:

LINKEDIN SCANS 6,278 BROWSER EXTENSIONS

INDUSTRY DESK1 MIN READ
THU, APR 30, 2026

■ AI-SUMMARIZED FROM 1 SOURCE BELOW

LinkedIn scans users' installed browser extensions and encrypts the data into every request sent to its servers, according to privacy research. The practice affects millions of users without explicit consent.

Security researchers discovered that LinkedIn identifies 6,278 different browser extensions on user devices and includes encrypted extension data in HTTP requests. The company collects information about which extensions are installed, potentially revealing user behavior, productivity tools, and security software. LinkedIn encrypts this data but still transmits it with every request, making it difficult for users to detect or opt out of the scanning. The practice raises privacy concerns, as extension data can infer sensitive information about browsing habits and security measures. The discovery sparked discussion on Hacker News, with 121 points and 32 comments. Users questioned whether LinkedIn discloses this data collection in its privacy policy and whether it shares the information with third parties. LinkedIn has not publicly commented on the findings. The practice highlights how major platforms collect detailed information about user device configurations beyond their primary services.

■ SOURCES

Hacker News

■ SUMMARY WRITTEN BY AI FROM THE LINKS ABOVE

■ MORE FROM THE SECURITY DESK

The FBI has linked cybercriminals to a sharp increase in cargo theft attacks across North America. Losses from cyber-enabled cargo theft reached nearly $725 million in 2025, prompting federal warnings to the transportation and logistics sector.

JUST NOWSecurity Desk

Taylor Swift is pursuing a trademark on her likeness as researchers uncover scammers using AI-generated deepfake videos of the artist to defraud TikTok users. The fake content tricks viewers into surrendering personal data.

JUST NOWIndustry Desk

A newly discovered phishing service named Bluekit provides attackers with over 40 templates targeting popular services and includes AI capabilities for generating campaign drafts.

2H AGOAI Desk

A severe Linux vulnerability dubbed CopyFail has emerged, threatening multi-tenant servers, CI/CD pipelines, and Kubernetes containers worldwide. The flaw catches the security community unprepared as exploitation vectors expand.

3H AGODev Desk

■ SUBSCRIBE TO THE DAILY BRIEF

ONE EMAIL, 5 STORIES, 06:00 UTC. UNSUBSCRIBE ANYTIME.