Three dominant themes in the discussion
| # | Theme | Key points & quotes |
|---|---|---|
| 1 | Security & privacy risk | LinkedIn’s extension‑fingerprinting is seen as a new vulnerability that should be fixed. • “This is a security vulnerability and should be patched.” – ronsor • “Should be patched nonetheless though, that’s a pretty obscene fingerprinting vector.” – jsheard |
| 2 | Technical mechanics & browser differences | How the probe works and why it behaves differently in Chrome vs Firefox. • “Firefox already mitigates this by randomizing the extension path.” – jsheard • “Chrome, these are available in a webpage via the URL chrome‑extension://[PACKAGE ID]/[PATH]” – cbsks • “Firefox randomizes the extension ID for each restart.” – tech234a |
| 3 | Scraping, data‑collection ethics, and LinkedIn’s stance | Debate over whether LinkedIn’s checks are justified, how they relate to scraping, and the broader data‑broker debate. • “LinkedIn wants you using their tools not 3rd party.” – jppope • “LinkedIn considers the data valuable… the scrapers undermine that.” – nitwit005 • “I think it was a legitimate use… we were making LinkedIn more useful to some of their actual customers.” – josephg |
These three themes capture the core concerns—security, technical implementation, and the ethical debate around LinkedIn’s extension‑fingerprinting.