11 Jan 2013
This ‘hack’ will come in handy if you really need to know who your Semi-Anonymous Browser is. It’s a simple technique that in essence tracks the apparently random list of 10 Candidates presented in the Semi-Anonymous Browser (SABs) field. It’s clever and works fairly well and I therefore wanted to share it with you. It’s likely that as more people use this hack and discuss the use of it, LinkedIn HQ may change their algorithm to close the exploit, so use it while you can!
Your Semi-Anonymous Browser is “Someone in/at [X Company/Organization/Field] in [Y Country]. Or it could be “Vice President at [X Company]. These folks have decided to remain partially hidden when browsing other people on LinkedIn. Personally, anything that makes it harder to make a connection on a professional networking site is not generally a good strategy in my book but I concede that there are some good reasons why remaining Semi-Anonymous on LinkedIn is useful and perhaps necessary (i.e a journalist protecting their sources). Btw – if you’re not aware that you are Semi-Anonymous, please check your visibility settings. You could be missing out.
You can find Semi-Anonymous Browsers in the “WHO’S VIEWED YOUR PROFILE” section in your sidebar of your Profile section.
Here are the steps you need to take to try this hack:
- Click on your Semi-Anonymous Browser (SAB).
- Take a Screenshot of the 10 SAB Candidates that are presented.
- Wait 24 Hours and take a 2nd Screenshot of those 10 SAB Candidates.
- Compare 1st & 2nd Screenshots. If one person in the SAB view shows up in both lists….
- The persistent person is your actual browser, unmasked. I’ve marked mine in red in the following 3 examples.
Example #2 “Program Manager at Johnson Controls”
Example #3 “Vice President at JPMorgan Chase”
Interestingly, I noticed that LinkedIn refers to these SAB candidates as “Red Herrings” – see the url identifier:
Pretty cool, right? What should you do with this information? Why not reach out to the person you unmasked and ask them if you can help? They will doubtless be very surprised that you found them, perhaps even impressed! You could share this technique with them, or not. You are now in a stronger position with more options/opportunities than you had prior to knowing about this hack. Another strategy is not to bother with the hack at all and simply ‘browse back’ all of the first 10 Candidates, regardless. Doing this makes it look like you’ve identified your SAB, when you have not. It could open doors and does not take much of your time. The down-side to this scattergun approach, of course, is that you are reliant on the other person to make the next move. The side-side of this approach: 9 people that had absolutely no prior contact with you are now wondering who the heck you are and why you just browsed them!
One final point. This tool is not perfect. Though I found 3 great examples for you above, my testing revealed that this technique only worked some of the time. Of the 10 SABs I tested this week, 7 wouldn’t ‘wash’ completely through with new Candidates no matter how many times I checked. So please bear that in mind. See my earlier post on intelli-guessing SABs here, where I show you how to make an intelligent guess on identifying SABs by cold, hard logic. Do take a look at that post and use that technique in conjunction with this hack for best results.
That’s all from me this week. As always – thanks very much for stopping by and reading. If you found this article thought-provoking, interesting or dare I say, useful. Please go ahead and share it with someone using that sliding share thingy on the left.
Warm regards from Chicago.