Business LinkedIn Faces Spying Allegations Over Browser Extension Scanning - A German group claims LinkedIn is 'illegally searching' users' computers. But the Microsoft-owned site says "Wait, you goys..!"

  • 🏰 The Fediverse is up. If you know, you know.
  • Want to keep track of this thread?
    Accounts can bookmark posts, watch threads for updates, and jump back to where you stopped reading.
    Create account
Link (archive)

UPDATE 4/7: LinkedIn was hit with two class-action lawsuits on Monday over the browser extensions scanning. However, LinkedIn says the dispute mischaracterizes practices already disclosed in its privacy policy.

Original Story:
LinkedIn is fending off allegations that it’s been secretly spying on users using a little-known JavaScript file built to scan for what browser extensions you use.

A German group that represents commercial LinkedIn users, Fairlinked e.V., claims the Microsoft-owned site is “running one of the largest corporate espionage operations in modern history.” In a report, Fairlinked notes that LinkedIn’s website uses a 2.7MB JavaScript file designed to detect Chrome browser extensions.

“The program runs silently, without any visible indicator to the user,” the group says. "It does not ask for consent. It does not disclose what it is doing. It reports the results to LinkedIn’s servers. This is not a one-time check. The scan runs on every page load, for every visitor.”

This browser extension “fingerprinting” technique has been spotted before, but it was previously found to probe only 2,000 to 3,000 extensions. Fairlinked alleges that LinkedIn is now scanning for 6,222 extensions that could indicate a user’s political opinions or religious views. For example, the extensions LinkedIn will look for include one that flags companies as too “woke,” one that can add an “anti-Zionist” tag to LinkedIn profiles, and two others that can block content forbidden under Islamic teachings.

It would also be a cakewalk to tie the collected extension data to specific users, since LinkedIn operates as a vast professional social network that covers people’s work history. Fairlinked's concern is that Microsoft and LinkedIn can allegedly use the data to identify which companies use competing products.

"LinkedIn has already sent enforcement threats to users of third-party tools, using data obtained through this covert scanning to identify its targets,” the group claims.

However, LinkedIn claims that Fairlinked mischaracterizes a LinkedIn safeguard designed to prevent web scraping by browser extensions. “We do not use this data to infer sensitive information about members,” the company says.

"Here’s why: some extensions have static resources (images, JavaScript) available to inject into our web pages. We can detect the presence of these extensions by checking if that static resource URL exists," the company says. "This detection is visible inside the Chrome developer console. We use this data to determine which extensions violate our terms, to inform and improve our technical defenses, and to understand why a member account might be fetching an inordinate amount of other members' data, which, at scale, impacts site stability."

The statement goes on to allege that Fairlinked is from a developer whose account was previously suspended for web scraping. One of the group's board members is listed as “S.Morell,” which appears to be Steven Morell, the founder of Teamfluence, a tool that helps businesses monitor LinkedIn activity.

LinkedIn adds: “They attempted to obtain an injunction in Germany, alleging LinkedIn had violated various laws. The court ruled against them and found their claims against LinkedIn had no merit, and in fact, this individual’s own data practices ran afoul of the law. Unfortunately, this is a case of an individual who lost in the court of law, but is seeking to re-litigate in the court of public opinion without regard for accuracy.”

Still, the Microsoft-owned site is facing some blowback for not clearly disclosing the browser extension scanning in LinkedIn’s privacy policy. That said, the policy does say: "We also get information about your network and device (e.g., IP address, proxy server, operating system, web browser and add-ons."

056OpracE89iK8CKMn26oPd-4.webp
(TOS describing LinkedIn getting information about your web browser and add-ons every time you visit)

In the meantime, Fairlinked is soliciting donations for a legal fund to take on Microsoft and is urging the public to encourage local regulators to intervene.


For a demonstration, click on Linkedin.com and click on f13 to see all the shiny lights.
Check if your chrome extensions are detectable on your browser or how visible you are to trackers.

Read BrowserGate yourself. (archive)
Every time any of LinkedIn’s one billion users visits linkedin.com, hidden code searches their computer for installed software, collects the results, and transmits them to LinkedIn’s servers and to third-party companies including an American-Israeli cybersecurity firm.

Shipping your data to third parties​

LinkedIn loads an invisible tracking element from HUMAN Security (formerly PerimeterX), an American-Israeli cybersecurity firm, zero pixels wide, hidden off-screen, that sets cookies on your browser without your knowledge. A separate fingerprinting script runs from LinkedIn’s own servers. A third script from Google executes silently on every page load. All of it encrypted. None of it disclosed.

