Slash Boxes

SoylentNews is people

posted by NCommander on Thursday April 03 2014, @12:32AM   Printer-friendly
from the how-is-this-possible? dept.

The BBC is reporting that the email addresses of LinkedIn users can be exposed via a web browser add on. A LinkedIn spokesman told the BBC "We are doing everything we can to shut Sell Hack down. On 31 March LinkedIn's legal team delivered Sell Hack a cease-and-desist letter as a result of several violations"

NCommander adds: Sell Hack is a plugin for Chrome that allows you to retrieve emails from LinkedIn itself. The article goes on to say that Sell Hack is complying with the cease and desist, but actual details remain somewhat light. If anyone is familiar with the inner works of this plugin, I'll amend this article to include the details.

This isn't LinkedIn's first battle with third party services

This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 5, Insightful) by Hairyfeet on Thursday April 03 2014, @02:22AM

    by Hairyfeet (75) <{bassbeast1968} {at} {}> on Thursday April 03 2014, @02:22AM (#25294) Journal

    Or better yet why not just avoid that clusterfuck? Between the malware, the data breaches, frankly it ought to be obvious to anybody with a functioning brain that LinkenIn is nothing but a piss poor badly run mess, I mean how many times do they have to royally fuck things up before its not worth messing with? if any client of mine asked for a Linkedin link I'd read them the laundry list of fuckups and tell them "I'm sorry but that website simply is too big of a security risk to use in good conscience' and that would be that.

    ACs are never seen so don't bother. Always ready to show SJWs for the racists they are.
    Starting Score:    1  point
    Moderation   +3  
       Insightful=3, Total=3
    Extra 'Insightful' Modifier   0  
    Karma-Bonus Modifier   +1  

    Total Score:   5  
  • (Score: 2) by TK on Thursday April 03 2014, @02:55PM

    by TK (2760) on Thursday April 03 2014, @02:55PM (#25602)

    Do you happen to have that laundry list on hand?

    The fleas have smaller fleas, upon their backs to bite them, and those fleas have lesser fleas, and so ad infinitum
    • (Score: 2) by Hairyfeet on Sunday April 06 2014, @04:11AM

      by Hairyfeet (75) <{bassbeast1968} {at} {}> on Sunday April 06 2014, @04:11AM (#26953) Journal

      Just type "LinkedIn data breach" "LinkedIn email breach" and "LinkedIn malware" in any search engine and you'll have more than enough rope to hang anybody who wants you to use that mess. I may have it a little better than most as many come to me because I have the rep of knowing my shit so when I say "that's crap"? most go "well if the man says its crap its crap" and go on.

      Then if they insist on having some sort of "anything but FB" social network I point them to G+, which does tend to be more IT/Nerd heavy and when you look at security track records Google is one of the good ones. LinkedIn has had problems almost from day one and frankly i wouldn't trust them with data about my dead dog, much less with actually useful data that could be in any way misused. Of course i found out it was shit thanks to first hand experience as i joined up soon after it was released using an email I ONLY use for clients and whadda ya know? less than 5 days after I share that account with LI this account gets buried in spam, an account that had been completely spam free before that BTW. Soon after the first of the "LI security breach" articles showed up and i got a letter from them saying "Might want to change any passwords you may have used and all that as we got pwned". I closed my account and avoided that place like the clap ever since.

      ACs are never seen so don't bother. Always ready to show SJWs for the racists they are.