LinkedIn Is Spying on You, According to a New 'BrowserGate' Security Report — Scripts Stealthily Scan Visitors' Browsers for over 6,000 Chrome Extensions and Harvest Hardware Data

LinkedIn Is Spying on You, According to a New 'BrowserGate' Security Report — Scripts Stealthily Scan Visitors' Browsers for over 6,000 Chrome Extensions and Harvest Hardware Data

Tom's Hardware
Tom's HardwareApr 4, 2026

Companies Mentioned

Why It Matters

LinkedIn’s covert data collection heightens privacy risks for professionals and could trigger regulatory action under GDPR, CCPA, and emerging U.S. privacy laws. Understanding the scope of tracking helps businesses and users protect sensitive information.

Key Takeaways

  • LinkedIn scripts scan for 6,000+ Chrome extensions.
  • Data collection includes hardware fingerprints and browsing behavior.
  • Report highlights lack of user consent and privacy risks.
  • Potential regulatory scrutiny under GDPR and US privacy laws.
  • Users can mitigate risk via script blockers or private browsing.

Pulse Analysis

The BrowserGate investigation uncovered a sophisticated layer of JavaScript embedded in LinkedIn’s public pages that silently interrogates a visitor’s browser environment. By querying the presence of thousands of Chrome extensions, the code can infer a user’s professional tools, security posture, and even personal interests. Coupled with hardware fingerprinting—capturing screen dimensions, GPU details, and operating system identifiers—the script builds a persistent, cross‑session profile that survives cookie deletions. This level of granularity exceeds typical analytics and skirts the boundaries of consent, raising red flags for privacy advocates.

From a regulatory perspective, LinkedIn’s practices intersect with multiple privacy frameworks. The European Union’s GDPR mandates clear, informed consent for any data that can identify an individual, while California’s CCPA and newer state statutes require transparent disclosure of tracking mechanisms. As legislators tighten “universal doxxing” provisions, platforms that harvest extension data may face fines or forced redesigns. Competitors such as Indeed and Glassdoor have publicly limited similar tracking, positioning themselves as privacy‑friendly alternatives and potentially gaining market share among security‑conscious recruiters.

For users, mitigation is straightforward but essential. Deploying script‑blocking extensions like uBlock Origin or enabling private browsing modes can prevent the extension‑scan from executing. Enterprises should consider network‑level content filters that strip third‑party scripts from inbound traffic. Meanwhile, LinkedIn is expected to respond with either a privacy‑by‑design overhaul or a detailed justification to regulators. The episode underscores a broader industry shift: as data‑driven personalization intensifies, transparent consent mechanisms will become a competitive differentiator rather than a compliance checkbox.

LinkedIn is spying on you, according to a new 'BrowserGate' security report — scripts stealthily scan visitors' browsers for over 6,000 Chrome extensions and harvest hardware data

Comments

Want to join the conversation?

Loading comments...