Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. There is a fresh thing going around about LinkedIn scanning extensions installed in Chrome/Chromium:https://browsergate.eu/

There is a fresh thing going around about LinkedIn scanning extensions installed in Chrome/Chromium:https://browsergate.eu/

Scheduled Pinned Locked Moved Uncategorized
linkedinbrowsergateprivacy
40 Posts 15 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • rysiek@mstdn.socialR rysiek@mstdn.social

    I was not aware of the technique the scanning employs, but apparently it's a known issue on Chrome and Chromium-based browsers, and has been for years:
    https://browserleaks.com/chrome

    LinkedIn itself has been using it since 2017:
    https://github.com/dandrews/nefarious-linkedin

    And I am sure it is used by a lot of shady sites to fingerprint users and actually figure out protected information about them. It can absolutely be used that way, and Google needs to plug this huge privacy hole.

    🧵/end

    #Chrome #BrowserGate #Privacy

    rysiek@mstdn.socialR This user is from outside of this forum
    rysiek@mstdn.socialR This user is from outside of this forum
    rysiek@mstdn.social
    wrote last edited by
    #19

    Also go see what @vantiss has to say about it:
    https://social.treehouse.systems/@vantiss/116336811478744261

    Credit where credit's due, I relied on her research on the earliest known instance of LinkedIn using this technique.

    If you want to boost something, go boost her toot!

    #BrowserGate #Chrome #Privacy

    moses_izumi@fe.disroot.orgM rysiek@mstdn.socialR 2 Replies Last reply
    0
    • rysiek@mstdn.socialR rysiek@mstdn.social

      LinkedIn loads a lot of JS. In that JS there is a list of over 6.000 extensions, identified by their ids and with a single file path provided.

      The JS then checks if it is running in Chrome or a Chromium-based browser, and cycles through that list, checking if these extensions are installed by doing a fetch() to "chrome-extension://<extension_id>/<file_path>".

      If the fetch() succeeds, the extension is installed. If not, it isn't.

      🧵

      orca@nya.oneO This user is from outside of this forum
      orca@nya.oneO This user is from outside of this forum
      orca@nya.one
      wrote last edited by
      #20
      @rysiek@mstdn.social wtf why does Chrome allows an untrusted website to do that???
      rozie@mastodon.onlineR 1 Reply Last reply
      0
      • rysiek@mstdn.socialR rysiek@mstdn.social

        LinkedIn loads a lot of JS. In that JS there is a list of over 6.000 extensions, identified by their ids and with a single file path provided.

        The JS then checks if it is running in Chrome or a Chromium-based browser, and cycles through that list, checking if these extensions are installed by doing a fetch() to "chrome-extension://<extension_id>/<file_path>".

        If the fetch() succeeds, the extension is installed. If not, it isn't.

        🧵

        schnittchen@tech.lgbtS This user is from outside of this forum
        schnittchen@tech.lgbtS This user is from outside of this forum
        schnittchen@tech.lgbt
        wrote last edited by
        #21

        @rysiek why ffs is this even possible?

        rysiek@mstdn.socialR 1 Reply Last reply
        0
        • rysiek@mstdn.socialR rysiek@mstdn.social

          Also go see what @vantiss has to say about it:
          https://social.treehouse.systems/@vantiss/116336811478744261

          Credit where credit's due, I relied on her research on the earliest known instance of LinkedIn using this technique.

          If you want to boost something, go boost her toot!

          #BrowserGate #Chrome #Privacy

          moses_izumi@fe.disroot.orgM This user is from outside of this forum
          moses_izumi@fe.disroot.orgM This user is from outside of this forum
          moses_izumi@fe.disroot.org
          wrote last edited by
          #22
          @rysiek @vantiss
          For the record, I'm the guy who pointed her to @kopper 's report.
          (no hard feelings about stolen credit)
          vantiss@social.treehouse.systemsV 1 Reply Last reply
          0
          • moses_izumi@fe.disroot.orgM moses_izumi@fe.disroot.org
            @rysiek @vantiss
            For the record, I'm the guy who pointed her to @kopper 's report.
            (no hard feelings about stolen credit)
            vantiss@social.treehouse.systemsV This user is from outside of this forum
            vantiss@social.treehouse.systemsV This user is from outside of this forum
            vantiss@social.treehouse.systems
            wrote last edited by
            #23

