Microsoft is running one of the largest corporate espionage operations in modern history. Every time any of LinkedIn’s one billion users visits linkedin.com, hidden code searches their computer for installed software, collects the results, and transmits them to LinkedIn’s servers and to third-party companies including an American-Israeli cybersecurity firm.
The user is never asked. Never told. LinkedIn’s privacy policy does not mention it.
Because LinkedIn knows each user’s real name, employer, and job title, it is not searching anonymous visitors. It is searching identified people at identified companies. Millions of companies. Every day. All over the world.
One Linux you could, I.E. for a flatpak you could use flatseal (or manually do it via command line) to lock down what folders the flatpak can operate in. I just did this for Brave Browser.
There is also the software Bubblewrap that accomplishes the same. These are at the application level for the entire browser though.