Every time you open LinkedIn in a Chrome-based browser, LinkedIn’s JavaScript executes a silent scan of your installed browser extensions. The scan probes for thousands of specific extensions by ID, collects the results, encrypts them, and transmits them to LinkedIn’s servers.
A bit gross, but also just kind of how browser extensions that interact with Web sites work.
Yeah this is just browser fingerprinting, and most sites do it now
Recommenting since this is being posted fucking everywhere with the same sensational headline that makes it look like linkedin is jumping out of the browser to scan your actual filesystems - here’s an exerpt from the site linked:
The Attack: How it works
Every time you open LinkedIn in a Chrome-based browser, LinkedIn’s JavaScript executes a silent scan of your installed browser extensions. The scan probes for thousands of specific extensions by ID, collects the results, encrypts them, and transmits them to LinkedIn’s servers. The entire process happens in the background. There is no consent dialog, no notification, no mention of it in LinkedIn’s privacy policy.It’s enumerating the browser extensions you have installed.
Yea they makes a lot more sense, I was wondering how in the world were they able to get access to your file system from the browser. Turns out, they aren’t.
#1 lunatics. Thanks for the link.
It’s absolutely fucking not because why on earth would I go that that place?
Aren’t you ever interested in how the people you know fare, hoping to see they are doing worse than you?
A number of human people do that, you know. Succumb.
Perhaps I miss the point, as no, I don’t.
I guess it’s feeding off people’s morbid curiosity?
I have to use it for work when I’m hiring, usually after 3-5min I can’t stomach it any longer and close the tab in disgust



