LinkedIn is illegally searching your computer (browsergate.eu)
1327 points by digitalWestie 7 hours ago
haswell 6 hours ago
The headline seems pretty misleading. Here’s what seems to actually be going on:
> Every time you open LinkedIn in a Chrome-based browser, LinkedIn’s JavaScript executes a silent scan of your installed browser extensions. The scan probes for thousands of specific extensions by ID, collects the results, encrypts them, and transmits them to LinkedIn’s servers.
This does seem invasive. It also seems like what I’d expect to find in modern browser fingerprinting code. I’m not deeply familiar with what APIs are available for detecting extensions, but the fact that it scans for specific extensions sounds more like a product of an API limitation (i.e. no available getAllExtensions() or somesuch) vs. something inherently sinister (e.g. “they’re checking to see if you’re a Muslim”).
I’m certainly not endorsing it, do think it’s pretty problematic, and I’m glad it’s getting some visibility. But I do take some issue with the alarmist framing of what’s going on.
I’ve come to mostly expect this behavior from most websites that run advertising code and this is why I run ad blockers.
andersonpico 6 hours ago
How is probing your browser for installed extensions not "scanning your computer"?
Calling the title misleading because they didn't breach the browser sandbox is wrong when this is clearly a scenario most people didn't think was possible. Chrome added extensionId randomization with the change to V3, so it's clearly not an intended scenario.
> vs. something inherently sinister (e.g. “they’re checking to see if you’re a Muslim”)
They chose to put that particular extension in their target list, how is it not sinister? If the list had only extensions to affect LinkedIn page directly (a good chunk seem to be LinkedIn productivity tools) they would have some plausible deniability, but that's not the case. You're just "nothing ever happens"ing this.
haswell 5 hours ago
> How is probing your browser for installed extensions not "scanning your computer"?
I think most people would interpret “scanning your computer” as breaking out of the confines the browser and gathering information from the computer itself. If this was happening, the magnitude of the scandal would be hard to overstate.
But this is not happening. What actually is happening is still a problem. But the hyperbole undermines what they’re trying to communicate and this is why I objected to the title.
> They chose to put that particular extension in their target list, how is it not sinister?
Alongside thousands of other extensions. If they were scanning for a dozen things and this was one of them, I’d tend to agree with you. But this sounds more like they enumerated known extension IDs for a large number of extensions because getting all installed extensions isn’t possible.
If we step back for a moment and ask the question: “I’ve been tasked with building a unique fingerprint capability to combat (bots/scrapers/known bad actors, etc), how would I leverage installed extensions as part of that fingerprint?”
What the article describes sounds like what many devs would land on given the browser APIs available.
To reiterate, at no point am I saying this is good or acceptable. I think there’s a massive privacy problem in the tech industry that needs to be addressed.
But the authors have chosen to frame this in language that is hyperbolic and alarmist, and in doing so I thing they’re making people focus on the wrong things and actually obscuring the severity of the problem, which is certainly not limited to LinkedIn.
ryandrake 5 hours ago
emacdona 5 hours ago
nightpool 5 hours ago
ksymph 4 hours ago
Kuraj 2 hours ago
globular-toast 40 minutes ago
lejalv 4 hours ago
franktankbank 4 hours ago
afandian 6 hours ago
When "the browser is the OS", scanning that is a pretty big chunk of "your computer".
chii 6 hours ago
latkin 5 hours ago
autoexec 2 hours ago
taneq 6 hours ago
m-schuetz 3 hours ago
Scanning your computer is an entirely different thing than scanning browser extensions. By maximizing the expectation via "Illegally searching your computer", the truth suddenly appears harmless.
islandfox100 an hour ago
1shooner 5 hours ago
>Calling the title misleading because they didn't breach the browser sandbox is wrong
By this logic we could also say that LinkedIn scans your home network.
andersonpico 5 hours ago
leptons an hour ago
>How is probing your browser for installed extensions not "scanning your computer"?
The same way taking a photo of a house from the street is not the same as investigating the contents of your pantry.
amw-zero 2 hours ago
It 100% implies that it's looking for locally installed binaries.
TZubiri 43 minutes ago
Because "scanning your computer" technically could include scanning plugins, but it could also include scanning your files, your network or your operating system.
While "scanning your browser" would be more accurate and would exclude the interpretation that it scans your files.
The reason the latter is not used is that, even though more precise and more communicative, it would get less clicks.
j45 6 hours ago
There are rules and laws about fingerprinting too, I thought.
moffkalast 4 hours ago
injidup 6 hours ago
In the same way that scanning and identifying your microwave for food you put inside it is not the same as scanning your house and reading the letters in your postbox.
Your browser is a subset of your computer and lives inside a sandbox. Breaching that sandbox is certainly a much more interesting topic than breaking GDPR by browser fingerprinting.
al_borland 6 hours ago
> I’ve come to mostly expect this behavior from most websites that run advertising code and this is why I run ad blockers.
Expecting and accepting this kind of thing is why everyone feels the need to run an ad-blocker.
An ad-blocker also isn’t full protection. It’s a cat and mouse game. Novel ideas on how to extract information about you, and influence behavior, will never be handled by ad-blockers until it becomes known. And even then, it’s a question of if it’s worth the dev time for the maker of the ad-blocker you happen to be using and if that filter list gets enabled… and how much of the web enabling it breaks.
haswell 6 hours ago
To be clear, expecting != accepting.
The point was more that the headline frames this as some major revelation about LinkedIn, while the reality is that we’re getting probed and profiled by far more sites than most people realize.
echelon an hour ago
LinkedIn's whole business model is gatekeeping their database.
They're scanning your extensions to make sure you aren't using third party tools to scrape LinkedIn.
It's stupid, but they're trying to stop people from making money on LinkedIn when they feel like they're the only ones that should be able to do that.
gausswho 40 minutes ago
armchairhacker 5 hours ago
Regulation is also a cat-and-mouse game. Life is a cat-and-mouse game.
lastofthemojito 6 hours ago
> this is why I run ad blockers.
It's pretty wild that we live in a world where the actual FBI has recommended we use ad blockers to protect ourselves, and if everyone actually listened, much of the Internet (and economy) as we know it would disappear. The FBI is like "you should protect yourself from the way that the third largest company in the world does business", and the average person's response is "nah, that would take at least a couple of minutes of my time, I'll just go ahead and continue to suffer with invasive ads and make sure $GOOG keeps going up".
integralid 4 hours ago
>the average person's response is "nah, that would take at least a couple of minutes of my time,
As a data point I, a technical person who tweaks his computer a lot, was against adblocking for moral reasons (as a part of perceived social contract, where internet is free because of ads). Only later I changed mi mind on this because I became more privacy aware.
ronsor 3 hours ago
bookofjoe 2 hours ago
whynotmaybe 3 hours ago
ACow_Adonis 3 hours ago
xboxnolifes 4 hours ago
The crazier part is that its an official government position, and we (people at large / the government) aren't immediately slapping down the actions of these companies.
nickvec 5 hours ago
Majority of people use their mobile devices these days to browse the Internet. Installing an ad blocker on your iPhone is a significantly bigger challenge than on desktop.
lemoncookiechip 5 hours ago
Rychard 5 hours ago
SirHumphrey 5 hours ago
Fwirt 2 hours ago
jshier 4 hours ago
treetalker 5 hours ago
lII1lIlI11ll 3 hours ago
juliangmp 5 hours ago
pants2 5 hours ago
registeredcorn 4 hours ago
iso1631 5 hours ago
streetfighter64 5 hours ago
SoftTalker 3 hours ago
Every browser should have ad blocking technology included and enabled by default. I do not understand why Apple in particular has not pushed this with Safari, as they like to portray that they care about privacy.
I get why Chrome doesn't, and that's why you should not use it. But Netscape? Edge? What is stopping them?
Browsing the web without an ad blocker is a miserable experience. Users who have never tried or don't know how to set one up would be delighted.
lastofthemojito 2 hours ago
bookofjoe 2 hours ago
MidnightRider39 2 hours ago
meroes 4 hours ago
It’s worse than that. My mom wants to see ads. I thought I was doing her a favor adding her to my pihole but she really likes ads, especially Facebook ads.
surajrmal 5 hours ago
Don't worry, soon you'll need to pay every website 5.99 a month because AI is destroying click through rates. The internet will likely be far worse without ads than with ads. Solving the tracking problem doesn't need to be mixed up with blocking ads outright. What's funny is that tracking isn't nearly as meaningful for click through rates on ads as relevance to what's on the page, and yet so much effort is placed onto tracking for the slim improvement it provides.
array_key_first 5 hours ago
mrkeen 4 hours ago
zadikian 4 hours ago
DebtDeflation 5 hours ago
eipi10_hn 2 hours ago
ozgrakkurt 4 hours ago
tombert 5 hours ago
b112 5 hours ago
KellyCriterion 4 hours ago
toomuchtodo 5 hours ago
jcgrillo 5 hours ago
nathan_compton 3 hours ago
jonathanstrange 5 hours ago
ajsnigrutin 5 hours ago
Forgeties79 5 hours ago
stronglikedan 2 hours ago
> the average person's response is ... I'll just go ahead and continue to suffer with invasive ads
The real reason is that the average person neither suffers with ads nor finds ads invasive, despite what a vocal online minority would have you believe. We just ignore them and get on with life. ::shrug::
chickensong an hour ago
mcmcmc 3 hours ago
The FBI also recommended people use commercial VPNs… coincidentally they don’t need a warrant to spy on communications that leave the country
autoexec 2 hours ago
unmole 5 hours ago
> and if everyone actually listened, much of the Internet (and economy) as we know it would disappear.
