LinkedIn is scanning browser extensions

(404privacy.com)

434 pontos | por un-nf 5 dias atrás

39 comentários

  • ChrisArchitect
    5 dias atrás
    • traderj0e
      5 dias atrás
      It's a different primary source though
      • 1vuio0pswjnm7
        4 dias atrás
        It's not clear to me what "[dupe]" means on HN anymore

        It is being used, e.g., by this commenter, where the URLs and the target page content for each submission differ

        Moreover, HN allows duplicate submissions under some circumstances, where the URLs are exactly the same. If the submissions are relatively far apart in time sometimes the moderator or a commenter will reply with "Previous discussion". More recently, a "past" link was added. Many times however the duplicate submissions are close together in time and there are no comments

        Perhaps "[dupe]" as used here means "duplicate topic". But that seems like a pointless label as there are multiple submissions about the same topic every week on HN

        As someone who archives all active HN story URLs, titles, etc. in an SQL database daily, I can locate duplicate submissions very quickly. Most do not have any indication of "[dupe]" in the title or comments

        • ChrisArchitect
          4 dias atrás
          Dupe isn't about the url (except when it obviously is), it's about the duplicate discussion. Just flipping through most of this thread here it's all the repeated comments and points from the rather large thread on the source from earlier in the month. In this url's case it was written the same week as the source, maybe it brings a bit more analysis to the topic, but it's from then. It's not fresh. If it had been shared then it probably would have been merged into the main discussion (or could have been shared there at the time).

          Not pointless at all, keeps things fresh and rolling. Stops some of us having to see the same topic over and over, and directs those who missed things to where the main discussion happened or is still happening. Stuff moves pretty fast around here.

          You might see multiple submissions (a regular offender of submitting a ton of duplicates yourself) but they don't go anywhere, don't make it to front page or eyeball traction (say >20 upvotes). Most don't need specific dupe flagging because there's no discussion forming. Sharing the link helps casual readers find the discussion. And directs the recognition and attention to the original posters and story especially when stories are barely hours old.

          As if you haven't been around here for awhile enough to be clearer on this. Striving to keep the feed fresh and discussion together helps us all, you could do better to contribute that way.

        • 1vuio0pswjnm7
          2 dias atrás
          There is more to HN than just discussion. It's been called a "news aggregator" but it could be different things to different people

          I prefer to read the submitted stories ("news") more than the replies, if any. I enjoy reading multiple stories on the same topic as they may include different presentation of the facts and sometimes different perspectives. Not to mention there are sometimes technical differences in news websites, e.g., some news websites suck more than others. Before the internet, I would read several newspapers each day. I would intentionally read multiple news reports of the same story

          Others may prefer HN _discussion_, which only occurs on a minority of stories

          NB. Most HN users do not submit replies and engage in discussion. They are readers and/or voters only

          A small number of HN commenters, or maybe the moderators, might try to preempt or redirect potential discussion, or otherwise manipulate it to meet their preferences or goals

          C'est la vie. Have at it

          But I think "dupe" means duplicate. As in duplicate URLs. Others seem to agree. I appreciate the clarification

          Using that term to refer to something else related to _potential discussion_ is subjective and inaccurate, maybe even deceptive, an attempt to "dupe" the reader, pun intended

        • traderj0e
          4 dias atrás
          Dupe means duplicate, but that's normally if both links point to the same article or both articles are secondaries pointing to the same primary article
      • gnabgib
        5 dias atrás
        This is the same source - 404 story lists browsergate.eu (linked by Chris) as the original source
        • un-nf
          4 dias atrás
          Yeah, the source I used is browsergate.eu. I do a lot of developing in the dev tools (browser fingerprinting protection tool on the same site) and so I was looking at the dev tools for linked in and saw the extension enumeration a few weeks ago. I didn't realize that's what was going on, but there was a repository from a few years ago that started tracking this. There's a HN link somewhere... nefariouslinkedin I think it was called.

          Then, I saw the browsergate story drop on mastodon and thought "no way," lo-and-behold, there's a lawsuit in the works for it.

          I found the audit to be a bit dense and hard to read, this is a response to that. I

        • un-nf
          4 dias atrás
          I did do my own independent audit, though. Sorry, I just checked back today and was not expecting this to get the traction it did.
          • traderj0e
            4 dias atrás
            That's what I mean, this article has its own audit, it's not a dupe of the other
    • Cider9986
      5 dias atrás
      28 days ago, 1897 points, 812 comments
  • nokya
    5 dias atrás
    "What is not a question is that a criminal investigation is now open." Good. These companies deserve each and every stone thrown at them, and much more.
    • fuzzfactor
      4 dias atrás
      What's really needed is to find out whose idea this was to begin with.

      Some truly straight-shooters should be pointing the finger very accurately to where all this is coming from.

      Anybody who has a team committed to non-below-average websites should be able to screen applicants against a roster of known enshittifiers.

      It may be too late to nip it in the bud, but there's no reason to allow these individuals to continue unabated, much less keep growing so annoyingly.

      What's wrong with some people anyway?

      • un-nf
        4 dias atrás
        This is unfortunately common practice on the internet.

        Browser fingerprinting is the new norm. LinkedIn just didn't disclose it in their privacy policy. They do mention canvas fingerprinting and collecting other signals, but not specifically this extension enumeration stuff.

        But fingerprinting is used to track people even without cookies. Take a look at this for some further reading: https://404privacy.com/blog/browser-fingerprinting-is-the-ad...

  • ro_bit
    5 dias atrás
    Why is my Chrome telling random websites which extensions I have installed?
    • kimos
      5 dias atrás
      It isn’t exactly. They created a list of known extensions by their id and a file which is known to exist in that extension. The site iterates over each pair and tries to load that file, if it doesn’t error it knows the extension is installed. It’s a clever and difficult manual process, but it does bypass the security trying to prevent this kind of thing.

      I read that their reasoning is it exists to block users that use known scraper extensions which bypass their terms of use. But don’t entirely buy that.

      • FridgeSeal
        5 dias atrás
        So the follow up question, is why is a random website, allowed to try and load arbitrary files?
        • stingraycharles
          5 dias atrás
          This is how I interpreted the original question and indeed it makes no sense, JavaScript from a website should not be allowed to interact with extensions like this.
          • flomo
            5 dias atrás
            It's actually the extension injecting itself into the webpage, often to interact with it. (I imagine much of this is just looking for global ExtensionName objects.)
            • angoragoats
              5 dias atrás
              Actually, the article is clear about what is happening technically, and it’s both. Chrome does, in fact, allow the page to make requests for resources stored in the extension bundle, and this is one of the two fingerprinting methods that the article describes.
          • encom
            5 dias atrás
            >JavaScript from a website should not be allowed

            Agreed 100%.

