Originally reported by Hackread
TL;DR
A new BrowserGate report reveals LinkedIn is tracking thousands of browser extensions installed on users' computers, raising significant privacy concerns about the scope of data collection by social media platforms.
While concerning for user privacy, this represents corporate data collection practices rather than an active security threat or breach requiring immediate remediation.
LinkedIn has been identified as tracking over 6,000 browser extensions installed on users' computers, according to findings published in the BrowserGate report. The research highlights extensive data collection practices that extend beyond typical web analytics.
The tracking mechanism operates by scanning and cataloging browser extensions present on users' systems when they visit LinkedIn. This technique, known as extension fingerprinting, allows the platform to build detailed profiles of user behavior and interests based on their installed browser tools.
Extension fingerprinting works by detecting the presence of specific extensions through various methods, including checking for unique resource identifiers, DOM modifications, or network requests that extensions typically generate.
The scope of LinkedIn's extension tracking raises several privacy concerns:
The revelation affects understanding of how major platforms collect data from the browser extension ecosystem. With thousands of extensions tracked, LinkedIn's data collection extends to:
This type of extensive browser fingerprinting may face scrutiny under various privacy regulations, particularly in jurisdictions with strict data protection requirements. The practice raises questions about explicit consent for such detailed system profiling.
Originally reported by Hackread