Would it really? It seems to me that most normal users spend most of their time and attention on apps, not in browsers.
phplovesong 4 hours ago
YT made sure adblockers ruin the experience. We really need a good YT alternative, as it has become AI slop (shorts) and most new videos are of real poor quality.
Gagarin1917 3 hours ago
i_love_retros 5 hours ago
Half the population are fucking idiots. Possibly more than half.
They need to be protected by the state because they can't think for themselves.
The problem is in most countries and especially America the state is a corrupt cesspool.
IAmBroom 3 hours ago
throwawayq3423 3 hours ago
pluralmonad 4 hours ago
lstodd 3 hours ago
j45 5 hours ago
Ad blockers focus on ads, not fingerprinting.
ronjouch 5 hours ago
autoexec 2 hours ago
mewmewblobcat 5 hours ago
throwawayq3423 3 hours ago
fallinditch 5 hours ago
I asked an LLM to create a plan for a 'digital rebirth' in order to minimize privacy harms. It's a lot of work, but increasingly: a worthwhile endeavor.
amlib 4 hours ago
replwoacause 6 hours ago
I disagree, I think we should push back hard on behavior like this. What business is it of LinkedIn's what browser extensions I have installed? I think the framing for this is appropriate.
kps 6 hours ago
Why is it possible for a web site to determine what browser extensions I have installed? If there are legitimate uses, why isn't this gated behind a permission prompt, like things like location and camera?
haswell 6 hours ago
roblabla 6 hours ago
mrweasel 3 hours ago
taneq 5 hours ago
jacquesm 5 hours ago
MagicMoonlight 6 hours ago
haswell 6 hours ago
To broaden my point, I think we’d find that many websites we use are doing this.
My point isn’t that this is acceptable or that we shouldn’t push back against it. We should.
My point is that this doesn’t sound particularly surprising or unique to LinkedIn, and that the framing of the article seems a bit misleading as a result.
autoexec 2 hours ago
devy 6 hours ago
Aurornis 6 hours ago
> What business is it of LinkedIn's what browser extensions I have installed?
The list of extensions they scan for has been extracted from the code. It was all extensions related to spamming and scraping LinkedIn last time this was posted: Extensions to scrape your LinkedIn session and extract contact info for lead lists, extensions to generate AI message spam.
That seems like fair game for their business.
autoexec 2 hours ago
tartoran 5 hours ago
52-6F-62 5 hours ago
MikeNotThePope 5 hours ago
If I had to guess, LinkedIn would be primarily searching for extensions that violate their terms of service (e.g. something that could be used to scrape data). They put a lot of effort into circumventing automated data collection. I could be wrong.
jacquesm 5 hours ago
> I think we should push back hard on behavior like this.
Indeed, so I gather all of you have canceled your LI account over this?
I never made one in the first place because it was pretty clear to me that this company - even before the acquisition - had nothing good in mind.
phendrenad2 4 hours ago
So why not say that LinkedIn is murdering people? I mean, if all you care about is raising awareness with maximal clickbait...
Aurornis 6 hours ago
This has been covered several times including reverse engineering of the code. The list of extensions they check for doesn’t include common extensions like ad blockers. It’s exclusively full of LinkedIn spamming and scraping type of extensions.
They also logically don’t need to fingerprint these users because those people are literally logging in to an account with their credentials.
By all appearances they’re just trying to detect people who are using spam automation and scraping extensions, which honestly I’m not too upset about.
If you never install a LinkedIn scraper or post generator extension you wouldn’t hit any of the extensions in the list they check for, last time I looked.
honzaik 5 hours ago
it apparently scans for something like "PQC Checker", an extension for checking if TLS connection is PQC-enabled? how is that a spam extension (and thats just a random one i saw)
Aurornis 5 hours ago
austin-cheney 31 minutes ago
> I’m not deeply familiar with what APIs are available for detecting extension
Here is what the article says:
Method 1
async function c() {
const e = [],
t = r.map(({id: t, file: n}) => {
return fetch(`chrome-extension://${t}/${n}`)
});
(await Promise.allSettled(t)).forEach((t, n) => {
if ("fulfilled" === t.status && void 0 !== t.value) {
const t = r[n];
t && e.push(t.id);
}
});
return e;
}
Method 2 async function(e) {
const t = [];
for (const {id: n, file: i} of r) {
try {
await fetch(`chrome-extension://${n}/${i}`) && t.push(n);
} catch(e) {}
e > 0 && await new Promise(t => setTimeout(t, e));
}
return t;
}
The API is making an HTTP request to chrome-extension://${store_id}/${file_name}
There is then a second stage where they walk the DOM looking for text signatures and element attributes indicative of the store_id valuesIt looks like the user has the freedom to manage this by launching chrome with this flag: --disable-extensions
It also seems there is an extension for extension management to deny extension availability by web site: https://superuser.com/questions/1546186/enable-disable-chrom...
VladVladikoff 6 hours ago
It is likely in response to scraping. Linked in is heavily scraped by scammers who do the BEC scams. So linked in is trying to find ways to link together banned accounts, to handle their ban evasion.
I run a site which attracts a lot of unsavoury people who need to be banned from our services, and tracking them to reban them when they come back is a big part of what makes our product better than others in the industry. I do not care at all about actually tracking good users, and I am not reselling this data, or anything malicious, it's entire purpose is literally to make the website more enjoyable for the good users.
dweinus 6 hours ago
Understandable, and yet none of that makes it ok.
jacquesm 5 hours ago
> it's entire purpose is literally to make the website more enjoyable for the good users.
There are people who actually enjoy using LinkedIn?
colechristensen 4 hours ago
>Linked in is heavily scraped by scammers who do the BEC scams.
It's also heavily scraped by businesses for lead generation for sales and recruiting. Either before their API became available or to not pay them or to get around the restrictions of their API.
cachius 3 hours ago
> expect to find in modern browser fingerprinting
No. Don't need extensions for that. See how Cloudflare Turnstile does it, recently popped up at https://news.ycombinator.com/item?id=47566865 cause ChatGPT uses it now:
Layer 1: Browser Fingerprint WebGL (8 properties): UNMASKED_VENDOR_WEBGL, UNMASKED_RENDERER_WEBGL, WEBGL_debug_renderer_info, getExtension, getParameter, getContext, canvas, webgl
Screen (8): colorDepth, pixelDepth, width, height, availWidth, availHeight, availLeft, availTop
Hardware (5): hardwareConcurrency, deviceMemory, maxTouchPoints, platform, vendor
Font measurement (4): fontFamily, fontSize, getBoundingClientRect, innerText. Creates a hidden div, sets a font, measures rendered text dimensions, removes the element.
DOM probing (8): createElement, appendChild, removeChild, div, style, position, visibility, ariaHidden
Storage (5): storage, quota, estimate, setItem, usage. Also writes the fingerprint to localStorage under key 6f376b6560133c2c for persistence across page loads.
Scanning for 6000 extensions is anti-competitive, surveillant and immoral.
chromacity 5 hours ago
> I’m not deeply familiar with what APIs are available for detecting extensions, but the fact that it scans for specific extensions sounds more like a product of an API limitation (i.e. no available getAllExtensions() or somesuch) vs. something inherently sinister
This seems like a really weird argument to make. The fact that the platform doesn't provide a privacy-violating API is not an extenuating circumstance. LinkedIn needed to work around this limitation, so they knew they're doing something sketchy.
For the record, I don't think they're being evil here, but the explanation is different: they're don't seem to be trying to fingerprint users as much as they're trying to detect specific "evil" extensions that do things LinkedIn doesn't want them to do on linkedin.com. I guess that's their prerogative (and it's the prerogative of browsers to take that away).
davedx 4 hours ago
What are the religious-related extensions described in the article doing that's "evil"?
chromacity 3 hours ago
drnick1 an hour ago
The bigger problem I see here is browser security and Javascript as a whole. Browsers should not be allowed to extract and send such vast amounts of information in the first place, especially without the user's consent. At most, they should return a few broad things such as browser type (major version), language perhaps, and device type (mobile/desktop). That's it. Other things, such as exact resolutions, time zones, and other hardware identifiers make it trivially easy to track users across the Internet. Now that it's too late to revise Web standards, browsers should default to return spoofed values for all the rest.
lxgr 5 hours ago
> The scan probes for thousands of specific extensions by ID, collects the results
Why exactly does Chrome even allow this in the first place!? This is the most surprising takeaway for me here, given browser vendors' focus on hardening against fingerprinting.
spopejoy 4 hours ago
Firefox FTW. I was relieved to find this was a Chrome-only problem.
lxgr 3 hours ago
Griffinsauce an hour ago
> But I do take some issue with the alarmist framing of what's going on.
