Hacker Timesnew | past | comments | ask | show | jobs | submit | autoexec's commentslogin

> The list of extensions they scan for has been extracted from the code. It was all extensions related to spamming and scraping LinkedIn

Not according to the website which says:

The scan doesn’t just look for LinkedIn-related tools. It identifies whether you use an Islamic content filter (PordaAI — “Blur Haram objects, real-time AI for Islamic values”), whether you’ve installed an anti-Zionist political tagger (Anti-Zionist Tag), or a tool designed for neurodivergent users (simplify). Under GDPR Article 9, processing data that reveals religious beliefs, political opinions, or health conditions requires explicit consent. LinkedIn obtains none.

It also scans for every major competitor to Microsoft’s own products — Salesforce, HubSpot, Pipedrive — building company-level intelligence on which businesses use which software. Because LinkedIn knows your name, employer, and role, each scan aggregates into a corporate technology profile assembled without anyone’s knowledge.


I've love it if LinkedIn got successfully sued for millions and it resulted in similar lawsuits against every other website that did this sort of thing.


So no compelling here. The police asked for it and google gave it, either for free or in exchange for money. They didn't say "no" to the police, they didn't wait for a court order.

The bad guy here is google. And the people that champion data collection by private companies because of free market == good.


In that case, the main bad guy was the police who didn't bother to do even the most basic investigating after "check Google's GPS records to see who was at the house" including "Check Google's GPS records to see how how long they were there" which would have shown them this was a drive by, but yeah Google is absolutely a villain

It looks like it's also gathering info on your OS and graphics card which seems very much "your computer"

NoScript will prevent that script from loading and scanning extensions. JS is required for almost all fingerprinting and malware spread via websites. Keeping it disabled, at least by default, is the best thing you can do to protect yourself.

Disable JS and you've eliminated the vast majority of fingerprinting (besides "blocks JS")

alternatively, css can script quite a bit... :)

No joke, CSS has gotten out of hand!

It's probably better to let them spy on your highly encrypted traffic going overseas than use a US based service considering that they can march into any US company and start collecting every bit of data (https://en.wikipedia.org/wiki/Room_641A)

It turns out that "makes the most money for a small amount of people" is pretty much the same as "makes everything shitty for everyone else". It's time that we either stop accepting "most profitable" as an excuse for making things worse or start regulating/punishing bad behavior until it becomes so costly that it's no longer profitable.

Whales are the tiny percentage of users who spend large amounts of actual money on bullshit non-products offered by mobile apps and online platforms. AKA suckers.

That'd be ideal because it would mean I could browse the internet without ads and just never use AI chatbots. Unfortunately I think ads are only going to spread and what we'll actually end up with is "more ads everywhere".

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: