We were only able to name one extension (the one named in the presentation), as we did not have conclusive proof that data from other extensions which we found to be suspicious ended up in the data set (as the access to incremental data was limited to a short time period):
We developed a sandboxing framework to test whether Chrome extensions send URL data to a third party using a MITM proxy, the code is available on Github:
In general, you should be careful about any extension that regularly sends data to a third party. You can check this in Chrome by opening the extensions list (chrome://extensions/), checking "Developer Mode" on the top right corner and clicking on "Inspect views: background page" of the extension. You can then open the "Network" tab and see all requests the extension makes while you surf the web.
i had to dns sinkhole requests to pixel.intenta.io that a browser extension was creating, every site site I visited was sent along in an ajax request to this domain.
So uhm, which ones are these and how did the researchers obtain the data? (Bought it?)
Edit: The answer to the second question is: social engineering.