this post was submitted on 03 Apr 2026
32 points (100.0% liked)

Privacy

9464 readers
837 users here now

A community for Lemmy users interested in privacy

Rules:

  1. Be civil
  2. No spam posting
  3. Keep posts on-topic
  4. No trolling

founded 2 years ago
MODERATORS
 

LinkedIn is using hidden JS to scan your browser for over 6,000 specific extension IDs via a known Chromium vulnerability. By inventorying your local software, they can infer highly sensitive "Special Category" data like health status, religion, and political advocacy without consent.

I’ve joined the dots on why Chromium-based "Shields" fail here and how to harden your home lab/network to stop the leak.

top 11 comments
sorted by: hot top controversial new old
[–] zer0squar3d@lemmy.dbzer0.com 3 points 4 days ago* (last edited 4 days ago) (2 children)

First off it only scans browser addons/extensions by matching them to known browser ids.

Second this has nothing to do with home lab or network so nothing to secure there; Either dont use linkedin, use a firefox based browser or, if you read the actual browsergate website, changing your user agent to anything not chrome/chromium based should block the script from running as it runs this check before anything else, or just dns block 'linkedin.com/li/track' iirc to prevent from being sent back or do all of the above.

Yes this is a volation of privacy but helping push the framing around this thst it scans your computer with that terrible title isnt helping the situation.

Edit: spelling

[–] TheIPW@lemmy.ml 3 points 4 days ago

Thanks for the feedback. You’re right, it’s really just scanning for known extension IDs, not poking around your entire computer. Saying “computer scan” might sound a bit dramatic, but the privacy risk is still pretty serious given what info they can guess from those extensions.

About the home lab and network side — I get that LinkedIn isn’t scanning your whole network or anything. What I meant is more about how you can block or filter those sneaky requests at the network level, like with DNS blocking or firewall rules, so they never even get sent out. It’s not a classic home lab threat, but if you’re running your own DNS or network filters, it’s a handy extra layer to keep things tighter.

Sure, switching browsers or faking your user agent works too, but not everyone wants to give up Chromium or LinkedIn completely. That’s why I mentioned a few different ways to protect yourself.

Appreciate the note on wording — I just wanted to show why this isn’t just some minor browser oddity and why it’s worth thinking about from a privacy and network defence angle.

[–] lazynooblet@lazysoci.al 1 points 4 days ago

How do you DNS block a URL :)

[–] Auster@thebrainbin.org 2 points 4 days ago

I think you forgot the link? That or my instance didn't pull it.

[–] onlinepersona@programming.dev 1 points 4 days ago (2 children)

So Firefox and its forks are safe?

[–] TheIPW@lemmy.ml 4 points 4 days ago

Mostly, yes. Firefox doesn't use the specific Chromium internal resource API that LinkedIn is exploiting for this. However, since the script relies on hidden GET requests, I still recommend Multi-Account Containers to isolate LinkedIn entirely, plus a custom uBlock Origin filter just to be sure.

[–] zer0squar3d@lemmy.dbzer0.com 1 points 4 days ago

Or if you change your useragent to anything other than chrome/chromium related as it only runs on detected chromium browsers.

[–] gibmiser@lemmy.world 1 points 4 days ago (2 children)

Wonder how hard it would be to make a list of sensitive information employees based on the programs installed. I imagine pretty easy.

[–] zer0squar3d@lemmy.dbzer0.com 1 points 4 days ago

It only checks browser addons/extensions. The title isnt accurate.

[–] TheIPW@lemmy.ml 1 points 4 days ago

Spot on. If you can see a user has certain VPN clients, IDEs, or specific advocacy tools installed, you've essentially built a psychological profile of an employee’s home environment without them ever clicking 'Accept'. It’s a massive GDPR Article 9 violation (Special Category data) hidden in plain sight.

[–] TheIPW@lemmy.ml 0 points 4 days ago

Did you find it, I think the Lemmy server is having a few issues today. https://the.unknown-universe.co.uk/privacy-security/linkedin-browsergate/