            • un-nf
              4 dias atrás
              I agree, and this is why I built 404. If you poke around the page a bit, you'll see a tool that prevents browser fingerprinting.

              404 catches JS calls in JS proxies and returns mocked-up values (assigned by a profile), it also has protections against TLS fingerprinting, canvas fingerprinting, device enumeration, TCP/IP fingerprinting, HTTP header fingerprinting, and more.

              The predatory practices that browser fingerprinting have enabled guised behind "fraud protection" are atrocious. Even with a VPN, even in incognito mode, a website can track me and see what I've been doing EVEN IF ITS NOT ON THEIR SITE.

              Then a data broker buys all this data and uses an AI model to put it all into a pretty little package and sell it to Google, or the gov't, or something. It's scary.

        • mschuster91
          5 dias atrás
          Because extensions can and often do contain stuff like images or JS bundles that they inject into a target page's DOM. Not allowing a tab's context to load files from the chrome-extension:// namespace would break a lot of things.
          • unglaublich
            4 dias atrás
            True, but you'd expect the same CORS rules to apply for extensions. Only pages originating from an extension are by default able to load resources from said extension.
        • sigmoid10
          5 dias atrás
          Chrome exposes these files via a URL that you can fetch in javascript like you would any other file on a normal website. These local extension files usually contain code, styles or images that your browser needs to run the extensions.
          • pbhjpbhj
            5 dias atrás
            Why is it not a CORS violation?

            The browser needing access and a random website having access are quite different. Seems like a big ol' pile of vulns waiting to happen.

            • sigmoid10
              4 dias atrás
              CORS is a server setting to tell the browser not to load its data from potentially unsafe origins. If you set a server to send access-control-allow-origin: *, then your browser will happily load these resources for you regardless of where you currently are. And chrome extensions need to be loadable from everywhere to be able to inject code or images into pages, so enabling CORS for them would defeat their main purpose. The extensions themselves might even need to bypass an existing CORS setup for the website you are currently on to fetch additional data.
              • pbhjpbhj
                4 dias atrás
                From the other end, yes extensions access all page data, but pages shouldn't access extension data at all; it feels like that should be the CORS violation.
                • sigmoid10
                  4 dias atrás
                  You have it backwards. For an extension to work on a page, it's data/code needs to be accessible from said page. If your extension server in chrome enforced CORS to prevent access from tabs on other websites, extensions wouldn't work anywhere.
      • nulltrace
        5 dias atrás
        Firefox at least randomizes extension IDs per install. Chrome hands all of that to extension devs, basically a "your problem now".
      • un-nf
        4 dias atrás
        If that were the case, the list wouldn't have extensions that relate to a users religion, income, demographics, and more.
      • emporas
        5 dias atrás
        Does the same scan is happening on firefox? Random websites invoking extensions do seem to be a security hole to me.
        • dminik
          5 dias atrás
          This was posted before and it seems that Firefox randomizes the extension URLs.
    • pyrophane
      5 dias atrás
      Here's the relevant bit from the original source:

      "Chrome extensions can expose internal files to web pages through the web_accessible_resources field in their manifest.json. When an extension is installed and has exposed a resource, a fetch() request to chrome-extension://{id}/{file} will succeed. When the extension is not installed, Chrome blocks the request and the promise rejects.

      LinkedIn tests every extension in the list this way."

    • sethops1
      5 dias atrás
      Can ask the same question about so many horrible security blunders web browsers have made over the decades.
      • 2ndorderthought
        5 dias atrás
        They are only blunders if they aren't being used as features by someone
    • hbn
      5 dias atrás
      Is that information available to websites? I figured they were doing some kind of novel hackery to self-detect extensions based on behaviour that would only happen if X extension was installed.

      But that would be a lot of work for 6,300 extensions. Unless someone offers that as a service?

    • AndroTux
      5 dias atrás
      Brave explicitly blocks this
      • pnw
        5 dias atrás
        Last time this was discussed the consensus was Brave does not block it. Brave's fingerprinting protection does not include extensions.

        https://news.ycombinator.com/item?id=46904361

        • AndroTux
          4 dias atrás
          Well, just because LinkedIn still tries to send the requests on Brave doesn't mean the blocking doesn't work. The question is whether any request will give a valid response.

          That said, I can't find conclusive info on whether this is blocked exactly. Brave does block "plugins" (which is why I assumed this includes this specific kind of fingerprinting), and the getExtension() call (which is probably unrelated), according to this page: https://brave.com/privacy-updates/4-fingerprinting-defenses-...

          But since they don't explicitly mention the chrome-extension URL, you might be right.

    • estimator7292
      5 dias atrás
      So that websites can track and identify you "for improved personalized advertising" in exactly this way.

      Browser fingerprinting is massively valuable to Google's surveillance/advertising apparatus. This is all working exactly as intended.

    • gib444
      5 dias atrás
      Chrome is a browser produced by an advertising company. Its reason for existence is to track you.
      • lucb1e
        5 dias atrás
        Not that I disagree but Google's tracking motivation in making the browser seems irrelevant to why it lets competitors do this fingerprinting
        • wetpaws
          5 dias atrás
          [dead]
        • gdulli
          5 dias atrás
          They want fingerprinting to work for everyone because the more effective it is, the higher the value of the ad inventory they sell.
      • ranger_danger
        4 dias atrás
        > Its reason for existence is to track you.

        Source:

    • p_stuart82
      5 dias atrás
      because Chrome lets sites probe "installed", and LinkedIn turns that into telemetry.
    • actionfromafar
      5 dias atrás
      Chrome always makes tracking easier. It’s their blind spot, because google.
  • 3dsnano
    5 dias atrás
    friends, WHEN you are asked to implement something like this at your job, which will you choose: object (& hold ground, loose job) OR comply (& keep job)

    as practitioners, where do we hold the line between telemetry and surveillance?

    • frogperson
      5 dias atrás
      I choose not to work at places like linked in, meta, or any place that accepts Saudi or Israeli funding. It makes it a little harder to find a job, but i sleep better at night.
      • aryonoco
        5 dias atrás
        For similar reasons, I have been working in the public sector (Australian state government) for the past 5 years and couldn’t be happier.

        I’m lucky that I’m in a team which is hands on and does a lot of very interesting things. From building CRUD apps which are used in management and response to bushfires (wildfires) to more interesting things like building a datalake which amalgamates and stores weather data from multiple sources to building near real time CDC pipelines and making our transactional data available to our in house team of data scientists who then use that data to do fascinating stuff that eventually results in for example making sure that our response to bushfires takes into account the impact and safety of endangered species.

