Back to News
Advertisement
Advertisement

⚡ Community Insights

Discussion Sentiment

47% Positive

Analyzed from 2988 words in the discussion.

Trending Topics

#extensions#extension#linkedin#chrome#job#data#https#installed#list#why

Discussion (180 Comments)Read Original on HackerNews

ChrisArchitect•about 4 hours ago
traderj0e•about 2 hours ago
It's a different primary source though
gnabgib•40 minutes ago
This is the same source - 404 story lists browsergate.eu (linked by Chris) as the original source
Cider9986•about 4 hours ago
28 days ago, 1897 points, 812 comments
nokya•about 4 hours ago
"What is not a question is that a criminal investigation is now open." Good. These companies deserve each and every stone thrown at them, and much more.
lemax•about 1 hour ago
This is fairly standard practice for device fingerprinting. LI is probably using this to protect its platform from scraping etc, and extension lists have sufficient enough entropy to help identify users and form a useful component of a fingerprint.
ghm2180•32 minutes ago
Its already pretty easy to oneshot an extension aiding scraping and LI can do nothing about it. I've seen people build and install a local chrome extension in a couple of days and have an AI inject itself into devtools and scrape pretty much any website. And that was a few months ago. I don't think there is an easy way to defend against such things anymore. Its a matter of time that defensive programming measures like this become useless.
pyrophane•about 2 hours ago
Here's the most relevant section I could find from the original source:

"Chrome extensions can expose internal files to web pages through the web_accessible_resources field in their manifest.json. When an extension is installed and has exposed a resource, a fetch() request to chrome-extension://{id}/{file} will succeed. When the extension is not installed, Chrome blocks the request and the promise rejects.

LinkedIn tests every extension in the list this way."

thayne•about 1 hour ago
It seems like it shouldn't let code originating from the site (as opposed to from the extension) to access that.
fractaled•12 minutes ago
I'm not sure you'd need to directly fetch to determine if they resolve. One could probably inject an img tag and see if it resolves.
ro_bit•about 4 hours ago
Why is my Chrome telling random websites which extensions I have installed?
kimos•about 3 hours ago
It isn’t exactly. They created a list of known extensions by their id and a file which is known to exist in that extension. The site iterates over each pair and tries to load that file, if it doesn’t error it knows the extension is installed. It’s a clever and difficult manual process, but it does bypass the security trying to prevent this kind of thing.

I read that their reasoning is it exists to block users that use known scraper extensions which bypass their terms of use. But don’t entirely buy that.

FridgeSeal•about 3 hours ago
So the follow up question, is why is a random website, allowed to try and load arbitrary files?
stingraycharles•about 3 hours ago
This is how I interpreted the original question and indeed it makes no sense, JavaScript from a website should not be allowed to interact with extensions like this.
sigmoid10•about 2 hours ago
Chrome exposes these files via a URL that you can fetch in javascript like you would any other file on a normal website. These local extension files usually contain code, styles or images that your browser needs to run the extensions.
mschuster91•about 2 hours ago
Because extensions can and often do contain stuff like images or JS bundles that they inject into a target page's DOM. Not allowing a tab's context to load files from the chrome-extension:// namespace would break a lot of things.
nulltrace•13 minutes ago
Firefox at least randomizes extension IDs per install. Chrome hands all of that to extension devs, basically a "your problem now".
emporas•about 3 hours ago
Does the same scan is happening on firefox? Random websites invoking extensions do seem to be a security hole to me.
dminik•about 2 hours ago
This was posted before and it seems that Firefox randomizes the extension URLs.
estimator7292•2 minutes ago
So that websites can track and identify you "for improved personalized advertising" in exactly this way.

Browser fingerprinting is massively valuable to Google's surveillance/advertising apparatus. This is all working exactly as intended.

pyrophane•about 2 hours ago
Here's the relevant bit from the original source:

"Chrome extensions can expose internal files to web pages through the web_accessible_resources field in their manifest.json. When an extension is installed and has exposed a resource, a fetch() request to chrome-extension://{id}/{file} will succeed. When the extension is not installed, Chrome blocks the request and the promise rejects.

LinkedIn tests every extension in the list this way."

hbn•about 3 hours ago
Is that information available to websites? I figured they were doing some kind of novel hackery to self-detect extensions based on behaviour that would only happen if X extension was installed.

