Smashing Security podcast #462: LinkedIn is spying on you, and you agreed to nothing

LinkedIn has been secretly scanning your browser for over 6,000 installed extensions – on every single click you make. It can tell if you’re job hunting, what religion you are, and whether you have ADHD. And none of this is mentioned anywhere in their privacy policy.
Meanwhile, California’s crypto millionaires are learning that no amount of encryption can protect you from someone who knocks on your door pretending to deliver a pizza.
All this and more in episode 462 of the “Smashing Security” podcast with cybersecurity expert and keynote speaker Graham Cluley, joined this week by special guest Dave Bittner.
0:00
0:00
Show full transcript
▼
This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
Hello, hello, and welcome to Smashing Security, Episode 462. My name is Graham Cluley.
We’ll be hearing more about them later on in the podcast. This week on Smashing Security.
We won’t be talking about how hackers working for the Russian government broke into thousands of home routers to steal passwords.
You’ll hear no discussion of how tourists traveling to Hong Kong have been warned that it’s now a criminal offense to refuse to hand over to police the passwords for all your personal devices.
And we won’t even mention how after authorities cracked down on the use of Telegram, WhatsApp, and VPNs, Russian citizens have switched to using two other apps.
For instant message and video call, including in some cases smart cat feeders. So Dave, what are you going to be talking about this week?
Well, before we kick off, we’ve just got a moment to thank one of this episode’s sponsors, ESET.
Now, there’s no shortage of cybersecurity vendors claiming to be the best, of course, but ESET is one of the few that’s been proven it for 30 years.
Research has always been at the core of what ESET does.
Their threat intelligence teams are actively tracking APT groups and ransomware affiliates and publishing findings that the security community actually reads and references.
That’s not a marketing line. That’s 30 years of doing the work. And here’s what makes it interesting.
3 decades of research means that ESET has built up global telemetry that most vendors simply don’t have access to.
They combine that telemetry with AI-native technology and human expertise, and that’s what powers both their products and their MDR service.
Real intelligence behind the protection, not just pattern matching. 110 million users worldwide trust ESET with their endpoints, cloud, email, and mobile devices.
That number doesn’t happen by accident. So why don’t you check them out right now? Go to smashingsecurity.com/ESET. That’s smashingsecurity.com/ESET. And thanks to ESET.
For supporting the show. Now, chums, chums, LinkedIn. Don’t you love it? Don’t you love it? I love it. Oh boy. It’s great.
They’re all sharing the lessons they’ve learned on life’s journey, often from their failures.
Maybe they’ve been made redundant and they started up a company and now they’ve succeeded and they’re encouraging others.
They’re saying, look, I was a failure too, just like you, but now I am magnificent. Or they’ll give you a humble brag about stepping on an orange.
There’ll be some lesson they’ve learned in life and they’ll post about it and link to it. I find those heartwarming. Don’t you? Don’t you love those?
Seeing what people are posting, it’s a good old guffaw. So I go there every day.
Didn’t involve stepping on an orange, but clearly I’d showed a little bit too much humility or been self-promoting too much.
Now, of course, I don’t go on LinkedIn looking for a job. What fool would go on LinkedIn to look for a job? That’s not what it’s there for.
You know, it’s not to say though that I don’t love the feeling of a recruiter sliding into my DMs, which they do occasionally, saying, oh, we’ve got the perfect job for you.
We can tell that you’re a cybersecurity and AI whatchamacallit. And sometimes they offer me jobs which are entirely inappropriate.
I think there was once a touring group that they asked me to join, a chorus line for HMS Pinafore or something going around Bulgaria.
And this week, it got that little bit stranger because a German privacy group— and you always have to worry when a privacy group is German, they’re serious about their privacy.
They are called Fairlinked, and they’ve published what they’re calling the Browsergate Report. And you always know you’re in trouble, don’t you, when there’s a gate involved?
Anyway, Browsergate reveals that every single time you open LinkedIn in a Chrome-based browser, the LinkedIn platform will quietly inject a little bit of JavaScript into your session.
And that little bit of JavaScript, well, I say it’s little, is 2.7 megabytes, David, 2.7 megabytes of JavaScript.
So it’s looking for all kinds of information about what you are running on your computer within your browser while you’re on LinkedIn.
It also harvests your CPU core count, your available memory, your screen resolution, your battery status, your time zone, your language settings.
And this isn’t once per visit to LinkedIn. This is every single click that you make. Hmm.
So you click on someone’s profile and it’s going to send a fingerprint, a unique, pretty much unique fingerprint with all these different indicators regarding your computer.
And none of this, none of this is mentioned anywhere in LinkedIn’s privacy policy, which is absolutely fine.
So if you have a tool which helps you translate LinkedIn posts, for instance, hmm, it will pick that up or a grammar extension, something to make you look more eloquent on LinkedIn.