        And when I look at the underlying data and the trends and and projections of just how bad bushfires are going to get in the next 30 years and how we must be so much nimbler and smarter just to survive, the work takes on a whole new level of meaning.

        Don’t get me wrong, there are times the internal bureaucracy absolutely drives me mad. And I am aware that I could be earning much more in the private sector. But I get to work with a team who are really passionate and enthusiastic about their job, and I get to sleep at night knowing that unlike my previous jobs, this time I am not just making someone who is already uber rich, richer.

        If you had told the teenage Utilitarian me that I would one day work for, and enjoy working for, government, I would have thought hell must have frozen over.

        • KetoManx64
          3 dias atrás
          > and I get to sleep at night knowing that unlike my previous jobs, this time I am not just making someone who is already uber rich, richer.

          You can provide value in the free market, or you can work in a public sector where the people paying your salary have no choice but pay their taxes to cover your salary or risk going to prison.

      • matof
        1 dia atrás
        Agree, having a strong moral compass is a must have yet becoming more and more important. Very easy to say, incredibly hard to execute when the offer is big enough...
      • HerbManic
        5 dias atrás
        In years to come you will be so thankful that you took that path.

        As they say, better to be a poor master than a rich slave.

      • vehemenz
        5 dias atrás
        I wouldn’t lump in Israel in, but good for you.
        • bravetraveler
          5 dias atrás
          I got you covered, boo. I will! For sport.

          Anyway, for those in this situation, some anecdotes. I've outright refused to do questionable things and kept my job. I've also played incompetent so the sharks look elsewhere. Point being... options exist, don't negotiate [only] with yourself.

          Would be remiss if I missed the opportunity to quote Louis Rossman: "don't accept the premise of assholes"

        • KoftaBob
          5 dias atrás
          There have been several spywares developed in Israel and that have been used by them and other governments against civilians, below are just a few examples. Why wouldn't you lump Israel in?

          https://en.wikipedia.org/wiki/Pegasus_(spyware)

          https://en.wikipedia.org/wiki/Paragon_Solutions

          https://en.wikipedia.org/wiki/Cytrox#Predator

          • vehemenz
            4 dias atrás
            If your criterion holds for spyware merely developed in a state, then that commits you not working in the US or UK as well. Something to think about.

            Putting that aside, my moral positions about Israel are rooted in the righteousness of the Jews' cause and their historical struggle. My personal self-righteousness is inadequate in comparison.

          • traderj0e
            5 dias atrás
            It's just that I'm an American, so I don't want to work for Israel. If we're making cyberwarfare tools for the US, sure.
    • zulban
      5 dias atrás
      There's a third choice. Say you'll do it but do it poorly, or drag your feet forever. Hard to prove you intentionally did a bad job.

      If that's the game you're playing tho, maybe time to find another job too ;)

    • ulimn
      5 dias atrás
      I think it's also an option to anonymously tell the world what will happen. That way you keep your job and still people are at least aware. Unless if you are one of like 3 people who know about it and they would immediately know it was you.
    • lucb1e
      5 dias atrás
      I wonder the same. Maybe it's made by people who feel like they wouldn't easily find another job and need the job for healthcare or financial reasons (living paycheck to paycheck)? And it's ordered by managers in similar situations, whose managers want to see increased revenue and don't care how? Somewhere in the chain it feels like there should be someone who says 'wtf are we doing'. It's strange

      To answer your question though: I'd object of course, I'm very lucky to be well enough off that I can currently make that choice without serious repercussions. Do you think someone would come out on HN and say "oh sure yeah I have no morals!", at least without it being a throwaway where you'd have no idea if it's real?

    • traderj0e
      5 dias atrás
      Honestly I would implement this. Chrome's fault for telling every website what extensions are installed. User isn't harmed anyway.
      • 0cf8612b2e1e
        5 dias atrás
        How do you feel about burglars exploiting bad locks? Known flaw, so the owner had it coming? Insurance will make them right in the end?
        • traderj0e
          5 dias atrás
          Nobody is getting burgled here
      • 3dsnano
        5 dias atrás
        cool perspective++
  • pyrophane
    5 dias atrás
    Here's the most relevant section I could find from the original source:

    "Chrome extensions can expose internal files to web pages through the web_accessible_resources field in their manifest.json. When an extension is installed and has exposed a resource, a fetch() request to chrome-extension://{id}/{file} will succeed. When the extension is not installed, Chrome blocks the request and the promise rejects.

    LinkedIn tests every extension in the list this way."

    • golem14
      4 dias atrás
      Hmm, can one fake-install extensions that randomly return yes/no to those queries ? It's pretty clear which files linkedin (and other sites doing the fingerprinting) is testing, one can observe it as the OP author points out.

      It should also be interesting to see which other sites test those very same files, has anybody looked yet ?

    • thayne
      5 dias atrás
      It seems like it shouldn't let code originating from the site (as opposed to from the extension) to access that.
      • fractaled
        5 dias atrás
        I'm not sure you'd need to directly fetch to determine if they resolve. One could probably inject an img tag and see if it resolves.
  • StilesCrisis
    5 dias atrás
    Is this a hallucination? I can't find this quote anywhere else.

    > According to browsergate, Milinda Lakkam confirmed this under oath, saying, "LinkedIn took action against users who had specific extensions installed."

    • GrinningFool
      5 dias atrás
      Huh, kind of. That's not the actual quote. Note I haven't followed the chain further back than this:

      https://browsergate.eu/the-evidence-pack/

          LinkedIn’s systems “may have taken action against LinkedIn users that happen to have [XXXXXX] installed.”
      
