Microsoft is running one of the largest corporate espionage operations in modern history. Every time any of LinkedIn’s one billion users visits linkedin.com, hidden code searches their computer for installed software, collects the results, and transmits them to LinkedIn’s servers and to third-party companies including an American-Israeli cybersecurity firm.

https://news.ycombinator.com/item?id=47613981

  • pastermil@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    15
    ·
    7 hours ago

    Alright, I’ll bite. What would one use instead of LinkedIn

    I am not a big fan of it myself, but it’s been providing me insight on the corporate world. I have had great job-seeking experience there, especially with the Easy Apply feature.

    Recently, tho, it’s been shitty, especially with all the avalance of AI slop, both as content as well as job requirements.

    I’d like to know if there’s a less shitty alternative.

    • dev_null@lemmy.ml
      link
      fedilink
      English
      arrow-up
      9
      ·
      5 hours ago

      Never used it. I just apply on a given company’s website, after finding out about the job on various job boards. I’m not even sure where LinkedIn is supposed to come into play?

      • AngryDeuce@lemmy.world
        link
        fedilink
        English
        arrow-up
        1
        ·
        40 minutes ago

        That’s for after youre onboarded, so they know what names to drop when theyre sending you scam texts and emails.

        So whatever you do, make sure first thing you do when you get a new job is drop as much PII in there about your current employer so your IT department doesnt get too lax with thinking people are finally figuring out that the CEO that you’ve never even met in person would totally send you a text asking you to buy 1000 bucks worth of iTunes giftcards on your second day of employment.

      • Halcyon@discuss.tchncs.de
        link
        fedilink
        English
        arrow-up
        9
        ·
        4 hours ago

        Same here, never used LinkedIn and don’t see any reason for that. LinkedIn is full of self-promoters, none of whom I want to become.

        Open job opportunities are posted everywhere on specialized job platforms. Just subscribe to job postings in your own field and then apply directly.

  • bleistift2@sopuli.xyz
    link
    fedilink
    English
    arrow-up
    269
    ·
    18 hours ago

    First comment from the link:

    Every time you open LinkedIn in a Chrome-based browser, LinkedIn’s JavaScript executes a silent scan of your installed browser extensions. The scan probes for thousands of specific extensions by ID, collects the results, encrypts them, and transmits them to LinkedIn’s servers.

    That is very different from “searches their computer for installed software”

    • Madrigal@lemmy.world
      link
      fedilink
      English
      arrow-up
      53
      arrow-down
      2
      ·
      16 hours ago

      Still don’t really understand why browsers expose this data to sites.

      Web browsers are just such a massive security hole.

      • bleistift2@sopuli.xyz
        link
        fedilink
        English
        arrow-up
        30
        arrow-down
        1
        ·
        16 hours ago

        On the contrary, websites are incredibly sandboxed. It’s damn near impossible to find out anything about the computer. Off the top of my head: Want to know where the file lives that the user just picked? Sure, it’s C:\fakepath\filename. Wanna check the color of a link to see if the user has visited the site before? No need to check. The answer will be ‘false’. Always.

        • Madrigal@lemmy.world
          link
          fedilink
          English
          arrow-up
          28
          arrow-down
          1
          ·
          15 hours ago

          Here’s the information a web server needs to deliver content to a browser:

          • The requested resource
          • An IP address
          • User credentials (sometimes)

          Everything else is a fucking security hole. There’s no good reason for servers to know what extensions you have installed, what OS you’re running, the dimensions of your browser window, where your mouse cursor is positioned, or any one of a thousand other data points that browsers freely hand over.

          • bleistift2@sopuli.xyz
            link
            fedilink
            English
            arrow-up
            1
            ·
            1 hour ago

            The browser can never know what information is needed for a certain use case. So it needs to be permissive in order to not break valid uses.

            For instance, your list does not include the things a user clicks on the website. But that’s exactly the info I needed to log recently. A user was complaining that dropdowns would close automatically. We quickly reached the assumption that something was sending two click events. In order to prove that, I started logging the users’ clicks. If there were two in the same millisecond, then it’s definitely not a bug but a hardware (or driver or OS or whatever) issue.

          • Dnb@lemmy.dbzer0.com
            link
            fedilink
            English
            arrow-up
            4
            arrow-down
            2
            ·
            8 hours ago

            If the site doesn’t know the window width of can’t react to mobile or desktop users automatically or scale elements/ change to best for your display.

