"The report alleges that the platform runs a hidden system, internally referred to as 'Spectroscopy,' which scans users' browsers for thousands of installed extensions and builds a detailed digital fingerprint of their devices without explicit user awareness."
"According to findings spotted by Bleeping Computer, a 2.7MB JavaScript bundle loads whenever users open LinkedIn in a browser, executing thousands of simultaneous checks to detect over 6,000 Chrome extensions."
"Once collected, the information is encrypted using RSA and transmitted to LinkedIn telemetry endpoints, with the fingerprint attached to every API request during the session."
"Moreover, this raises concerns under the EU's GDPR framework, where such data may be classified as sensitive personal information requiring explicit consent."
Fairlinked e.V. published an investigation revealing LinkedIn's hidden data collection system named 'Spectroscopy.' This system scans users' browsers for over 6,000 extensions and gathers 48 device attributes, creating a unique digital fingerprint. The collected data is encrypted and sent to LinkedIn, tracking user activity across the platform. Concerns arise regarding the classification of this data under GDPR as sensitive personal information. LinkedIn denies any wrongdoing, claiming the system is designed to prevent unauthorized scraping.
Read at Tech Times
Unable to calculate read time
Collection
[
|
...
]