|
Getting your Trinity Audio player ready...
|
LinkedIn is reportedly using hidden scripts on its website to scan visitors’ browsers for over 6,000 Chrome extensions while collecting detailed device information. This includes CPU details, memory, screen resolution, time zone, and battery status, which can help create a unique browser fingerprint.
The scanning appears to target extensions that may interfere with LinkedIn’s platform, though the company claims it does not analyze sensitive personal data. Privacy experts have raised concerns because users are generally unaware of this level of data collection, and it isn’t explicitly described in LinkedIn’s privacy policy.



