LinkedIn scans for 6,278 extensions and encrypts the results into every request
LinkedIn has been scanning users' browser extensions since at least 2017, collecting data on 6,278 extensions as of 2026, and encrypting this information into every request without user consent. The company uses this data to identify users and potentially take enforcement actions, linking detailed software inventories to verified professional profiles. This practice, not disclosed in LinkedIn's privacy policy, raises concerns about privacy, user consent, and the broader implications of browser fingerprinting.
Opening excerpt (first ~120 words) tap to expand
LinkedIn Is Scanning Your Browser Extensions. This Is How They Use the Data. Seth Honda · April 6, 2026 · 7 min read Try 404 for Free When companies get caught doing this sort of thing, the response is almost always the same: "we're using this technology to combat fraud," or "ensure positive user experience," or "save computing resources," or some other hog wash.The simple truth, there's no reason to be collecting data that can be used to identify a user across the web if they're not signed in to your service. The harm of companies like Experian or LinkedIn being able to correlate all of your web traffic back to you is not hard to imagine.
…
Excerpt limited to ~120 words for fair-use compliance. The full article is at 404.