LinkedIn is using hidden JS to scan your browser for over 6,000 specific extension IDs via a known Chromium vulnerability. By inventorying your local software, they can infer highly sensitive “Special Category” data like health status, religion, and political advocacy without consent.

I’ve joined the dots on why Chromium-based “Shields” fail here and how to harden your home lab/network to stop the leak.

  • gibmiser@lemmy.world
    link
    fedilink
    English
    arrow-up
    3
    ·
    11 days ago

    Wonder how hard it would be to make a list of sensitive information employees based on the programs installed. I imagine pretty easy.

    • TheIPW@lemmy.mlOP
      link
      fedilink
      English
      arrow-up
      4
      ·
      11 days ago

      Spot on. If you can see a user has certain VPN clients, IDEs, or specific advocacy tools installed, you’ve essentially built a psychological profile of an employee’s home environment without them ever clicking ‘Accept’. It’s a massive GDPR Article 9 violation (Special Category data) hidden in plain sight.