LinkedIn is using hidden JS to scan your browser for over 6,000 specific extension IDs via a known Chromium vulnerability. By inventorying your local software, they can infer highly sensitive “Special Category” data like health status, religion, and political advocacy without consent.

I’ve joined the dots on why Chromium-based “Shields” fail here and how to harden your home lab/network to stop the leak.

    • TheIPW@lemmy.mlOP
      link
      fedilink
      English
      arrow-up
      5
      ·
      9 days ago

      Mostly, yes. Firefox doesn’t use the specific Chromium internal resource API that LinkedIn is exploiting for this. However, since the script relies on hidden GET requests, I still recommend Multi-Account Containers to isolate LinkedIn entirely, plus a custom uBlock Origin filter just to be sure.

    • 0^2@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      1
      ·
      9 days ago

      Or if you change your useragent to anything other than chrome/chromium related as it only runs on detected chromium browsers.