Skip links

A new privacy controversy is unfolding around LinkedIn after researchers alleged that the professional networking platform quietly checks users’ web browsers for installed extensions without clear disclosure or explicit consent.

The claims originate from an investigation by European digital rights organization Fairlinked e.V., released under a project titled “BrowserGate.” According to the report, LinkedIn pages running on Chromium-based browsers automatically execute background JavaScript designed to detect whether specific browser extensions are installed on a user’s system.

Researchers say the mechanism works by attempting to access publicly exposed resources linked to browser extensions. When a resource successfully loads, the system confirms that the extension exists. The process occurs within milliseconds during normal page loading and produces no visible notification to users.

The investigation alleges that LinkedIn’s code references more than 6,000 extension identifiers and activates only on Chromium browsers such as Google Chrome, Microsoft Edge, Brave, Opera, and Arc. Firefox and Safari browsers were not found to trigger the same behavior.

Privacy analysts note that the issue becomes more sensitive because LinkedIn accounts are tied to verified personal identities, workplaces, and professional roles. Any detected extension can therefore be associated directly with an identifiable individual rather than an anonymous browser session.

Researchers argue that, when aggregated, this information could allow detailed insights into workplace software adoption trends and organizational technology stacks. The report claims LinkedIn could theoretically determine which competing sales tools, recruitment platforms, or productivity software employees across specific companies are using.

Among the categories reportedly identifiable through extension detection are job-search utilities, accessibility and assistive tools, news and political content filters, religious community applications, and software linked to rival business intelligence platforms. Investigators warn that some of these signals may indirectly reveal sensitive personal characteristics.

Under the European Union’s General Data Protection Regulation (GDPR), data capable of exposing religious beliefs, political opinions, or health-related conditions falls under “special category” protections requiring explicit legal justification and user consent before processing. The BrowserGate report alleges that LinkedIn’s public privacy disclosures do not clearly describe such browser extension scanning.

The investigation also claims that additional tracking components load alongside LinkedIn pages, including scripts associated with external security and analytics providers. These elements reportedly operate invisibly in the background while transmitting encrypted data during page visits.

LinkedIn has not issued a detailed public response addressing the specific technical allegations. The findings have nevertheless intensified scrutiny from privacy advocates who argue that modern web platforms increasingly rely on sophisticated fingerprinting techniques that operate beyond users’ awareness.

If regulators determine that undisclosed browser fingerprinting occurred, experts say the case could become a major test of transparency standards for large technology platforms and the limits of data collection practices tied to authenticated online identities.

Leave a comment

RBN Community

Join our whatsapp channels below to get the latest news and updates.

rBusiness rMarkets