But that would be a lot of work for 6,300 extensions. Unless someone offers that as a service?

sethops1•about 4 hours ago
Can ask the same question about so many horrible security blunders web browsers have made over the decades.
2ndorderthought•about 4 hours ago
They are only blunders if they aren't being used as features by someone
AndroTux•about 3 hours ago
Brave explicitly blocks this
pnw•about 1 hour ago
Last time this was discussed the consensus was Brave does not block it. Brave's fingerprinting protection does not include extensions.

https://news.ycombinator.com/item?id=46904361

p_stuart82•about 2 hours ago
because Chrome lets sites probe "installed", and LinkedIn turns that into telemetry.
actionfromafar•about 1 hour ago
Chrome always makes tracking easier. It’s their blind spot, because google.
gib444•about 4 hours ago
Chrome is a browser produced by an advertising company. Its reason for existence is to track you.
lucb1e•about 3 hours ago
Not that I disagree but Google's tracking motivation in making the browser seems irrelevant to why it lets competitors do this fingerprinting
gdulli•about 3 hours ago
They want fingerprinting to work for everyone because the more effective it is, the higher the value of the ad inventory they sell.
3dsnano•about 4 hours ago
friends, WHEN you are asked to implement something like this at your job, which will you choose: object (& hold ground, loose job) OR comply (& keep job)

as practitioners, where do we hold the line between telemetry and surveillance?

frogperson•about 4 hours ago
I choose not to work at places like linked in, meta, or any place that accepts Saudi or Israeli funding. It makes it a little harder to find a job, but i sleep better at night.
aryonoco•about 2 hours ago
For similar reasons, I have been working in the public sector (Australian state government) for the past 5 years and couldn’t be happier.

I’m lucky that I’m in a team which is hands on and does a lot of very interesting things. From building CRUD apps which are used in management and response to bushfires (wildfires) to more interesting things like building a datalake which amalgamates and stores weather data from multiple sources to building near real time CDC pipelines and making our transactional data available to our in house team of data scientists who then use that data to do fascinating stuff that eventually results in for example making sure that our response to bushfires takes into account the impact and safety of endangered species.

And when I look at the underlying data and the trends and and projections of just how bad bushfires are going to get in the next 30 years and how we must be so much nimbler and smarter just to survive, the work takes on a whole new level of meaning.

Don’t get me wrong, there are times the internal bureaucracy absolutely drives me mad. And I am aware that I could be earning much more in the private sector. But I get to work with a team who are really passionate and enthusiastic about their job, and I get to sleep at night knowing that unlike my previous jobs, this time I am not just making someone who is already uber rich, richer.

If you had told the teenage Utilitarian me that I would one day work for, and enjoy working for, government, I would have thought hell must have frozen over.

HerbManic•about 3 hours ago
In years to come you will be so thankful that you took that path.

As they say, better to be a poor master than a rich slave.

vehemenz•about 3 hours ago
I wouldn’t lump in Israel in, but good for you.
bravetraveler•about 3 hours ago
I got you covered, boo. I will! For sport.

Anyway, for those in this situation, some anecdotes. I've outright refused to do questionable things and kept my job. I've also played incompetent so the sharks look elsewhere. Point being... options exist, don't negotiate [only] with yourself.

Would be remiss if I missed the opportunity to quote Louis Rossman: "don't accept the premise of assholes"

KoftaBob•24 minutes ago
There have been several spywares developed in Israel and that have been used by them and other governments against civilians, below are just a few examples. Why wouldn't you lump Israel in?

https://en.wikipedia.org/wiki/Pegasus_(spyware)

https://en.wikipedia.org/wiki/Paragon_Solutions

https://en.wikipedia.org/wiki/Cytrox#Predator

zulban•about 3 hours ago
There's a third choice. Say you'll do it but do it poorly, or drag your feet forever. Hard to prove you intentionally did a bad job.

