BTI-CACTIVEIdentity
C14BEHAVIORAL

Identity Resolution

The Mechanisms of Taking

THE TAKE

They take your anonymous visitors and sell them as leads to your competitors.

//TECHNICAL_DESCRIPTION

Resolving anonymous visitors to known identities without consent. Your CAC, their revenue. IP-to-company mapping, email hash matching, and cross-device graph lookups convert your anonymous traffic into identified leads that enter data broker networks accessible to competitors.

//REVENUE_IMPACT

What It Costs You

CAC Subsidization

Visitor data captured on a site can flow into data broker networks and identity graphs, eventually surfacing in competitor prospecting tools. The original company paid to acquire the traffic; competitors pay pennies to intercept the lead.

Signal Corruption

Overlapping tracking mechanisms corrupt attribution data. Multiple sources claim credit for single conversions. Pipeline metrics diverge from reality. Marketing decisions get made on numbers that can’t be trusted.

Legal Tail Risk

Pre-consent data collection, undisclosed data sharing, and consent signal violations create regulatory exposure. Class actions and regulatory fines can exceed entire annual marketing budgets. Liability sits with the site owner, not the vendor.

//RELATED_ADVISORIES

Related Advisories

No published advisories reference this code yet.

Investigations are ongoing.

Blackout uses security frameworks to protect AGAINST vendors, not FOR them. We do not notify vendors. We do not provide remediation windows. If you're using a vendor flagged by this code, the advisory is your evidence.