      
      Edit: nice! I just notice indent-formatted text is now wrapping on mobile browsers. (Or at least ffm.) I wonder how long that's been fixed...
      • Lerc
        5 dias atrás
        Saying 'I may have taken a shower' instead of 'I took a shower' makes my wife use her disapproving look.
        • GrinningFool
          5 dias atrás
          True - also when you put something in quotes I think it should be a quote.
  • lemax
    5 dias atrás
    This is fairly standard practice for device fingerprinting. LI is probably using this to protect its platform from scraping etc, and extension lists have sufficient enough entropy to help identify users and form a useful component of a fingerprint.
    • ghm2180
      5 dias atrás
      Its already pretty easy to oneshot an extension aiding scraping and LI can do nothing about it. I've seen people build and install a local chrome extension in a couple of days and have an AI inject itself into devtools and scrape pretty much any website. And that was a few months ago. I don't think there is an easy way to defend against such things anymore. Its a matter of time that defensive programming measures like this become useless.
  • maelito
    5 dias atrás
    Well, I deleted my Linkedin account and life is better now.
    • booi
      5 dias atrás
      That's big talk coming from someone who currently has a job. getting a job without a linkedin account isn't that straightforward.
      • maelito
        1 dia atrás
        I don't have a job. But yes, 80 % of people or more have a job. Please talk about their presence on Linkedin and how they force others to stay.
      • Tor3
        4 dias atrás
        None of our new hires the last few years had anything to do with Linkedin though. As for myself, I deleted my account around the time when it started to try to look like a Facebook feed.
      • traderj0e
        5 dias atrás
        I get why people without jobs need a LinkedIn, but I don't get why they post there constantly. Like reposting stuff, writing random thoughts, posting rocket ship emojis, has anyone ever gotten a job that way?
        • Eji1700
          5 dias atrás
          I've heard it makes you more visible on things like search results. Linkdin, of course, is trying to encourage interaction on their site so sounds believable that they'd do that, but i've been lucky enough to not need to care.
          • traderj0e
            5 dias atrás
            That makes sense. I'm curious if it's proven though. Guess I'm lucky to have a job and credentials, recruiters are contacting me despite 0 public LinkedIn activity.
  • gusfoo
    4 dias atrás
    In fairness, their privacy policy DOES explicitly say that they collect this information. See https://www.linkedin.com/legal/privacy-policy?ref=cms.hondas...

    > 1.5 Your Device and Location > We receive data through cookies and similar technologies When you visit or leave our Services (including some plugins and our cookies or similar technology on the sites of others), we receive the URL of both the site you came from and the one you go to and the time of your visit. We also get information about your network and device (e.g., IP address, proxy server, operating system, web browser and add-ons, device identifier and features, cookie IDs and/or ISP, or your mobile carrier). If you use our Services from a mobile device, that device will send us data about your location based on your phone settings. We will ask you to opt-in before we use GPS or other tools to identify your precise location.

    "including some plugins" being the relevant bit.

    • soraminazuki
      4 dias atrás
      That's them worming themselves out of legal responsibility and makes them look even worse.
  • Aurornis
    5 dias atrás
    This is re-posted article from the author's Substack that does a pretty bad job of explaining the situation. The second link in the article is supposed to take you to a "GitHub repository tracking the extension list" but it goes to a GitHub page for a plugin that hasn't been updated in 9 years.

    It has a lot of hallmarks of LLM writings ("It's not this, it's that" and feeling like a lot of empty words rehydrated from an outline) while missing the real updates in the story like the German affidavit filed by a LinkedIn engineer who worked on these tools.

    A key piece of information that this article omits is that the list of extensions being scanned for doesn't include anything you'd recognize or anything you'd even think to install. It's full of data extraction tools, scrapers, AI spam and recruiting tools (remember all those automated spammy LinkedIn messages you got?), and plugins masquerading as simple things that have been pulled from the extension store for violations.

    A lot of articles have been trying hard to distract from this fact by highlighting that the list of extension includes things like a plugin designed to simplify web pages for neurodivergent users or an "anti-Zionist political tagger" to imply that they're trying to do fingerprinting based on those attributes, but they neglect to mention that those plugins were pulled from the extension store most likely because they were data exfiltrators dressed up as simple plugins to get people to install them.

    An updated list is available here: https://browsergate.eu/extensions/

    But read that site carefully and actually try to click the links. In this section they're trying to direct your attention away from all of the AI spam and data extraction tools with this section:

    > The scan doesn’t just look for LinkedIn-related tools. It identifies whether you use an Islamic content filter (PordaAI — “Blur Haram objects, real-time AI for Islamic values”), whether you’ve installed an anti-Zionist political tagger (Anti-Zionist Tag), or a tool designed for neurodivergent users (simplify).

    But click the links. They've all been pulled from the store. Extensions like that are often bait to get people to install scrapers that will use your computer and LinkedIn login to extract data and send it back to their servers.

    So regardless of where you stand on probing for the presence of these scammy extensions, you should at least understand the facts rather than the story that companies like this are trying to sell you to drive traffic to their product.

    I suggest cutting through the ragebait journalism and reading more directly from a recent source, like this affidavit filed in Germany by a LinkedIn engineer familiar with the project: https://browsergate.eu/downloads/Lakam-affidavit-redacted.pd...

    • un-nf
      4 dias atrás
      Aurornis, I appreciate your comment and want to step in to defend myself.

      The LLM writing style is simply not true. I am a high-school English teacher and if my students caught me using AI to do my writing, they'd rip me to pieces.

      I included the GH link as a source of proof. While I did read the browsergate piece and ended up publishing my article as a result of, I noticed this was happening months ago because I am a developer myself and saw this very strange behavior in the LinkedIn dev console. The nature of my work is that I spend many hours sometimes staring at the dev tools to debug my JS injection, CSP rewriting, and header modification that 404 does.

      Is 404 a tool to stop this? Yes. But that's the point. The reason why this type of thing is allowed to happen, browser fingerprinting, is because the public is unaware of it, so trying to educate the public is a part of my outreach. There are almost no tools on the market that allow for browser fingerprinting protection. Mullvad and Tor are close options, but they're often met with their own levels of scrutiny just for using their tools. For example, my school blocks the Tor network from being accessed altogether. Some websites can block the Tor fingerprint.

      The original source is more technical, of course, but I was also in communication with the Browsergate team and continue to be so this is not a one-off journalist just trying to peddle his project. This has been my life for the last 2 years and I don't appreciate you discounting the work that privacy advocates do by splitting hairs and mincing my words.

      While it may not be things I would think to install, maybe they're not extensions someone with certain affiliations would think to install.

    • tadfisher
      5 dias atrás
      > But click the links. They've all been pulled from the store.

      I did that with the first five extensions in the list; only one was removed from the store. So you should qualify this statement.

      Maybe they are all scammy extensions, and maybe this is a weird LLM-driven astroturfing campaign, but let's try to at least root our arguments in a shared reality.

      • ziml77
        5 dias atrás
        You're misunderstanding what that's in reference to. It's not about all of the extensions in the list being removed. It's about the 3 that are specifically called out in the text above the list to scare people into thinking they're being profiled for things that could put them in danger.

        All 3 of those have been removed.

  • stevenicr
    5 dias atrás
    and,

    recently while trying to decipher why computer was at 98% memory and 65% cpu

    one of the culprits is https://li.protechts.net taking 2GB ram and 8% cpu.

    DDG searches say this is something for linkedin. - I had two tabs for linkedin open but left behind as I opened other tabs to research.

    So I had not reopened these tabs in over 9 hours and they are still just humming along sucking down almost 10% of cpu and a couple gigs of ram for what?

