Report Says LinkedIn Quietly Scans Browsers for Thousands of Extensions and Device Data

Date:

Getting your Trinity Audio player ready...

A new BrowserGate security report suggests that LinkedIn’s website may be running hidden JavaScript code that checks visitors’ browsers for more than 6,000 installed Chrome extensions and gathers detailed information about their devices. 

This script reportedly probes for specific extension identifiers and also collects hardware and software details such as CPU core count, available memory, screen resolution, time zone, language settings, and battery status to build a unique browser fingerprint. 

Many of the identified extensions include tools related to LinkedIn’s own services or competitors, while LinkedIn says the scanning is intended to detect extensions that violate its terms and protect site stability—asserting it does not use the data to draw conclusions about sensitive personal information. 

The practice, which isn’t clearly disclosed in LinkedIn’s privacy policy, has raised privacy concerns because the collected data could potentially be tied back to individual user profiles. More info

View more information.

View online discussions.

Share post:

spot_imgspot_img

Popular

More like this
Related

Hackers accessed personal information for up to 70,000 people in Canada Life data breach

https://twitter.com/globeandmail/status/2046346225059033574?s=20

Apple CEO Tim Cook will step down as CEO

https://twitter.com/CNN/status/2046332373780902181?s=20

What Banks Don’t Want You To Know

https://youtu.be/yPPAjsCogAc

Happy Canada Day

https://twitter.com/MarkJCarney/status/1940035009798172732