If you’re using a tax tool, If you— oh, also extensions designed for people with ADHD or dyslexic users, because there are dyslexic extensions you can put on your browser which change the font to make it easier to read, for instance.
There are tools that notify users— oh, this was an odd one— tools that notify users of Islamic prayer times.
Maybe they change your wallpaper to a particular flag or put a color scheme on your laptop. I’m not sure. But anyway, many of these aren’t scraping tools. These are personal tools.
They could reveal deeply private information about you and your health and your faith or your neurology.
And that’s not really what you want LinkedIn to be secretly cataloging, is it?
LinkedIn knows exactly who you are.
So LinkedIn internally apparently calls this a spectroscopy. Spectroscopy? Is that it? It sounds like a colonoscopy.
Anyways, apparently back in 2017, which is around about the time LinkedIn introduced this feature, so it’s only really been uncovered now.
Back then, LinkedIn was scanning for 38 extensions, which feels like, well, maybe that’s all right.
By 2024, it had gone from 38 extensions to 461, which is still a lot, but you could perhaps argue there are 461 ways to scrape LinkedIn.
I’ll be honest with you, I actually have an extension in my browser which does take information from LinkedIn, right?
So I have a CRM for customers and things and people who contact me asking me to do work for them and things.
And it’s useful sometimes just to collect information about, you know, who are they, what’s their job title, what’s their contact details if we connected and things.
I don’t know if LinkedIn don’t like that I’ve got this little tool.
I looked this morning, it’s 6,222.
And they say that while at the same time not denying that they do have a list of 6,000 extensions. They haven’t denied any of that.
They’ve only tried to discount the intention behind it. So they say the scanning is purely to identify extensions that scrape data. In violation of their terms of service.
Again, I don’t know what that has to do with Muslim prayer times.
In fact, they say that the person behind the report had their account banned by LinkedIn for scraping in the past. And apparently a German court denied their injunction request.
Against the platform. So there is some beef between the researchers and LinkedIn.
But it’s also entirely possible that the thing they discovered is still a problem. And those two things are not mutually exclusive.
So if someone with a speeding ticket tells you that your house is on fire, you should probably still check. Is it a bit warm in here?
Well, the obvious thing to do is either not go to LinkedIn or use a different browser. So if you use Firefox, you’re largely protected.
The way its extensions work don’t expose the same identifiers that Chrome does. Similarly, Brave, that blocks tracking endpoints by default.
Safari users largely in the clear as well.
But if you’re on Chrome or Edge, Edge of course is a Chrome-based browser, you are being scanned every time you visit and there’s no setting to stop them from doing it.
And LinkedIn is not being upfront about what it is doing. So regulators have been informed. We’ll have to see if anything comes from this, but it’s not great, is it?
It does sound like the guys at LinkedIn are rather scooping up a bit too much information.
How can I be in this industry so long and be so naive to think that it It won’t be used for advertising purposes or surveillance.
And they introduced this new feature and you reminded me earlier about this. They’ve got this translator thing, haven’t they?
Thrilled to announce— come on, British, I’m never thrilled— that I’ll be joined by the one and only Dave Bittner on this week’s episode of the Smashing Security podcast.
Microphone emoji. Can’t wait to dive deep into the latest in cybersecurity. You won’t want to miss this conversation.
#cybersecurity, #infosec, #postcast, #networking, #thoughtleadership. Oh, I can change my excitement level. I can go for high energy with more emojis and hype.
But you know how most companies have to prove they’re secure to customers or auditors and regulators, and the whole thing involves chasing down evidence, filling in questionnaires and forms, updating the same spreadsheet cells over and over again.
SPEAKER_02. Over and over again. It sounds utterly soul-destroying.
So no more staring at the ceiling at 2 AM wondering whether you’ve got the right controls in place or whether one of your suppliers has been breached. SPEAKER_02.
The stuff of nightmares.
But this Banta solution uses AI as well, and it’s the useful kind— flagging risks, collecting evidence, slotting into the tools your team already uses so you move faster, scale without the headaches, and perhaps actually get some sleep.
Go to vanta.com/smashing to find out more. SPEAKER_02. That’s vanta.com/smashing. And thanks to Vanta for supporting the show.
And I have to say, the first time I saw this particular comic, it had indeed been printed out and stuck to a bulletin board in a break room.
That was the first time I saw it, but I’ve seen it dozens of times afterwards. I thought perhaps the two of us could reenact this for our listeners before I dig into the story here.
And the person says, “His laptop’s encrypted. Let’s build a multimillion-dollar cluster to crack it.” Ah, no good. It’s—
In order to protect our passwords or protect our bitcoin wallets, but basically some good old-fashioned violence really does the trick.
