Rudxain (talk | contribs)
m link JS
m Browser scanning and personal data mining: Added missing archive link, URL-status fields.
 
(3 intermediate revisions by 2 users not shown)
Line 35: Line 35:
===Account Verification===
===Account Verification===


Verifying a LinkedIn account (i.e. acquiring a blue checkmark) requires sending a full copy of the user's passport to a third party service provider, Persona. Biometric data of several kinds such as typing patterns are also collected by Persona. The company then retains the right to store the information, share it with third party data brokers and train AI on the passport and the passport photo. <ref>{{Cite web |first= |date=2026-02-16 |title=I Verified My LinkedIn Identity. Here's What I Actually Handed Over. |url=https://thelocalstack.eu/posts/linkedin-identity-verification-privacy/ |url-status=live |archive-url=https://web.archive.org/web/20260405141228/https://thelocalstack.eu/posts/linkedin-identity-verification-privacy/ |archive-date=5 Apr 2026 |access-date=2026-03-31 |website=TheLocalStack}}</ref>
Verifying a LinkedIn account (i.e. acquiring a blue checkmark) requires sending a full copy of the user's passport to a third party service provider, [[Persona]]. Biometric data of several kinds such as typing patterns are also collected by Persona. The company then retains the right to store the information, share it with third party data brokers and train AI on the passport and the passport photo. <ref>{{Cite web |first= |date=2026-02-16 |title=I Verified My LinkedIn Identity. Here's What I Actually Handed Over. |url=https://thelocalstack.eu/posts/linkedin-identity-verification-privacy/ |url-status=live |archive-url=https://web.archive.org/web/20260405141228/https://thelocalstack.eu/posts/linkedin-identity-verification-privacy/ |archive-date=5 Apr 2026 |access-date=2026-03-31 |website=TheLocalStack}}</ref>


For users outside the United States, this also means that their personal and biometric data is sent to US servers, where they are accessible to US authorities.
For users outside the United States, this also means that their personal and biometric data is sent to US servers, where they are accessible to US authorities.
Line 49: Line 49:


==Browser scanning and personal data mining==
==Browser scanning and personal data mining==
Fairlinked e.V. have discovered data mining operation from within your browser when visiting LinkedIn. [https://browsergate.eu/ BrowserGate] exposes Microsoft's LinkedIn for allegedly conducting a massive, undisclosed spying operation by injecting malicious [[JavaScript]] into users' browsers to secretly scan and detect over 6,222 installed browser extensions without consent, in violation of the EU Digital Markets Act (DMA). It reveals how LinkedIn builds detailed individual and organizational profiles based on extensions indicating sensitive information such as political opinions, religious beliefs, disabilities, neurodivergence, job-seeking status, and even mapping which organizations use which competitor products, then aggregates this data while matching it to users' names, employers, and job titles.{{Citation needed|date=2 Apr 2026}}
Fairlinked e.V. have discovered data mining operation from within your browser when visiting LinkedIn. [https://browsergate.eu/ BrowserGate] exposes Microsoft's LinkedIn for allegedly conducting a massive, undisclosed spying operation by injecting malicious [[JavaScript]] into users' browsers to secretly scan and detect over 6,222 installed browser extensions without consent, in violation of the EU Digital Markets Act (DMA). It reveals how LinkedIn builds detailed individual and organizational profiles based on extensions indicating sensitive information such as political opinions, religious beliefs, disabilities, neurodivergence, job-seeking status, and even mapping which organizations use which competitor products, then aggregates this data while matching it to users' names, employers, and job titles.<ref>{{Cite web |author=digital fairness e.V. |title=LinkedIn Is Illegally Searching Your Computer |url=https://browsergate.eu/ |website=Browsergate.eu |date=6 Mar 2026 |access-date=13 Apr 2026 |url-status=live |archive-url=https://ghostarchive.org/archive/FlBoq |archive-date=2 Apr 2026}}</ref><ref>{{Cite web |last=Fadilpašić |first=Sead |title=One of the largest corporate espionage and data breach scandals in digital history': New "BrowserGate" report claims LinkedIn secretly scans user browsers for installed extensions and collects device data |url=https://www.techradar.com/pro/security/one-of-the-largest-corporate-espionage-and-data-breach-scandals-in-digital-history-new-browsergate-report-claims-linkedin-secretly-scans-user-browsers-for-installed-extensions-and-collects-device-data |website=Techradar |date=6 Apr 2026 |access-date=13 Apr 2026 |url-status=live |archive-url=https://web.archive.org/web/20260406163425/https://www.techradar.com/pro/security/one-of-the-largest-corporate-espionage-and-data-breach-scandals-in-digital-history-new-browsergate-report-claims-linkedin-secretly-scans-user-browsers-for-installed-extensions-and-collects-device-data |archive-date=6 Apr 2026}}</ref><ref>{{Cite web |last=Adams |first=Lawrence |title=LinkedIn secretly scans for 6,000+ Chrome extensions, collects data |url=https://www.bleepingcomputer.com/news/security/linkedin-secretly-scans-for-6-000-plus-chrome-extensions-collects-data/ |website=Bleeping Computer |date=3 Apr 2026 |access-date=13 Apr 2026 |url-status=live |archive-url=https://web.archive.org/web/20260405000141/https://www.bleepingcomputer.com/news/security/linkedin-secretly-scans-for-6-000-plus-chrome-extensions-collects-data/ |archive-date=5 Apr 2026}}</ref>


==References==
==References==