<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://consumerrights.wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Hamid001</id>
	<title>Consumer Rights Wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://consumerrights.wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Hamid001"/>
	<link rel="alternate" type="text/html" href="https://consumerrights.wiki/w/Special:Contributions/Hamid001"/>
	<updated>2026-05-05T07:49:39Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.44.0</generator>
	<entry>
		<id>https://consumerrights.wiki/index.php?title=Linkedin_Browsergate&amp;diff=52731</id>
		<title>Linkedin Browsergate</title>
		<link rel="alternate" type="text/html" href="https://consumerrights.wiki/index.php?title=Linkedin_Browsergate&amp;diff=52731"/>
		<updated>2026-05-02T12:00:35Z</updated>

		<summary type="html">&lt;p&gt;Hamid001: cleaning&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;LinkedIn Is Illegally Searching Your Computer.&lt;br /&gt;
&lt;br /&gt;
===Microsoft is running one of the largest corporate espionage operations in modern history.===&lt;br /&gt;
Every time any of LinkedIn’s one billion users visits linkedin.com, hidden code searches their computer for installed software, collects the results, and transmits them to LinkedIn’s servers and to third-party companies including an American-Israeli cybersecurity firm.&lt;br /&gt;
&lt;br /&gt;
The user is never asked. Never told. LinkedIn’s privacy policy does not mention it.&lt;br /&gt;
&lt;br /&gt;
Because LinkedIn knows each user’s real name, employer, and job title, it is not searching anonymous visitors. It is searching identified people at identified companies. Millions of companies. Every day. All over the world.&lt;br /&gt;
&lt;br /&gt;
=====This is illegal and potentially a criminal offense in every jurisdiction we have examined.=====&lt;br /&gt;
LinkedIn uses hidden JavaScript to silently scan users&#039; browsers for over 6,000 installed extensions. This includes scans for competitors&#039; tools, privacy software (VPNs/Ad-blockers), and extensions revealing sensitive personal data (religion/politics). The scan bypasses security boundaries and maps corporate software infrastructure without user consent. &amp;lt;ref&amp;gt;{{Cite web |title=uncontrolled |url=https://browsergate.eu/ |access-date=browsergate}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Incident==&lt;br /&gt;
LinkedIn uses hidden JavaScript to silently scan users&#039; browsers for over 6,000 installed extensions. This includes scans for competitors&#039; tools, privacy software (VPNs/Ad-blockers), and extensions revealing sensitive personal data (religion/politics). The scan bypasses security boundaries and maps corporate software infrastructure without user consent.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Targeting:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The scans look for tools used by competitors, VPNs, ad blockers, and even extensions that reveal sensitive personal info like religion or political leanings&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Corporate Espionage:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Because LinkedIn knows your employer, it can map the internal software infrastructure of millions of companies &amp;lt;ref&amp;gt;{{Cite web |first=LaserHelix |title= |url=https://www.youtube.com/watch?v=mHj6IvBmlpU}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Consumer response==&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Recommendation:&#039;&#039;&#039; Use &#039;&#039;&#039;Firefox&#039;&#039;&#039;, which is not susceptible to this specific API exploit.&lt;br /&gt;
*&#039;&#039;&#039;Technical Fix:&#039;&#039;&#039; Block the specific script &amp;lt;code&amp;gt;Chunk 905&amp;lt;/code&amp;gt; via network filtering.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
{{reflist}}2. https://browsergate.eu/&lt;br /&gt;
&lt;br /&gt;
3. https://www.youtube.com/watch?v=mHj6IvBmlpU&lt;br /&gt;
&lt;br /&gt;
4. https://www.youtube.com/watch?v=f2i4KuXlF7c&lt;/div&gt;</summary>
		<author><name>Hamid001</name></author>
	</entry>
	<entry>
		<id>https://consumerrights.wiki/index.php?title=Linkedin_Browsergate&amp;diff=52730</id>
		<title>Linkedin Browsergate</title>
		<link rel="alternate" type="text/html" href="https://consumerrights.wiki/index.php?title=Linkedin_Browsergate&amp;diff=52730"/>
		<updated>2026-05-02T11:59:58Z</updated>