And I think that’s part of why this is such a classic cartoon and why it resonates with the community, because I think particularly in cybersecurity, so often people go for the technologically irresistible solution to a problem when the more practical solution may be what’s really needed, in this case, a $5 wrench that you can whack someone with until they give you the information you want.
So my story comes from KTLA, which is one of the local TV affiliates in California.
They said there were similar delivery driver ruses in San Jose and Sunnyvale and Los Angeles. So kind of seemingly California-based for the moment or focused.
So they’re not just showing up randomly. They shopped a target list first. Now, there are suspects here.
So law enforcement has tracked down some people and arrested them that they allege have done these dastardly deeds.
But I’m wondering about what you make of this, this whole idea that if you have a big cache of cryptocurrency, someone might show up and threaten or even perform physical violence against you.
It’s just horrendous that this could happen.
I guess the only answer really is you’ve got to keep really quiet about the fact that you’ve got a great big hoard of bitcoin or Ethereum somewhere, you know.
Yeah, you can’t go around showing off about it.
That was my next question is, is how did the bad guys come to know that this person in particular, or these people that they targeted, had large caches of cryptocurrency so they could go after them?
Do you think it may have been as simple as somebody just bragging about their success?
You’re going to be living somewhere nice.
Right. One of, one of those hardware keys.
So they know that my email address is somehow connected with cryptocurrency. Now, as it is, they don’t know I’ve only got $5 worth of cryptocurrency rather than $5 million.
But that information combined with, oh, look, he’s got a really flash car, or, oh my goodness, you know, he keeps on going on these macho podcasts talking about his bitcoin billions or whatever it may be, could lead to specific people people being targeted.
But it is a problem which actually, you know, it goes beyond the bitcoin wallets. It goes into all areas of life, doesn’t it?
You know, if you have passwords or if you have things protecting important data to you, you can have all the technology in the world defending you.
And organized criminals can think, well, if it’s too hard to hack him, maybe we’ll take an axe and try and hack him or threaten to hack him or hack his fingers off.
Of course you’re going to tell them. It’s horrific.
Not long ago, I was having a conversation with Chris Pearson, who’s the CEO of a company called Black Cloak, and their specialty is executive protection online.
But part of what they do is physical protection where people need bodyguards.
And yeah, evidently, if you are a high-wealth person or a person of enough importance in the business world, like kidnappings still happen and you have to be protected.
He also shared with me that you get to a certain level and you’re prohibited from driving your own car by your board of directors because it’s considered too much of a hazard to the company.
So you are required to have a personal driver.
It basically becomes a second job, doesn’t it? SPEAKER_02. Yes, I know this one.
It’s when the contractor turns up on the wrong day or at the wrong address and tries to install the wrong thing.
Their own hardware, not reselling someone else’s kit?
SPEAKER_02. So full visibility with none of the legwork.
There’s even a hardware buyback program if you’ve already got kit from another vendor. SPEAKER_02. Ah, that’s rather civilized.
Could be a funny story, a book that they’ve read, a TV show, a movie, a record, a podcast, a website, or an app. Whatever they wish.
It doesn’t have to be security-related necessarily.
Incredible. Such a piece of work they’d put together animating this lost piece of television which no longer existed in the BBC archives, had not been seen for over 50 years.
And I said, this is brilliant. This is my pick of the week. Well, what do you know? That missing episode has now been found. SPEAKER_02. Ah.
Found not one, but two missing episodes of Doctor Who from 1965. Episodes of, this was particularly exciting, The Daleks’ Master Plan. Space vessel 111, touchdown completed.
Excellent. I will await our guest here. Daleks! One of the greatest Doctor Who stories of all time.
So it was originally 12 episodes long, and there were only, I think, 3 or 4 which had been found. Now we are up to— I really should know this.
I think we’re up to 5 episodes in total now is what exists. It was found in the collection of a guy who was collecting films, wasn’t interested in Doctor Who.
He was collecting films about trains and canal boats, and he’s sadly deceased.
But there was a huge collection of films, and Film is Fabulous, this charity, came in and said, look, we can help catalogue this.
And they happened to find these old missing Doctor Who episodes, which are now on BBC iPlayer. I watched them over the weekend. They are wonderful.
This is so much better than modern Doctor Who. And it has been an absolute delight.
In fact, I had some listeners to the podcast contact me and say, Graham, Graham, when this was announced, Graham, you— and I said, yes, I know, I know.
I’m going to wait until they’re actually available to watch before I talk about them on the podcast.
There is another guy out there who’s been recreating all of the Doctor Who episodes using AI, and they are just as horrendous as you can probably imagine.
Yeah, so you don’t really want those. So the real thing is obviously the best of all and what we’ve really been excited about.
So I thought there must be some geeky listeners out there, particularly maybe in Britain and Australia who are really into Doctor Who, who will be very excited about this.
And this is perhaps the most geeky, nerdy reason in the world for someone to not get into Doctor Who.
