WARNING: LinkedIn has your profile. They have more from illegally spying on you.

“LinkedIn started injecting malicious code into the browsers of their users, without their knowledge or their consent. At the time of writing, this code downloads a list of 6,222 software products and brute-forces the detection of each one.”

More info:
https://browsergate.eu/executive-summary/

What you can do:
https://browsergate.eu/take-action/

🧵 1/2

#BrowserGate #LinkedIn #InfoSec #OpSec #Privacy #Crime #YouAreTheProduct #Microsoft

The BrowserGate folks have provided an evidence pack, proving the scraping of data from your computer.

This includes a sworn affidavit by LinkedIn’s Senior Manager of Software Engineering and Machine Learning, Milinda Lakkam. It’s an admission of guilt. Under oath.

https://browsergate.eu/the-evidence-pack/

🧵 2/2

#BrowserGate #LinkedIn #InfoSec #OpSec #Privacy #Crime #YouAreTheProduct #Microsoft

The Evidence Pack

Everything on this page is independently verifiable. The source code speaks for itself. Its own engineer, under oath, admits it. Exhibit 1 — LinkedIn’s JavaScript bundle File: 5fdhwcppjcvqvxsawd8pg1n51.js Size: ~2.7 MB (13,159 lines of minified JavaScript) Webpack chunk: chunk.905 This is the file LinkedIn serves to every Chrome user who visits linkedin.com. It contains a hardcoded array of 6,222 Chrome extension IDs, each paired with a specific internal file path that LinkedIn engineers mapped for detection.

BrowserGate

@markwyner

This makes me incredibly glad to have gotten away from that hellhole of a website.