LinkedIn is spying on you, according to a new 'BrowserGate' security report — scripts stealthily scan visitors' browsers for over 6,000 Chrome extensions and harvest hardware data

LinkedIn
(Image credit: Shutterstock)

LinkedIn is understood to be injecting a JavaScript fingerprinting script into every page load that probes visitors' browsers for 6,236 installed Chrome extensions and collects detailed device telemetry, according to a report by Fairlinked e.V. and independently confirmed by BleepingComputer.

Many of the targeted extensions are LinkedIn-related tools, including sales intelligence products from Apollo, Lusha, and ZoomInfo that directly compete with LinkedIn's offerings. The Fairlinked report claims that LinkedIn scans more than 200 competing products in total and that the script also checks for language and grammar extensions, tools for tax professionals, and other categories with no obvious connection to LinkedIn's platform.

Article continues below

Beyond extensions, the script gathers hardware and software fingerprinting data, such as CPU class, device memory, screen dimensions, time zone offset, battery status, and storage capabilities. These data points are commonly used in browser fingerprinting to build unique device profiles, but because LinkedIn accounts are tied to real names, employers, and job titles, the extension and device data can be linked back to positively identify individuals. The Fairlinked report also claims the data is transmitted to HUMAN Security, an American-Israeli cybersecurity firm, though this has not been independently verified.

LinkedIn told BleepingComputer the scanning is used to detect extensions that scrape data or otherwise violate its terms of service. "To protect the privacy of our members, their data, and to ensure site stability, we do look for extensions that scrape data without members' consent," a LinkedIn spokesperson told BleepingComputer. The company added that it does not use the data to "infer sensitive information about members."

LinkedIn also said the Fairlinked report was published by someone whose account had been restricted for scraping. The individual is linked to a browser extension called "Teamfluence," which LinkedIn said violated its platform terms. A German court denied that individual's request for a preliminary injunction against LinkedIn, finding that the platform was within its rights to block accounts engaged in automated data collection.

LinkedIn isn’t the first major platform to use aggressive client-side fingerprinting. In 2021, eBay was found to be using JavaScript to perform automated port scans on visitors' devices to detect remote access software. The same script was later found running on sites operated by Citibank, TD Bank, and Equifax.

Google Preferred Source

Follow Tom's Hardware on Google News, or add us as a preferred source, to get our latest news, analysis, & reviews in your feeds.

Luke James
Contributor

Luke James is a freelance writer and journalist.  Although his background is in legal, he has a personal interest in all things tech, especially hardware and microelectronics, and anything regulatory. 

  • Makaveli
    Hmm interesting.

    So if this is what they do when you browse to the site, what is the actual linked in app doing?
    Reply
  • hotaru251
    wouldn't this be violating EU privacy laws?
    Reply
  • Arkitekt78
    Everything you use is spying on you...
    Reply
  • PEnns
    We need a new article called: Those are the companies that are NOT spying on you. Yet.
    Reply
  • ezst036
    Ever since Microsoft embraced the Google model, I expect this from Microsoft products such as LinkedIn.
    Reply
  • ezst036
    Arkitekt78 said:
    Everything you use is spying on you...

    PEnns said:
    We need a new article called: Those are the companies that are NOT spying on you. Yet.
    The BSDs and Linux is not spying on you.

    Especially the ones who are actively taking the path toward rejecting the "universal doxxing" laws like what is coming out of California and Colorado.

    Some of the Linuxes probably will go down the legislation-mandated spy path, it will be sad to see them die off in the next few years but when you make your bed you do have to lay down in it.
    Reply
  • USAFRet
    ezst036 said:
    The BSDs and Linux is not spying on you.

    Especially the ones who are actively taking the path toward rejecting the "universal doxxing" laws like what is coming out of California and Colorado.

    Some of the Linuxes probably will go down the legislation-mandated spy path, it will be sad to see them die off in the next few years but when you make your bed you do have to lay down in it.
    And if people used only the OS, Linux would be a 100% solution.

    But we don't.
    All the applications and sites we use...those are the problem.
    Reply
  • Spuwho
    It's a like a credit protection agency saying "tell us about every credit card, bank account, or loan you have ever made and we will protect you and then turn around and sell the very data you willingly gave them.

    Non sequitor.
    Reply
  • Gururu
    Does it only work if you are looking at profiles while logged in? I realize that you have limited access if not logged in, but if you do a random search on google and see a profile can it trace to you somehow?
    Reply
  • ezst036
    USAFRet said:
    And if people used only the OS, Linux would be a 100% solution.
    People do use only the OS, Windows 11 is the most popular version of Windows that Microsoft has ever produced in its entire decades-long history as an OS provider.
    Reply