The Attack: How it works
Every time you open LinkedIn in a Chrome-based browser,
Stopped reading there
A community for discussing events around the World
Rule 1: posts have the following requirements:
Rule 2: Do not copy the entire article into your post. The key points in 1-2 paragraphs is allowed (even encouraged!), but large segments of articles posted in the body will result in the post being removed. If you have to stop and think "Is this fair use?", it probably isn't. Archive links, especially the ones created on link submission, are absolutely allowed but those that avoid paywalls are not.
Rule 3: Opinions articles, or Articles based on misinformation/propaganda may be removed.
Rule 4: Posts or comments that are homophobic, transphobic, racist, sexist, anti-religious, or ableist will be removed. “Ironic” prejudice is just prejudiced.
Posts and comments must abide by the lemmy.world terms of service UPDATED AS OF OCTOBER 19 2025
Rule 5: Keep it civil. It's OK to say the subject of an article is behaving like a (pejorative, pejorative). It's NOT OK to say another USER is (pejorative). Strong language is fine, just not directed at other members. Engage in good-faith and with respect! This includes accusing another user of being a bot or paid actor. Trolling is uncivil and is grounds for removal and/or a community ban.
Similarly, if you see posts along these lines, do not engage. Report them, block them, and live a happier life than they do. We see too many slapfights that boil down to "Mom! He's bugging me!" and "I'm not touching you!" Going forward, slapfights will result in removed comments and temp bans to cool off.
Rule 6: Memes, spam, other low effort posting, reposts, misinformation, advocating violence, off-topic, trolling, offensive, regarding the moderators or meta in content may be removed at any time.
Rule 7: We didn't USED to need a rule about how many posts one could make in a day, then someone posted NINETEEN articles in a single day. Not comments, FULL ARTICLES. If you're posting more than say, 10 or so, consider going outside and touching grass. We reserve the right to limit over-posting so a single user does not dominate the front page.
We ask that the users report any comment or post that violate the rules, to use critical thinking when reading, posting or commenting. Users that post off-topic spam, advocate violence, have multiple comments or posts removed, weaponize reports or violate the code of conduct will be banned.
All posts and comments will be reviewed on a case-by-case basis. This means that some content that violates the rules may be allowed, while other content that does not violate the rules may be removed. The moderators retain the right to remove any content and ban users.
News !news@lemmy.world
Politics !politics@lemmy.world
World Politics !globalpolitics@lemmy.world
For Firefox users, there is media bias / propaganda / fact check plugin.
https://addons.mozilla.org/en-US/firefox/addon/media-bias-fact-check/
The Attack: How it works
Every time you open LinkedIn in a Chrome-based browser,
Stopped reading there
This is straight up misinformation. First off, it's perfectly legal.
LinkedIn does browser fingerprinting. It's the same thing Google and Meta do. It's how Google Ads is shifting to a post-adblocker revenue stream.
Browser fingerprints show fonts used, audio codecs, WebGL render data, processor, operating system - enough that if you add up several factors together, it makes a statistically unique fingerprint. it does NOT scan applications on your computer. It can't. It DOES scan which browser extensions you have running (if they affect page loading).
If you check your email and then close that and go to Google in an incognito window and search for porn - Google will fucking know what you're looking at. Gmail and all Google apps all fingerprint, and then you'll notice how Google ads trackers are on most sites online? Yep. That's how they track you.
Use a VPN? Use an ad blocker? Great - Google doesn't care. Google can track your fingerprint.
See your own fingerprint - check how it know it's you visit after visit.
They also scan for thousands of extensions. The only reason it doesn't do this on Firefox is that Firefox randomises the uuid of extensions every time. Chrome doesn't.
Fonts, codecs, hardware, OS, extensions are all parts of a computer that never ever need to be transmitted to a website for it to function. Any information about them should be sandboxed, and if the website wants to display differently based on them, it can send static data or code in and get nothing back out.
I'm pretty sure for fonts they can tell because they have different widths, which affects page layout, which can be measured.
There's a lot of stuff like that.
Best would be make it illegal and give the law teeth. Solving it technically will always be an arms race.
it does NOT scan applications on your computer
technically browser extensions are considered applications under EU's GDPR
It DOES scan which browser extensions you have running (if they affect page loading).
as per their report:
Why two detection methods
Method Technique What it catches AED fetch() against known resource paths Extensions that are merely installed, even if they inject nothing into the current page Spectroscopy Full DOM tree walk Extensions that actively modify the page, even if they are not in LinkedIn’s hardcoded list
it's misleading to say its searching your computer tho...? this invokes the thought of LinkedIn getting to rifle through your files like it has access to ~/Documents/ or smth.
but yeah tracking you over the internet is similarly bad
it's misleading to say its searching your computer tho...?