            @moses_izumi @rysiek
            huh? he was referring to my link to the 2017 repo, not the stuff from kopper

            moses_izumi@fe.disroot.orgM 1 Reply Last reply
            0
            • vantiss@social.treehouse.systemsV vantiss@social.treehouse.systems

              @moses_izumi @rysiek
              huh? he was referring to my link to the 2017 repo, not the stuff from kopper

              moses_izumi@fe.disroot.orgM This user is from outside of this forum
              moses_izumi@fe.disroot.orgM This user is from outside of this forum
              moses_izumi@fe.disroot.org
              wrote last edited by
              #24
              @vantiss @rysiek
              ehh.
              microsoft's malfeasace is bigger than any of us.
              1 Reply Last reply
              0
              • rysiek@mstdn.socialR rysiek@mstdn.social

                Also go see what @vantiss has to say about it:
                https://social.treehouse.systems/@vantiss/116336811478744261

                Credit where credit's due, I relied on her research on the earliest known instance of LinkedIn using this technique.

                If you want to boost something, go boost her toot!

                #BrowserGate #Chrome #Privacy

                rysiek@mstdn.socialR This user is from outside of this forum
                rysiek@mstdn.socialR This user is from outside of this forum
                rysiek@mstdn.social
                wrote last edited by
                #25

                And thank you to @martijn_grooten for some additional input as well!

                smallcircles@social.coopS 1 Reply Last reply
                0
                • schnittchen@tech.lgbtS schnittchen@tech.lgbt

                  @rysiek why ffs is this even possible?

                  rysiek@mstdn.socialR This user is from outside of this forum
                  rysiek@mstdn.socialR This user is from outside of this forum
                  rysiek@mstdn.social
                  wrote last edited by
                  #26

                  @schnittchen right?!

                  1 Reply Last reply
                  0
                  • rysiek@mstdn.socialR rysiek@mstdn.social

                    There is a fresh thing going around about LinkedIn scanning extensions installed in Chrome/Chromium:
                    https://browsergate.eu/

                    The website claims "LinkedIn is Illegally Searching Your Computer", and implies the purpose is to find "religious beliefs, political opinions, disabilities".

                    tl;dr:
                    - yes, LinkedIn is scanning through a list of 6k+ extensions on Chrome;
                    - yes, this is bad;
                    - but the website is disingenuous in making unnecessarily overblown claims.

                    🧵

                    #LinkedIn #BrowserGate #Privacy

                    doomstrike@metalhead.clubD This user is from outside of this forum
                    doomstrike@metalhead.clubD This user is from outside of this forum
                    doomstrike@metalhead.club
                    wrote last edited by
                    #27

                    @rysiek
                    The browsergate site is odd.

                    Fairlinked - Allianz für digitale Fairness e.V that seem to be behind it seem to be some sort of training org made up of folks all with datacentre industry backgrounds, AWS etc.
                    A few red flags for me in this story

                    1 Reply Last reply
                    0
                    • rysiek@mstdn.socialR rysiek@mstdn.social

                      And thank you to @martijn_grooten for some additional input as well!

                      smallcircles@social.coopS This user is from outside of this forum
                      smallcircles@social.coopS This user is from outside of this forum
                      smallcircles@social.coop
                      wrote last edited by
                      #28

                      @rysiek

                      It is good and heartening to see nuanced reflections like these. Thank you, Rysiek!

                      1 Reply Last reply
                      0
                      • rysiek@mstdn.socialR rysiek@mstdn.social

                        Is this bad? Yes. It could allow fingerprinting users, and a specific set of installed extensions (say, a lot related to particular religion) could be revealing, and arguably is illegal based on GDPR.

                        Is this "Searching Your Computer"? No, this is not what we generally think of when "searching your computer" is mentioned. This framing is way overblown and unnecessary.

                        BrowserGate site also implies LI's purpose might be to gather this kind of protected data. I don't think this is warranted.