And so they had to do conversions to make it work here because our video runs just, just about 30 frames a second.
And we can handle 24 by using a, you know, 2:3 pulldown, all that good stuff. But 25 is a little weird. And so it was running at a different speed and it just looked off.
So when I was flipping through the channels and I would see, you know, give up, give yourself up, give yourself up, you know, whatever the Daleks said.
Uh, it just looked weird to me and I kept on flipping past. Now, I did not flip past Benny Hill, so—
I will save this for the next time I’m on Smashing Security and Graham will enjoy this. Uh, we’re talking about chess today. So one of your favorite things.
I used to go to the department store and I’d spend an afternoon before I owned one, play in them. Yeah. Because that was my way of having fun as a teenager.
It sounds like the old computer in the original Star Trek series, you know, where it’s like working. Bang, bang.
You know, there’s magnets under the board and it’s sliding pieces around.
Be sort of dragging pieces, but it would have to drag other pieces to the side to, for instance, let the knight go through the pawns.
And you would think this is very clever how they’ve made this. Yeah. Yeah.
So I enjoy watching it for the old boomboxes and Walkmans and CD players and all that sort of the stuff that, that you and I grew up with and lusted after but weren’t able to afford in our teen years.
This person goes back and looks at that stuff. But in this case, he was looking at an updated version of one of these robotic chess-playing kits.
And this one actually uses a robotic arm to play against you, which I think is a little more advanced and more fun than the old magnetic versions.
So it’s picking up the pieces with a magnet, it looks like, and dropping them down again. Yeah.
I was gonna ask you, is it, is it just dispiriting because you spend all this time trying to come up with the perfect move and you put it in and the, the computer just responds and goes, nope.
So if you went to a site like I don’t know, chess.com or lichess.org, and you started playing as a beginner, it would deliberately play bad moves to try and make things easier for you or not the best move to give you a chance, because otherwise it would really be no fun at all.
But in the case of this robot, you want to handicap that as well. You’d actually want to tie its hand behind its back or something, wouldn’t you?
What’s the best way to do that?
Yep, you’ve guessed it, on LinkedIn. And don’t forget to ensure that you never miss another episode.
Follow Smashing Security in your favorite podcast apps such as Apple Podcasts, Spotify, and Pocket Casts.
Episode show notes, sponsorship info, guest lists, and the entire back catalog of over 460 episodes. Check out smashingsecurity.com. Until next time, cheerio, bye-bye.
This episode sponsors ESET, Vanta, and Meta, and also to the following Yep, please make some noise for Willy B, who’s certainly a very confident nickname, and we respect it enormously.
Jonathan Haddock, who sounds like a character in a Victorian novel about a fishmonger with a dark secret. John Morris. Eisenberg.
We can’t actually be completely certain that Eisenberg is here, because observing them changes everything. William Sabados. Karen Reynolds. Matt Weir.
Jamie Forster, Panda Bear, see, not a real name. Yeah, here we are reading it out on a podcast. And Robert Martin. Thank you all so much. You are the backbone of this show.
We’re very grateful indeed because those are just a few members of Smashing Security Plus, which means that they get their episodes ad-free and earlier than the general public.
And they can also have their names be mercilessly mocked at the end of the show.
So if that’s the kind of thing that you fancy happening to you, all you have to do is sign up for Smashing Security Plus.
Just head over to smashingsecurity.com/plus for all of the details and become a patron of the podcast. But you can support us in other ways if you’re short of a few bob.
And when in fact you can do it completely for free. Like, subscribe, leave a 5-star review. Most importantly of all, tell your friends about Smashing Security.
And encourage them to listen to it. In fact, grab their phones and just subscribe to the podcast without the— oh, hang on, I didn’t actually recommend that you do that.
Maybe ask their permission before you do that. That’d be wise. But regardless, every little bit helps and it really does make all the effort worthwhile.
And thank you to you for tuning in, and I hope you tune in to next week’s episode as well. Until then, cheerio, bye-bye.
Host:
Graham Cluley:
Guest:
Dave Bittner:
Episode links:
SPONSORS:
- ESET – 30 years of threat research behind unique global telemetry, AI-native technology, and human expertise working together to keep your business protected.
- Meter – Network infrastructure for the enterprise. Get a free personalised demo.
- Vanta – Expand the scope of your security program with market-leading compliance automation… while saving time and money. Smashing Security listeners get $1000 off!
Support the show:
You can help the podcast by telling your friends and colleagues about “Smashing Security”, and leaving us a review on Apple Podcasts or Podchaser.
Join Smashing Security PLUS for ad-free episodes and our early-release feed!
Follow us:
Follow the show on Bluesky, or join us on the Smashing Security subreddit, or visit our website for more episodes.
Thanks:
Theme tune: “Vinyl Memories” by Mikael Manvelyan.
Assorted sound effects: AudioBlocks.

