Skimming the list, looks like most extensions are for scraping or automating LinkedIn usage. Not surprising as there's money to be made with LinkedIn data. Scraping was a problem when I worked there, the abuse teams built some reasonably sophisticated detection & prevention, and it was a constant battle.
cxr|24 days ago
* if LinkedIn didn't get it from an existing data source
direwolf20|24 days ago
bastawhiz|24 days ago
winddude|24 days ago
bryanrasmussen|24 days ago
cxr|24 days ago
LinkedIn's fingerprinting code, as the README explains, is found in fingerprint.js[2], which embeds a big JSON literal with the IDs of the extensions it probes for. (Sickeningly enough, this data starts about two-thirds of the way through the file* and isn't the culprit behind the bulk of its 2.15 MB size…)
* On line 34394; the one starting:
1. <https://github.com/mdp/linkedin-extension-fingerprinting/blo...>2. <https://github.com/mdp/linkedin-extension-fingerprinting/blo...>
tlogan|24 days ago
RHSman2|24 days ago
hsbauauvhabzb|24 days ago
charcircuit|24 days ago
xp84|24 days ago
dumbo23|24 days ago
[deleted]