If that's the game you're playing tho, maybe time to find another job too ;)

ulimn•about 2 hours ago
I think it's also an option to anonymously tell the world what will happen. That way you keep your job and still people are at least aware. Unless if you are one of like 3 people who know about it and they would immediately know it was you.
lucb1e•about 3 hours ago
I wonder the same. Maybe it's made by people who feel like they wouldn't easily find another job and need the job for healthcare or financial reasons (living paycheck to paycheck)? And it's ordered by managers in similar situations, whose managers want to see increased revenue and don't care how? Somewhere in the chain it feels like there should be someone who says 'wtf are we doing'. It's strange

To answer your question though: I'd object of course, I'm very lucky to be well enough off that I can currently make that choice without serious repercussions. Do you think someone would come out on HN and say "oh sure yeah I have no morals!", at least without it being a throwaway where you'd have no idea if it's real?

traderj0e•about 2 hours ago
Honestly I would implement this. Chrome's fault for telling every website what extensions are installed. User isn't harmed anyway.
0cf8612b2e1e•29 minutes ago
How do you feel about burglars exploiting bad locks? Known flaw, so the owner had it coming? Insurance will make them right in the end?
traderj0e•15 minutes ago
Nobody is getting burgled here
3dsnano•about 2 hours ago
cool perspective++
StilesCrisis•about 3 hours ago
Is this a hallucination? I can't find this quote anywhere else.

> According to browsergate, Milinda Lakkam confirmed this under oath, saying, "LinkedIn took action against users who had specific extensions installed."

GrinningFool•about 3 hours ago
Huh, kind of. That's not the actual quote. Note I haven't followed the chain further back than this:

https://browsergate.eu/the-evidence-pack/

    LinkedIn’s systems “may have taken action against LinkedIn users that happen to have [XXXXXX] installed.”

Edit: nice! I just notice indent-formatted text is now wrapping on mobile browsers. (Or at least ffm.) I wonder how long that's been fixed...
Lerc•about 3 hours ago
Saying 'I may have taken a shower' instead of 'I took a shower' makes my wife use her disapproving look.
GrinningFool•about 2 hours ago
True - also when you put something in quotes I think it should be a quote.
namar0x0309•22 minutes ago
Aside from the gross privacy invasion it specifically looks for Muslim/Islamic related extensions.

Having a lot of connections working at Microsoft and Western tech industry, I'm not surprised with the targeting of Muslims.

itake•20 minutes ago
Muslim/Islamic extremist recruiters used Adobe's Express platform for terrorist / extremist recruitment.

No idea if if LinkedIn has the same issue though.

claytonn•31 minutes ago
Just as invasive as Akamai bot manager on every other site you visit. Akamai is so jam packed they can likely identify you from the mouse movement data alone. The LinkedIn discourse feels forced, the problem is so much worse than what you're seeing here.
varenc•about 1 hour ago
One trick to evade some of LinkedIn's detection:

A big part of its detection relies on finding known extension resources at URLs of the form `chrome-extension://{extension_id}/{file}`

An extension installed from the Chrome store has the same `extension_id` for every user. But, if you just extract the source for that extension, and then load it yourself, you'll get a NEW extension_id. Same extension with the same functionality, but its extension_id will be completely new so impossible for LinkedIn to query.

Granted this won't evade the second type of detection LinkedIn employs, it'll help you evade quite a bit. I often clone extension source code anyway since it mostly protects me from malicious extension updates (by effectively disabling updates).

maelito•about 4 hours ago
Well, I deleted my Linkedin account and life is better now.
booi•about 3 hours ago
That's big talk coming from someone who currently has a job. getting a job without a linkedin account isn't that straightforward.
traderj0e•about 2 hours ago
I get why people without jobs need a LinkedIn, but I don't get why they post there constantly. Like reposting stuff, writing random thoughts, posting rocket ship emojis, has anyone ever gotten a job that way?
Eji1700•about 2 hours ago
I've heard it makes you more visible on things like search results. Linkdin, of course, is trying to encourage interaction on their site so sounds believable that they'd do that, but i've been lucky enough to not need to care.
Advertisement
thwarted•39 minutes ago
> Hundreds of job search extensions are in the scan list. LinkedIn knows which of its users are quietly looking for work before they've told their employer. … Extensions tied to political content, religious practice

Why are these even extensions to begin with? A legit job finding service can be a website, no extension required. If they are nefarious extensions that fake ad clicks or mine cryptocurrency, that they are job search, or political, or religious in name/nature only serves to get rubes to install them. This entire ecosystem is goofed up.

