|
Getting your Trinity Audio player ready...
|
A new BrowserGate security report suggests that LinkedIn’s website may be running hidden JavaScript code that checks visitors’ browsers for more than 6,000 installed Chrome extensions and gathers detailed information about their devices.
This script reportedly probes for specific extension identifiers and also collects hardware and software details such as CPU core count, available memory, screen resolution, time zone, language settings, and battery status to build a unique browser fingerprint.
Many of the identified extensions include tools related to LinkedIn’s own services or competitors, while LinkedIn says the scanning is intended to detect extensions that violate its terms and protect site stability—asserting it does not use the data to draw conclusions about sensitive personal information.
The practice, which isn’t clearly disclosed in LinkedIn’s privacy policy, has raised privacy concerns because the collected data could potentially be tied back to individual user profiles. More info