Wait, your browser extensions aren't on your computer?
I think the argument is that since some of the extensions that are probed can be political in nature, which can reveal political identity, which is potentially unlawful in the EU. However, it really needs to be up to a judge to make a decision on that.
In general what they're doing is legal, and the BrowserGate people are using niggling little details, a handful of extensions out of the 6000 probed, to justify this argument. I couldn't say, especially as someone from outside the EU, whether this is actually illegal or not, but it's definitely in a nebulous area at the moment.
Though I agree it's sensationalized in terms of claiming it's "searching your computer" and doing "corporate espionage."
Yeah but still sick of this shit

I have NoScript for JS tracking, but what do you use for fingerprint randomisation?
I use CanvasBlocker.
I made no effort to do that, im using the duckduckgo browser on my phone.
Interesting, I also have the DDG browser but the test shows a unique fingerprint result. I don't think that I have tinkered with any settings and I haven't installed addons.
Correction- the first test was the browser inside the lemmy voyager app, not sure what its based on. This one is out of the DDG app;

Some of the test sites don't differentiate between random and unique. They may see a randomized fingerprint as a plausible unique user, but it may be different the next time you visit. Other sites may detect that your browser has taken steps to randomize your fingerprint, and use that as an identifying piece of information on its own (power user vs average joe)
They cannot do that. They do scan the browser's extensions, but the title is very misleading.
LinkedIn loads an invisible tracking element ... zero pixels wide, hidden off-screen, that sets cookies on your browser without your knowledge
Uh, what? Hidden "off-screen"? In a browser? I've been doing web dev for decades and have no idea what that means. Can someone explain how this is supposed to make any kind of sense?
I presume they're talking about an element with something like this: position: absolute; left: -50px; width: 0px; height 0px;
Very commonly used for elements like skip to content links that are hidden off screen and shown on screen once they receive focus.
“Yes, LinkedIn was probing for a lot of extensions, but there was no scanning of your computer and no malicious code, just a simple JavaScript technique to determine if the extension was there.”
Reguly decided to test the resource probing and results obtained on a sample 10% of the 6,000+ extensions. “One extension refused to have its tab closed and reopened itself every time I closed it. Others changed my home screen, the about:blank page, and added bookmarks.” Another Rickrolled him, playing the ‘Never Gonna Give You Up’ video every time he opened his browser. “To say that a lot of these are the worst of the worst extensions out there is not an understatement.”
What’s more, statistically from his sample testing, he believes only around 2,000 could be detected by LinkedIn, when even 6,000 is just a small sub-set of the total number of extensions that exist. If LinkedIn was intent on fingerprinting or profiling its users, there are better methods than this.
“I don’t see anything that indicates malicious intent here,” he told SecurityWeek “It is discovering some information, yes, but I don’t think it crosses the threshold to malicious – I think that’s a very sensationalized view of what’s going on.”
Asked why LinkedIn is doing this, he replies, “I don’t know. But for me, a common trend across these extensions is that they have data scraping functionality and are not well known. And they were problematic at times. Many of them gave me that used-car-salesman vibe that you see in the movies,” he continued.
“I can’t help but wonder if LinkedIn wanted to know if these extensions were there to try and defend against them. I certainly wouldn’t want one of my LinkedIn contacts to be running these extensions and visit my page with these scrapers installed. I feel that a user with these extensions installed visiting my LinkedIn page is more of an affront to my privacy than LinkedIn checking to see if I have these extensions.”
Of course, depending on interpretation, this still may not be appropriate or legal in the EU. However, it does seem that BrowserGate's claims are a bit on the exaggerated side.
OP's link with Google's AMP nonsense removed: https://www.securityweek.com/browsergate-claims-of-linkedin-spying-clash-with-security-research-findings/
hidden code searches their computer for installed software
Not gonna read an article that is this poorly researched. It's clickbait.
Literally? They're searching installed browser extensions, that's not "my computer." Sure, it's identification data, and it may brush up against EU laws, but "illegally searching your computer" is definitely a bit of hyperbole.
They are not "literally" searching my computer, as much as I am not literally fucking your mom.
I'll never join LinkedIn. Pointless middlemen in job searches. A social network people are forced to use.
we have updated our terms and conditions
pray that we do not alter them any further...
Last time I visited linkedin it shot my dog. Be careful everyone!
What?
Who is upvoting this blatant fallacy. Browser fingerprinting is not scanning your entire PC. Fuck off op