Aurornis•about 2 hours ago
This is re-posted article from the author's Substack that does a pretty bad job of explaining the situation. The second link in the article is supposed to take you to a "GitHub repository tracking the extension list" but it goes to a GitHub page for a plugin that hasn't been updated in 9 years.

It has a lot of hallmarks of LLM writings ("It's not this, it's that" and feeling like a lot of empty words rehydrated from an outline) while missing the real updates in the story like the German affidavit filed by a LinkedIn engineer who worked on these tools.

A key piece of information that this article omits is that the list of extensions being scanned for doesn't include anything you'd recognize or anything you'd even think to install. It's full of data extraction tools, scrapers, AI spam and recruiting tools (remember all those automated spammy LinkedIn messages you got?), and plugins masquerading as simple things that have been pulled from the extension store for violations.

A lot of articles have been trying hard to distract from this fact by highlighting that the list of extension includes things like a plugin designed to simplify web pages for neurodivergent users or an "anti-Zionist political tagger" to imply that they're trying to do fingerprinting based on those attributes, but they neglect to mention that those plugins were pulled from the extension store most likely because they were data exfiltrators dressed up as simple plugins to get people to install them.

An updated list is available here: https://browsergate.eu/extensions/

But read that site carefully and actually try to click the links. In this section they're trying to direct your attention away from all of the AI spam and data extraction tools with this section:

> The scan doesn’t just look for LinkedIn-related tools. It identifies whether you use an Islamic content filter (PordaAI — “Blur Haram objects, real-time AI for Islamic values”), whether you’ve installed an anti-Zionist political tagger (Anti-Zionist Tag), or a tool designed for neurodivergent users (simplify).

But click the links. They've all been pulled from the store. Extensions like that are often bait to get people to install scrapers that will use your computer and LinkedIn login to extract data and send it back to their servers.

So regardless of where you stand on probing for the presence of these scammy extensions, you should at least understand the facts rather than the story that companies like this are trying to sell you to drive traffic to their product.

I suggest cutting through the ragebait journalism and reading more directly from a recent source, like this affidavit filed in Germany by a LinkedIn engineer familiar with the project: https://browsergate.eu/downloads/Lakam-affidavit-redacted.pd...

tadfisher•about 2 hours ago
> But click the links. They've all been pulled from the store.

I did that with the first five extensions in the list; only one was removed from the store. So you should qualify this statement.

Maybe they are all scammy extensions, and maybe this is a weird LLM-driven astroturfing campaign, but let's try to at least root our arguments in a shared reality.

ziml77•41 minutes ago
You're misunderstanding what that's in reference to. It's not about all of the extensions in the list being removed. It's about the 3 that are specifically called out in the text above the list to scare people into thinking they're being profiled for things that could put them in danger.

All 3 of those have been removed.

stevenicr•about 3 hours ago
and,

recently while trying to decipher why computer was at 98% memory and 65% cpu

one of the culprits is https://li.protechts.net taking 2GB ram and 8% cpu.

DDG searches say this is something for linkedin. - I had two tabs for linkedin open but left behind as I opened other tabs to research.

So I had not reopened these tabs in over 9 hours and they are still just humming along sucking down almost 10% of cpu and a couple gigs of ram for what?

This is firefox with ublock origin - quick searches saw malwarebytes browser guard considered it (protechts.net) malware for a bit and then took it off the list of things it blocked / warned about.

Not sure this is related to the scan mentioned, but it may be related to the overall concerns about data and unknown usage of resources.

I'm considering blocking this at the dns hosts level at this point.

repost of my comment 28 days ago

tpurves•about 2 hours ago
Thanks for flagging this, I was literally seeing the same thing with protechts.net in my activity tab this morning as I was trying to understand why firefox was aggressively draining my battery.
jameson•40 minutes ago
Why doest the browser even allow it?

Runtime of extensions should be blackbox to a website IMO

mkw5053•about 4 hours ago
Interesting, so would Safari prevent this? I tried moving to Safari and honestly loved everything except I use my google accounts now for authenticating with to many services and that was a pain compared to chrome.
NoahZuniga•about 4 hours ago
Even better! Moving to firefox fixes this.

