This video exposes LinkedIn's hidden browser extension scanning, revealing privacy violations and corporate espionage risks.
Key Takeaways
- LinkedIn conducts covert browser extension scans without user consent, violating privacy.
- This data collection extends to organizational profiling, potentially aiding corporate espionage.
- The practice is illegal in some jurisdictions and raises serious ethical and legal concerns.
- Users can mitigate risks by switching browsers or applying specific filters to block the scans.
- LinkedIn's data gathering capabilities make it a potent but controversial OSINT tool.
Summary
- LinkedIn runs hidden JavaScript on linkedin.com that scans users' browsers for installed Chrome extensions without consent.
- The scan runs on every page load and sends data to LinkedIn and third-party companies, including an American-Israeli cybersecurity firm.
- LinkedIn searches for thousands of extensions, including productivity tools, VPNs, ad blockers, political and religious extensions.
- Detected extensions are linked to users' employers, mapping software infrastructure of companies without their knowledge.
- This practice is considered illegal in Germany and likely elsewhere due to privacy violations.
- LinkedIn bypasses security boundaries set by extension developers to prevent such scans.
- The scanning began in 2017 with 38 extensions and now targets over 6,000 extensions.
- Users can avoid this Chrome-exclusive exploit by using Firefox or blocking specific URLs like chunk.905.
- LinkedIn's extensive data gathering makes it a powerful OSINT tool but also a privacy threat to users and organizations.
- The video encourages awareness and provides resources like browsergate.eu for further information and mitigation.






![[EN/ES] สามี ภรรยา | Beginner Slow Thai Stories | Thai … — Transcript](https://i.ytimg.com/vi/oLGs6oxoVSc/maxresdefault.jpg)




