A “BrowserGate” report claims LinkedIn scans users’ browsers for thousands of extensions and collects device data without clear disclosure.
Researchers say LinkedIn runs a hidden script that checks for over 6,000 extensions and gathers around 48 device attributes, creating a fingerprint linked to user activity. The scanning behaviour itself has been independently verified.
LinkedIn disputes the claims, saying the detection is used to identify extensions that breach its terms, particularly scraping tools, and that it does not use the data to infer sensitive information.
Concern centres on the scale and scope of the data collected, including tools linked to competitors and potential insights into user behaviour. There are also questions about transparency, given the lack of clear disclosure in its privacy policy.
For businesses, the advice is to review browser use, limit extensions, and strengthen endpoint controls to reduce exposure of corporate activity.
As key project members in many of our IT projects whether, actively assisted or simply advised what they do not know about IT, in our opinion isn’t worth knowing!
- Nadia Mullins-Hills -