Video version of tl;dr (preservetube)
 
mischaracterizes practices already disclosed in its privacy policy
Such a scheming, lawyer-brained mentality to think you can say "Ackchyually, it's right there in paragraph 87 of 6 point font that we can remotely activate your nannycam and let our indian call centers watch your children, we were totally transparent" and expect normal people to say ok, no big deal then...
 
Such a scheming, lawyer-brained mentality to think you can say "Ackchyually, it's right there in paragraph 87 of 6 point font that we can remotely activate your nannycam and let our indian call centers watch your children, we were totally transparent" and expect normal people to say ok, no big deal then...
It's why everyone says, "read the fine print," but that fine print takes longer to read than I've been alive.
 
>Flashbacks to all those times I was updating my LinkedIn profile, opened a new window, and was gripping my dick so hard while watching MILF lesbians that my weiner looked like one of those purple pool balls in front of the webcam.

Nooo.... NOOOOO... NOOOOOOOO~ Wait, actually, only slightly less embarrassing than the times my neighbors, boss, and local priest caught me. Eh, whatever.
 
Every time any of LinkedIn’s one billion users visits linkedin.com, hidden code searches their computer for installed software, collects the results, and transmits them to LinkedIn’s servers and to third-party companies including an American-Israeli cybersecurity firm.
Urge to fedpost...rising.
 
>Flashbacks to all those times I was updating my LinkedIn profile, opened a new window, and was gripping my dick so hard while watching MILF lesbians that my weiner looked like one of those purple pool balls in front of the webcam.

Nooo.... NOOOOO... NOOOOOOOO~ Wait, actually, only slightly less embarrassing than the times my neighbors, boss, and local priest caught me. Eh, whatever.
Just imagine how many pajeets have to look at pictures of buttholes all day. Whatever the number is, its not enough.
 
Just imagine how many pajeets have to look at pictures of buttholes all day. Whatever the number is, its not enough.
Why would someone be spreading their butthole next to a webcam while also on LinkedIn? Unless networking these days is way different from what I am used to.
 
A German group that represents commercial LinkedIn users, Fairlinked e.V., claims the Microsoft-owned site is “running one of the largest corporate espionage operations in modern history.” In a report, Fairlinked notes that LinkedIn’s website uses a 2.7MB JavaScript file designed to detect Chrome browser extensions.

“The program runs silently, without any visible indicator to the user,” the group says. "It does not ask for consent. It does not disclose what it is doing. It reports the results to LinkedIn’s servers. This is not a one-time check. The scan runs on every page load, for every visitor.”
This is stupid.

Displaying an HTML page with embedded or linked Javascript is consenting to running the Javascript. You can disable Javascript if you want.

It's not deceptive and you don't need to check the fine print of a contract to understand what you're agreeing to when you load a webpage in your browser.
 
This is stupid.

Displaying an HTML page with embedded or linked Javascript is consenting to running the Javascript. You can disable Javascript if you want.

It's not deceptive and you don't need to check the fine print of a contract to understand what you're agreeing to when you load a webpage in your browser.
Jewish hands typed this post.

"Yeah we did everything in our power to keep you from seeing what you agreed to but you still agreed to it"
 
If no one has had the pleasure, even if you hate Reddit, I would suggest perusing the https://old.reddit.com/r/linkedinlunatics sub for a glimpse into how insane the place is. It used to be a site to share your resume and connect with business contacts. Now it is some kind of containment zone for a bunch of really narcissistic and self-important ‘CEOs’ who post their insane philosophies on life and humanity between whatever drugs they are on.

IMG_1449.jpeg IMG_1450.jpeg IMG_1451.jpeg
 
Last edited:
This is standard browser fingerprinting stuff. Every major platform does this from a user profiling and bot identification standpoint.

Not saying that I agree with it, but the article is making this out to be something unique to LinkedIn/MS when it’s not.
 
This is stupid.

Displaying an HTML page with embedded or linked Javascript is consenting to running the Javascript. You can disable Javascript if you want.

It's not deceptive and you don't need to check the fine print of a contract to understand what you're agreeing to when you load a webpage in your browser.

If you want to block JavaScript with an autistic level of control, umatrix is the go to browser extension, brought to you by the dev of ublock origin. Just know that blocking scripts often breaks pages.

Gl;hf
 
Last edited:
Back
Top Bottom