LinkedIn Is Silently Scanning 6,000+ Your Chrome Extensions Without Telling You And Ties Results to Your Professional Identity
Every time you visit LinkedIn in a Chrome-based browser, a hidden JavaScript routine silently probes your browser for more than 6,000 installed extensions, collects 48 hardware and software characteristics about your device, encrypts the resulting fingerprint, and attaches it to every API request you make during your session. The practice is not disclosed in LinkedIn’s privacy policy. A federal class action lawsuit has now been filed — and the legal questions it raises go far beyond one company’s terms of service.
What LinkedIn Is Actually Doing
According to an investigation by Fairlinked e.V., a European commercial LinkedIn users association, the platform runs a three-part surveillance system silently on its website. First, a JavaScript bundle fires up to 6,222 simultaneous requests to check which browser extensions you have installed. Second, a passive DOM scan crawls your page for chrome-extension:// references, catching even extensions not on the known list if they inject anything visible into the page. Third, a device fingerprinting system collects 48 distinct browser characteristics — CPU cores, memory, screen resolution, timezone, battery status, audio hardware, and more.
Once compiled, the data is serialized, encrypted using an RSA public key, and transmitted to LinkedIn’s telemetry endpoints. The fingerprint is then permanently injected as an HTTP header into every API request made during the session — meaning LinkedIn receives it with every search, every profile view, and every message sent.
The scan runs exclusively on Chromium-based browsers — Chrome, Edge, Brave, Opera, and Arc. Firefox and Safari users are not currently affected.
Why This Is Different From a Normal Cookie
Most websites track users with cookies, which users can delete. The fingerprint LinkedIn collects is specific enough to identify a user even after cookies are cleared — meaning standard privacy tools do not stop it.
What makes this particularly sensitive is the context. LinkedIn accounts are tied to real names, employers, and job titles. Every detected extension is instantly matched to an identified individual. Because LinkedIn also knows where each user works, these individual scans can aggregate into corporate intelligence profiles revealing which software tools entire organizations use — without those organizations’ knowledge or consent.
The 6,167-extension list includes over 200 competing sales tools such as Apollo, Lusha, and ZoomInfo — platforms that compete directly with LinkedIn’s own products. It also includes job search tools, religious apps, political tools, and neurodivergent aids — data that can reveal things about you that you never agreed to share with a professional network.
The Class Action Lawsuit
On April 6, 2026, the Law Office of J.R. Howell filed a proposed nationwide class action in the U.S. District Court for the Northern District of California. The case, Ganan v. LinkedIn Corporation, Case 5:26-cv-02968, was filed on behalf of plaintiff Jeff Ganan, a sales professional based in Los Angeles County, and a proposed nationwide class of Chrome browser users who accessed linkedin.com within the United States.
The complaint brings six causes of action under federal and California privacy law, including violations of the Federal Electronic Communications Privacy Act, California’s wiretapping statutes, and California’s computer fraud law.
Related article: $990K Differin Benzene Contamination Settlement, Do You Qualify for a Cash Payment? May 19 is Deadline to File Claim

The lawsuit seeks compensatory and punitive damages, statutory damages of $5,000 per violation, and an injunction requiring LinkedIn to stop the scanning and delete all collected data.
The Federal Wiretap Act — part of the Electronic Communications Privacy Act — prohibits the intentional interception of electronic communications without consent. The argument here is that probing a user’s browser environment without disclosure is effectively intercepting information about that user’s digital life without their knowledge. At $5,000 per violation across a platform with over one billion registered users, the potential exposure is enormous.
This is part of a growing wave of covert data collection lawsuits against major tech platforms. Our coverage of the Meta Ray-Ban smart glasses lawsuit and the Allstate secret data tracking class action shows the same legal theory playing out: companies collecting data consumers never agreed to share, for purposes far beyond what was disclosed.
What LinkedIn Says
LinkedIn has not denied that the scanning occurs. A LinkedIn spokesperson told BleepingComputer that the practice is a security measure to identify extensions that scrape data without member consent or otherwise violate its terms of service. The company added that it does not use the data to infer sensitive information about members.
LinkedIn also challenged the credibility of the BrowserGate report, pointing out that it originates from parties connected to Teamfluence, a Chrome extension that LinkedIn had restricted for alleged terms of service violations.
Independent researchers have noted, however, that the practice of scanning for extensions dates back to at least 2017, when LinkedIn tracked just 38 extensions. By February 2026, that number had grown to nearly 3,000, and it has since more than doubled to over 6,000. The scale of the operation is what critics say goes well beyond any reasonable anti-scraping defense.
