@kazani
LinkedIn Is Scanning Your Browser Extensions. This Is How They Use the Data.
https://404privacy.com/blog/linkedin-is-scanning-your-browser-extensions-this-is-how-they-use-the-data/
LinkedIn is scanning users browser extensions, collecting data without explicit consent or disclosure in their privacy policy.
This practice of scanning extensions has been ongoing since at least 2017 and has expanded to track over 6,278 extensions.
The data collected can be used to infer personal information about users, such as job searching activity, political leanings, religious practices, and disability status.
LinkedIn's extension scan is part of a larger device fingerprinting system (APFC/DNA) that collects numerous browser and device characteristics.
The extension scan works by attempting to fetch specific files from chrome-extension:// URLs; a successful fetch indicates the extension is installed.
This collected data is appended to users existing professional profiles on LinkedIn, linking browsing behavior to verified identities.
The practice can reveal an organization's internal tooling, security products, and workflows by analyzing employees' browser extensions.
The data collected by LinkedIn can be integrated with third-party datasets, enriching user profiles and enabling cross-platform tracking.
LinkedIn has reportedly taken enforcement actions against users based on the presence of specific extensions, without user knowledge.
A criminal investigation into LinkedIn's practices has been opened by the Cybercrime Unit of the Bavarian Central Cybercrime Prosecution Office in Germany.