Microsoft's LinkedIn has been discovered using hidden JavaScript scripts on its website to scan visitors' browsers for installed Chrome extensions and collect device data, according to a new report dubbed "BrowserGate." The social networking platform appears to be checking for over 6,000 different browser extensions without user knowledge or explicit consent.

The data collection occurs when users visit LinkedIn's website, with the hidden scripts automatically scanning for specific browser extensions and gathering information about users' devices. This practice raises significant privacy concerns as it involves collecting data about users' browsing habits and installed software without clear disclosure.

The scanning mechanism uses JavaScript code that runs in the background while users browse LinkedIn's website. The scripts appear designed to identify specific extensions that users have installed, potentially building profiles of user behavior and preferences based on their browser configuration.

LinkedIn has not yet provided a comprehensive response regarding the purpose of this data collection or what safeguards are in place to protect user privacy. Users concerned about this practice may consider using browser privacy extensions or disabling JavaScript on LinkedIn's website, though this may impact functionality.

This discovery adds to growing concerns about data collection practices by major tech platforms and highlights the need for greater transparency in how companies gather information about their users' online activities.