
"Assuming the BrowserGate allegations are true, LinkedIn users should consider reducing the amount of identifiable, trackable, or sensitive data their browser exposes, and organizations should treat LinkedIn as a potentially hostile web environment until facts are verified."
"Even if BrowserGate is exaggerated, browser fingerprinting is a real, widespread practice across the web. Treat LinkedIn like any other third-party data collector."
"IT executives should assume that LinkedIn can map your tech stack and that, if the claims are accurate, LinkedIn could infer which SaaS tools your employees use, which competitors you rely on, which job search tools your staff is using and which political/religious extensions appear inside your workforce."
"Some companies might even want to use a separate isolated browser solely for LinkedIn, or... use a sandboxed browser session, such as Browserling or other cloud-isolated browsers."
LinkedIn users are advised to reduce the exposure of identifiable and sensitive data due to BrowserGate allegations. Organizations should consider LinkedIn a potentially hostile environment. Even if the allegations are exaggerated, browser fingerprinting is a common practice. IT executives should assume LinkedIn can map tech stacks and infer sensitive information about employees. Recommendations include blocking LinkedIn on sensitive networks, accessing it through Virtual Desktop Infrastructure (VDI), and using isolated browser sessions for added security.
Read at Computerworld
Unable to calculate read time
Collection
[
|
...
]