On the contrary, your framing is quite defeatist IMO. The fact that stores get robbed frequently does not mean we should just normalize that and accept it as a fact of life.
mcv 5 hours ago
Why is JavaScript running in a page even allowed to know what extensions I have? Is this also what sites use to see I've got an ad blocker?
Just run everything in a safe environment that it can't look out of.
cwmma 4 hours ago
The page isn't allowed to know what extensions you have, instead LinkedIn is looking for various evidence that extensions are installed, like if an extension was to create a specific html element, LinkedIn could look for evidence of that element being there.
Since the extensions are running on the same page as LinkedIn (some of them are explicitly modifying the LinkedIn the website) it's impossible to sandbox them so that linked in can't see evidence of them. And yes this is how a site knows you have an ad blocker is installed.
eipi10_hn an hour ago
socalgal2 an hour ago
How does this scan happen. AFAIK there is no API for a webpage to scan for extensions. The most a page could do is try to figure out indirectly if an extension exists if that extension leaks info into the page.
stronglikedan 2 hours ago
> sounds more like a product of an API limitation (i.e. no available getAllExtensions() or somesuch) vs. something inherently sinister (e.g. “they’re checking to see if you’re a Muslim”)
Then why search for PordaAI or Deen Shield? Or more specifically, since getAllExtensions() would return them, why would they be on the "scan list", instead of just ignored?
darepublic 5 minutes ago
linked in is scummy but yes I was puzzled by how linked in could scan your comouter from the browser. when i saw they meant extensions I thought aha.
gabbagool 3 hours ago
Just because someone lets the electrician (LinkedIn) into their home (browser) doesn't mean they can do whatever the hell they want that isn't expressly prohibited. If the electrician wants to rifle through my desk drawers, they should ask for permission, and I will politely tell them to leave.
longislandguido 3 hours ago
If your electrician was known to be hostile like the Internet, then you'd put locks on your drawers.
The browser security model right now is more like those completely ineffective "gun free zone" signs cities tack up in public parks.
xXSLAYERXx 3 hours ago
I worked for a company that sold b2b contact data and they had (maybe still have) a linkedIn extension. It basically enriched the linkedIn profile. I wonder if linkedIn is trying to block these, or heavily target, in some way, these types of users to push folks towards their sales navigator.
catlifeonmars 5 hours ago
> I’m certainly not endorsing it, do think it’s pretty problematic, and I’m glad it’s getting some visibility. But I do take some issue with the alarmist framing of what’s going on.
Speaking has someone who shares the same lack of surprise, perhaps some alarm is warranted. Just because it’s ubiquitous doesn’t mean it’s ok. This feels very much frog in boiling water for me.
Why do you think the alarmist framing is unwarranted?
haswell 4 hours ago
I do think a degree of alarm is appropriate.
But it’s critical to sound the correct alarm.
To me, it seems like the authors pulled the fire alarm for a single building when in reality there’s a tornado bearing down.
And by doing so, everyone is scrambling about a fire instead of the response a tornado siren would cause.
They’re both dangerous and worthy of an immediate reaction, but the confusion and misdirection this causes seems deeply problematic.
When people realize the fire wasn’t real, they start to question the validity of the alarm. The tornado is still out there.
I realize this analogy is a bit stretched.
As someone who has spent quite a lot of time steeped in security/privacy research, the stuff described in the article has been happening pervasively across the industry.
People absolutely should be alarmed. Many of us have been alarmed for quite some time. Raising the alarm by saying “LinkedIn is searching your computer” isn’t it.
mr-wendel 4 hours ago
tpoacher 5 hours ago
I get the point you're making, but to be clear, "they’re checking to see if you’re a Muslim" vs "they’re checking to see if your fingerprint matches that of known Muslims in our ever-expanding database" are not too far off.
Bender 3 hours ago
Javascript can query chrome extensions [1] and much more [2].
francoi8 3 hours ago
This blows my mind. What good reason is there for giving javascript such permissions by default? This should at the minimum trigger an explicit permission request from the user.
jredwards 6 hours ago
I've been avoiding Chrome-based browsers for many years now but have only recently become aware of how catastrophically low the Firefox market share is. I'm kind of shocked that more people aren't choosing to avoid Chrome.
giancarlostoro 6 hours ago
> It also seems like what I’d expect to find in modern browser fingerprinting code.
Time to figure out if I can make FireFox pretend to be Chrome, and return random browser extensions every time I visit any website to screw up browser fingerprinting...
inetknght 6 hours ago
> the fact that it scans for specific extensions sounds more like a product of an API limitation (i.e. no available getAllExtensions() or somesuch) vs. something inherently sinister (e.g. “they’re checking to see if you’re a Muslim”).
Your computer is your private domain. Your house is your private domain. You don't make a "getAllKeysOnPorch()" API, and certainly don't make "getAllBankAccounts()" API. And if you do, you certainly don't make it available to anyone who asks.
It absolutely is sinister.
neya 6 hours ago
> I’ve come to mostly expect this behavior from most websites that run advertising code and this is why I run ad blockers.
We should not normalise nor accept this behaviour in the first place.
dcchuck 3 hours ago
I agree. The first paragraph on the page implies the javascript can natively search your machine (vs. via Browser Extensions)
pqtyw 6 hours ago
> no available getAllExtensions()
Well great there is no avalable 'getAllFiles()' or such either because they'd be scanning your files for "fingerprinting" as well.
> alarmist framing
Well they literally searching your computer for applications/extensions that you have installed? (and to an extent you can infer what are some of the desktop applications you have based on that too)
fasterik 5 hours ago
>this is why I run ad blockers.
It's important to note that this isn't fixed by ad blockers. To avoid this kind of fingerprinting, you need to disable JavaScript or use a browser like Firefox which randomizes extension UUIDs.
spopejoy 4 hours ago
Yes, but FF also prevents the extension scanning. It's scandalous that Chrome allows this!
urig 5 hours ago
The tracking described is extremely invasive. You say you are not endorsing it but you are certainly normalizing it. This is unacceptable.
The people behind this URL are trying to hold Microsoft accountable. The power to them.
FloorEgg 4 hours ago
I wonder if their motivation for doing this is to detect the LinkedIn automation tools that power all the spam messaging and connection requests?
nkrisc 6 hours ago
> i.e. no available getAllExtensions() or somesuch) vs. something inherently sinister (e.g. “they’re checking to see if you’re a Muslim”
But I bet they could reliably guess your religious affiliation based on the presence of some specific browser extensions.
caminante 5 hours ago
They already have so much telemetry from your phone, IP, etc.
God forbid they make an educated guess based on your actual LinkedIn connections, name, interests, etc.
Betelbuddy 5 hours ago
The next step for a forensic investigator, is to found out how many of those extensions, are actually from a partner or fully owned subsidiary from LinkedIn... When you see a cockroach...
RankingMember 5 hours ago
> this is why I run ad blockers.
What's been really obnoxious lately is the number of sites I try to do things on that are straight up broken without turning off my ad-blocker.
jollymonATX an hour ago
Your expectations do not matter here frankly. This reads like CFAA to me, unauthorized access.
MisterTea 6 hours ago
> The scan probes for thousands of specific extensions by ID, collects the results, encrypts them, and transmits them to LinkedIn’s servers.
Why is this even possible in the first place? It's nobodies business what extensions I have installed.
storus 4 hours ago
Which browsers in which mode (normal/private) are affected?
thfuran 4 hours ago
>vs. something inherently sinister
This is inherently sinister.
whimsicalism 3 hours ago
this is obviously not fingerprinting code to anyone with a brain, it's about scraping
chistev 4 hours ago
But what would be the benefit of them doing that?
secondcoming 2 hours ago
My biggest gripe is why these JS APIs even exist in the first place
nailer 4 hours ago
> The headline seems pretty misleading.
Yes. I was expecting LinkedIn was connecting to extensions that are using their exhanced privileges to scan your computer, per the "LinkedIn Is Illegally Searching Your Computer" headline.
Instead, LinkedIn is scanning for extensions.
dfxm12 4 hours ago
But I do take some issue with the alarmist framing of what’s going on.
I’ve come to mostly expect this behavior from most websites that run advertising code
We should be alarmed that websites we go to are fingerprinting us and tracking our behavior. This is problematic, full stop. The fact that most websites are doing this doesn't change that.
wat10000 5 hours ago
Your post sounds like "it sounds bad, but it's no different from what others do, so it's not that bad."
I would put it more like: it sounds bad, and it's no different from what others do, so they're all that bad.
The fact that they're working around an API limitation doesn't make this better, it just proves that they're up to no good. The whole reason there isn't an API for this is to prevent exactly this sort of enumeration.
It's clear that companies will do as much bad stuff as they can to make money. The fact that you can do this to work around extension enumeration limits should be treated as a security bug in Chrome, and fixed. And, while it doesn't really make a difference, LinkedIn should be considered to be exploiting a security vulnerability with this code.
j45 5 hours ago
There is clear rules around what you can and can't do to fingerprint users. if it's being done overtly, covertly, obscurely, indirectly, all for the same result through direct or indirect or correlated metadata it ends up with the same outcome.
