Microsoft is running one of the largest corporate espionage operations in modern history.

Every time any of LinkedIn’s one billion users visits linkedin.com, hidden code searches their computer for installed software, collects the results, and transmits them to LinkedIn’s servers and to third-party companies including an American-Israeli cybersecurity firm.

The user is never asked. Never told. LinkedIn’s privacy policy does not mention it.

Because LinkedIn knows each user’s real name, employer, and job title, it is not searching anonymous visitors. It is searching identified people at identified companies. Millions of companies. Every day. All over the world.

  • inlandempire@jlai.lu
    link
    fedilink
    English
    arrow-up
    15
    ·
    2 hours ago

    it does NOT scan applications on your computer

    technically browser extensions are considered applications under EU’s GDPR

    It DOES scan which browser extensions you have running (if they affect page loading).

    as per their report:

    Why two detection methods

    Method Technique What it catches
    AED fetch() against known resource paths Extensions that are merely installed, even if they inject nothing into the current page
    Spectroscopy Full DOM tree walk Extensions that actively modify the page, even if they are not in LinkedIn’s hardcoded list
    • Alberat@lemmy.world
      link
      fedilink
      English
      arrow-up
      3
      ·
      45 minutes ago

      it’s misleading to say its searching your computer tho…? this invokes the thought of LinkedIn getting to rifle through your files like it has access to ~/Documents/ or smth.

      but yeah tracking you over the internet is similarly bad