Global plaintiff registration is open. If you used LinkedIn, complete the intake form now.

Global Plaintiff Intake

LinkedIn Browser Surveillance Claims

Register now

If you used LinkedIn, register now.

Public technical research alleges LinkedIn did more than check extensions. It describes hidden tool detection, page inspection, browser fingerprinting, encrypted telemetry, and third-party anti-fraud integrations operating in the background while people used the site. The same public materials say those signals may reveal job-search activity, competitor tools, company software choices, and other workplace context. If you used LinkedIn anywhere in the world, register now so the firm can review whether your use may fit a potential claim.

  • All LinkedIn users should register
  • Short intake
  • No obligation

What this intake is built to document

This page is designed for LinkedIn users who want their experience reviewed as part of a potential class action or coordinated legal intake. The public BrowserGate materials describe a monitoring system that allegedly operated in the background while people used LinkedIn in a browser.

The intake is intentionally broad. It is meant to gather clean data across countries, devices, browsers, and use patterns so counsel can compare how the alleged conduct may have affected different categories of users.

1

Alleged background collection

The public write-up describes browser monitoring that allegedly ran while users were on LinkedIn, not a form users knowingly filled out.

2

Potentially global user pool

This intake is open internationally because LinkedIn is a global product and review may depend on geography, jurisdiction, and role.

3

Structured intake first

The form is simplified so the intake team gets clean, comparable records without making users self-diagnose the technical allegations.

The public write-up describes a layered monitoring system

The public BrowserGate materials describe multiple collection and transmission routines working together, not one isolated browser check.

Repeat checks on page load

The public introduction says the extension check ran on page load, not as a one-time test, for visitors using the affected browser family.

Multi-step extension detection

The public materials describe a fallback chain that attempted direct extension contact, known-resource probing, and page-change detection to identify installed tools.

Full-page trace search

A separate routine allegedly walked the page itself looking for extension URLs and IDs embedded in text, markup, and attributes.

Chromium browser targeting

The technical write-up says the extension scan targeted Chrome-family browsers, including Chrome, Edge, Brave, Opera, and Arc.

Broader APFC fingerprinting

The same public analysis describes a larger collection system gathering browser, hardware, storage, screen, network, font, plugin, and audio-related signals.

Encrypted telemetry and repeat sending

The public materials say the resulting payload was encrypted, sent through LinkedIn telemetry endpoints, and reused across later requests during the same session.

Stealth-oriented execution

The technical write-up describes idle-time execution, staggered probing, silent failure handling, and hidden off-screen components meant to avoid obvious detection.

Third-party anti-fraud services

The public materials also point to background integrations tied to HUMAN Security, Merchant Pool, and Google reCAPTCHA Enterprise.

Feature-flagged rollout

The same analysis describes internal flags that could enable, test, or segment parts of the collection pipeline for different users or sessions.

The public materials suggest this may reveal more than casual browsing

A useful intake captures patterns across countries, industries, browsers, and tool setups. That is why this intake is open broadly to LinkedIn users worldwide.

What the public materials say LinkedIn could infer

Job-seeking activity

Public materials say job-search extensions can signal when a user may be exploring a new role.

Recruiting and sales workflows

Recruiter tools, prospecting tools, and LinkedIn-adjacent business software may reveal how a user or team worked on the platform.

Company software choices

The deeper public write-up says extension signals can be aggregated into a rough picture of which tools a company or department relies on.

Security and accessibility setups

The public materials also frame security, privacy, accessibility, and workplace helper tools as potentially meaningful context.

Why register even if you are not sure

  • People across countries, industries, and browser setups may help show how widespread the alleged monitoring was.
  • Recruiters, job seekers, founders, students, sales teams, public-sector workers, and everyday LinkedIn users can all register.
  • You do not need screenshots, technical proof, or certainty to start the process.
  • Submitting the intake is free and does not create an attorney-client relationship.
A

Career and hiring activity

People using LinkedIn for recruiting, hiring, or job search may help show how professional activity lined up with the alleged monitoring.

B

Commercial and sales activity

Teams using LinkedIn for prospecting, partnerships, or outbound work may reveal patterns tied to business software and workflow choices.

C

Everyday user baselines

General LinkedIn users matter too. Their submissions help compare ordinary browsing against more specialized use cases.

What to know before you submit

Why should all LinkedIn users register?

Because the allegations describe background monitoring that may have affected many kinds of LinkedIn users. The intake is open to people across countries, industries, and browsing setups.

What does the public technical write-up say happened?

In plain English: the public research says LinkedIn allegedly checked for installed tools, searched the page for extension traces, generated a larger device fingerprint, and pushed encrypted results through LinkedIn and third-party systems.

Does submitting this form make me a plaintiff?

No. It tells the intake team you want your situation reviewed. Formal representation would require a separate attorney review and engagement process.

Can users outside the United States register?

Yes. This intake is open internationally, and the team can evaluate geography, jurisdiction, and next steps after review.

What kinds of tools may matter?

Public materials discuss job-search tools, recruiting tools, sales extensions, privacy and security software, accessibility helpers, and general workplace extensions. If you used LinkedIn in a browser with tools installed, it is worth registering.

Should businesses, teams, or former employees submit?

Yes. Comparing submissions from individuals, teams, and companies can help the intake team understand role, sector, and organizational context.

The public write-up frames this as more than a privacy complaint

The public BrowserGate materials argue that the issue is not just whether browsing data was collected, but what could be learned once those signals were tied to real profiles, employers, and organizations.

Real-name professional profiling

The deeper public write-up argues that browser signals become more sensitive when attached to names, employers, titles, locations, and professional networks.

Company and team mapping

The same materials say aggregated tool signals can help map software choices, prospecting stacks, and workflows across an organization.

Public-sector and regulated roles

The public write-up also argues the same monitoring could touch people in government, defense, law enforcement, healthcare, education, and other regulated sectors.

Cross-border transmission

The materials say the telemetry tied to these signals was transmitted back to LinkedIn-controlled systems in the United States.

Case notice and non-affiliation

Research acknowledgment: this page was informed by public BrowserGate materials published by Fairlinked - Alliance for digital fairness e.V., together with credited work by Jay-O, Mark Percival, Dan Andrews, Josef Kadlec, and researchers at the University of Illinois Chicago.

Register now