My understanding is the rules and laws are to prevent the outcome, by any means, if it's happening.
j45 6 hours ago
I wonder if this is part of the reason why LinkedIn tabs seem to use so much ram, and sometimes run away CPU processes.
j45 5 hours ago
> "they're checking to see if you're a Muslim"
This could be easily inferred from the depth, breadth, and interconnectedness of data in the website.
By downplaying it, it's allowing it to exist and do the very thing.
The issue here is this stuff is working likely despite ad blockers.
Fingerprinting technology can do a lot more than just what can be learned from ads.
From the site:
"The scan doesn’t just look for LinkedIn-related tools. It identifies whether you use an Islamic content filter (PordaAI — “Blur Haram objects, real-time AI for Islamic values”), whether you’ve installed an anti-Zionist political tagger (Anti-Zionist Tag), or a tool designed for neurodivergent users (simplify). Under GDPR Article 9, processing data that reveals religious beliefs, political opinions, or health conditions requires explicit consent. LinkedIn obtains none." https://browsergate.eu/extensions/
mentalgear 6 hours ago
> The scan probes for thousands of specific extensions by ID, collects the results, encrypts them, and transmits them
And probably also vibe-coded therefore 2 tabs of LinkedIn take up 1GB of RAM (was on the front page a few days back).
ef2k 2 hours ago
A few years ago, intentionally fingerprinting or tracking your users without disclosure was spyware and unethical. Alas, here we are.
Anyway, what they're calling "spectroscopy", is a combination of extension probing and doing residue detection (looking for what extensions might leave behind in the DOM).
An ad blocker is not necessarily equipped to help since the script is embedded with the application code. Since they're targetting Chrome, switching browsers will help with the probing but not the detection part and you'll still be fingerprinted.
The only way forward is for browser vendors to offer a real privacy or incognito mode where sites are sandboxed by default. When the default profile is identical across millions of users there won't be anything unique to fingerprint.
Beestie 2 hours ago
I don't have a linkedin acct. So imagine my shock when I "googled" myself and found a linkedin profile connecting my name to a company I presently have a consulting arrangement with (1099 not W2). I went ballistic and fired off an email to the consulting firm to take down the profile immediately or face legal action (a bluff). Couple days later, the company forwarded an email they received from linkedin confirming the profile had been taken down.
So this is just a heads up that even if you don't have a linkedin account, they will create one on your behalf so might better check (assuming you neither have nor want one).
TheSkyHasEyes a minute ago
Of all the reading I've done on this story, your comment so far is the only post which would explain why linkedin is even doing this.
If anyone else as any more info on the why, please share.
crazygringo 32 minutes ago
What's the path for that to even happen?
Are companies now commonly uploading lists of employees to LinkedIn? Is this happening automatically because you got an e-mail account from the company and the company runs on MS Office? What triggered it?
This seems like somewhat of a scandal that deserves its own post, but it also needs a lot more details to be trustworthy and for people to understand what exactly is happening.
Also, was there some way for you to take ownership of the profile? Did it depend on verifying a certain e-mail address? Does it require you to get the company to remove it, or could you take ownership and then delete the LinkedIn account/profile yourself?
andersonpico 6 hours ago
this is a massive violation of trust
> The scan doesn’t just look for LinkedIn-related tools. It identifies whether you use an Islamic content filter (PordaAI — “Blur Haram objects, real-time AI for Islamic values”), whether you’ve installed an anti-Zionist political tagger (Anti-Zionist Tag), or a tool designed for neurodivergent users (simplify).
Aurornis 5 hours ago
Many extensions designed to scrape data from social media websites are disguised as simple extensions that do something else.
If I had to guess: I sought that automatic content blurrer, neurodivergent website simplifier, or anti-Zionist tagger actually work. They’re all just piggybacking on trending topics to get users to install them and then forget about them, then they exfiltrate the data when you visit LinkedIn.
cryptoegorophy 4 hours ago
This. Do not install any extension unless you absolutely need. Assume they all leak your browsing data. Not familiar with Google but if you can just vibe code your own extension then do that.
cousin_it 2 hours ago
dcchuck 3 hours ago
crazygringo 30 minutes ago
It's for fingerprinting and possibly ad targeting.
It's no different from when you visit an Islamist or anti-Zionist website that has analytics/trackers/ads on it.
It's bad, but this "massive violation of trust" is happening everywhere and has been for decades. There's nothing that's unique to Microsoft here.
egorfine 6 hours ago
> this is a massive violation of trust
This is not. To violate trust, there should have been some.
chii 6 hours ago
There's an implicit trust that a site doesn't try to racially profile you, as it is illegal. There's no enforcement, but that's why trust is being violated.
hedora 5 hours ago
gwerbin 6 hours ago
Almost certainly they are using that for audience segmentation and ad targeting. Clever and disgusting. This isn't the invention of some evil moustache-twirling executive, this was the invention of an employee or group of employees who value money more than morals. We should think of such employees as henchmen.
luxuryballs 5 hours ago
if they do a better job at showing me an ad that might be relevant to me, how is that disgusting? if I have to see an ad at all I at least want them to give it their best shot
alt227 3 hours ago
GrinningFool an hour ago
gwerbin 5 hours ago
buellerbueller 3 hours ago
franktankbank 3 hours ago
einpoklum 6 hours ago
If you mean by the website, then - surely not. What basis do you have to trust websites you visit? Especially a social network that owned by Microsoft to boot?
If you mean the _browser_, then I agree in principle, but - it is a browser offered to you by Alphabet. And they are known to mass surveillance and use of personal information for all sorts of purposes, including passing copies to the US intelligence agencies.
But of course, this is what's promoted and suggested to people and installed by default on their phones, so even if it's Google/Alphabet, they should be pressured/coerced into respecting your privacy.
bethekidyouwant 6 hours ago
It scans thousands so in thousands, some of them have these weird names
cenal an hour ago
There is no reason to trust any big tech company. Folks should be using containers in their browser if they care about privacy. I previously published a LinkedIn container extension for FireFox: https://addons.mozilla.org/en-US/firefox/addon/linkedin-cont... although as many know you can achieve the same results with Firefox containers without a specific extension like mine if you configure it manually.
I will work on an improvement to that extension so that it can block these scans if they attempt them in firefox.
lxgr 5 hours ago
All I'm seeing is that Chrome apparently is failing to properly sandbox websites against extension fingerprinting.
Sure, this can be solved at the legal layer, but in this case, there seems to be a much simpler and more effective technical solution, so why not pursue that instead?
streetfighter64 5 hours ago
Well, the developers of Chrome aren't exactly incentivized to prevent tracking (though perhaps tracking done by their competitors). But anyway, you can try to prevent it with a technical solution while also being outraged that they did it. If someone has their home broken into, perhaps they should have better locks, but the burglar is still responsible for their actions.
Johnny555 3 hours ago
>the fact that it scans for specific extensions sounds more like a product of an API limitation (i.e. no available getAllExtensions() or somesuch)
Why should a website be able to scan for extensions at all?
Or if there's a legitimate need (like linkedin.com wants to see if you installed the linkedin extension), leave it up to the extension to decide if it wants to reveal itself. The extension can register a list of URL patterns it will reveal itself to. So the linkedin extension might reveal itself only to *.linkedin.com, a language translation extension might reveal itself to everyone, and an adblocker extension might not choose to reveal itself to anyone.
black3r 2 hours ago
that's basically how it already works...
extensions choose on which site they're active and if they provide any available assets (e.g. some extensions modify CSS of the website by injecting their CSS, so that asset is public and then any website where the extension is active can call fetch("chrome-extension://<extension_id>/whatever/file/needed.css" if it knows the extension ID (fixed for each extension) and the file path to such asset... if the fetch result is 404, it can assume the extension is not installed, if the result is 200 it can assume the extension is installed.
This is what LinkedIn is doing... they have their own database of extension IDs and a known working file path, and they are just calling these fetches... they have been doing it for years, I've noticed it a few years back when I was developing a chrome extension which also worked with LinkedIn, but back then it was less than 100 extensions scanned, so I just assumed they want to detect specific extensions which break their site or their terms of use... now it's apparently 6000+ extensions...
OhMeadhbh 5 hours ago
Fwiw... I now run personal and professional browser profiles from two different jails / cgroups. It's a pain in the arse to set up, and I have to verify my config still works after every update, but I get a good feeling knowing my personal chocolate is not mixing in with my professional peanut butter.
I set up the cgroups hack so I could route traffic from a dev profile into a VPS vpn, and may not be that useful for everyone.
