- cross-posted to:
- privacy@lemmy.ml
- privacy@lemmy.ml
- cross-posted to:
- privacy@lemmy.ml
- privacy@lemmy.ml
Microsoft is running one of the largest corporate espionage operations in modern history. Every time any of LinkedIn’s one billion users visits linkedin.com, hidden code searches their computer for installed software, collects the results, and transmits them to LinkedIn’s servers and to third-party companies including an American-Israeli cybersecurity firm.


They allow this because they are being developed to allow this.
Browsers that don’t allow this in a Web-like system without such functionality (like Gemini) can be written in two days or a week if you don’t hurry.
Or at least take as long as Mosaic or Arena took to become usable.
Enormous resources are being invested into continued development of a platform where users provide valuable feedback.
By the way, ML is long past the point where that data could even be interpreted ambiguously. Those who have the data know exactly who you are and probably some useful traits of what you are thinking the moment you are typing a comment at any big website.