    This is firefox with ublock origin - quick searches saw malwarebytes browser guard considered it (protechts.net) malware for a bit and then took it off the list of things it blocked / warned about.

    Not sure this is related to the scan mentioned, but it may be related to the overall concerns about data and unknown usage of resources.

    I'm considering blocking this at the dns hosts level at this point.

    repost of my comment 28 days ago

    • tpurves
      5 dias atrás
      Thanks for flagging this, I was literally seeing the same thing with protechts.net in my activity tab this morning as I was trying to understand why firefox was aggressively draining my battery.
  • varenc
    5 dias atrás
    One trick to evade some of LinkedIn's detection:

    A big part of its detection relies on finding known extension resources at URLs of the form `chrome-extension://{extension_id}/{file}`

    An extension installed from the Chrome store has the same `extension_id` for every user. But, if you just extract the source for that extension, and then load it yourself, you'll get a NEW extension_id. Same extension with the same functionality, but its extension_id will be completely new so impossible for LinkedIn to query.

    Granted this won't evade the second type of detection LinkedIn employs, it'll help you evade quite a bit. I often clone extension source code anyway since it mostly protects me from malicious extension updates (by effectively disabling updates).

  • claytonn
    5 dias atrás
    Just as invasive as Akamai bot manager on every other site you visit. Akamai is so jam packed they can likely identify you from the mouse movement data alone. The LinkedIn discourse feels forced, the problem is so much worse than what you're seeing here.
  • 1vuio0pswjnm7
    4 dias atrás
    "Then, I saw the browsergate story drop on mastodon and thought "no way," lo-and-behold, there's a lawsuit in the works for it." - un-nf

    Farrell v LinkedIn Corporation 4:26-cv-02953-KAW (N.D. Cal. Apr. 6, 2026)

    https://ia601503.us.archive.org/33/items/gov.uscourts.cand.4...

  • mkw5053
    5 dias atrás
    Interesting, so would Safari prevent this? I tried moving to Safari and honestly loved everything except I use my google accounts now for authenticating with to many services and that was a pain compared to chrome.
    • NoahZuniga
      5 dias atrás
      Even better! Moving to firefox fixes this.

      Chrome for some reason (still!) gives extensions static ids. Firefox has the id change per firefox instance.

    • bigethan
      5 dias atrás
      Seems to only happen Chrome per the dev of Wipr (a great safari privacy extension) https://mas.to/@mipstian/116341745221356805
    • skeaker
      5 dias atrás
      I would imagine using any non-Chromium browser would cause it to fail to find any Chrome extensions, yes.
      • mkw5053
        5 dias atrás
        Sure, but Safari may or may not leak Safari extension signals in a similar fashion. I haven't actually investigated.
    • testfrequency
      5 dias atrás
      Well if you’re a logged in to Google don’t you just SSO everywhere?
      • mkw5053
        5 dias atrás
        I honestly kind of forget the exact annoyances because it has been some time. I want to say I had to reauth every time I wanted to SSO with my google account because it doesn't allow/deletes third party cookies.
        • traderj0e
          5 dias atrás
          Yeah it's something like this. I have multiple Google accounts and am somehow always logged into the wrong one.
  • ifh-hn
    3 dias atrás
    So if you must use LinkedIn, the answer then is to use Firefox, and create a locked down profile with ublock origin installed with webrtc disabled in advanced mode and block everything be default. Then navigate to linkedin and only whitelist the minimum scripts needed to run the site.
  • namar0x0309
    5 dias atrás
    Aside from the gross privacy invasion it specifically looks for Muslim/Islamic related extensions.

    Having a lot of connections working at Microsoft and Western tech industry, I'm not surprised with the targeting of Muslims.

    • itake
      5 dias atrás
      Muslim/Islamic extremist recruiters used Adobe's Express platform for terrorist / extremist recruitment.

      No idea if if LinkedIn has the same issue though.

  • rapnie
    5 dias atrás
    See also "LinkedIn is searching your browser extensions" (812 comments) https://news.ycombinator.com/item?id=47613981
  • jameson
    5 dias atrás
    Why doest the browser even allow it?

    Runtime of extensions should be blackbox to a website IMO

  • dctoedt
    5 dias atrás
    Seems to do this in Microsoft Edge, too.*

    * I use Edge bcs of the vertical tabs — Safari's equivalent is a poor substitute. Firefox didn't seem to have vertical tabs last time I checked.

  • cynicalsecurity
    5 dias atrás
    But how is this supposed to help against scraping? This is ridiculously ineffective against scraping. Just pretend to have a standard set of extensions and you are good to go.
  • tim333
    4 dias atrás
    It's quite the resource hog too

    > tracks 6,278 extension

    I just tried it and in 7 mins it got to 800 errors so that's like 50 minutes to do them all, using ~5% of cpu.

  • thwarted
    5 dias atrás
    > Hundreds of job search extensions are in the scan list. LinkedIn knows which of its users are quietly looking for work before they've told their employer. … Extensions tied to political content, religious practice

    Why are these even extensions to begin with? A legit job finding service can be a website, no extension required. If they are nefarious extensions that fake ad clicks or mine cryptocurrency, that they are job search, or political, or religious in name/nature only serves to get rubes to install them. This entire ecosystem is goofed up.

  • echelon
    5 dias atrás
    Can someone here please create a LinkedIn replacement for developers that

    1. Doesn't have the spam

    2. That doesn't look like it's from 2008

    3. That only developers / engineers / tech folks can join

    4. Doesn't try to log into your email to steal your contact list

    5. That doesn't track you or your extensions / browser fingerprint

    6. That doesn't have a bunch of fake "linkedinmaxxing" garbage content

    7. that doesn't have marketers and recruiters, etc.

    8. ...

