LinkedIn is using hidden JS to scan your browser for over 6,000 specific extension IDs via a known Chromium vulnerability. By inventorying your local software, they can infer highly sensitive “Special Category” data like health status, religion, and political advocacy without consent.

I’ve joined the dots on why Chromium-based “Shields” fail here and how to harden your home lab/network to stop the leak.

  • TheIPW@lemmy.mlOP
    link
    fedilink
    English
    arrow-up
    4
    ·
    12 days ago

    Spot on. If you can see a user has certain VPN clients, IDEs, or specific advocacy tools installed, you’ve essentially built a psychological profile of an employee’s home environment without them ever clicking ‘Accept’. It’s a massive GDPR Article 9 violation (Special Category data) hidden in plain sight.