            You need mouse input for hovering effects as well

            • lambalicious@lemmy.sdf.org
              link
              fedilink
              English
              arrow-up
              1
              ·
              1 hour ago

              False. Browsers can announce themselves as desktop or mobile, or even advertise pre-determined fake window and screen sizes for this purpose (in Firefox it’s called “letterboxed” in the hidden settings). There is no need for a server to have any of this information anyway - either the design of the webpage should be responsive by default, or the server can send specifically whichever files for styles the browser specifically asks for, perhaps falling back to a “all.css” or something.

            • Madrigal@lemmy.world
              link
              fedilink
              English
              arrow-up
              9
              arrow-down
              2
              ·
              8 hours ago

              That can all be done 100% client side. The server does not need this information.

              • 3abas@lemmy.world
                link
                fedilink
                English
                arrow-up
                6
                arrow-down
                2
                ·
                7 hours ago

                If you can do it client side, you can send it to a server…

                The difference is intent.

                • Madrigal@lemmy.world
                  link
                  fedilink
                  English
                  arrow-up
                  3
                  ·
                  7 hours ago

                  you can send it to a server

                  Yes, because web browsers, under current web architecture, allow this.

                  This is entirely my point.

              • Dnb@lemmy.dbzer0.com
                link
                fedilink
                English
                arrow-up
                4
                arrow-down
                1
                ·
                edit-2
                7 hours ago

                Ah I read as the Brower doesn’t need that data. I’d say it needs width (maybe height) but that’s it

                But this info talked about in OP is done via client sending the data to a server not the server getting it all the time

          • Serinus@lemmy.world
            link
            fedilink
            English
            arrow-up
            10
            arrow-down
            2
            ·
            12 hours ago

            There are absolutely reasons. Firefox is done by a reasonable job of anti-fingerprinting, and it’s a fine line to walk to disable as many of those indicators as possible without breaking sites.

            Browsers do give away too much, but at least Firefox is working on it. And it’s not extremely straightforward.

    • credo@lemmy.world
      link
      fedilink
      English
      arrow-up
      80
      ·
      18 hours ago

      Well, I guess it’s technically installed software… but the scope is significantly less than what’s implied from the headline. My immediate reaction was, “how?”

      This is basically standard browser fingerprinting, hence why it’s sold for surveillance activities. Linked in is big brother.

    • hansolo@lemmy.today
      link
      fedilink
      English
      arrow-up
      30
      arrow-down
      5
      ·
      17 hours ago

      WTF is this article? Browser extensions are standard browser fingerprinting data.

    • lmr0x61@lemmy.ml
      link
      fedilink
      English
      arrow-up
      5
      arrow-down
      6
      ·
      16 hours ago

      That sounds… normal? and maybe even sensible, especially if LinkedIn does SSR, since that could allow the servers know how to tailor the content to the specific browser requesting a page.

      • TootGuitar@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        18
        ·
        edit-2
        11 hours ago

        In what fucking world is it “normal” or “sensible” to scan your browser extensions to decide how to render a page? Please explain.

        I’ve been doing web development for 30 years (since the time when “SSR” was just called “building a web app”) and I have not once ever had the desire or need to do this.

        • runit@lemmy.zip
          link
          fedilink
          English
          arrow-up
          1
          ·
          11 minutes ago

          The reason is fingerprinting. Verrrry old technique. Adtech stuff. You might collect browser extension, webgl information, CPU core count, screen resolution, IP address, reverse dns, locale, headers, user agent, akamai hash, etc. The reason is so that these metrics can then be enriched to build a consumer profile and used in analytics

        • paraphrand@lemmy.world
          link
          fedilink
          English
          arrow-up
          2
          ·
          5 hours ago

          I can only think of reasons that are meant to block you based on what you are using to augment your browsing experience.

  • Blaster M@lemmy.world
    link
    fedilink
    English
    arrow-up
    44
    arrow-down
    3
    ·
    17 hours ago

    Browsing extensions are being discovered by directly probing them - over 6,200 of them - and they are particular extensions tied to religious, political, and neurodivergent use cases. This is more than just browser fingerprinting - it is breaching the privacy of the user and profiling them in ways deemed illegal in the EU (GDPR) and even California. That doesn’t include the tracking cookies, either.