While the tech world obsesses over AI and recent supply chain attacks, a quiet but unprecedented legal suit dropped in Munich in late January 2026. Almost nobody is reporting on it, which blows my mind because nearly everyone has a LinkedIn account now.
LinkedIn has become an essential tool for nearly every professional today, whether for job searching, recruiting, or business networking. While they disclose that they "collect information about your network and device, device identifier and features, cookie IDs and/or ISP, and your mobile carrier", they were scanning for much more than that. Unfortunately, like many large tech companies, they used hidden methods to extract maximum value from its users who are, ultimately, the product.
Every single time you (or any of LinkedIn’s roughly one billion users) load linkedin.com, hidden JavaScript quietly scans your browser for installed software and extensions. The results are sent straight to LinkedIn’s servers and to third-party companies like HUMAN Security (formerly PerimeterX), an American-Israeli cybersecurity firm. There is no meaningful consent, no clear disclosure in the privacy policy, and no opt-out.
What are they actually scanning for?
Here’s a clear breakdown based on the publicly available evidence and court-related disclosures:
- Browser extensions: The script checks for thousands of installed extensions and applications. This includes over 509 job-seeking and AI-powered application tools. LinkedIn can see who is actively job hunting, which companies or industries interest you, and which tools you rely on.
- Competitor tools: It specifically detects over 200 extensions related to rival platforms and sales tools (such as Apollo, Lusha, ZoomInfo, and others). This allows LinkedIn to target users with premium ads or potentially restrict competitor tools on its platform.
- Sensitive inferences: Certain extensions can reveal deeply personal information, such as religious beliefs, political views, disabilities, neurodivergence, or sexual orientation. These signals are collected and categorized, all tied to your identity.
This goes far beyond basic tracking. The data is tied to your LinkedIn identity (name, photo, job title, location, and employer) and also the data they openly say they collect. This suite of data allows them to do things like match devices to users and their locations, or match a user and their device to certain ads they are more likely to click on. While the scan does not directly read your passwords or payment details, the presence of specific extensions can still expose highly sensitive aspects of your life. That information is then shared with third parties.
LinkedIn hides this activity using advanced code obfuscation and encryption, making it basically impossible for users to notice. The primary external recipient is HUMAN Security, which has no obvious cybersecurity contract with LinkedIn that would justify receiving this level of user data.
This concerns me as someone who strongly values customer and user privacy. It’s a glaring example of how even outwardly professional platforms will push boundaries to monetize user data. The case filed in Munich (preliminary injunction, Case No. 37 O 104/26) alleges violations of the EU Digital Markets Act, competition law, and data protection rules. It remains ongoing, and the outcome could set an important precedent.
At its core, this highlights a simple truth: on LinkedIn, you are the product. The platform isn’t just a job board, at least, a very sophisticated data collection engine operating with minimal to no transparency.
Thank you for reading