❗Article Status Notice: Inappropriate Tone/Word Usage
This article needs additional work to meet the wiki's Content Guidelines and be in line with our Mission Statement for comprehensive coverage of consumer protection issues. Specifically it uses wording throughout that is non-compliant with the Editorial guidelines of this wiki.
Learn more ▼
How You Can Help: If this is a non-Theme article (See: Article types):
- Persuasive language should not be used in the Wiki's voice. Avoid loaded words, or the causing of unnecessary offense, wherever possible.
- No direct attacks on named individuals or companies. Malice may be attributed to bad and proven offenders, but only through the use of quotation and citation - never in the Wiki's voice.
If this is a Theme article:
- Where argumentation is used make sure it is clear and direct but not inflammatory. Avoid strong language, or causing unnecessary offense.
- No direct attacks on named individuals or companies. Malice may be attributed to bad and proven offenders, in a formal and calm manner.
This notice will be removed once sufficient documentation has been added to establish the systemic nature of these issues. Once you believe the article is ready to have its notice removed, visit either the Moderator's noticeboard, or the Discord (join here) and post to the #appeals channel.
LinkedIn Is Illegally Searching Your Computer.
Microsoft is running one of the largest corporate espionage operations in modern history.
Every time any of LinkedIn’s one billion users visits linkedin.com, hidden code searches their computer for installed software, collects the results, and transmits them to LinkedIn’s servers and to third-party companies including an American-Israeli cybersecurity firm.
The user is never asked. Never told. LinkedIn’s privacy policy does not mention it.
Because LinkedIn knows each user’s real name, employer, and job title, it is not searching anonymous visitors. It is searching identified people at identified companies. Millions of companies. Every day. All over the world.
This is illegal and potentially a criminal offense in every jurisdiction we have examined.
LinkedIn uses hidden JavaScript to silently scan users' browsers for over 6,000 installed extensions. This includes scans for competitors' tools, privacy software (VPNs/Ad-blockers), and extensions revealing sensitive personal data (religion/politics). The scan bypasses security boundaries and maps corporate software infrastructure without user consent. [1]
Incident
LinkedIn uses hidden JavaScript to silently scan users' browsers for over 6,000 installed extensions. This includes scans for competitors' tools, privacy software (VPNs/Ad-blockers), and extensions revealing sensitive personal data (religion/politics). The scan bypasses security boundaries and maps corporate software infrastructure without user consent.
Targeting:
The scans look for tools used by competitors, VPNs, ad blockers, and even extensions that reveal sensitive personal info like religion or political leanings
Corporate Espionage:
Because LinkedIn knows your employer, it can map the internal software infrastructure of millions of companies [2]
Consumer response
- Recommendation: Use Firefox, which is not susceptible to this specific API exploit.
- Technical Fix: Block the specific script
Chunk 905via network filtering.
References
- ↑ "uncontrolled". Retrieved browsergate.
{{cite web}}: Check date values in:|access-date=(help) - ↑ https://www.youtube.com/watch?v=mHj6IvBmlpU.
{{cite web}}:|first=missing|last=(help); Missing or empty|title=(help)