LinkedIn has been quietly scanning users' computers every time they visit the site, searching for installed software and browser extensions without explicit consent or notification. Security researchers have uncovered what they're calling BrowserGate - a surveillance operation that's expanded from tracking about 461 products in 2024 to over 6,000 products by February 2026.
Here's what makes this genuinely troubling: this isn't just abstract data collection. LinkedIn knows your real name, your employer, and your job title. When the platform scans your machine and finds job search tools - and it's specifically looking for 509 of them - it's collecting intelligence on identified individuals who may be quietly looking for new work. That's not anonymized behavioral data. That's surveillance.
The technical implementation is clever in the worst way. Hidden code executes on every visit, identifying installed software and transmitting results to LinkedIn servers and HUMAN Security (formerly PerimeterX), an American-Israeli cybersecurity firm. The scan happens invisibly, using tracking elements you never see.
Competitive intelligence at scale. The scan targets over 200 competing products including Apollo, Lusha, and ZoomInfo. LinkedIn is essentially building a map of which companies use which competitor tools, all without asking permission from the people whose computers are being scanned.
The privacy implications get worse when you consider what software choices reveal. As the researchers point out, the scan can expose "religious beliefs, political opinions, disabilities, and job search activity" of identified individuals. Install a screen reader? That's disability information. Use certain productivity tools? That might indicate religious practice or political affiliation.
LinkedIn claims it's complying with EU Digital Markets Act regulations by publishing restricted APIs. But simultaneously expanding surveillance of third-party tools while claiming regulatory compliance is... let's call it creative interpretation.
The technology is real. The legal justification is questionable at best. The question is whether users who signed up for a professional networking platform consented to having their computers systematically scanned for intelligence gathering. I know what my lawyer would say.
