6 minute read

Channel
Figure 1. ASE Inc, DALL-E Hacker Dad vs. Cog Dad…​

 

I’d like to share a daring experiment on LinkedIn with you. I hope that you will find this read both insightful and humorous. Here is some information on how LinkedIn works as a community and a platform. So, this is for people who care about LinkedIn in their lives.

Importantly, I only publish on my own GitHub blog these days. But I will make this article available in full on LinkedIn — for obvious reasons.

Lead-in to LinkedIn

This story begins years ago, sometime at the end of 2021. Meet Joe Random Hacker, a friend of mine and another founder who specializes in computer security — i.e, he threatens laggards for a living. This was in the wake of the first massive LinkedIn data leak of some 700 million user profiles to the public. Joe and I were visiting at the Northern, one of the oldest hacker cliques in Quebec, Canada. People were complaining about the "uselessness" of LinkedIn to their business endeavors. And it’s true: all of these folks are founders, and practically none of them got any business from LinkedIn — including yours truly. To myself and my closest friends, the platform was completely inconsequential. And then Joe brings up an idea to run an experiment and figure out how LinkedIn really works — and what it’s good for. You see, there are two things that are constant about hackers:

  1. Ruthlessly separate that which matters from that which doesn’t.

  2. Relentlessly experiment, test, probe, and iterate — get to the bottom of it.

We tug on things, and that’s how we move the world forward.

By that time, everyone had the data. A cracker named toorgib (marketing handle God User) was trying to sell it on Tor — incompetently, I may add. And a Russian cracker group in Budapest kept tugging on LinkedIn for more and more PII — rather successfully. The company was owned by the most incompetent corporation in the world, practically the definition of a "security vulnerability." Instead of trying to patch poor API design, everything was swept under the rug, and everyone still yapping got gagged with a wad of cash. This created a safe haven for experimentation on the Tor data drops and an insatiable market for LinkedIn user data. Of course, LinkedIn was the talk of the floor at the Northern. Best of all — none of this was illegal.

You see, crackers are criminals, and hackers never stoop down to their level — that’s taboo and an instant exclusion. Hackers are opportunists, not criminals, and there’s a thin line between the two. Thus, everyone was very careful to not talk about this in public outside of the clique. Though legal, morally this experimentation may still be on shaky ground.

First things first — hardcore analytics on the static data. Someone you may know of provided an MLOps platform and initial models for classification discovery. The AI platform chose a classification schema based on the personality traits of the users. And this is the value I can share with you today.

Note that I write hacker-culture-specific terms in parentheses, like so (crackers, hackers, muggles, etc.) And The Jargon File is available at CatB over http for your perusal.

People who Don’t Matter on LinkedIn

The Wizard (hackers)

Behavior: Posts deeply insightful, countercultural takes, but rarely performs for engagement.
Tactic: Truth over optics, pushes people to think.
Typical goal: Authentic reach, maybe influence — but hates the game.
Subtypes: Indie hackers, ethical coaches, polymaths.

This is yours truly and the bulk of the Northern community.

The Lurker (random)

Behavior: Never posts, occasionally likes, reads everything.
Tactic: Pure consumption. May still be high-value (execs, real clients).
Typical goal: Private intel or hiring info.

Some of the most respected founders we know fall into this category.

The Corporate Zombie (muggle)

Behavior: Automated job title updates, anniversary posts, or weirdly formal jargon.
Tactic: Nothing. Just drifting.
Typical goal: None. They’re trapped.

People who Thrive on LinkedIn

The Sycophant (suits)

Behavior: Constant praise, reacts to trends with empty "Love this!" or "So inspiring!"
Tactic: Upvotes their way into visibility, often tagging influencers for proximity exposure.
Typical goal: Get noticed by recruiters, not clients.
Subtypes: Corporate ladder climbers, HR cosplayers.

The Hustler (posers)

Behavior: "10x this, $0 to $1M that," posts daily wins, offers vague consulting, growth hacks, or "success playbooks."
Tactic: Performative success to capture leads.
Typical goal: Sell digital products or coaching.
Subtypes: SaaS growth bros, lost solopreneurs, startup flippers, personal coaches.

The Content Farmer (freaks)

Behavior: Reposts news or tweets with no added value, or uses AI-generated "wisdom."
Tactic: Volume over depth. Bots help boost early impressions.
Typical goal: Audience building for newsletter/Substack/course pipeline.

The Ninja/Recruiter (leechers)

Behavior: Slides into DMs with roles that don’t match your skill set.
Tactic: Spray and pray.
Typical goal: Commission. We’re a commodity to them.

The Troll/Contrarian (trolls)

Behavior: Comments to argue, "Well actually …​" experts, LinkedIn edgelords.
Tactic: Provocation, confrontational, or evocative for attention.
Typical goal: Visibility. Real value never understood by us or AI.

Analytics model offered a couple dozen more classifications, but that’s not important to our story. I also checked with several modern chat bots before writing: this short list is good enough for us.