                        🧵

                        clickhere@mastodon.ieC This user is from outside of this forum
                        clickhere@mastodon.ieC This user is from outside of this forum
                        clickhere@mastodon.ie
                        wrote last edited by
                        #29

                        @rysiek Thank you, I was wondering about a potentially-unlawful-under-GDPR aspect to this. Much obliged.

                        rysiek@mstdn.socialR 1 Reply Last reply
                        0
                        • clickhere@mastodon.ieC clickhere@mastodon.ie

                          @rysiek Thank you, I was wondering about a potentially-unlawful-under-GDPR aspect to this. Much obliged.

                          rysiek@mstdn.socialR This user is from outside of this forum
                          rysiek@mstdn.socialR This user is from outside of this forum
                          rysiek@mstdn.social
                          wrote last edited by
                          #30

                          @clickhere Article 9, the first point:
                          https://gdpr-info.eu/art-9-gdpr/

                          > Processing of personal data revealing racial or ethnic origin, political opinions, religious or philosophical beliefs, or trade union membership, and the processing of genetic data, biometric data for the purpose of uniquely identifying a natural person, data concerning health or data concerning a natural person’s sex life or sexual orientation shall be prohibited.

                          IANAL, I am not saying 100% illegal, but an argument can be made…

                          1 Reply Last reply
                          0
                          • rysiek@mstdn.socialR rysiek@mstdn.social

                            There is a fresh thing going around about LinkedIn scanning extensions installed in Chrome/Chromium:
                            https://browsergate.eu/

                            The website claims "LinkedIn is Illegally Searching Your Computer", and implies the purpose is to find "religious beliefs, political opinions, disabilities".

                            tl;dr:
                            - yes, LinkedIn is scanning through a list of 6k+ extensions on Chrome;
                            - yes, this is bad;
                            - but the website is disingenuous in making unnecessarily overblown claims.

                            🧵

                            #LinkedIn #BrowserGate #Privacy

                            gytisrepecka@social.gyt.isG This user is from outside of this forum
                            gytisrepecka@social.gyt.isG This user is from outside of this forum
                            gytisrepecka@social.gyt.is
                            wrote last edited by
                            #31

                            @rysiek Thanks for the write-up of the details

                            Website is classic use case of seeking for attention with clickbait titles - we all can do better than that

                            It took time to figure out that mentioned fingerprinting is limited to Chromium based browsers and use of extensions

                            1 Reply Last reply
                            0
                            • orca@nya.oneO orca@nya.one
                              @rysiek@mstdn.social wtf why does Chrome allows an untrusted website to do that???
                              rozie@mastodon.onlineR This user is from outside of this forum
                              rozie@mastodon.onlineR This user is from outside of this forum
                              rozie@mastodon.online
                              wrote last edited by
                              #32

                              @Orca @rysiek This is trusted website. But yes, it's feature by Google, present in Chromium for years - extensions have fixed IDs.

                              orca@nya.oneO 1 Reply Last reply
                              0
                              • rozie@mastodon.onlineR rozie@mastodon.online

                                @Orca @rysiek This is trusted website. But yes, it's feature by Google, present in Chromium for years - extensions have fixed IDs.

                                orca@nya.oneO This user is from outside of this forum
                                orca@nya.oneO This user is from outside of this forum
                                orca@nya.one
                                wrote last edited by
                                #33
                                @rozie@mastodon.online @rysiek@mstdn.social
                                I don't think extensions having static IDs are the problem. My problem is: why is an external website allowed to access extension assets (without extension allowing it explicitly)? That sounds like a security nightmare.
                                rozie@mastodon.onlineR 1 Reply Last reply
                                0
                                • orca@nya.oneO orca@nya.one
                                  @rozie@mastodon.online @rysiek@mstdn.social
                                  I don't think extensions having static IDs are the problem. My problem is: why is an external website allowed to access extension assets (without extension allowing it explicitly)? That sounds like a security nightmare.
                                  rozie@mastodon.onlineR This user is from outside of this forum
                                  rozie@mastodon.onlineR This user is from outside of this forum
                                  rozie@mastodon.online
                                  wrote last edited by
                                  #34

                                  @Orca @rysiek I'll need to take a closer look how exactly it's made.

                                  I was aware of the technique where extension interacting with the site (so, in a way, trusting it, but only in a way) was also allowing this site to interact with own files. With fixed ID it allowed to check if extension is present. And this is one of described techniques. Those extensions probably declare interaction with LI (or any site) via web_accessible_resources.

