logoalt Hacker News

rdohertyyesterday at 8:27 PM5 repliesview on HN

Skimming the list, looks like most extensions are for scraping or automating LinkedIn usage. Not surprising as there's money to be made with LinkedIn data. Scraping was a problem when I worked there, the abuse teams built some reasonably sophisticated detection & prevention, and it was a constant battle.


Replies

cxryesterday at 9:13 PM

In order to create the data source that LinkedIn's extension-fingerprinting relies on to work, someone (at LinkedIn*?) almost certainly violated the Chrome Web Store TOS—by (perversely*) scraping it.

* if LinkedIn didn't get it from an existing data source

winddudeyesterday at 9:22 PM

a problem for linkedin != "a problem". The real problem for people is the back room data brokering linkedin and others do.

bryanrasmussenyesterday at 8:38 PM

from the code doesn't look like they do anything if they have a match, they just save all the results to a csv for fingerprinting?

show 1 reply
hsbauauvhabzbyesterday at 8:30 PM

Wont someone think of poor little LinkedIn, a subsidiary of one of the largest data brokers in the world?

show 2 replies
dumbo23yesterday at 9:26 PM

[dead]