LinkedIn is using hidden JS to scan your browser for over 6,000 specific extension IDs via a known Chromium vulnerability. By inventorying your local software, they can infer highly sensitive “Special Category” data like health status, religion, and political advocacy without consent.
I’ve joined the dots on why Chromium-based “Shields” fail here and how to harden your home lab/network to stop the leak.



Wonder how hard it would be to make a list of sensitive information employees based on the programs installed. I imagine pretty easy.
Spot on. If you can see a user has certain VPN clients, IDEs, or specific advocacy tools installed, you’ve essentially built a psychological profile of an employee’s home environment without them ever clicking ‘Accept’. It’s a massive GDPR Article 9 violation (Special Category data) hidden in plain sight.
It only checks browser addons/extensions. The title isnt accurate.