THE TAKE
They hid where your data goes after they take it.
//TECHNICAL_DESCRIPTION
Data sharing with parties not disclosed to users. The vendor's own downstream data flows include recipients not mentioned in their privacy policy or subprocessor list. Your user data reaches entities neither you nor your users consented to.
//ESCALATION_CONTEXT
How This Escalates BTI-C Findings
Transforms data collection findings (C03, C08, C16) into data laundering findings. The vendor isn't just collecting — they're distributing without disclosure.
//RELATED_ADVISORIES
Related Advisories
No published advisories reference this code yet.
Investigations are ongoing.
Blackout uses security frameworks to protect AGAINST vendors, not FOR them. We do not notify vendors. We do not provide remediation windows. If you're using a vendor flagged by this code, the advisory is your evidence.