- cross-posted to:
- linkedinlunatics@sh.itjust.works
- cross-posted to:
- linkedinlunatics@sh.itjust.works
Microsoft is running one of the largest corporate espionage operations in modern history. Every time any of LinkedIn’s one billion users visits linkedin.com, hidden code searches their computer for installed software, collects the results, and transmits them to LinkedIn’s servers and to third-party companies including an American-Israeli cybersecurity firm.


I will have to yield to your experience then. I mainly thought of it as a naive type of sensible argument, given people were not all that concerned about tracking and particularly browser fingerprinting. I guess back then, the main thing was web developers who used flash needed to check for it. But those people were anti-open web back then and deserved to be ignored by the browser makers.
I am guessing you were strongly in the open web camp back then. I am glad we sort of won that particular battle, even if we lost so many others.
Yeah, you’re right on that you needed to check for Flash if your site used it. But at the risk of sounding overly pedantic: Flash wasn’t a browser extension either; it was a plugin, which though named similarly were completely different implementation-wise. Browser plugins are not really supported anymore in 2026, due to them having essentially unrestricted access to the host machine.