    • jszymborski
      5 dias atrás
      Just type about:blank in your browser, and you'll get what you're asking for ;)
      • SpyCoder77
        5 dias atrás
        This is not going unappreciated :)
    • traderj0e
      5 dias atrás
      I thought the whole point of LinkedIn was getting a job, but that would run afoul of #7. You can ignore the rest of the crap on their website.
      • slater
        5 dias atrás
        How ever did people get jobs before recruiters? /s
        • traderj0e
          5 dias atrás
          Well, how? Recruiters got me job offers when I graduated college. I had no connections otherwise.
          • ddoolin
            5 dias atrás
            Same way they do it now. Cold applying, word of mouth/referrals, networking events, etc. Personally my first industry job in like 2012 originated from a networking mixer that I showed up to after seeing a promotional online. My unpaid internship/mentorship before that was a word of mouth from my mom asking her friend's husband which I suppose might count as a connection.
          • nicoburns
            5 dias atrás
            You search for job advertisements, and then send in an application!
            • traderj0e
              5 dias atrás
              But that application goes to a recruiter. Guess if you mean the site shouldn't have recruiters doing the cold-calling, idk maybe, but then the game is in getting the recruiters to read your application. This is different from having connections.
              • angoragoats
                5 dias atrás
                I think OP was referring to applying direct with the company doing the hiring. This is how I landed my first several jobs in tech, no recruiters involved.
                • traderj0e
                  5 dias atrás
                  Gotcha. Ok the companies themselves reached out on LinkedIn to me. It wasn't those third-party recruiters like "I recruit for Tesla, Apple, Sigma, IBM..." I ignored those emails. But it was still a recruiter within the company, not a technical manager or IC.
            • mlmonkey
              5 dias atrás
              Back in the day, CACM use to have job listings at the back. There was always DE Shaw advertising. Sending in printed CVs and cover letters was the slow and painful way to do it.
        • gerdesj
          5 dias atrás
          If you write a decent covering letter and enclose a CV (resume) and get it to my desk, I might be inclined to be interested in you.

          That's how things used to be done. Recruiters did exist but you generally got off your arse and impressed a potential employer with a well laid out CV as an invitation to call to interview.

          Nowadays it appears that people want to circumvent all that complicated effort bollocks. You simply spray yourself across some social media wankery and let's face it LinkedIn is the supreme example of wankery and some grateful employer will pick you up.

          The next time you are considering buying a record player to engage with the past in some sort of misty eyed histrionics session, why not buy a pen and paper and write a letter and impress someone with your turn of phrase? Enclose a CV (resume) for maximum effect.

          ... "Nurse ... nurse ... my dried frog pills have started dancing on my eyeballs ... nurse ... "

        • b3ing
          5 dias atrás
          Cold applying by letters or just walking in and asking for an application

          Applying to jobs posted in the newspapers

        • pimeys
          5 dias atrás
          Getting a job across the border is easier with LinkedIn...
    • kevin_thibedeau
      5 dias atrás
      Stack Exchange sort of tried to do this. It never seemed to get off the ground.
    • recursivegirth
      5 dias atrás
      IRC has existed for decades.
      • yrcyrc
        5 dias atrás
        I met some of my girlfriends through irc :)
        • 867-5309
          5 dias atrás
          ..said no IRC user, ever
      • echelon
        5 dias atrás
        And it's a ghost town.
        • antiframe
          5 dias atrás
          I suppose that depends on where you go and what you expect. Older communities are better populated than younger ones. (Not age-wise but topic-wise).
          • lacunary
            5 dias atrás
            where's a good irc chat these days?
            • antiframe
              4 dias atrás
              It depends on the time of day, but #emacs, #nethack, #archlinux, #lobsters, #security, #openbsd usually have enough users for good convos. It depends on what you are into, really.
    • zeafoamrun
      5 dias atrás
      Seriously. We need some kind of federated replacement. Who is building this?
      • WJW
        5 dias atrás
        Be the change you want to see mate.
        • reg_dunlop
          5 dias atrás
          It's odd, yeah?

          We have the ability to vibe these things over a weekend, yet getting to the critical mass/tipping point of adoption is something else.

          Whatever happened to: if you build it, they will come?

          • HWR_14
            5 dias atrás
            It only took a weekend to build a social network preAI
          • jll29
            5 dias atrás
            If you want it to happen, we should talk requirements - what would you want from a LinkedIn NextGen?

            - A professional profile page

            - Contacts

            - Introductions/referrals

            - Ask my (sub-)network?

            Anything else?

            • bix6
              5 dias atrás
              A way for you to make money that isn’t ads / harvesting my data.

              Exportable format so I can leave if needed.

              • reg_dunlop
                5 dias atrás
                It's tough to generate revenue that isn't through ads.

                That said, if the users could organize into special interest groups and create a walled-garden with default no ads, and then gate-keep advertisers to a permitted white-list.

                I dunno, I'm just spit-ballin

              • eptcyka
                5 dias atrás
                You want the unemployed to pay? Or do you want the employers to pay? If you want the employers to pay, how do you attract enough attractive unemployed to your site?
                • traderj0e
                  5 dias atrás
                  Employers pay, unemployed will go where there are places to get jobs. But this assumes employers are unsatisfied with LinkedIn somehow. Are they?
                  • reg_dunlop
                    4 dias atrás
                    Well I guess we have a possible reason why LI is still relevant.

                    This suggest then that the relevance of any solution would need to appease the employers... yet here we are trying to build/design something for employees first.

                    • traderj0e
                      4 dias atrás
                      Right, the website being annoying doesn't really matter compared to the network quality.

                      One thing I've considered, what if there were a site where you could rep trusted people anonymously? Then employers (or buyers etc) can see if there's some path from themselves to the candidate, at least to know they aren't some total rando who could be a scammer. The thing is, it's hard to obfuscate the reps if you're answering those queries, and it all falls apart once someone can prove that they gave or received rep.

                      • reg_dunlop
                        3 dias atrás
                        I really like the anonymous angle. Suspending the unspoken reality of bias and profiling by employers, the point of job postings is to fill a skill void, I think. The idea of embellishing the recommendations seems like it would require some sort of validation of the recommendation giver...so yeah, eventually there needs to be some verifiabilty.
                        • traderj0e
                          1 dia atrás
                          There is one piece of non-anonymity, you know who you're repping. The system only cares if there's a path from you to the target, so there will never be a path from you to a bot unless a real person you indirectly know reps a bot. 1000 bots can rep each other and nobody will care.
          • conductr
            5 dias atrás
            Works for baseball fields, not websites
            • sds357
              5 dias atrás
              in movies, not RL
      • somat
        5 dias atrás
        It's called "The Web"
      • johnecheck
        5 dias atrás
        sifa.id aspires to that.

        Wishing Guido (gui.do) the best.

    • WD-42
      5 dias atrás
      I feel like Github became this in the last 10-15 years.
      • traderj0e
        5 dias atrás
        Yes. But now we need a replacement for what the old GitHub used to do.
        • HoldOnAMinute
          5 dias atrás
          You need a new type of corporation.

