this post was submitted on 30 Apr 2026
82 points (78.1% liked)

World News

55796 readers
2136 users here now

A community for discussing events around the World

Rules:

Similarly, if you see posts along these lines, do not engage. Report them, block them, and live a happier life than they do. We see too many slapfights that boil down to "Mom! He's bugging me!" and "I'm not touching you!" Going forward, slapfights will result in removed comments and temp bans to cool off.

We ask that the users report any comment or post that violate the rules, to use critical thinking when reading, posting or commenting. Users that post off-topic spam, advocate violence, have multiple comments or posts removed, weaponize reports or violate the code of conduct will be banned.

All posts and comments will be reviewed on a case-by-case basis. This means that some content that violates the rules may be allowed, while other content that does not violate the rules may be removed. The moderators retain the right to remove any content and ban users.


Lemmy World Partners

News !news@lemmy.world

Politics !politics@lemmy.world

World Politics !globalpolitics@lemmy.world


Recommendations

For Firefox users, there is media bias / propaganda / fact check plugin.

https://addons.mozilla.org/en-US/firefox/addon/media-bias-fact-check/

founded 2 years ago
MODERATORS
 

Microsoft is running one of the largest corporate espionage operations in modern history.

Every time any of LinkedIn’s one billion users visits linkedin.com, hidden code searches their computer for installed software, collects the results, and transmits them to LinkedIn’s servers and to third-party companies including an American-Israeli cybersecurity firm.

The user is never asked. Never told. LinkedIn’s privacy policy does not mention it.

Because LinkedIn knows each user’s real name, employer, and job title, it is not searching anonymous visitors. It is searching identified people at identified companies. Millions of companies. Every day. All over the world.

you are viewing a single comment's thread
view the rest of the comments
[–] GreenShimada@lemmy.world 62 points 4 hours ago* (last edited 3 hours ago) (5 children)

This is straight up misinformation. First off, it's perfectly legal.

LinkedIn does browser fingerprinting. It's the same thing Google and Meta do. It's how Google Ads is shifting to a post-adblocker revenue stream.

Browser fingerprints show fonts used, audio codecs, WebGL render data, processor, operating system - enough that if you add up several factors together, it makes a statistically unique fingerprint. it does NOT scan applications on your computer. It can't. It DOES scan which browser extensions you have running (if they affect page loading).

If you check your email and then close that and go to Google in an incognito window and search for porn - Google will fucking know what you're looking at. Gmail and all Google apps all fingerprint, and then you'll notice how Google ads trackers are on most sites online? Yep. That's how they track you.

Use a VPN? Use an ad blocker? Great - Google doesn't care. Google can track your fingerprint.

See your own fingerprint - check how it know it's you visit after visit.

https://fingerprint.com/

https://coveryourtracks.eff.org/

https://amiunique.org/

[–] PumaStoleMyBluff@lemmy.world 1 points 39 minutes ago (1 children)

Fonts, codecs, hardware, OS, extensions are all parts of a computer that never ever need to be transmitted to a website for it to function. Any information about them should be sandboxed, and if the website wants to display differently based on them, it can send static data or code in and get nothing back out.

[–] jtrek@startrek.website 1 points 32 minutes ago

I'm pretty sure for fonts they can tell because they have different widths, which affects page layout, which can be measured.

There's a lot of stuff like that.

Best would be make it illegal and give the law teeth. Solving it technically will always be an arms race.

[–] inlandempire@jlai.lu 20 points 3 hours ago (1 children)

it does NOT scan applications on your computer

technically browser extensions are considered applications under EU's GDPR

It DOES scan which browser extensions you have running (if they affect page loading).

as per their report:

Why two detection methods

Method Technique What it catches
AED fetch() against known resource paths Extensions that are merely installed, even if they inject nothing into the current page
Spectroscopy Full DOM tree walk Extensions that actively modify the page, even if they are not in LinkedIn’s hardcoded list
[–] Alberat@lemmy.world 4 points 2 hours ago (1 children)

it's misleading to say its searching your computer tho...? this invokes the thought of LinkedIn getting to rifle through your files like it has access to ~/Documents/ or smth.

but yeah tracking you over the internet is similarly bad

[–] stroz@infosec.pub 3 points 31 minutes ago

it's misleading to say its searching your computer tho...?

Wait, your browser extensions aren't on your computer?

[–] Akh@lemmy.world 7 points 3 hours ago

Yeah but still sick of this shit

[–] Steve@startrek.website 3 points 2 hours ago (1 children)
[–] Enkers@sh.itjust.works 1 points 1 hour ago (2 children)

I have NoScript for JS tracking, but what do you use for fingerprint randomisation?

[–] crimson_iris@piefed.social 1 points 1 hour ago

I use CanvasBlocker.

[–] Steve@startrek.website 1 points 1 hour ago (1 children)

I made no effort to do that, im using the duckduckgo browser on my phone.

[–] status_sphere@sh.itjust.works 1 points 57 minutes ago (2 children)

Interesting, I also have the DDG browser but the test shows a unique fingerprint result. I don't think that I have tinkered with any settings and I haven't installed addons.

[–] Steve@startrek.website 1 points 33 minutes ago* (last edited 33 minutes ago)

Correction- the first test was the browser inside the lemmy voyager app, not sure what its based on. This one is out of the DDG app;

[–] PumaStoleMyBluff@lemmy.world 1 points 36 minutes ago

Some of the test sites don't differentiate between random and unique. They may see a randomized fingerprint as a plausible unique user, but it may be different the next time you visit. Other sites may detect that your browser has taken steps to randomize your fingerprint, and use that as an identifying piece of information on its own (power user vs average joe)

I think the argument is that since some of the extensions that are probed can be political in nature, which can reveal political identity, which is potentially unlawful in the EU. However, it really needs to be up to a judge to make a decision on that.

In general what they're doing is legal, and the BrowserGate people are using niggling little details, a handful of extensions out of the 6000 probed, to justify this argument. I couldn't say, especially as someone from outside the EU, whether this is actually illegal or not, but it's definitely in a nebulous area at the moment.

Though I agree it's sensationalized in terms of claiming it's "searching your computer" and doing "corporate espionage."