                                  Without fixed ID it (fetch of the file) wouldn't work.

                                  rysiek@mstdn.socialR 1 Reply Last reply
                                  0
                                  • rozie@mastodon.onlineR rozie@mastodon.online

                                    @Orca @rysiek I'll need to take a closer look how exactly it's made.

                                    I was aware of the technique where extension interacting with the site (so, in a way, trusting it, but only in a way) was also allowing this site to interact with own files. With fixed ID it allowed to check if extension is present. And this is one of described techniques. Those extensions probably declare interaction with LI (or any site) via web_accessible_resources.

                                    Without fixed ID it (fetch of the file) wouldn't work.

                                    rysiek@mstdn.socialR This user is from outside of this forum
                                    rysiek@mstdn.socialR This user is from outside of this forum
                                    rysiek@mstdn.social
                                    wrote last edited by
                                    #35

                                    @rozie @Orca this is correct. But extensions would have had fixed IDs anyway, these are needed for other things. The problem is making it possible for fetch(chrome-extension://<extension_id>/some/file.ext) to work.

                                    Yes, that requires the extension to declare the file via web_accessible_resources, so yes, this is also partially on the extension vendors. But this is such a glaring privacy problem that one can and should blame Google for not closing this hole.

                                    rozie@mastodon.onlineR 1 Reply Last reply
                                    0
                                    • rysiek@mstdn.socialR rysiek@mstdn.social

                                      @rozie @Orca this is correct. But extensions would have had fixed IDs anyway, these are needed for other things. The problem is making it possible for fetch(chrome-extension://<extension_id>/some/file.ext) to work.

                                      Yes, that requires the extension to declare the file via web_accessible_resources, so yes, this is also partially on the extension vendors. But this is such a glaring privacy problem that one can and should blame Google for not closing this hole.

                                      rozie@mastodon.onlineR This user is from outside of this forum
                                      rozie@mastodon.onlineR This user is from outside of this forum
                                      rozie@mastodon.online
                                      wrote last edited by
                                      #36

                                      @rysiek @Orca For what things fixed IDs are necessary? And why Firefox doesn't have fixed IDs, then?

                                      rysiek@mstdn.socialR 1 Reply Last reply
                                      0
                                      • rozie@mastodon.onlineR rozie@mastodon.online

                                        @rysiek @Orca For what things fixed IDs are necessary? And why Firefox doesn't have fixed IDs, then?

                                        rysiek@mstdn.socialR This user is from outside of this forum
                                        rysiek@mstdn.socialR This user is from outside of this forum
                                        rysiek@mstdn.social
                                        wrote last edited by
                                        #37

                                        @rozie @Orca Firefox absolutely has fixed IDs for extensions; for example "uBlock0@raymondhill.net" is the fixed ID for uBlock Origin and you can use it in policies.json to automagically install it and configure it (say, when you are deploying to a fleet of laptops).

                                        For example:
                                        https://support.mozilla.org/gl/questions/1271181

                                        This also answers the question of "why are fixed IDs for extensions necessary".

                                        rozie@mastodon.onlineR 1 Reply Last reply
                                        0
                                        • rysiek@mstdn.socialR rysiek@mstdn.social

                                          @rozie @Orca Firefox absolutely has fixed IDs for extensions; for example "uBlock0@raymondhill.net" is the fixed ID for uBlock Origin and you can use it in policies.json to automagically install it and configure it (say, when you are deploying to a fleet of laptops).

                                          For example:
                                          https://support.mozilla.org/gl/questions/1271181

                                          This also answers the question of "why are fixed IDs for extensions necessary".

                                          rozie@mastodon.onlineR This user is from outside of this forum
                                          rozie@mastodon.onlineR This user is from outside of this forum
                                          rozie@mastodon.online
                                          wrote last edited by
                                          #38

                                          @rysiek @Orca Ah, you mean external ID (name? 🤔). I mean internal one. It's random in case of Firefox. But it's fixed and the same as the external external one in Chromium. That's why extension's files can be accessed.

                                          rysiek@mstdn.socialR 1 Reply Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups