• Skip to primary navigation
  • Skip to main content
  • Skip to footer
  • Home
  • Advertise With Us
  • Contact
  • Cookie Policy
    • Privacy statement (CA)
    • Cookie policy (CA)
    • Privacy statement (UK)
    • Cookie policy (UK)
    • Privacy statement (US)
    • Cookie Policy (US)
    • Privacy statement (EU)
    • Cookie policy (EU)
    • Disclaimer

TechWalls

Technology News | Gadget Reviews | Tutorials

  • Reviews
  • Tech Guide
  • Home Improvement
  • Gadget & Apps
  • News

Is Intro Really Safe? LinkedIn Tries to Dispel Security Fears

Updated on Nov 1, 2013 by Guest Authors

Security experts denouncing LinkedIn’s new email application over privacy concerns are merely raising false alarm, so says the social network’s information security manager. But most security old pros seem to be voicing the same opinion: LinkedIn Intro is insecure.

Intro was introduced last week for iPhone users. The application is designed to channel an email through LinkedIn’s server before it goes straight to the recipient, operating much like a benign man-in-the-middle attack. The professional social networking site intends for the middle link to analyze emails and create additional profile information to be tagged on the message when it reaches the recipient’s inbox. In so doing, the Intro server also stores email data for a short while in an encrypted form and then removes those data from its system when the recipient receives the email.

LinkedIn briefly describes the aim for the new service, thus:

“When people email you, we show you their LinkedIn profile: you can put faces to names, write more effective emails, and establish rapport. You can grow your professional network by connecting with them on LinkedIn.”

intro-security

Is Intro Safe for Users?

What may look protected to LinkedIn Information Security Manager Cory Scott appears rather vulnerable to some security researchers.

In security firm Bishop Fox’s own piece of assessment, for example, Intro exposes sensitive data to malicious third parties that could maneuver the middle link system to their advantage.

Bishop Fox describes what a security profile can do:

“These security profiles can do much, much more than just redirect your emails to different servers. A profile can be used to wipe your phone, install applications, delete applications, restrict functionality, and a whole heap of other things.”

Scott slightly agrees that it could be possible, given the unpredictable behavior of threat landscape. He continues to believe, however, that Intro is built with the most secure implementation possible. Scott says the LinkedIn team has analyzed every possible way a hacker could exploit the Intro server and built the necessary security parameters to fend off any form of attacks and protect the users’ data. In other words, the company tapped the expertise of internal and external security professionals who have put Intro through acid tests in order to gauge how far the system could counter cyber threats.

Still Vulnerable to Threats

Moreover, the server is part of LinkedIn’s own network, thus a slim chance for third-party services to gain full access to it, the company says. That is acceptable, except that LinkedIn’s own system is not as impervious to compromise. It can be recalled that LinkedIn fell prey to a security breach in 2012. If it happened to the company’s network itself, what could prevent it from befalling its sub-systems?

Disclosure: We might earn commission from qualifying purchases. The commission help keep the rest of my content free, so thank you!

Footer

Review of the Waterpik Evolution and Nano Water Flosser Combo Pack

Transparent Shaving: The yoose ICE Electric Shaver Review

INKBIRD IBS-TH5 Review – Smart Thermo Hygrometer with E-Ink Display

LISEN MagSafe CD Phone Holder for Car Review

Follow TechWalls

YoutubeFacebookTwitterInstagram

Recent Posts

  • Review of the Waterpik Evolution and Nano Water Flosser Combo Pack
  • Transparent Shaving: The yoose ICE Electric Shaver Review
  • The Hidden Cost of Cryptocurrency: Bitcoin’s Energy and Water Footprint
  • Free Places To Sleep Inside Hong Kong Airport During Long Transits

Copyright © 2023 · All Rights Reserved

Manage Cookie Consent
We use technologies like cookies to store and/or access device information. We do this to improve browsing experience and to show personalized ads. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional cookies Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}