But I think this is a reminder that you may want to have at least two profiles: one public and the other private. Do you really want Microsoft to know you installed the "Otaku Neko StarBlazers Tru-Fen Extendomatic" package to change every picture of a current political figure to an image from the cast of Space Battleship Yamato?
flat-like-paper 2 hours ago
I... I searched for this extension.
fsflover 2 hours ago
> I now run personal and professional browser profiles from two different jails / cgroups. It's a pain in the arse to set up, and I have to verify my config still works after every update
You may be interested in Qubes OS. My daily driver. Can't recommend it enough.
arafeq 6 hours ago
the part about scanning for 509 job search extensions is especially nasty. imagine getting flagged to your employer because linkedin detected you had a job board extension installed.
al_borland 6 hours ago
Several years ago I heard the company I worked for say they had a way to get notified if it seemed like an employee might be thinking of leaving, so they could take some kind of action. I now wonder if LinkedIn, or various job sites, were selling them data.
nico 3 hours ago
LinkedIn might not need to sell the data. You can set your profile to “open for work” privately, and only recruiters can see it. So if your company has people with LinkedIn recruiter accounts, they could see your profile set to looking for work
PS: I guess given that recruiter accounts are paid, LinkedIn is technically selling access to the data in a way
kjkjadksj 4 hours ago
It is pretty easy to signal stuff on linkedin without intending to do so. For example whenever I get an old coworker adding me on linkedin, they are 100% of the time job seeking. Inevitably they start a new role some weeks later.
All one has to do is just measure employees linkedin activity. I mean truthfully people don’t use the site at all if they aren’t actively looking for work. It is corporate dystopia otherwise. It is trivial to find these signals.
Ajedi32 6 hours ago
LinkedIn is a job board so that seems unlikely.
mikkupikku 6 hours ago
Are you kidding? They've probably been selling a datastream of who in the company has been job searching to company HR departments the whole time. Search for a job on LinkedIn and I bet anybody with a paid corporate account can find that out if they care to.
keeda an hour ago
Ikatza 4 hours ago
whimsicalism 3 hours ago
bdangubic 6 hours ago
LinkedIn is a job board as much as Facebook is picture-sharing website
debesyla 5 hours ago
hmokiguess 5 hours ago
Separate question, why isn't this kind of stuff something the browser restricts access to or puts behind an approval gate to the end user?
silverwind 3 hours ago
kjkjadksj 4 hours ago
Chrome is adware.
z3ratul163071 6 hours ago
why would the browser ever expose extensions api to a web page. does firefox does this as well?
ceejayoz 6 hours ago
The "The Attack: How it works" section explains how it works. It's not an API.
I am a little surprised something like CORS doesn't apply to it, though.
acorn221 6 hours ago
So these extensions allow linkedin to do this though, it's literally them saying "yes, this site can ping this resource" - called "web_accessible_resources".
This is fair from Linkedin IMO as I've seen loads of different extensions actually scraping the linkedin session tokens or content on linkedin.
entropyneur 3 hours ago
Panda4 6 hours ago
> Every time you open LinkedIn in a Chrome-based browser, LinkedIn’s JavaScript executes a silent scan of your installed browser extensions.
It's not clear though, either they only tested against chrome-based browsers or Firefox isn't enabling them to do so.
edit: I answered before I go fully through the article but it does say it's only Chrome based.
> The extension scan runs only in Chrome-based browsers. The isUserAgentChrome() function checks for “Chrome” in the user agent string. The isBrowser() function excludes server-side rendering environments. If either check fails, the scan does not execute.
> This means every user visiting LinkedIn with Chrome, Edge, Brave, Opera, Arc, or any other Chromium-based browser is subject to the scan.
OoooooooO 6 hours ago
Firefox uses UUID for the local extension url per extension so you can't search for hardcoded local urls.
dylan604 6 hours ago
What is a Chrome-based browser? Isn't Chrome Google's Chromium based browser? How many are based on Chrome?
Panda4 6 hours ago
andersonpico 6 hours ago
thom 6 hours ago
I was under the impression Firefox randomises extension IDs on install, so hopefully not?
hedora 5 hours ago
The answer to "why would Chrome ever undermine privacy and security?" is always "Google's revenue stream".
I'm happy to see that this doesn't hit firefox. I wonder if safari is impacted.
Raed667 6 hours ago
they seem to be calling `chrome-extension://.....` so i don't think it applies to firefox
gburgett 6 hours ago
The “how it works” page suggests it only works on chrome based browsers. Anyone able to determine if firefox or safari are affected too?
pamcake 6 hours ago
Firefox-based browsers not affected.
nottorp 6 hours ago
Hmm I opened linkedin in Firefox and ublock origin showed it blocked 4 items... then switched away and back and the counter was up to 12.
Is that enough blocking, I wonder?
tankenmate 5 hours ago
RunningDroid 6 hours ago
> The “how it works” page suggests it only works on chrome based browsers. Anyone able to determine if firefox or safari are affected too?
The code filters out non-chrome browsers: >The extension scan runs only in Chrome-based browsers. The isUserAgentChrome() function checks for “Chrome” in the user agent string. The isBrowser() function excludes server-side rendering environments. If either check fails, the scan does not execute.
jamesgill 5 hours ago
https://browsergate.eu/extensions/
It seems to not scan for Privacy Badger and uBlock Origin, two extensions I rely on. That's...surprising.
x0x0 4 hours ago
Because what they're scanning for is scrapers. So much linkedin scraping. And I'd bet that the majority of the innocuous-looking extensions are scrapers hidden as other extensions to get users to unknowingly use them.
searls 5 hours ago
Read this:
> Every time any of LinkedIn’s one billion users visits linkedin.com, hidden code searches their computer for installed software, collects the results, and transmits them to LinkedIn’s servers
And thought, "no way in hell this gets by Safari."
And then, under "The Attack: How it Works":
> Every time you open LinkedIn in a Chrome-based browser
Shocker. If you use a Chromium-based browser, you should expect to be trading away your privacy, IME.
jobberknoll 3 hours ago
Can't be said enough: Stop using Chrome.
padjo 2 hours ago
Also: stop installing random extensions
aerhardt an hour ago
A lot of extensions on LinkedIn are necessary because of their total lack of innovation. You really cannot do anything in B2B sales or recruiting with only LinkedIn tools. These are not random extensions, but crucial extensions literally saving billions of dollars in wasted time or creating massive opportunities in the global economy.
tiku 5 hours ago
I remember the LinkedIn app that got all your contacts from your phone and tried to add them to your network. I had random people from internet-deals (local craigslist) that where popping up. So strange that this was allowed.
devy 6 hours ago
LinkedIn has been a weirdest social network for a long time.
theandrewbailey 5 hours ago
What scanning for browser extensions taught me about B2B sales
hnuser435 4 hours ago
Wish they'd add a little more to what end-users can do about it like switch to a non chrome-based browser.
ChrisMarshallNY 3 hours ago
It's a call for funding. I suspect the answer they want, is click on a donation link; regardless of which browser you're using.
dmos62 an hour ago
What's an optimistic future for Web fingerprinting? Currently, a website's ability to fingerprint the browser, the device, and the user is absolutely ridiculous.
Here's a quick look at only the static things a website can fingerprint https://www.browserscan.net/.
seamossfet 6 hours ago
I wonder how much of this is also used for audience segmentation for their advertisements? Linkedin ads are some of the most expensive out of any social media platform, but they also tend to have the highest conversion since you can get pretty niche with your targeting.
charles_f 5 hours ago
It will sound like finessing on details, but details are important in these kind of claims, and this seems incorrect
> Microsoft has 33,000 employees and a $15 billion legal budget
Microsoft has more than 220k employees (it's hard to follow with all the layoffs), and the G&A in which bankrolls legal expenses (but not only - it also contains basically every employee who's not engineering or sales) was only 7B in 2025 - so legal budget is much lower than that.
hjk2 6 hours ago
How a web site can search one's computer?
RajT88 6 hours ago
TFA explains it is looking for installed browser extensions (which sites are allowed to do)
hedora 5 hours ago
"allowed" by the web browser, but almost certainly not by the end user. The law is pretty clear on this in the US:
> 'the term “exceeds authorized access” means to access a computer with authorization and to use such access to obtain or alter information in the computer that the accesser is not entitled so to obtain or alter;'
The problem, of course, is that by clicking on a LinkedIn link, you agree to a non-negotiated contract that can change at any time, and that you have never seen. If that weren't allowed, then this sort of crap would correctly be considered "unauthorized access":
cedilla 6 hours ago
Allowed to do? Not prevented from by technical measures, but certainly not allowed to do.
Considering the goal is to identify people, this is undeniably PII. As the article demonstrates, it also pertains sensitive information.
Someone 6 hours ago
https://browsergate.eu/how-it-works/: “Every time you open LinkedIn in a Chrome-based browser, LinkedIn’s JavaScript executes a silent scan of your installed browser extensions”
⇒ which Chrome allows sites to do.
mrgoldenbrown 6 hours ago
TFA goes into a lot of detail explaining why they "allegedly" aren't actually allowed to do so in the EU.
cwillu 6 hours ago
Well, they're able to do it; “allowed” to do it is an ambiguous enough phrasing that it's practically begging to have an argument whose crux is fundamentally about a differing interpretation.