          Only a Public Benefit Corporation will get the software to a usable state and refuse enshittification

          • traderj0e
            5 dias atrás
            Well the challenge is also gatekeeping. Gotta keep non-technical people or intentions off of it for #3
    • skeeter2020
      5 dias atrás
      what exactly do you want this for? I think HN satisfies all of these (#2 - HN has a mid 90's aesthetic)
    • not2b
      5 dias atrás
      If by some miracle someone managed to create this, and a critical mass of people somehow discovered it and used it, at some point they'd burn out, sell it, and it would turn into the same shit that we see everywhere else.
      • wizardforhire
        5 dias atrás
        Not if you organize it as a non-profit with stated purpose that explicitly address exactly that… and is run as a public service for the public good.
        • stephenhuey
          5 dias atrás
          Might have better success with a Public Benefit Corporation instead of a nonprofit. I’ve considered starting some myself.
        • stack_framer
          5 dias atrás
          Now do OpenAI...
    • Klayy
      5 dias atrás
      Maybe that's what the new Friendster should be
      • fuzzfactor
        4 dias atrás
        Friendster sounds like a great idea for a platform to take this on.

        Is there anything else making a new start right now with as well-known a name? That could make a major difference in building critical mass fast enough.

        Now Friendster is already moving in its own new direction [0], but it would still be a good portal to a separate new jobs board that only needs to start out with zero bullshit and one key thing a little bit better than Linkedin in some very important area, then gradually diverge further from there if necessary.

        No need to even try to replace Linkedin (who wants another one of those?), the only thing that a better option needs to have to become sustainable, is to be better for a few million visitors on a regular basis. Maybe way fewer would be adequate if done right, IDK.

        I don't think Friendster is going to stop short of that, so there you go.

        Plus IIRC Friendster is already paid for and owes nobody anything. If it stays that way it could turn out to be a surprising advantage. No matter how big Linkedin is I can only imagine that it is "mortgaged" up the wazoo like anything else, it's a whale like no other.

        Friendster could go into the kind of shallow water where it can thrive, and Linkedin would be effectively beached.

        [0] Very cool the way their plan for physical contact or proximity looks like it will restrict bot activity just when it's needed most, while accepting the limitation to unbridled growth that this implies.

    • seattle_spring
      5 dias atrás
      > 3. That only developers / engineers / tech folks can join

      Is at odds with

      > 6. That doesn't have a bunch of fake "linkedinmaxxing" garbage content

      Almost all of the shit-tier AI-generated AI evangelism has been from "tech folks" connections. It's all the exact same content.

    • avaer
      5 dias atrás
      How much would you pay for this?
      • traderj0e
        5 dias atrás
        Yeah that's the thing, slight fee vs more annoying site doesn't matter that much. LinkedIn got me a job. Sure I had to give a burner email for them to ddos, but so what. If I were to use another site, it'd be because that's where recruiters are, not cause it's a nicer site.

        Anyway if you magically copied the entire LinkedIn network to a clean, no-nonsense site and wanted $5/mo to be active on there during the time I'm seeking a job, I'd pay that. And it'd be more if it had better opportunities. I guess there's LinkedIn Premium, but eh not convinced on that.

    • FridgeSeal
      5 dias atrás
      LinkedIn is a cesspool, but it’s almost worthless to me without the recruiters.

      They’re basically the only reason I’m there.

      • pizzly
        5 dias atrás
        Also a lack of LinkedIn account makes you more suspicious and less likely to get hired. So this is additional value in having an account. For appearances.
        • jamesfinlayson
          5 dias atrás
          Yeah I recently heard about people working multiple jobs at once - I wasn't surprised - with work from home being a thing and many jobs at big companies being not overly strenuous, you can get away with it.

          A previous coworker had been not especially good at his job and left after two months, and a little later I went looking for his LinkedIn to see where he'd ended up. Couldn't find him but didn't give it much thought. A friend told me that he was working at a company up the street but was also working another job at the same time, and the penny dropped - you can't have LinkedIn and be working two jobs at once and reasonably expect to get away with it or get hired again.

        • Loughla
          5 dias atrás
          That really depends on the field. Only one position asked about my LinkedIn. And that was because they had you apply via the site.

          I didn't apply, because fuck that inside out.

    • jachee
      5 dias atrás
      You’re already looking at it, buddy.
      • StilesCrisis
        5 dias atrás
        This looks like it's from 2008
        • 1over137
          5 dias atrás
          and thank god too. Modern design is bloated crap.
        • traderj0e
          5 dias atrás
          Looks older than that, which is great
    • ImJasonH
      5 dias atrás
      Can you create it?
    • metalliqaz
      5 dias atrás
      Except for #2 I think you're looking for Hacker News.
      • skeeter2020
        5 dias atrás
        didn't see your comment when I said basically the same thing. #2 is good though, bc HN has a pre-2008 look
  • SpyCoder77
    5 dias atrás
    > Users who had no idea their software was being inventoried, no idea the inventory was being used against them, and no way to know it was happening because none of it appears in LinkedIn's privacy policy.

    As if users are actually reading the privacy policy...

  • flenserboy
    5 dias atrás
    Fun to have to spin up a whole VM just to use a particular website!
  • guluarte
    5 dias atrás
    I did that and got logged out of LinkedIn.
  • ghm2180
    5 dias atrás
    I use firefox with uBlock Origin's matrix turned on linked in and its cdn is explicitly black listed globally on it. I see links like ~`licdn` or some shit appear with a lot more frequency on webapps in the matrix now a days. I would recommend you all install it and block it actively.

    Its disgusting.

  • 0xAstro
    5 dias atrás
    Now the 1000s of spammy chrome web extension requests when I opened LinkedIn makes sense
  • GodelNumbering
    5 dias atrás
    I saw the following from linkedIn this morning

    > Update to our terms and data use As of November 3, 2025, we are using some of your Linkedin data to improve the content-generating Al that enhances your experience, unless you opt out in your settings. We also updated our terms. See what's new and how to manage your data.

    Frankly, it is unacceptable to tell a user "oh we have been using your personal data for 5 months already and will continue to do so unless you explicitly opt out". Are there any transparent alternatives to LinkedIn (not the trust me bro variant)?

    • sp1982
      5 dias atrás
      I am building corvi.careers, its a job search engine not social network tho
  • 0xAstro
    5 dias atrás
    now it makes sense with the 1000s of spammy not found requests to chrome extensions i was seeing on linkedin and had claude code debug.
  • cromka
    5 dias atrás
    Call me crazy but both Google and MS started doing weird things like that since about the dinner at Trump. Did you know that Google Chrome now happily asks you to store your ID/Passport information on top of all the information they offered to store for the last 10 years or so? Why now? Why this crazy "enhanced" feature? (https://blog.google/products-and-platforms/products/chrome/e...)

    I am far from conspiracy theorist but, god damn, if you take a few steps back from all the current madness and look at what's happening from a perspective, then YES, they're collecting all that data and it up to specific people and their IDs. I don't even want to guess how deep are Palantir and AI chat in this.

    • estimator7292
      5 dias atrás
      This is complete and utter conspiracy nonsense.

