LinkedIn - Secretly Scans 6,000+ Chrome Extensions

Basically, LinkedIn is checking what Chrome extensions you have to gather data about you.
LinkedIn is scanning over 6,000 Chrome extensions to collect user data, raising significant privacy concerns. This could expose sensitive information about users and their corporate affiliations. Stay informed and protect your privacy.
What Happened
A recent report, dubbed BrowserGate, reveals that LinkedIn is using hidden JavaScript on its website to scan visitors' browsers for installed Chrome extensions. This technique allows LinkedIn to collect device data and link it to user profiles, raising serious privacy concerns.
According to Fairlinked e.V., an association of LinkedIn users, the platform checks for over 6,236 browser extensions. These include tools that compete with LinkedIn's own offerings, such as Apollo and ZoomInfo. This covert scanning enables LinkedIn to gather sensitive personal and corporate information without users' consent.
Who's Affected
The primary victims of this data collection are LinkedIn users, particularly those who utilize third-party browser extensions. Since LinkedIn accounts are tied to real identities and job roles, the implications of this data gathering extend to their employers and competitors.
What Data Was Exposed
LinkedIn's scanning script collects a variety of data, including:
- Installed browser extensions
- CPU core count
- Available memory
- Screen resolution
- Timezone and language settings
- Battery status
- Audio information
- Storage features
This data can be used to build unique browser profiles, potentially allowing for tracking across different websites.
What You Should Do
Users should be aware of these practices and consider the following actions:
- Review your browser extensions: Be cautious about what you install. Remove any extensions that you do not trust.
- Adjust privacy settings: Check your browser's privacy settings to limit tracking.
- Stay informed: Keep up with privacy news related to platforms you use.
LinkedIn's Response
In response to the allegations, LinkedIn claims that the data collected is used solely to protect the platform and its users. They argue that the scanning is necessary to identify extensions that scrape data without consent. LinkedIn has denied any malicious intent, stating that the claims stem from a dispute with a developer whose account was restricted for violating LinkedIn's terms of service.
Industry Context
This is not the first instance of aggressive fingerprinting techniques being employed. Similar methods have been reported in the past, including instances where companies like eBay used JavaScript to scan for remote support software. Such practices highlight a growing trend in the tech industry where user privacy is often compromised under the guise of security.
In conclusion, while LinkedIn defends its actions as protective, the implications of such extensive data collection practices warrant scrutiny. Users must remain vigilant about their online privacy and the tools they choose to use.