this post was submitted on 02 Apr 2026
69 points (98.6% liked)

Privacy

4358 readers
76 users here now

Icon base by Lorc under CC BY 3.0 with modifications to add a gradient

founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] Quacksalber@sh.itjust.works 10 points 1 week ago* (last edited 1 week ago) (2 children)

My question is how. Am I too naive to believe that the browser, Firefox in my case, would stop a webpage from crawling your computer?

[–] OwOarchist@pawb.social 7 points 1 week ago

And I would be very surprised if their crawler manages to somehow work on Linux...

[–] DrWorm@piefed.blahaj.zone 4 points 1 week ago (1 children)

It looks like the attack only works on Chrome (or Chrome based browsers).

They have 2 methods for figuring out which extensions are used: asking the browser for files related to each of the 6000+ extensions they scan for, and checking the DOM for injected content

But that doesn’t mean that Firefox couldn’t be targeted in the future.

A good way to protect yourself is to use uBlock Origin or something similar, which will block the collected data from getting sent to LinkedIn

[–] TheSlad@sh.itjust.works 1 points 1 week ago (1 children)

Extensions? It just said software above.

Is it actually scanning for installed software on the system or just chrome extensions?

[–] DrWorm@piefed.blahaj.zone 3 points 1 week ago

Yeah it’s a bit dishonest

Instead of

hidden code searches their computer for installed software

I would say

hidden code searches their browser for installed extensions