HeadlinesBriefing favicon HeadlinesBriefing.com

LinkedIn’s Hidden Extension Scan Reveals 6,278 Browser Add‑Ons

Hacker News •
×

LinkedIn has been quietly cataloguing Chrome extensions for years, starting in 2017 when its public list listed 38 entries. Today the catalog lists 6,278 extensions, maintained by automated tooling that crawls the Chrome Web Store, parses manifests, and records probe targets. The data surface appears every time a user visits LinkedIn in Chrome, flooding the console with errors that reveal the scan.

LinkedIn claims the scans help combat fraud and improve user experience, but the practice links a verified professional profile to a detailed software inventory. Every missing or present extension becomes a data point that can signal job‑search activity, political views, or disability accommodations—information that LinkedIn can aggregate across employees to map corporate tool usage without consent for strategic insights and recruitment.

LinkedIn does not disclose the scan in its privacy policy, nor does it ask for explicit consent. The practice expands beyond fraud prevention into a broader fingerprinting ecosystem where LinkedIn can merge its data with third‑party behavioral sets, turning a single login into a cross‑site profile that tracks browsing habits, device traits, and even local IP addresses across the network today.