๐ŸŒFreshcollected in 47m

LinkedIn Secretly Scans 6,000 Browser Extensions

LinkedIn Secretly Scans 6,000 Browser Extensions
PostLinkedIn
๐ŸŒRead original on The Next Web (TNW)

๐Ÿ’กLinkedIn fingerprints devs' browsersโ€”protect privacy on key AI job/networking platform

โšก 30-Second TL;DR

What Changed

Hidden JS probes for 6,000+ extensions silently

Why It Matters

Raises privacy concerns for professionals using LinkedIn for networking and job searches. Could erode user trust in Microsoft-owned platform amid growing scrutiny on tracking.

What To Do Next

Audit browser extensions and use incognito mode or privacy-focused browsers before accessing LinkedIn.

Who should care:Developers & AI Engineers

๐Ÿง  Deep Insight

AI-generated analysis for this event.

๐Ÿ”‘ Enhanced Key Takeaways

  • โ€ขSecurity researchers identified that the technique utilizes 'web accessible resources' within the manifest.json files of installed extensions to perform side-channel attacks, allowing LinkedIn to detect specific software without explicit browser permissions.
  • โ€ขThe practice is primarily aimed at fraud detection and bot mitigation, specifically targeting automated scraping tools or malicious extensions that inject content into the LinkedIn DOM, rather than just user tracking.
  • โ€ขBrowser vendors, particularly Google, have faced increased pressure to restrict the 'web_accessible_resources' API in response to this discovery, as it facilitates cross-site fingerprinting that bypasses standard privacy protections.

๐Ÿ› ๏ธ Technical Deep Dive

  • โ€ขThe routine executes a series of 'fetch' requests to known extension-specific URLs (e.g., chrome-extension://[extension-id]/manifest.json).
  • โ€ขA successful response (200 OK) confirms the extension's presence, while a failure (404 or blocked) indicates absence.
  • โ€ขThe 48 characteristics collected include canvas fingerprinting, WebGL renderer information, audio context analysis, and battery status API data.
  • โ€ขThe resulting fingerprint is hashed using a proprietary algorithm and transmitted via a custom header in XHR/Fetch requests to LinkedIn's backend infrastructure.

๐Ÿ”ฎ Future ImplicationsAI analysis grounded in cited sources

Browser vendors will deprecate or restrict 'web_accessible_resources' access.
The widespread abuse of this feature for fingerprinting forces browser developers to prioritize privacy over legacy extension compatibility.
LinkedIn will face regulatory scrutiny under GDPR and CCPA.
The lack of explicit user consent for collecting device-specific hardware identifiers constitutes a potential violation of data transparency requirements.

โณ Timeline

2024-11
Initial discovery of suspicious fingerprinting scripts by independent security researchers.
2025-03
LinkedIn updates its privacy policy to include broader language regarding 'security and fraud prevention' measures.
2026-02
Public disclosure of 'BrowserGate' findings by security analysts, triggering widespread media coverage.
๐Ÿ“ฐ

Weekly AI Recap

Read this week's curated digest of top AI events โ†’

๐Ÿ‘‰Related Updates

AI-curated news aggregator. All content rights belong to original publishers.
Original source: The Next Web (TNW) โ†—

LinkedIn Secretly Scans 6,000 Browser Extensions | The Next Web (TNW) | SetupAI | SetupAI