      This kind of tracking has been going on for decades

  • un-nf
    5 dias atrás
    [flagged]
    • tomhow
      5 dias atrás
      This is a good example of why post summaries are considered off-topic on HN. If it becomes the top comment (which it often does if people agree with it or are riled up by it) they'll reply to the summary rather than posting their replies as root comments to the main thread, creating a split between replies to the top comment and root replies.

      Also, please don't use a title for the HN submission that's different from the title of the original post. The guidelines are specific about this.

    • Lerc
      5 dias atrás
      Can you confirm that the title is correct and that it encrypts rather than hashes?

      Both are concerns, but sending interpretable data is a more serious concern.

      I scanned through the article and did not see an example of the header it added.

      • stingraycharles
        5 dias atrás
        It says RSA public key encryption in the article, so I’m going to assume that it’s not a typo.
    • kyleee
      5 dias atrás
      And certainly fingerprint you right?
      • flomo
        5 dias atrás
        Probably mostly for abuse prevention. Lots of extensions like this one:

        https://addons.mozilla.org/en-US/firefox/addon/linkedin-data...

        • hirako2000
          5 dias atrás
          The "abuse" is that one doesn't have to copy paste for hours.
      • WJW
        5 dias atrás
        I guess that's what they're hoping for. With my admittedly biased opinion of the average linkedin user, about 99% will have the default set of extensions installed and so will not be very useful. Those users might have other identifiers of course, so who knows.
        • jwpapi
          5 dias atrás
          I’m pretty sure it’s not 99% you would wonder how many differences there are along with user-agent resolution and ip range...

          I think 99% are identifiable

          • flomo
            5 dias atrás
            Ideally about 99% of LinkedIn users are using their professional name, occupation, and location.
        • RobRivera
          5 dias atrás
          Oh man time to see if there is a chrome Bonzai Buddy extension
    • phantomathkg
      5 dias atrás
      can, but how? Have you verify all 6278 and what they do?
      • cromka
        5 dias atrás
        sounds like you haven't heard of fingerprinting yet and how specific it is
        • yunwal
          5 dias atrás
          Reversible encryption wouldn’t be required for fingerprinting. They’re doing something even more sinister here.
  • gedy
    5 dias atrás
    LinkedIn without the news/post feed would be fine
    • ricardonunez
      5 dias atrás
      There’s an extension called News Feed Eradicator that does that for you.
      • mcintyre1994
        5 dias atrás
        Wonder if it’s on their list of extensions to spy on!
        • selcuka
          5 dias atrás
          We should be good if the Eradicator extension eradicates the script that scans for extensions.
    • em-bee
      5 dias atrás
      i just don't open the main page with the feed. i practically don't notice it's there. i have the messages view open, and i check notifications. i also don't follow anyone (except my contacts)
    • bluedino
      5 dias atrás
      And the useless notifications
      • seattle_spring
        5 dias atrás
        Having a notification that just shows me an ad for "LinkedIn premium" should be a crime.
  • theturtle
    5 dias atrás
    [dead]
  • pino83
    5 dias atrás
    [flagged]
    • Severian
      5 dias atrás
      What's the reason you asked this question? I mean, yeah, you could have stayed silent, and nowadays everyone assumes that pointing out obvious things in a condescending tone is kind of insightful, just because you used enough ellipses.

      Back then we all knew: vague rhetorical questions aren't arguments.

      Technically, it's not a big surprise at all that someone would restate "you are the product" like it's a revelation. There is nothing novel at all.

      And non-technically, yeah, as you said... You tried to weather a paragraph of empty meaning. You know that this comment says absolutely nothing actionable. You've known since word one. Nobody can actually be stupid enough to not instantly see that. It's impossible to not understand it.

      Your strategy so far was to just scold. Who of you has expected a productive outcome, given this "mediocre" contribution, to say it veeeeeery friendly?

      • pino83
        5 dias atrás
        On the one hand, this really sounds frustrated, and I know why you are (bcs we both know that I'm right).

        But beyond that unhappy story, your comment actually made me smile. Linguistically, let's say. And there is no sarcasm at all. It was funny to read!!

    • QuantumNomad_
      5 dias atrás
      > What's the actual problem? I mean, yeah, time passed by... And nowadays everyone assumes that all these services are kind of fine, just because time passed by.

      I didn’t make an account on LinkedIn before, and I never will in the future either.

      Hopefully, continuing to point out shady practices from sites will help more people stay away from them too as time goes on.

      • pino83
        5 dias atrás
        You see here how smart they are. And here you definitely read from the smarter one, compared to some average John Doe.

        So, no, there is no chance. Whenever you think "this might now finally help to make enough people understand", they'll quickly prove the opposite.

    • downrightmike
      5 dias atrás
      "What's the actual problem? I mean, yeah, time passed by... And nowadays everyone assumes that all these services are kind of fine, just because time passed by."

      no no no no no no no, These sites go on the blacklist.

      • pino83
        5 dias atrás
        Either it was there since day 1, together with Facebook and some others, or your blacklist is a pointless show.

        What nobody started discussing so far: Every user actively pushed these shady sites. They are/were all active parts of the problem. And usually they somehow knew it. They'll come with lame excuses, as if the issue ever was a technical one, and too difficult to get, but in fact, no, things cannot be more obvious. To everyone who ever got in touch with other human beings. It never was a tech problem.

        I'm excited when this discussion will start. But we are far away from it yet.

  • kmeisthax
    5 dias atrás
    Wasn't this specifically some lame-ass attempt to combat some click fraud or something these extensions were doing? And aren't these articles specifically coming from the person doing the fraud (which is why they know about the extension scanning)?

    To be clear, LinkedIn shouldn't be scanning your browser extensions, but still. The ultimate problem is that browser extensions are a powerful malware vector and there's a huge market of people buying little utilities off of solo developers to enshittify them.

    • dnnddidiej
      5 dias atrás
      > LinkedIn shouldn't be scanning your browser extensions.

      Correct

      Yes there are other problems in the world and we can JAQ the messanger too.

    • cxr
      5 dias atrás
      > Wasn't this specifically some lame-ass attempt to combat some click fraud or something these extensions were doing?

      No. That you believed that was just an unfortunate consequence of HN's kneejerk tendency to upvote middlebrow dismissals to the top comment, which resulted in people rushing to craft apologetics for what is in reality bonafide scumminess on LinkedIn's part, which itself resulted in confabulations like the claim that, "It was all extensions related to spamming and scraping LinkedIn last time this was posted"—which is simply untrue.

  • charcircuit
    5 dias atrás
    This is pure speculation. It is a million times more likely that this data is strictly used to combat scraping and fraud.
    • mr_toad
      5 dias atrás
      You saw speculation, and you raised with speculation and hyperbole!