RajT88 6 hours ago
stefanka 4 hours ago
Can you build a version of chromium where this will just return false always?
breppp 6 hours ago
it can in the fantasy world of incorrect headlines
esseph 6 hours ago
While you're at it, you should also find out why a website can scan your internal network...
crest 6 hours ago
The title is clickbaity. The website scans the browser for installed extensions.
hmokiguess 6 hours ago
This website was difficult to follow but I found that this page https://browsergate.eu/extensions/ was the most helpful to understand what they were talking about
Essentially, they are labelling you, like most do, but against some interesting profiles given the kinds of extensions they are scanning for
Joeboy 6 hours ago
The most obvious reason for this is browser fingerprinting, right? So your visits to other websites can be linked to your Linkedin identity? Or no?
glenstein 6 hours ago
They also try to profile for things like political beliefs.
Someone 6 hours ago
I don’t see this article showing that. They query for extensions that could be used to do that, and that likely already is illegal, but those queries could solely be used to uniquely identify users (grabbing more bits makes it less likely to get collisions)
hedora 5 hours ago
glenstein 4 hours ago
whimsicalism 3 hours ago
no, it's about scraping.
kartoffelsaft 4 hours ago
I want to know what power I have as just some guy to do anything about this? (even if just for myself)
I ask because it seems like every job I apply to asks for a linkedin profile, and I've heard floating around that if it's not filled in enough most employers assume you're a bot. Heck, one of the forms from the "who's hiring" thread yesterday straight up said if you have < 100 connections they'd throw out your application. So, in order to get my foot in the door, I need to hand over vast and intricate data about my personal life to a third party?
OkayPhysicist 4 hours ago
For you personally, to solve this issue in particular? Use Firefox. Google is evil, and there's a good chunk of the Chrome team who are actively enemy combatants.
For the broader issue of not wanting to give even the information you'd need to choose to share to LinkedIn? Network the good ol' fashioned way: talking to random strangers in San Francisco bars.
JumpCrisscross 2 hours ago
> there's a good chunk of the Chrome team who are actively enemy combatants
Uh what.
OkayPhysicist an hour ago
solarkraft 4 hours ago
This is why the EU regulates them (or pretends to) as a public utility. The individual action I took was to donate to Fairlinks‘ legal fund.
nojvek 4 hours ago
I’d suggest having an adblocker first.
Second not having a ton of extensions. Extensions can do fishy things.
This is Chrome’s broken model. Before installing an extension, one should be able to see all the domains an extension talks to.
The domains should be listed in manifest. But that’s not how it works.
In Android, every app you open needs a gazillion default permissions.
stronglikedan 2 hours ago
Oh boy, they stand to lose dozens of users over this! DOZENS!
SiteRelEnby 3 hours ago
Enumerated a full list.
https://git.gay/SiteRelEnby/browsergate-list
https://git.gay/SiteRelEnby/browsergate-list/src/branch/main...
SiteRelEnby 3 hours ago
Some of the spiciest:
* Anti-Zionist Tag (directly inferring political opinion)
* PordaAI (Islamic content filter)
* simplify (browsergate.eu specifically called out as a neurodivergent accessibility tool. Job search autofill that markets itself as particularly useful for people who struggle with forms)
* No more Musk ("Hides digital noise related to Elon Musk")
* Political Circus ("Politician -> Clown AI Filter")
* Job application trackers and utils ("Job Follow-Up Tracker" etc)
* Various "Distraction Blocker" type addons
LinkedIn scanning for tools that scrape LinkedIn:
* LinkedIn Cookie Sync for Headhunting Agent
* LinkedIn Cookie importer for Derrick (lol "for Derrick")
* MailMatics Cookie Grabber
* LinkedIn Fake Job Post Detector. Yes, they're detecting an addon that exposes fake job postings on their own platform.
*NOT* in the list, if you were wondering:
* Shinigami Eyes
* Dark Reader
* Adblockers
* Password managers
* FoxyProxy
* User-Agent spoofers, request modification tools, etc
* Most privacy/security tools (no uBO, no Privacy Badger, no FoxyProxy, no NoScript, etc.
For the latter category, the most interesting things there we found *were* searched-for are BuiltWith Technology Profiler, and some browser addons bundled from scanners (e.g. "Malwarebytes Browser Guard Beta").
pbiggar 3 hours ago
The Anti-Zionist tag is interesting. It seems that it's actually an extension that would be used by Zionists, as it identifies anti-zionists, and the wording incorrectly claims that anti-Zionism is hate speech (whereas it is in fact Zionism that is hate-based ideology).
A lot of Zionists claim -- incorrectly -- that all Jews as Zionists. But certainly the major groups of Zionists are Christian zionists and Jewish Zionists. I would say there is a very very high chance that if you use the Anti-zionist Tag Chrome extension, that you are Jewish.
So it seems quite likely that Linkedin is actually tracking Jews with this.
nticompass 6 hours ago
> Every time you open LinkedIn in a Chrome[actually Chromium]-based browser
There's a reason I continue to use Firefox (with uBlock Origin) and will never switch.
Also, when I got laid off from a previous job, I made a LinkedIn profile to help find a new job. Once I found a new job, I haven't logged into LinkedIn since - that was almost 2 years ago.
stevetron 4 hours ago
I'm certain that if LinkedIn were confronted, that they could produce a response that says they are covered by the TOS you had to agree to in order to use the site. I don't have time to spend scanning legalease. Or make use of LinkedIn. If my system is being scanned, they'll see that I'm using a legitimate licensed copy of Windows 7 on a MODERN computer. If anything is at fault, it includes web browsers that Identify themselves to web sites.
GuestFAUniverse an hour ago
AFAIK it can be fined with up to 4% of revenue in the EU.
How much is that currently? $600M?
ericyd 6 hours ago
I don't like any of this, but I'm not totally clear how this is substantially different from other fingerprinting technologies which I assume are used by every large tech company. Could anyone elaborate? The post isn't very clear why this is different from other data surveillance.
cedilla 6 hours ago
If other people collect data like that it's probably also illegal.
arafeq 5 hours ago
the difference is intent. regular fingerprinting identifies your browser for ad tracking. linkedin is scanning for 509 specific extensions including job search tools, and they sell recruiter products to your employer. that's not fingerprinting, that's workplace surveillance with extra steps.
fooofw 2 hours ago
How is it even possible that we've reached a point where "yes, this is obvious and pretty unsurprising" is the default response to spying on an industrial scale.
mentalgear 6 hours ago
Interesting. I didn't know a extension’s web-accessible resource (e.g. chrome-extension://<id>/...) could be abused to learn about the user's installed extensions by checking whether it resolves or not.
davidmurdoch 6 hours ago
You would need to use use_dynamic_url: true in the manifest to create a unique one.
acorn221 6 hours ago
Yeah, this is the easiest way to get around it
philipwhiuk 6 hours ago
Or just not allow them to load the URIs at all
arndt 6 hours ago
Is there a way to disable the ability for websites to scan for extensions in Chrome?
xoxxala 6 hours ago
dev1ycan 6 hours ago
Nope, which is why Chrome exists, to allow Google to do this. Which is why you should avoid chromium.
elwebmaster 3 hours ago
LinkedIn also violates SPAM regulations on a regular basis. Despite of me having disabled all emails from this service I consistently receive promotional emails. LinkedIn defines a new "type of promotional email" for which it assumes it has implicit consent to send unsolicited emails and proceeds to do so. It then has a fake compliance apparatus by allowing the victim to once again "unsubscribe" from the newly created email subscription which they never consented to on the first place. I really hope there is a class action and these scumbags get fined.
red_admiral 6 hours ago
"searching your computer" -> using standard web fingerprinting techniques. They don't actually get to read your home directory, and the authors should be honest about this!
two_handfuls 5 hours ago
That's on brand. I remember their phone app asking for contacts permission and just taking them all and uploading them to their server.
llacb47 6 hours ago
This title should be changed as no court found this is illegal, and this is pretty standard, if extensive, browser fingerprinting, however disagreeable it is
caminante 5 hours ago
I agree.
I'm not convinced by their page explaining "Why it's illegal and potentially criminal" [0]. It's written by security researchers and non-attorneys.
For example, this characterization seems overly broad:
> The Court of Justice of the European Union has ruled, in three separate cases, that data which allows someone to infer or deduce protected characteristics is covered by this prohibition, regardless of whether the company intended to collect sensitive data.
hnburnsy 5 hours ago
Go check out QueryAllPackages permission on Android and see which of your apps can scan and know about all the other apps on your Phone. Thanks Google!
gib444 5 hours ago
All apps can do that right
pier25 6 hours ago
I alway use LinkedIn and Meta websites in a different browser altogether.
I hope browsers in the future will need to ask for permission before doing any of that.
dt3ft 6 hours ago
If you use both from the same IP without using a VPN… the profiles are most certainly grouped. There are commercial datasets on IP addresses with almost 100% accuracy with tags like “school”, “house”, “apartment block” etc. Furthermore, if you ever logged into both sites from within the same browser by accident, the link by fingerprinting was made right there and then. The final profile on you may not be 100% accurate, but certainly is in the 98% range.
gwerbin 6 hours ago
It's one thing if they have a shadow profile on you (and dozens of companies almost certainly do), but it's another thing if you give them meaningful info about you to enrich that profile with. They can figure out roughly what block you live on, OK fine, but unless you're in a rural area with no neighbors they might not be able to do much better than that.
alt227 2 hours ago
free_bip 6 hours ago
They only mention this being a potential violation of the DMA. How about north american countries? US and Canada?
hedora 5 hours ago
Since the list of extensions they query targets certain religious groups and medical conditions, it's almost certainly in violation of US federal employment and hiring law.
mrkeen 2 hours ago
Yep, LinkedIn is cancer.