The Experiment

The real experiment began in 2024, and there were only four of us. I carefully offered a part to a fifth person — a hacker friend who worked in recruiting for years, so he would have had a better perspective. But he’d not touch this with a long pole. So we set off with only four categories.

  • suit: (1) The Sycophant — Joe: Scenario Set 1

  • poser: (2) The Hustler — John: Scenario Set 2

  • freak: (3) The Content Farmer — David: Scenario Set 3

  • leech: (4) The Ninja/Recruiter — MISSING

  • zero: (5) The Wizard — Yours Truly: CONTROL SET 1

Now we need a few words about our hacker friends. Joe, the one you already met, is a bit of a natural troll with about 2,000 connections. John is a founder from the Midwest and is naturally a random with 300 connections. David is a founder from Prague and is naturally a muggle with 1,000 connections. leech never joined. And yours truly was naturally a random, working up to muggle, with 500 connections.

What’s the Big Idea?

All of the hackers wanted to get rid of their LinkedIn accounts. Not because it’s a point of disrespect between founders — though it may be — but because there was simply no use for it. And I wanted to keep mine, because I coach engineering competence for Corporate America and actually need LinkedIn presence, even at a Lurker level. That’s how I ended up with the zero job.

We would aggressively work up to our designated personality type and use our shared ML analytics model to assess our progress relative to the LinkedIn community baseline. That baseline, of course, comes from the ongoing scrape available for free in the Prague Zero community (not to be confused with my role). From this collective experience, we could then publish a study at the Northern on the practical use of LinkedIn by hackers.

The experiment would run one year.

That should get some LOLs. Or so we thought.

The Test Fixture

zero runway

I would start publishing. And I would publish real, hardcore stories from the scene. This would still be considered baseline, because preliminary analysis showed that truthful and deep content was a negative gain on LinkedIn. I also made a few mildly controversial posts based on touchy work my MLOps platform is used on by research companies. And I posted a few more that were personal and unconvincing — simulated introspection, personal growth.

leech runway

This is the role I truly wish we had for completeness. But alas.

freak runway, the Content Farmer

David had his work cut out for him. Obviously, he didn’t want to generate a ton of lame content by hand. He also needed a final objective to keep him on track — like a course pipeline — which he chose. Quickly, LLMs and his own great coding skills came to the rescue. He published on everything from kittens to toilet lids, profusely. He gradually increased volume and frequency as he went.

poser runway, the Hustler

John was not into sales one bit. He got the short end of the stick between us. But this was good for him — he learned sales and marketing. Which he could use in his own business, should he choose to expand from µSaaS. He conjured a product he would actually build and sell — a mobile dieting app. Unlike freak, his expansion needed to follow a well-defined and focused path. Half a year went by before he got a good handle on this scenario set.

suit runway, the Sycophant

If you recall, Joe is a natural troll. Now he had to get “nice” instead of “naughty.” His challenge was personal. So, instead, Joe built an application — a serious webapp by year-end. It used the LinkedIn API to post automatically for him. He monitored results via a GCP-hosted dashboard and adjusted accordingly. He ended up being the least engaged of us all. But he loved it — it was coding and designing, his sweet spot. Now he’s thinking of turning it into a SaaS: something like “@$$-lick-2.0.”

General Results

The outcome of this experiment was not what we expected. I’ll go over the scenarios one by one. But keep in mind — LinkedIn isn’t just a platform. It’s a living, changing, evolving community. Run this experiment again, and we may see different results.

zero runway, yours truly

My experience was …​ lame. Despite sincere effort, nothing much changed. Nobody wanted to read my hard-earned babble. Even edge posts — like simulating political behavior — only gained a few likes. Turns out, a hacker’s natural behavior doesn’t move the needle on a social platform.

freak runway, the Content Farmer

David’s follower count exploded by an order of magnitude. He received many impressions on practically everything he posted. But his engagement stayed low. He didn’t get much business for his course pipeline. It was a bust! But not because it doesn’t work — it does. What was missing: closing the funnel with a captivating call to action.

poser runway, the Hustler

John had a lot of impressions for the product. He got a few thousand customers to buy his app. But it was very little compared to what he gets from regular marketing. He was closing — unlike David — but the ROI just wasn’t there.

suit runway, the Sycophant

Joe. Oh Joe, let me tell you — sneaky rat! He refused to delete his LinkedIn in the end. He didn’t sell, pitch, or even work for it. Yet his community grew so large that a single redirect to his webinar scored a ton of money. He made real connections. Tugging on posts — even automatically — earned him “cool points” and capital. He befriended CEOs without knowing, then found out on his dashboard later.

Joe didn’t even care about our experiment. A troll and a suit rarely share a room. But somehow, it worked. One question I’ve never answered: how does he keep those friends after they figure out who he really is? But he does. At least for now.

Conclusion

This didn’t turn out to be an experiment on a social platform. It became an experiment on human nature. Now Joe walks around all smug, repeating:

 "You get more flies with honey than with crap."

But what do you think? So — what have we really learned from this experiment?

Leave a comment