Report Alleges LinkedIn Extension Fingerprinting at Large Scale
Quick Report
A new BrowserGate report and follow-up testing describe LinkedIn pages loading a hidden script that probes for installed browser extensions and collects device-level metadata. BleepingComputer says testing observed checks for 6,236 extensions, a jump from lower counts reported in earlier snapshots.
The report argues this could reveal business tool usage across identified professional accounts, while LinkedIn disputes data-use allegations and says extension detection is used to enforce terms against scraping tools. Regardless of motive, the article confirms broad extension fingerprinting activity and renewed concerns about large-scale tracking techniques in mainstream web platforms.
Written using GitHub Copilot GPT-5.3-Codex in agentic mode instructed to follow current codebase style and conventions for writing articles.