this post was submitted on 02 Apr 2026
136 points (76.4% liked)

Technology

83330 readers
3554 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
 

Microsoft is running one of the largest corporate espionage operations in modern history. Every time any of LinkedIn’s one billion users visits linkedin.com, hidden code searches their computer for installed software, collects the results, and transmits them to LinkedIn’s servers and to third-party companies including an American-Israeli cybersecurity firm.

https://news.ycombinator.com/item?id=47613981

you are viewing a single comment's thread
view the rest of the comments
[–] bleistift2@sopuli.xyz 234 points 13 hours ago (6 children)

First comment from the link:

Every time you open LinkedIn in a Chrome-based browser, LinkedIn’s JavaScript executes a silent scan of your installed browser extensions. The scan probes for thousands of specific extensions by ID, collects the results, encrypts them, and transmits them to LinkedIn’s servers.

That is very different from “searches their computer for installed software”

[–] crystalmerchant@lemmy.world 1 points 2 hours ago (1 children)
[–] Goodlucksil@lemmy.dbzer0.com 14 points 2 hours ago

DuckDuckGo is still a Chromium browser. Firefox, buddies, Firefox.

[–] Madrigal@lemmy.world 46 points 12 hours ago (1 children)

Still don’t really understand why browsers expose this data to sites.

Web browsers are just such a massive security hole.

[–] bleistift2@sopuli.xyz 23 points 11 hours ago (1 children)

On the contrary, websites are incredibly sandboxed. It’s damn near impossible to find out anything about the computer. Off the top of my head: Want to know where the file lives that the user just picked? Sure, it’s C:\fakepath\filename. Wanna check the color of a link to see if the user has visited the site before? No need to check. The answer will be ‘false’. Always.

[–] Madrigal@lemmy.world 26 points 10 hours ago (2 children)

Here's the information a web server needs to deliver content to a browser:

  • The requested resource
  • An IP address
  • User credentials (sometimes)

Everything else is a fucking security hole. There's no good reason for servers to know what extensions you have installed, what OS you're running, the dimensions of your browser window, where your mouse cursor is positioned, or any one of a thousand other data points that browsers freely hand over.

[–] Serinus@lemmy.world 8 points 8 hours ago

There are absolutely reasons. Firefox is done by a reasonable job of anti-fingerprinting, and it's a fine line to walk to disable as many of those indicators as possible without breaking sites.

Browsers do give away too much, but at least Firefox is working on it. And it's not extremely straightforward.

[–] Dnb@lemmy.dbzer0.com 0 points 3 hours ago (1 children)

If the site doesn't know the window width of can't react to mobile or desktop users automatically or scale elements/ change to best for your display.

You need mouse input for hovering effects as well

[–] Madrigal@lemmy.world 5 points 3 hours ago (2 children)

That can all be done 100% client side. The server does not need this information.

[–] 3abas@lemmy.world 3 points 3 hours ago (1 children)

If you can do it client side, you can send it to a server...

The difference is intent.

[–] Madrigal@lemmy.world 2 points 3 hours ago (1 children)

you can send it to a server

Yes, because web browsers, under current web architecture, allow this.

This is entirely my point.

[–] msage@programming.dev 2 points 2 hours ago

They will always allow it as long as you have javascript or any other code.

[–] Dnb@lemmy.dbzer0.com 3 points 3 hours ago* (last edited 3 hours ago)

Ah I read as the Brower doesn't need that data. I'd say it needs width (maybe height) but that's it

But this info talked about in OP is done via client sending the data to a server not the server getting it all the time

[–] credo@lemmy.world 68 points 13 hours ago

Well, I guess it’s technically installed software… but the scope is significantly less than what’s implied from the headline. My immediate reaction was, “how?”

This is basically standard browser fingerprinting, hence why it’s sold for surveillance activities. Linked in is big brother.

[–] hansolo@lemmy.today 25 points 13 hours ago

WTF is this article? Browser extensions are standard browser fingerprinting data.

[–] PattyMcB@lemmy.world 11 points 12 hours ago

Gonna have to agree here. Article headline is rage bait

[–] lmr0x61@lemmy.ml 0 points 12 hours ago (1 children)

That sounds… normal? and maybe even sensible, especially if LinkedIn does SSR, since that could allow the servers know how to tailor the content to the specific browser requesting a page.

[–] TootGuitar@sh.itjust.works 16 points 7 hours ago* (last edited 7 hours ago) (1 children)

In what fucking world is it “normal” or “sensible” to scan your browser extensions to decide how to render a page? Please explain.

I’ve been doing web development for 30 years (since the time when “SSR” was just called “building a web app”) and I have not once ever had the desire or need to do this.

[–] paraphrand@lemmy.world 1 points 1 hour ago

I can only think of reasons that are meant to block you based on what you are using to augment your browsing experience.