It's mayonnaise calling milk white...
Enable Protocol Monitor in DevTools on Chrome and observe the tab freeze due to the volume of messages over QUIC and CDP...
Is somebody exlcuding CDP from being capable of "tracking" users? Histograms, origin trials, and so forth...
Google Chrome Labs rolls out Isolated Web Apps with all of the "cross-origin" isolation ideas - and gates WICG Direct Sockets behind IWA's.
Well, if I'm more interested in Direct Sockets than the idea of an "Isolated Web App" then I'm going to get out of whatever alleged "sandbox" supposedly set up using one or several of the *many* Web API's that provide that functionality, including WebRTC.
So, you've allegedly cross-origin isolated the Isolated Web App. But wait... I can make HTTP, HTTPS, WS, WSS, WebRTC and Web extension connections to the IWA. So you really don't have a cross-origin, isolated application.
I'd go so far as to assert it is IMPOSSIBLE to completely isolate origins on any window in a browser - given the amount of Web API's already available, and that keep being spit out. Web Bluetooth, Web Serial, hell Web Audio API, or just images and media files.
So the shiver me timbers shock value ain't really there for ethical hackers that already know there is no "security" for any signal communications.
You want "security" turn off the device and go to the library, pick a random book and read it at a table, then put the book back on the shelf.