LinkedIn uses hidden JavaScript to silently scan users' browsers for over 6,000 installed extensions. This includes scans for competitors' tools, privacy software (VPNs/Ad-blockers), and extensions revealing sensitive personal data (religion/politics). The scan bypasses security boundaries and maps corporate software infrastructure without user consent.
 
I made an article as requested on community and added basic info from other websites
Line 1: Line 1:
{{IncidentCargo
LinkedIn Is Illegally Searching Your Computer.
|Company=LinkedIn
|StartDate=2026-03-06
|Status=Active
|ProductLine=linkedin, software, extensions, spyware
|Product=linkedin
|ArticleType=Service
|Type=Surveillance, Privacy Violation, Anti-competitive Behavior, Lack of Transparency, Consent
}}
{{Ph-I-Int}}
==Background==
{{Ph-I-B}}


==[Incident]==
=== Microsoft is running one of the largest corporate espionage operations in modern history. ===
{{Ph-I-I}}
Every time any of LinkedIn’s one billion users visits linkedin.com, hidden code searches their computer for installed software, collects the results, and transmits them to LinkedIn’s servers and to third-party companies including an American-Israeli cybersecurity firm.


===[Company]'s response===
The user is never asked. Never told. LinkedIn’s privacy policy does not mention it.
{{Ph-I-ComR}}


Because LinkedIn knows each user’s real name, employer, and job title, it is not searching anonymous visitors. It is searching identified people at identified companies. Millions of companies. Every day. All over the world.


==Lawsuit==
===== This is illegal and potentially a criminal offense in every jurisdiction we have examined. =====
{{Ph-I-L}}
LinkedIn uses hidden JavaScript to silently scan users' browsers for over 6,000 installed extensions. This includes scans for competitors' tools, privacy software (VPNs/Ad-blockers), and extensions revealing sensitive personal data (religion/politics). The scan bypasses security boundaries and maps corporate software infrastructure without user consent. <ref>{{Cite web |title=uncontrolled |url=https://browsergate.eu/ |access-date=browsergate}}</ref>


==Incident==
LinkedIn uses hidden JavaScript to silently scan users' browsers for over 6,000 installed extensions. This includes scans for competitors' tools, privacy software (VPNs/Ad-blockers), and extensions revealing sensitive personal data (religion/politics). The scan bypasses security boundaries and maps corporate software infrastructure without user consent.
'''Targeting:'''
The scans look for tools used by competitors, VPNs, ad blockers, and even extensions that reveal sensitive personal info like religion or political leanings
'''Corporate Espionage:'''
Because LinkedIn knows your employer, it can map the internal software infrastructure of millions of companies <ref>{{Cite web |first=LaserHelix |title= |url=https://www.youtube.com/watch?v=mHj6IvBmlpU}}</ref>


==Consumer response==
==Consumer response==
{{Ph-I-ConR}}
 
* '''Recommendation:''' Use '''Firefox''', which is not susceptible to this specific API exploit.
* '''Technical Fix:''' Block the specific script <code>Chunk 905</code> via network filtering.




==References==
==References==
{{reflist}}
{{reflist}}2. https://browsergate.eu/
 
3. https://www.youtube.com/watch?v=mHj6IvBmlpU


{{Ph-I-C}}
4. https://www.youtube.com/watch?v=f2i4KuXlF7c<nowiki/>{{Ph-I-C}}