Microsoft is running one of the largest corporate espionage operations in modern history.

Every time any of LinkedIn’s one billion users visits linkedin.com, hidden code searches their computer for installed software, collects the results, and transmits them to LinkedIn’s servers and to third-party companies including an American-Israeli cybersecurity firm.

The user is never asked. Never told. LinkedIn’s privacy policy does not mention it.

Because LinkedIn knows each user’s real name, employer, and job title, it is not searching anonymous visitors. It is searching identified people at identified companies. Millions of companies. Every day. All over the world.

  • BradleyUffner@lemmy.world
    link
    fedilink
    English
    arrow-up
    12
    arrow-down
    1
    ·
    6 hours ago

    It scans your JavaScript context for known browser plugins. That’s it. It’s not scanning your whole computer for installed software.

    • mic_check_one_two@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      5
      ·
      5 hours ago

      I was gonna say… If LinkedIn managed to figure out how to break out of the browser sandbox, this would be a much bigger headline. Like “scanning your PC for installed software without the user’s knowledge, simply by visiting the site” is full blown “pull the plug on your entire internet connection until this zero day exploit can be figured out” levels of bad.

  • GreenShimada@lemmy.world
    link
    fedilink
    English
    arrow-up
    85
    arrow-down
    7
    ·
    edit-2
    18 hours ago

    This is straight up misinformation. First off, it’s perfectly legal.

    LinkedIn does browser fingerprinting. It’s the same thing Google and Meta do. It’s how Google Ads is shifting to a post-adblocker revenue stream.

    Browser fingerprints show fonts used, audio codecs, WebGL render data, processor, operating system - enough that if you add up several factors together, it makes a statistically unique fingerprint. it does NOT scan applications on your computer. It can’t. It DOES scan which browser extensions you have running (if they affect page loading).

    If you check your email and then close that and go to Google in an incognito window and search for porn - Google will fucking know what you’re looking at. Gmail and all Google apps all fingerprint, and then you’ll notice how Google ads trackers are on most sites online? Yep. That’s how they track you.

    Use a VPN? Use an ad blocker? Great - Google doesn’t care. Google can track your fingerprint.

    See your own fingerprint - check how it know it’s you visit after visit.

    https://fingerprint.com/

    https://coveryourtracks.eff.org/

    https://amiunique.org/

    • Bloefz@lemmy.world
      link
      fedilink
      English
      arrow-up
      12
      ·
      14 hours ago

      They also scan for thousands of extensions. The only reason it doesn’t do this on Firefox is that Firefox randomises the uuid of extensions every time. Chrome doesn’t.

    • PumaStoleMyBluff@lemmy.world
      link
      fedilink
      English
      arrow-up
      7
      ·
      15 hours ago

      Fonts, codecs, hardware, OS, extensions are all parts of a computer that never ever need to be transmitted to a website for it to function. Any information about them should be sandboxed, and if the website wants to display differently based on them, it can send static data or code in and get nothing back out.

    • Snot Flickerman@lemmy.blahaj.zone
      link
      fedilink
      English
      arrow-up
      8
      arrow-down
      1
      ·
      18 hours ago

      I think the argument is that since some of the extensions that are probed can be political in nature, which can reveal political identity, which is potentially unlawful in the EU. However, it really needs to be up to a judge to make a decision on that.

      In general what they’re doing is legal, and the BrowserGate people are using niggling little details, a handful of extensions out of the 6000 probed, to justify this argument. I couldn’t say, especially as someone from outside the EU, whether this is actually illegal or not, but it’s definitely in a nebulous area at the moment.

      Though I agree it’s sensationalized in terms of claiming it’s “searching your computer” and doing “corporate espionage.”

  • Damage@feddit.it
    link
    fedilink
    English
    arrow-up
    24
    arrow-down
    2
    ·
    15 hours ago

    The Attack: How it works
    Every time you open LinkedIn in a Chrome-based browser,

    Stopped reading there

    • Snot Flickerman@lemmy.blahaj.zone
      link
      fedilink
      English
      arrow-up
      8
      ·
      edit-2
      18 hours ago

      “Yes, LinkedIn was probing for a lot of extensions, but there was no scanning of your computer and no malicious code, just a simple JavaScript technique to determine if the extension was there.”

      Reguly decided to test the resource probing and results obtained on a sample 10% of the 6,000+ extensions. “One extension refused to have its tab closed and reopened itself every time I closed it. Others changed my home screen, the about:blank page, and added bookmarks.” Another Rickrolled him, playing the ‘Never Gonna Give You Up’ video every time he opened his browser. “To say that a lot of these are the worst of the worst extensions out there is not an understatement.”

      What’s more, statistically from his sample testing, he believes only around 2,000 could be detected by LinkedIn, when even 6,000 is just a small sub-set of the total number of extensions that exist. If LinkedIn was intent on fingerprinting or profiling its users, there are better methods than this.

      “I don’t see anything that indicates malicious intent here,” he told SecurityWeek “It is discovering some information, yes, but I don’t think it crosses the threshold to malicious – I think that’s a very sensationalized view of what’s going on.”

      Asked why LinkedIn is doing this, he replies, “I don’t know. But for me, a common trend across these extensions is that they have data scraping functionality and are not well known. And they were problematic at times. Many of them gave me that used-car-salesman vibe that you see in the movies,” he continued.

      “I can’t help but wonder if LinkedIn wanted to know if these extensions were there to try and defend against them. I certainly wouldn’t want one of my LinkedIn contacts to be running these extensions and visit my page with these scrapers installed. I feel that a user with these extensions installed visiting my LinkedIn page is more of an affront to my privacy than LinkedIn checking to see if I have these extensions.”


      Of course, depending on interpretation, this still may not be appropriate or legal in the EU. However, it does seem that BrowserGate’s claims are a bit on the exaggerated side.


      OP’s link with Google’s AMP nonsense removed: https://www.securityweek.com/browsergate-claims-of-linkedin-spying-clash-with-security-research-findings/

  • Snot Flickerman@lemmy.blahaj.zone
    link
    fedilink
    English
    arrow-up
    4
    arrow-down
    2
    ·
    18 hours ago

    Literally? They’re searching installed browser extensions, that’s not “my computer.” Sure, it’s identification data, and it may brush up against EU laws, but “illegally searching your computer” is definitely a bit of hyperbole.

    They are not “literally” searching my computer, as much as I am not literally fucking your mom.

  • magnue@lemmy.world
    link
    fedilink
    English
    arrow-up
    2
    ·
    19 hours ago

    I’ll never join LinkedIn. Pointless middlemen in job searches. A social network people are forced to use.

  • atzanteol@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    3
    arrow-down
    2
    ·
    17 hours ago

    hidden code searches their computer for installed software

    Not gonna read an article that is this poorly researched. It’s clickbait.