Microsoft is running one of the largest corporate espionage operations in modern history.

Every time any of LinkedIn’s one billion users visits linkedin.com, hidden code searches their computer for installed software, collects the results, and transmits them to LinkedIn’s servers and to third-party companies including an American-Israeli cybersecurity firm.

The user is never asked. Never told. LinkedIn’s privacy policy does not mention it.

Because LinkedIn knows each user’s real name, employer, and job title, it is not searching anonymous visitors. It is searching identified people at identified companies. Millions of companies. Every day. All over the world.

        • status_sphere@sh.itjust.works
          link
          fedilink
          English
          arrow-up
          1
          ·
          1 hour ago

          Interesting, I also have the DDG browser but the test shows a unique fingerprint result. I don’t think that I have tinkered with any settings and I haven’t installed addons.

          • Steve@startrek.website
            link
            fedilink
            English
            arrow-up
            1
            ·
            edit-2
            47 minutes ago

            Correction- the first test was the browser inside the lemmy voyager app, not sure what its based on. This one is out of the DDG app;

          • PumaStoleMyBluff@lemmy.world
            link
            fedilink
            English
            arrow-up
            1
            ·
            50 minutes ago

            Some of the test sites don’t differentiate between random and unique. They may see a randomized fingerprint as a plausible unique user, but it may be different the next time you visit. Other sites may detect that your browser has taken steps to randomize your fingerprint, and use that as an identifying piece of information on its own (power user vs average joe)