LinkedIn secretly scans for 6,000+ Chrome extensions, collects data
I initially ignored the first post about this after LinkedIn had stated it did not dispute that it detects specific browser extensions, telling BleepingComputer that the info was used to protect the platform and its users. The company also claimed the report was from someone whose account was banned for scraping LinkedIn content and violating the site's terms of use.
But others have been digging deeper into this issue, and it does appear that the data collection is a lot broader than the reasons that LinkedIn gave. For example LinkedIn is scanning for over 6,000 extensions (most of which have nothing to do with scraping of data from websites), and they do this by scanning the files on the drive for those extensions, as well as collecting other data about the user's machine.
It was not verified though that LinkedIn is actually sharing this data with any other parties. My own website's Matomo stats engine for example does also collect machine data (type of device, browser, pages visited, and city) but the data stays on my platform and I don't identify anyone from it.
It is just worth remembering that there are some companies who do aggressively collect data and some (like Facebook) who openly state they share that with upstream providers and 3rd parties (yes you can assume data brokers). If I ever visit a Facebook page it happens in a private browser via a VPN.
In LinkedIn's case I suppose we do need to remember it is owned by Microsoft, and they have an AI service. Their record around security and privacy has also not been great over time.
See
LinkedIn secretly scans for 6,000+ Chrome extensions, collects data
A new report dubbed "BrowserGate" warns that Microsoft's LinkedIn is using hidden JavaScript scripts on its website to scan visitors' browsers for installed extensions and collect device data.
#
technology #
privacy #
LinkedIn