		<summary type="html">&lt;p&gt;Hamid001: I made an article as requested on community and added basic info from other websites&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;LinkedIn Is Illegally Searching Your Computer.&lt;br /&gt;
&lt;br /&gt;
=== Microsoft is running one of the largest corporate espionage operations in modern history. ===&lt;br /&gt;
Every time any of LinkedIn’s one billion users visits linkedin.com, hidden code searches their computer for installed software, collects the results, and transmits them to LinkedIn’s servers and to third-party companies including an American-Israeli cybersecurity firm.&lt;br /&gt;
&lt;br /&gt;
The user is never asked. Never told. LinkedIn’s privacy policy does not mention it.&lt;br /&gt;
&lt;br /&gt;
Because LinkedIn knows each user’s real name, employer, and job title, it is not searching anonymous visitors. It is searching identified people at identified companies. Millions of companies. Every day. All over the world.&lt;br /&gt;
&lt;br /&gt;
===== This is illegal and potentially a criminal offense in every jurisdiction we have examined. =====&lt;br /&gt;
LinkedIn uses hidden JavaScript to silently scan users&#039; browsers for over 6,000 installed extensions. This includes scans for competitors&#039; tools, privacy software (VPNs/Ad-blockers), and extensions revealing sensitive personal data (religion/politics). The scan bypasses security boundaries and maps corporate software infrastructure without user consent. &amp;lt;ref&amp;gt;{{Cite web |title=uncontrolled |url=https://browsergate.eu/ |access-date=browsergate}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Incident==&lt;br /&gt;
LinkedIn uses hidden JavaScript to silently scan users&#039; browsers for over 6,000 installed extensions. This includes scans for competitors&#039; tools, privacy software (VPNs/Ad-blockers), and extensions revealing sensitive personal data (religion/politics). The scan bypasses security boundaries and maps corporate software infrastructure without user consent.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Targeting:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The scans look for tools used by competitors, VPNs, ad blockers, and even extensions that reveal sensitive personal info like religion or political leanings&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Corporate Espionage:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Because LinkedIn knows your employer, it can map the internal software infrastructure of millions of companies &amp;lt;ref&amp;gt;{{Cite web |first=LaserHelix |title= |url=https://www.youtube.com/watch?v=mHj6IvBmlpU}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Consumer response==&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Recommendation:&#039;&#039;&#039; Use &#039;&#039;&#039;Firefox&#039;&#039;&#039;, which is not susceptible to this specific API exploit.&lt;br /&gt;
* &#039;&#039;&#039;Technical Fix:&#039;&#039;&#039; Block the specific script &amp;lt;code&amp;gt;Chunk 905&amp;lt;/code&amp;gt; via network filtering.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
{{reflist}}2. https://browsergate.eu/&lt;br /&gt;
&lt;br /&gt;
3. https://www.youtube.com/watch?v=mHj6IvBmlpU&lt;br /&gt;
&lt;br /&gt;
4. https://www.youtube.com/watch?v=f2i4KuXlF7c&amp;lt;nowiki/&amp;gt;{{Ph-I-C}}&lt;/div&gt;</summary>
		<author><name>Hamid001</name></author>
	</entry>
	<entry>
		<id>https://consumerrights.wiki/index.php?title=Linkedin_Browsergate&amp;diff=52729</id>
		<title>Linkedin Browsergate</title>
		<link rel="alternate" type="text/html" href="https://consumerrights.wiki/index.php?title=Linkedin_Browsergate&amp;diff=52729"/>
		<updated>2026-05-02T11:48:32Z</updated>

		<summary type="html">&lt;p&gt;Hamid001: LinkedIn uses hidden JavaScript to silently scan users&amp;#039; browsers for over 6,000 installed extensions. This includes scans for competitors&amp;#039; tools, privacy software (VPNs/Ad-blockers), and extensions revealing sensitive personal data (religion/politics). The scan bypasses security boundaries and maps corporate software infrastructure without user consent.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{IncidentCargo&lt;br /&gt;
|Company=LinkedIn&lt;br /&gt;
|StartDate=2026-03-06&lt;br /&gt;
|Status=Active&lt;br /&gt;
|ProductLine=linkedin, software, extensions, spyware&lt;br /&gt;
|Product=linkedin&lt;br /&gt;
|ArticleType=Service&lt;br /&gt;
|Type=Surveillance, Privacy Violation, Anti-competitive Behavior, Lack of Transparency, Consent&lt;br /&gt;
}}&lt;br /&gt;
{{Ph-I-Int}}&lt;br /&gt;
==Background==&lt;br /&gt;
{{Ph-I-B}}&lt;br /&gt;
&lt;br /&gt;
==[Incident]==&lt;br /&gt;
{{Ph-I-I}}&lt;br /&gt;
&lt;br /&gt;
===[Company]&#039;s response===&lt;br /&gt;
{{Ph-I-ComR}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Lawsuit==&lt;br /&gt;
{{Ph-I-L}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Consumer response==&lt;br /&gt;
{{Ph-I-ConR}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
{{reflist}}&lt;br /&gt;
&lt;br /&gt;
{{Ph-I-C}}&lt;/div&gt;</summary>
		<author><name>Hamid001</name></author>
	</entry>
</feed>