What U.S. Law Says About This
Under EU GDPR Article 9, data revealing religious beliefs, political opinions, and health conditions is classified as Special Category Data, which cannot be processed without explicit consent. LinkedIn has no consent mechanism, no privacy policy disclosure, and no stated legal basis for collecting this category of data.
In the United States, the California Consumer Privacy Act gives California residents the right to know what personal data is being collected, the right to opt out of its sale, and the right to delete it. Because LinkedIn’s privacy policy does not mention extension scanning at all, users have had no opportunity to exercise any of those rights.
The case is likely to draw scrutiny from regulators in both the U.S. and Europe, particularly given LinkedIn’s designation as a gatekeeper under the EU’s Digital Markets Act, which imposes strict obligations on data practices and platform fairness.
What You Can Do Right Now
You do not need to wait for a lawsuit to resolve to take steps to limit exposure.
Use Firefox instead of Chrome for LinkedIn. The extension scanning runs exclusively on Chromium-based browsers. Firefox users are not currently affected.
Create a dedicated browser profile for LinkedIn with no other extensions installed. Chrome, Edge, and Brave all support multiple profiles. If LinkedIn scans for extensions in a profile that has none, it finds nothing.
Audit and remove browser extensions you do not actively use. Fewer extensions mean a smaller fingerprint — and less sensitive inference about who you are.
Review your LinkedIn privacy settings. Under Settings & Privacy, you can review what data LinkedIn says it collects. While extension scanning is not currently disclosed there, the exercise helps you understand what the platform knows about you.
Frequently Asked Questions
Is LinkedIn’s extension scanning illegal in the U.S.?
That is what the class action is asking a court to decide. The complaint argues it violates the Federal Wiretap Act and California privacy law. LinkedIn says the scanning is a legitimate security measure. No court has ruled on the merits yet.
Does this affect people who are not LinkedIn members?
Potentially yes. The script allegedly runs on all visitors, not just logged-in users. Someone who visits a public LinkedIn profile page without an account may still have their extension environment scanned.
What is browser fingerprinting?
Browser fingerprinting is the practice of collecting multiple device and browser characteristics — screen size, CPU cores, timezone, installed fonts, and more — to create a unique identifier for a user. Unlike cookies, it does not require storing anything on the user’s device, and clearing your browser history does not erase it.
What law governs this type of data collection in the U.S.?
The primary federal law at issue is the Electronic Communications Privacy Act (18 U.S.C. § 2511). In California, the California Consumer Privacy Act (Cal. Civ. Code § 1798.100 et seq.) and the California Comprehensive Computer Data Access and Fraud Act (Cal. Penal Code § 502) also apply. The lawsuit invokes all three.
Can I join the class action?
The case is currently a proposed class action — the court has not yet certified the class. If you used LinkedIn on a Chrome-based browser within the United States, you would likely be included in the proposed class automatically if the court certifies it. No action is required now.
Sources
- The Next Web — LinkedIn secretly scans 6,000+ browser extensions and fingerprints your device (April 2026)
- BleepingComputer — LinkedIn secretly scans for 6,000+ Chrome extensions, collects data (April 2026)
- BrowserGate.eu — US Class Action Suit over BrowserGate filed (April 7, 2026)
- CyberInsider — LinkedIn faces class action over alleged covert scanning of users’ browsers (April 2026)
- Security Boulevard — LinkedIn Secretly Scans for More Than 6,000 Chrome Extensions (April 2026)
- Cornell Law LII — Electronic Communications Privacy Act, 18 U.S.C. § 2511: law.cornell.edu/uscode/text/18/2511
- California Consumer Privacy Act — Cal. Civ. Code § 1798.100: leginfo.legislature.ca.gov
Prepared by the AllAboutLawyer.com Editorial Team and reviewed for factual accuracy against official court documents and independent technical reporting on May 16, 2026. Last Updated: May 16, 2026.
Disclaimer: This article is for general informational and educational purposes only and does not constitute legal advice. Laws vary by state and jurisdiction. For advice about your specific situation, consult a qualified attorney.
About the Author
Sarah Klein, JD, is a licensed attorney and legal content strategist with over 12 years of experience across civil, criminal, family, and regulatory law. At All About Lawyer, she covers a wide range of legal topics — from high-profile lawsuits and courtroom stories to state traffic laws and everyday legal questions — all with a focus on accuracy, clarity, and public understanding.
Her writing blends real legal insight with plain-English explanations, helping readers stay informed and legally aware.
Read more about Sarah