2020 - LinkedIn Sued For Spying on Clipboard Data After iOS 14 Exposes Its App:
https://wccftech.com/linkedin-sued-for-spying-on-clipboard-d...
2013 - LinkedIn MITM attacks your iPhone to read your mail:
https://www.troyhunt.com/disassembling-privacy-implications-...
2012/2016 - Data breach of 164.6 million accounts:
https://haveibeenpwned.com/breach/LinkedIn
According to haveibeenpwned.com, my email & password were leaked in both the 'May 2012' and 'April 2021' LinkedIn incidents.
tombert 2 hours ago
I'm shocked, shocked to find that a Microsoft product will actively do a bunch of horrible invasive stuff while simultaneously not caring about security of this private data.
robert23mg an hour ago
seems like clickbaiting, browser can't 'scan' your computer...
jacquesm 5 hours ago
Not mine. And why do we say LinkedIn, it is just Microsoft, just like Github is Microsoft and a whole raft of other companies are just Microsoft in a trenchcoat.
ChicagoDave 3 hours ago
I run MalwareBytes on all my browsers and as my computer protection system.
LinkedIn is getting nothing.
alt227 3 hours ago
Lol, you forgot the /s
AmazingTurtle 5 hours ago
6 months ago I already posted about this
EdNutting 5 hours ago
If you hadn’t written that post using AI, it might’ve received more attention. Also, (1) if you’d put LinkedIn in the title, rather than the very bottom of the post, and (2) if you’d provided any insight, rather than just speculation, as to what the data might be being used for.
lagrange77 4 hours ago
> The headline seems pretty misleading.
No it isn't. Performing fingerprinting on user's devices, to ultimately profit of financially or worse is misleading. Especially doing this while knowing the user isn't aware what this really means and just deciding it for them.
The headline is just an exaggerated way of saying what is really happening.
sumanep 6 hours ago
Bait, just look at browser addons, millons of site do it as well
badgersnake 5 hours ago
Therefore it’s okay, is that your point? Because I don’t think it is.
oelmgren 3 hours ago
Is there evidence that they use that information for anything other than browser fingerprinting or fraud detection?
That seems like the most obvious use case? Or maybe I missed something in the write up.
kibwen 3 hours ago
We can hypothesize that there may exist some for-profit companies that deserve the benefit of the doubt. Microsoft is not one of them.
pizzuh 4 hours ago
i dont like that i pay them $79 a month for them to scrape my extensions
daft_pink 5 hours ago
I don’t understand how browser security would allow linkedin to search my computer?
nathias 36 minutes ago
linkedin is full of dark patterns, it's really unfortunate it became the business default, all other social platforms get more criticism while being only a fraction as bad
mikkupikku 6 hours ago
LinkedIn has been overtly evil for decades, and their power users are the most insufferable sort of middle management yuppy scum. I know job searching can be hard, but I don't go near LinkedIn with a ten foot pole.
anon22981 6 hours ago
I really like going to linkedin daily to play minisudoku and a couple of other puzzles, then never engage the feed or other features
jameskilton 6 hours ago
Why would you go to LinkedIn to play puzzle games? There's thousands of other places to do so.
butlike 6 hours ago
This is really delightfully quirky
liyu-aka-lukyu 5 hours ago
Deleted my account. Fixed!
everdrive 6 hours ago
Sounds like containers and potentially adblocking and js blocking prevent this. For my part, I use linked in on my "god dammnit I hate corporate websites so much" browser which is used only for medical bill pay and amazon / wal mart purchases and then monthly bills. Could LinkedIn get something from me there? Potentially, but they're also not really following me around the web. I think given this I'll go install a 3rd browser for linkedin only, or maybe finally just delete my account. It never got me a job and it's a cesspool.
notafox 6 hours ago
You can use Firefox with different profiles and configure it to launch particular profile directly, without launching default profile and using about:profiles.
Firefox with a non-default profile can be created like that:
./firefox -CreateProfile "profile-name /home/user/.mozilla/firefox/profile-dir/"
# For linkedin that would be:
./firefox -CreateProfile "linkedin /home/user/.mozilla/firefox/linkedin/"
And you can launch it like that: ./firefox -profile "/home/user/.mozilla/firefox/profile-dir/"
# For linkedin that would be:
./firefox -profile "/home/user/.mozilla/firefox/linkedin/"
So, given that /usr/bin/firefox is just a shell script, you can - create a copy of it, say, /usr/bin/firefox-linkedin
- adjust the relevant line, adding the -profile argument
If you use an icon to run firefox (say, /usr/share/applications/firefox.desktop), you'll need to do copy/adjust line for the icon.Of course, "./firefox" from examples above should be replaced with the actual path to executable. For default installation of Firefox the path would be in /usr/bin/firefox script.
So, you can have a separate profiles for something sensitive/invasive (linkedin, shops, etc.) and then you can have a separate profile for everything else.
And each profile can have its own set of extensions.
laughing_snyder 5 hours ago
Directly on the landing page:
> Microsoft has 33,000 employees
this should probably be LinkedIn, not Microsoft.
syn0x 4 hours ago
LinkedIn is full of lunatics, does not surprise me at all.
acorn221 6 hours ago
This gave someone the opportunity to add in "Jeffery_Epstein_did_not_kill_himself" to linkedin's client facing code base through this. If you open dev tools -> network tab -> network search icon (magnifying glass) -> search for "epstein" and load up linkedin, you should see it for yourself too!
I really don't think they're "illegally" searching your computer, they're checking for sloppy extensions that let linkedin know they're there because of bad design.
chromacity 5 hours ago
The real story is what's going on behind the scenes. The charges are relatively flimsy (for the reason I mentioned in my other comment). But here's the cool thing: the site is basically taken from Microsoft's playbook. For years, they pretty transparently bankrolled shadowy, single-issue "grassroots advocacy" groups that went after their competitors under flimsy pretenses. These organizations attacked others but somehow never had an opinion about stuff like Windows Copilot.
This feels very similar, except now it's taking a swing at Microsoft. It's apparently paid for by some mysterious "trade association and advocacy group for commercial LinkedIn users" that runs out of a private PO box in a small German town - uh huh. I'm not going to feel bad for Microsoft, but I would love to read some investigative reporting down the line.
chad_strategic 4 hours ago
I run ad blockers and pihole, does that help?
foxes 6 hours ago
It seems it scans your extensions not your system - reading the details. The intro made it a bit unclear.
jwsteigerwalt 6 hours ago
LinkedIn is far from the only actor doing this. Browser extension fingerprinting is not new. LinkedIn‘s size, scope, network effects make this especially concerning.
Ajedi32 6 hours ago
Still pretty annoying browsers haven't patched that yet.
acorn221 6 hours ago
They have! It's these developers either not knowing or not caring about it which is the issue! I did a blog post about this a while back showing how they do it, and how you can get around it, it's not very complex for the devs.
https://www.linkedin.com/pulse/how-linkedin-knows-which-chro...
victor106 5 hours ago
Ajedi32 6 hours ago
halapro 6 hours ago
There's nothing to patch, scanning is not possible.
It's either the extension's choice to become detectable ("externally_connectable" is off by default) or it makes unique changes to websites that allow for its detection.
Ajedi32 6 hours ago
cj 6 hours ago
This has been going on for at least 5 years. It pops up on HN every so often.
sgt 6 hours ago
Seems like it. Which is serious but far from what I thought when I read the title. I suspect 90% of LinkedIn users don't even have a single browser extension installed.
josefritzishere 6 hours ago
I would debate that. Most work computers have some extensions installed by default. That's millions of laptops. Ex. Snow Inventory Agent, ad blockers etc.
choo-t 6 hours ago
Pretty sure that if they could they would, but browsers sandboxing security prevent this to go unnoticed.
hcfman 6 hours ago
I hate the way they just started saying you have a new message when you really don't. Now I'm going to miss when I really have new messages for a while because I'm not going to go to that site anymore when they say that.
And not letting you read your messages when on your mobile phone unless you use their app is particularly mean. Considering again where they are sending all the information they scrape.
dzonga 5 hours ago
some of these things are just an effect of using chromium browsers.
use safari or Firefox. and chrome only for incognito web app testing.
tamimio 2 hours ago
Amazing work, but it’s not surprising, I think anyone in cybersec space knows that LinkedIn is the number one source of information when it comes to track or ID someone, and I don’t mean just OSINT given the real data you have, but also three letters agencies love it, it’s a gold mine, wasn’t the silkroad owner was busted because of the same personal email used on LinkedIn? So yeah, delete it, never use it, it’s full of corporate cringy nonsense anyway
kvisner 3 hours ago
I can't say I needed yet another reason to hate the current state of LinkedIn, but I am not surprised in the slightest.
bitfilped 4 hours ago
Despite the misleading headline, I really don't understand why anyone uses linkedin, there will inevitably be a trailing rely of comments claiming it has some irreplaceable value in professional networking, but I don't buy it. Nobody I've ever talked to has been able to articulate any actual value provided by "connecting" to another person on a social networking site. If you want to build professional connections go to lunch, join community calls, attend professional events, and go to conferences.
trey-jones 6 hours ago
The fact that every job application wants a link to my profile on a platform that tries to push "brain training puzzle and games" on me just makes me angry every single time. I really hate LinkedIn and my active rebellion against it is hurting my ability to find a new job.
