Article Summary (Model: gpt-5.4)
Subject: LinkedIn extension probing
The Gist: The BrowserGate page, published by Fairlinked e.V., alleges that LinkedIn runs client-side code that probes visitors’ browsers for thousands of known extension IDs, sends the results back to LinkedIn, and combines them with users’ real identities. It argues this can reveal sensitive traits, job-seeking activity, and use of competitor or scraping tools, and claims the practice is undisclosed, unlawful under EU rules, and partly shared with third parties such as HUMAN Security and Google.
Key Claims/Facts:
- Extension detection: The page says LinkedIn checks for thousands of specific browser extensions and transmits the results to its servers.
- Sensitive and competitive signals: It claims the scan can expose special-category data, job-search tools, and use of rival sales/scraping products.
- Regulatory argument: It argues LinkedIn is evading the spirit of EU gatekeeper obligations by limiting public APIs while internally operating much broader access.
Discussion Summary (Model: gpt-5.4)
Consensus: Skeptical. Commenters broadly agree the behavior is invasive, but many think the article’s framing is exaggerated or imprecise.
Top Critiques & Pushback:
Better Alternatives / Prior Art:
Expert Context:
chrome-extension://<id>/<file>for known public extension resources, and looking for extension-injected DOM residue. That made several users view this less as a LinkedIn-only trick and more as an exposed browser capability (c47614603, c47620370).