LinkedIn scans for 6,278 extensions and encrypts the results into every request

· privacy web · Source ↗

TLDR

  • LinkedIn probes 6,278 Chrome extensions per visit, encrypts results via RSA, and injects them as HTTP headers into every subsequent API request.

Key Takeaways

  • The extension list has grown from 38 entries in 2017 to 6,278 as of April 2026; it is actively maintained and was built with automated Chrome Web Store crawling tooling.
  • Two detection systems run in parallel: a hardcoded ID list probed via fetch() to chrome-extension:// URLs, and a DOM-walking system called Spectroscopy that catches extensions not on the list.
  • Scan modes include parallel (Promise.allSettled) and sequential with configurable delays to reduce monitoring visibility; execution can be deferred to requestIdleCallback to avoid user-visible slowdown.
  • Detected extension IDs are packaged into AedEvent and SpectroscopyEvent objects, RSA-encrypted, and sent to the li/track endpoint, then injected as a header into every API call for the session.
  • None of this is disclosed in LinkedIn’s privacy policy; extensions tied to job search, political content, religious practice, disability, and neurodivergence are in the list, attached to verified professional identity.

Hacker News Comment Review

  • Commenters split on whether Chrome itself is the root problem, with one asking why Chrome allows arbitrary sites to probe extension presence at all via chrome-extension:// URLs.
  • The criminal investigation angle drew attention: the Bavarian Central Cybercrime Prosecution Office has an open case, and browsergate.eu reportedly provided the case number to the author directly.
  • A factual dispute emerged over whether a quote attributed to “Milinda Lakkam” confirming LinkedIn took enforcement action against extension users is verifiable, with at least one commenter unable to locate corroboration.

Notable Comments

  • @3dsnano: Raises the practitioner ethics question directly: when asked to implement surveillance like this at your job, do you object and risk termination, or comply?
  • @stevenicr: Reports li.protechts.net consuming 2GB RAM and 8% CPU across idle LinkedIn tabs in Firefox with uBlock Origin, suggesting persistent background activity beyond the extension scan.

Original | Discuss on HN