I know there has been other LinkedIn hate on HN this week. I know they have some good tools for job searching and hiring. I still wish we as a society could move on and leave this one with MySpace.
da_grift_shift 6 hours ago
This is https://news.ycombinator.com/item?id=46904361, right?
bethekidyouwant 6 hours ago
Chrome: lets website scan what extensions you have installed for some reason.
Fokamul 6 hours ago
This is result of browser fingerprinting.
My guess, Linkedin is used for years as source of valuable information for phishing/spear-phishing.
Maybe their motive is really spying. But more important for them is to fight against people botting Linkedin.
Imho, browser fingerprinting should be banned and EU should require browser companies to actively fight against it, not to help them (Fu Google)
jen729w 6 hours ago
I can’t take an article seriously that starts:
> Every time any of LinkedIn’s one billion users visits linkedin.com, hidden code searches their computer for installed software
and then proceeds not to explain how it’s doing that to me, a Safari user.
Because, spoiler: it isn’t. Or, it might try to search, and fail, and nothing will be collected.
liyu-aka-lukyu 5 hours ago
Deleted my LinkedIn account. Fixed.
EdoardoIaga 6 hours ago
The headline seems pretty misleading
dboreham 5 hours ago
Exactly how is it "illegal" to run code that exercises some aspect of the legitimate browser API surface? Are there functions marked as legal, and others marked as illegal?
JoelMcCracken 6 hours ago
This is true/valid in many ways, but the signs of significant AI gen are pretty obvious. And now I wonder how much of the overblown narrative is here.
This reminds me of the slop bug reports plaguing the curl project.
secretsatan 5 hours ago
Just use Safari, it won't even load the page half the time.
j45 5 hours ago
Browsers almost need a firewall against websites for the functions and scans being run on it by websites.
Different browsers have various settings available, but do we have a little snitch for a web browser?
knollimar 6 hours ago
Reminder for windows control alt shift windows L
pjmlp 5 hours ago
Another good reason not to use extensions, and leave whatever they do for utility apps.
donatj 6 hours ago
If they are genuinely only using the information to detect bad actors and maintain site stability as the affidavit states, and if they can prove it, this seems like potentially a non-issue?
I am not a lawyer, but site stability seems like a GDPR "Legitimate Interest" in my book anyway.
callamdelaney 4 hours ago
Typical microsoft
buellerbueller 5 hours ago
When Aaron Swartz does it, it is the threat of life in prison leading to suicide. When a multibillion dollar company does it, it is just capitalism.
HOLD EXECS LEGALLY ACCOUNTABLE, CRIMINALLY AND CIVILLY, FOR THE CRIMES OF THER CORPORATIONS.
VladVladikoff 6 hours ago
>The user is never asked. Never told. LinkedIn’s privacy policy does not mention it.
OMG is literally every article written with LLMs these days I just can't anymore. It's all so tiring.
an0malous 5 hours ago
I get it — it can be frustrating to encounter so much low effort AI content these days. But I think it’s worth looking at the bright side here: the increase in our production of entropy from GPU consumption will hasten the heat death of the universe.
Would you like me to suggest some AI summarizer tools you could use to more efficiently read AI generated content in the meantime?
nusl 5 hours ago
Why don't we train LLMs on the entire internet every day? Then we don't even need to read anything. Reading is something people did in 2025
jijijijij 5 hours ago
Nice try, but you em-dashed like a filthy human. The drone has been dispatched.
BrokenCogs 3 hours ago
sweetheart 5 hours ago
throwawayq3423 3 hours ago
> I get it —
well done
grub5000 6 hours ago
This is incredibly normal language and quite close to how I would write this quote, so what makes you think this is LLM text?
dd8601fn 4 hours ago
I've had the same thought pretty often, lately.
I get it... I'm not a good writer. It just sucks that now people are going to assume the stuff I said isn't even me.
I guess I always scored pretty low on the Turing test and never even knew it.
dwringer 2 hours ago
The other replies have explained what's jumping out but I'd agree that without the other surrounding sentences of the article's introduction I'd be inclined to think that quoted sentence by itself might be human. The full text, however, doubles down on the AI-smelling constructions and IMHO almost certainly indicates some AI provenance.
cyral 3 hours ago
It might be normal language but lets say maybe 5% of real human blog writers use short punchy phrases like that. The noticeable problem is now its 50% of blog posts because almost every single AI authored post uses the same phrasing, it's tiring knowing you are just reading ChatGPT output. Its usually part of a low-effort funnel to guide you to some product/service.
antonyt 3 hours ago
Is it actually stylistically close to how you'd write it? If I reformulate your comment in slop style I'd do something like:
The language is natural. Normal. Human. Who could question its authenticity?
The original example isn't the worst offender, but even small offenders stick out when you can't escape seeing this kind of thing everywhere.
GavinMcG 5 hours ago
It’s the fake drama. Punchy sentences. Contrast. And then? A banal payoff.
slfnflctd 4 hours ago
ocimbote 5 hours ago
nojs 5 hours ago
It’s 100% LLM text. HN really needs a button “flag as slop”.
Arubis 5 hours ago
Reading (and even more so, using the tools to produce) a bunch of LLM-output writing also affects one’s writing style. Ever sat down and blown through 3-4 books by a favorite author, then written something and found yourself using similar structure, word choice, style…? This could very well be a human author that’s been exposed to a lot of LLM output (ie 95% of this site’s audience).
I find myself doing this a lot, and I’m sure even more slips without my notice.
spopejoy 4 hours ago
> It's all so tiring.
What's tiring is a comment like this. If you don't like the article don't read it -- and don't comment.
BirAdam 4 hours ago
One cannot make an accurate assessment of liking or disliking an article without having read the article.
jack_ball 5 hours ago
I agree that that line reads GPT-like, but it's far from a conclusive tell. One option that I wonder about is if frequent interaction with AI will begin to influence people's organic writing style.
hybrid_study 5 hours ago
Who cares if it’s LLM written or assisted writing?
What matters is the content!
Biganon 3 hours ago
Nothing in this sentence is evidence of AI.
What's next? "There's punctuation in the sentence, must be AI" ?
beejiu 5 hours ago
LLMs didn't invent the "Rule of Three".
ottah 6 hours ago
How is that quote in any way demonstrative of this being written by LLM? You do know that LLMs were trained on the internet and every digitized text they could get their hands on? You are jumping at shadows, calm down already.
blargh 6 hours ago
what makes you think that? and what sets your comment appart from beeing created by an llm?
ugh123 4 hours ago
How can you tell?
elestor 2 hours ago
I don’t like AI slop as much as the next guy, but that part doesn’t seem so bad? Sounds like something anyone could write.
nickvec 5 hours ago
Ehh… this quote alone is pretty benign. If you didn’t mention it, I wouldn’t have even considered the possibility of AI.
SecretDreams 6 hours ago
That's the intention. Make the internet so unbelievably shit that you just accept and move on.
josefritzishere 6 hours ago
Why can't we have nice things?
mentalgear 6 hours ago
because corporate greed corrupts every nice thing: it pushes the other (maybe more moral) 'nice thing' alternatives out of the ecosystem by subsiding using VC funding to provide 'NiceThing!' for free until 'NiceThing!' is the monopoly or bought by another entity to become part of the monopoly (due to weak/not enforced antitrust laws).
crest 6 hours ago
Because we let them get away with it. Take something they're going to miss and can't replace (e.g. their freedom or their head) and it will stop as long as enforcement is reliable enough that they expect to get caught.
These aren't good people, but if you make the fine to the organisation much more expensive than the expected return, lock up the whole board and leave their families without a pot to piss in we will see this become the exception instead of the norm.
plagiarist 6 hours ago
Unbounded capitalism.
sourcegrift 6 hours ago
The only explanation of linkedin being worth 44B is the prominent appearance of both bill gates (who started spending a day a week at MS after nadella became ceo), and reid hoffman appear prominently in epstein files. The deal itself was finalized during Trump's first term. So everything checks out
_pdp_ 6 hours ago
The title is a complete nonsense.
jb1991 6 hours ago
So is this comment.
acorn221 6 hours ago
Yeah I agree
nxm 6 hours ago
Nothing but click-bait.
maplethorpe 6 hours ago
Doesn't it depend how they're storing the data? If it's sufficiently transformed, it could be considered fair use.
cwillu 6 hours ago
Copyright isn't relevant here.
largbae 6 hours ago
For my curiosity what would the fair use be?
maplethorpe 5 hours ago
Research.
hosteur 2 hours ago
No?
zephyrwhimsy 5 hours ago
The proliferation of AI coding assistants is shifting the bottleneck from writing code to reviewing code. The developers who will thrive are those who develop strong code review instincts.