# 🦊 Daily Idea — 2026-04-04
Project: ExtShield One-liner: Detects and blocks websites that secretly scan your browser extensions Score: Hook 5/5 | Loop 3/5 | Money 3/5 | Spread 5/5 | Feasibility 4/5 | Total: 20/25
Target Audience
Privacy-conscious professionals, developers, and LinkedIn users — the ~405 million people who just learned their extensions are being scanned without consent. Secondary: anyone who’s ever installed a browser extension and values their privacy.
Why Now
The LinkedIn BrowserGate scandal broke on April 3rd, 2026 — literally yesterday. LinkedIn was caught running hidden JavaScript that scans for 6,000+ browser extensions, harvesting data that reveals religious beliefs, political views, health conditions, and job-seeking activity. The internet is on fire. Security researchers, privacy advocates, and normal users are all asking the same question: “How do I protect myself?”
There is no consumer-grade answer. The enterprise tools (LayerX, Koi Security) cost thousands. Privacy extensions like uBlock and Privacy Badger don’t cover this specific attack vector. Anti-detect browsers are overkill. The market gap is screaming.
The Hook
“Is LinkedIn spying on your extensions? Find out in 10 seconds.”
Install ExtShield → instantly see a real-time feed of which websites are trying to detect your extensions. The first scan of LinkedIn will light up like a Christmas tree. Screenshot-worthy. Shareable. Outrage-amplifying.
Landing page leads with: “LinkedIn scanned 6,000 extensions without telling you. Here’s the extension that catches them in the act.”
The Loop
- Passive protection: Runs in the background, alerts you when any site attempts extension fingerprinting
- Weekly privacy report: “This week, 14 websites tried to scan your extensions. 3 were blocked.” Delivered as a browser notification or email digest
- Shield Score™: A per-site privacy rating (A-F) that shows how aggressively each site fingerprints — gamifies privacy awareness
- Community watchlist: Crowdsourced database of sites caught scanning — users feel like they’re contributing to something bigger
The Money
Freemium model:
- Free tier: Detect & alert when sites scan your extensions. See which sites are scanning. Basic weekly report.
- Pro tier ($3.99/mo or $29.99/yr): Block/spoof extension detection (sites see nothing), detailed analytics dashboard, export reports, priority community watchlist submissions, custom alert rules
- One-time purchase option: $14.99 lifetime access (for the anti-subscription crowd — common in extension markets)
Revenue math:
- Chrome Web Store + Firefox Add-ons + Edge Add-ons
- Target 50K installs month 1 (riding the BrowserGate wave)
- 3% conversion to Pro = 1,500 paying users
- Average $4/mo = $6,000/month recurring or mix of subscriptions + lifetime = ~$4,000-8,000/month
The Spread
This is the strongest dimension. BrowserGate is a viral moment and ExtShield is the actionable response.
- Screenshot virality: ExtShield’s real-time detection feed on LinkedIn.com → instant shareable screenshot for Twitter/X, Reddit, HN
- Outrage amplifier: Every time a new site is caught scanning, it becomes a news story. ExtShield becomes the tool journalists and researchers use to verify claims
- “I protected myself” social proof: Badge/share button — “I blocked 47 extension scans this week with ExtShield”
- HackerNews / Reddit launch: Post as “Show HN: I built ExtShield after the LinkedIn BrowserGate scandal” — guaranteed front page given current outrage
- Referral mechanic: Share ExtShield with 3 friends → unlock Pro for 1 month free
- PR angle: Pitch to cybersecurity journalists who are covering BrowserGate (Bleeping Computer, CyberNews, Ars Technica) — “here’s the tool that lets anyone verify the scanning”
Tech Stack
- Browser extension: TypeScript + Manifest V3 (Chrome, Firefox, Edge)
- Content script: Intercepts and monitors
fetch/XMLHttpRequestcalls + MutationObserver for DOM-based extension detection attempts - Detection engine: Pattern-match against known extension fingerprinting techniques (resource probing via
chrome-extension://URLs, timing attacks, DOM injection scanning) - Background service worker: Aggregates detection events, manages alerts, syncs with backend
- Backend API (optional, for Pro features): Node.js + TypeScript, PostgreSQL, deployed on Coolify
- Landing page: Next.js or Astro, fast and SEO-optimized
- Community watchlist: Simple API endpoint, crowdsourced submissions with upvote/verify
Launch Plan (First 48h)
Hour 0-6: Pre-launch
- Submit to Chrome Web Store and Firefox Add-ons (review takes ~24-48h, so start early)
- Build landing page with email capture
- Write the “Show HN” post draft
- Prepare Twitter/X thread explaining BrowserGate + ExtShield
Hour 6-24: Soft launch
- Post on Twitter/X tagging security researchers who covered BrowserGate
- Share in privacy-focused subreddits (r/privacy, r/chrome_extensions, r/cybersecurity)
- Email security journalists at Bleeping Computer, CyberNews, Ars Technica — position as a “verification tool” not just a product
- Submit to ProductHunt (schedule for next business day)
Hour 24-48: Amplify
- Post “Show HN: I built ExtShield after LinkedIn’s BrowserGate” on HackerNews
- ProductHunt launch
- Respond to every comment, every tweet — build trust fast
- Share detection results from major websites (LinkedIn, Facebook, etc.) as content
Revenue Estimate
- Week 1: $200-500 (early adopters, lifetime purchases)
- Month 1: $2,000-6,000 (riding the BrowserGate wave, first Pro conversions)
- Month 3: $4,000-10,000/mo (if community grows and new scanning scandals emerge)
Why This Will Work
Fear + agency = purchase. BrowserGate created the fear. ExtShield provides the agency. This is textbook loss aversion — people just learned they’ve already been scanned and they want to prevent it from happening again. The free tier removes friction (try it, see your own data, get scared, upgrade to block it).
The timing is everything. Privacy scandals have a ~2 week intense window. By launching within days of BrowserGate, ExtShield becomes the default tool associated with this event. It’s the “Have I Been Pwned” of extension fingerprinting — the tool everyone links to when the topic comes up.
The screenshot virality mechanic is key. When someone installs ExtShield and sees LinkedIn scanning 47 extensions in real-time, they WILL screenshot it and share it. Each share is a free ad.
Risk & Mitigation
- Chrome Web Store review delays: Mitigate by also distributing via direct download (.crx sideload) and Firefox Add-ons (faster review). Apply for review early.
- BrowserGate hype fades before launch: Speed is critical. MVP must ship within 3-4 days. Cut Pro features for v1 if needed — detection + alerts only is enough.
- LinkedIn/sites change their scanning method: Extension fingerprinting techniques are well-documented and limited in variety. Build detection for all known methods, update patterns via remote config.
- Low conversion to paid: Lifetime purchase option catches people who won’t subscribe. Consider also accepting Telegram Stars payment for tech-savvy audience.
- Technical arms race: Sites may try to evade detection. This actually HELPS — each evasion attempt becomes a news story and drives more installs. “LinkedIn changed their code to evade ExtShield — here’s how we caught them again.”