Microsoft is running one of the largest corporate espionage operations in modern history.

Every time any of LinkedIn’s one billion users visits linkedin.com, hidden code searches their computer for installed software, collects the results, and transmits them to LinkedIn’s servers and to third-party companies including an American-Israeli cybersecurity firm.

The user is never asked. Never told. LinkedIn’s privacy policy does not mention it.

Because LinkedIn knows each user’s real name, employer, and job title, it is not searching anonymous visitors. It is searching identified people at identified companies. Millions of companies. Every day. All over the world.

    • status_sphere@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      2
      ·
      2 hours ago

      Interesting, I also have the DDG browser but the test shows a unique fingerprint result. I don’t think that I have tinkered with any settings and I haven’t installed addons.

      • Steve@startrek.website
        link
        fedilink
        English
        arrow-up
        2
        ·
        edit-2
        2 hours ago

        Correction- the first test was the browser inside the lemmy voyager app, not sure what its based on. This one is out of the DDG app;

      • PumaStoleMyBluff@lemmy.world
        link
        fedilink
        English
        arrow-up
        3
        ·
        2 hours ago

        Some of the test sites don’t differentiate between random and unique. They may see a randomized fingerprint as a plausible unique user, but it may be different the next time you visit. Other sites may detect that your browser has taken steps to randomize your fingerprint, and use that as an identifying piece of information on its own (power user vs average joe)