This is the multi-page printable view of this section. Click here to print.

Return to the regular view of this page.

Scanned Extensions Database

    Every time you visit LinkedIn, a hidden JavaScript program scans your browser for installed Chrome extensions. No notice. No opt-in. No mention in their privacy policy.

    The scan doesn’t just look for LinkedIn-related tools. It identifies whether you use an Islamic content filter (PordaAI — “Blur Haram objects, real-time AI for Islamic values”), whether you’ve installed an anti-Zionist political tagger (Anti-Zionist Tag), or a tool designed for neurodivergent users (simplify). Under GDPR Article 9, processing data that reveals religious beliefs, political opinions, or health conditions requires explicit consent. LinkedIn obtains none.

    It also scans for every major competitor to Microsoft’s own products — Salesforce, HubSpot, Pipedrive — building company-level intelligence on which businesses use which software. Because LinkedIn knows your name, employer, and role, each scan aggregates into a corporate technology profile assembled without anyone’s knowledge.

    The list is growing. In May 2025, LinkedIn scanned for roughly 1,000 extensions. Ten months later, the number has passed 5,000. The surveillance is not slowing down — it is accelerating.

    This database contains every extension LinkedIn is known to scan for, extracted from LinkedIn’s production JavaScript bundles.