Chrome for some reason (still!) gives extensions static ids. Firefox has the id change per firefox instance.

bigethan•about 4 hours ago
Seems to only happen Chrome per the dev of Wipr (a great safari privacy extension) https://mas.to/@mipstian/116341745221356805
skeaker•about 4 hours ago
I would imagine using any non-Chromium browser would cause it to fail to find any Chrome extensions, yes.
mkw5053•about 4 hours ago
Sure, but Safari may or may not leak Safari extension signals in a similar fashion. I haven't actually investigated.
testfrequency•about 4 hours ago
Well if you’re a logged in to Google don’t you just SSO everywhere?
mkw5053•about 4 hours ago
I honestly kind of forget the exact annoyances because it has been some time. I want to say I had to reauth every time I wanted to SSO with my google account because it doesn't allow/deletes third party cookies.
traderj0e•about 2 hours ago
Yeah it's something like this. I have multiple Google accounts and am somehow always logged into the wrong one.
ghm2180•35 minutes ago
I use firefox with uBlock Origin's matrix turned on linked in and its cdn is explicitly black listed globally on it. I see links like ~`licdn` or some shit appear with a lot more frequency on webapps in the matrix now a days. I would recommend you all install it and block it actively.

Its disgusting.

dctoedt•about 3 hours ago
Seems to do this in Microsoft Edge, too.*

* I use Edge bcs of the vertical tabs — Safari's equivalent is a poor substitute. Firefox didn't seem to have vertical tabs last time I checked.

SpyCoder77•about 2 hours ago
> Users who had no idea their software was being inventoried, no idea the inventory was being used against them, and no way to know it was happening because none of it appears in LinkedIn's privacy policy.

As if users are actually reading the privacy policy...

rapnie•about 4 hours ago
See also "LinkedIn is searching your browser extensions" (812 comments) https://news.ycombinator.com/item?id=47613981
flenserboy•about 3 hours ago
Fun to have to spin up a whole VM just to use a particular website!
Advertisement
cynicalsecurity•about 2 hours ago
But how is this supposed to help against scraping? This is ridiculously ineffective against scraping. Just pretend to have a standard set of extensions and you are good to go.
guluarte•about 4 hours ago
I did that and got logged out of LinkedIn.
0xAstro•about 3 hours ago
Now the 1000s of spammy chrome web extension requests when I opened LinkedIn makes sense
GodelNumbering•about 4 hours ago
I saw the following from linkedIn this morning

> Update to our terms and data use As of November 3, 2025, we are using some of your Linkedin data to improve the content-generating Al that enhances your experience, unless you opt out in your settings. We also updated our terms. See what's new and how to manage your data.

Frankly, it is unacceptable to tell a user "oh we have been using your personal data for 5 months already and will continue to do so unless you explicitly opt out". Are there any transparent alternatives to LinkedIn (not the trust me bro variant)?

sp1982•about 2 hours ago
I am building corvi.careers, its a job search engine not social network tho
0xAstro•about 3 hours ago
now it makes sense with the 1000s of spammy not found requests to chrome extensions i was seeing on linkedin and had claude code debug.
kmeisthax•about 4 hours ago
Wasn't this specifically some lame-ass attempt to combat some click fraud or something these extensions were doing? And aren't these articles specifically coming from the person doing the fraud (which is why they know about the extension scanning)?

To be clear, LinkedIn shouldn't be scanning your browser extensions, but still. The ultimate problem is that browser extensions are a powerful malware vector and there's a huge market of people buying little utilities off of solo developers to enshittify them.

dnnddidiej•about 4 hours ago
> LinkedIn shouldn't be scanning your browser extensions.

Correct

Yes there are other problems in the world and we can JAQ the messanger too.

cxr•about 3 hours ago
> Wasn't this specifically some lame-ass attempt to combat some click fraud or something these extensions were doing?

No. That you believed that was just an unfortunate consequence of HN's kneejerk tendency to upvote middlebrow dismissals to the top comment, which resulted in people rushing to craft apologetics for what is in reality bonafide scumminess on LinkedIn's part, which itself resulted in confabulations like the claim that, "It was all extensions related to spamming and scraping LinkedIn last time this was posted"—which is simply untrue.

charcircuit•about 3 hours ago
This is pure speculation. It is a million times more likely that this data is strictly used to combat scraping and fraud.