Browsergate just dropped a bomb: LinkedIn is actively scanning your installed browser extensions. Hacker News is losing its mind over this privacy nightmare.

You usually log into LinkedIn to endorse your buddy for "HTML" or flex your new "Senior Promoted Dev" title, right? Well, heads up, because the world's most "professional" networking site was just caught red-handed peeking into your browser extensions. Big Tech at its finest!
A site called browsergate.eu just dropped a massive truth bomb on Hacker News, racking up over 1500 points. The TL;DR for you lazy scrollers: LinkedIn is actively running client-side Javascript to scan and sniff out which browser extensions you have installed on your local machine.
How are they doing this? Absolute dark magic and brute force. They use scripts to blindly probe known extension IDs, seeing what responds. It's essentially digital fingerprinting on steroids. While Microsoft/LinkedIn hasn't explicitly admitted why, any dev with half a brain knows the score: they're hunting down data scrapers, auto-connect bots, and probably checking if you're using ad blockers that mess with their revenue stream. You look for jobs, they look for your data. Fair trade, right?
Once this hit the front page, the tech community immediately split into the usual warring factions:
Let's be real—expecting privacy from Big Tech is like expecting a Jr. Dev to not break production on a Friday afternoon.
The biggest takeaway here is environment isolation. Stop using a single monolithic browser profile for everything. Don't mix your sketchy crypto or scraping extensions with the profile you use to talk to recruiters. If you're building bots or scraping heavily, don't run that junk on your main local machine. Spin up a cloud vps and do your dirty work there, completely isolated from your digital footprint.
Keep your work profile clean, or risk getting your "Open to work" account shadow-banned by some overly aggressive LinkedIn algorithm.
Sources for the drama: