logoalt Hacker News

lemaxyesterday at 11:34 PM0 repliesview on HN

This is fairly standard practice for device fingerprinting. LI is probably using this to protect its platform from scraping etc, and extension lists have sufficient enough entropy to help identify users and form a useful component of a fingerprint.