LinkedIn has always been perceived as one of the most trusted professional platforms by the masses. However, the latest research related to the platform suggests a very different story. According to a report published by Fairlinked eV and independently confirmed by Bleeping Computer, LinkedIn is injecting a JavaScript fingerprinting script into every page load that probes visitors' browsers for 6,236 installed Chrome extensions and collects detailed device telemetry. The script verified by BleepingComputer suggested that it harvests the CPU core count, time zone, language settings, battery status, and available memory. These findings were first published in Fairlinked's 'BrowserGate' report, which claims the script works by attempting to access
file resources tied to specific extension IDs, which is a well-documented technique for identifying whether extensions are installed in Chromium-based browsers. As per a GitHub repo, LinkedIn was scanning for roughly 2000 extensions in 2025, and a separate repo suggested that around 3000 were being scanned in February 2026. As of now, the entire count stands at 6,236. Most of the affected extensions are LinkedIn-related tools like Lusha, ZoomInfo, Apollo, and a lot more.iPhone Fold Price In India, Design, Specifications, Camera, And More Furthermore, the script also collects more than hardware and software fingerprinting data like device memory, CPU class, time zone offset, screen dimensions, and storage capabilities. The report by Fairlinked also stated that the data has been transmitted to HUMAN security which is an American Israeli cybersecurity firm. However, this has not been verified until now. LinkedIn also responded to the same by saying, 'To protect the privacy of our members, their data, and to ensure site stability, we do look for extensions that scrape data without members' consent," a LinkedIn spokesperson told BleepingComputer. The company added that it does not use the data to "infer sensitive information about members.'
/images/ppid_a911dc6a-image-177513706488830291.webp)
/images/ppid_59c68470-image-177530506509542233.webp)
/images/ppid_59c68470-image-177510753113526498.webp)
/images/ppid_a911dc6a-image-177531642436143142.webp)
/images/ppid_59c68470-image-177527502897774066.webp)


/images/ppid_59c68470-image-177514753094450993.webp)

/images/ppid_a911dc6a-image-177513443544245613.webp)
/images/ppid_59c68470-image-177511252986653731.webp)
/images/ppid_a911dc6a-image-177513963602059817.webp)