BTI_INVENTORY
Blackout Threat Intelligence — The CVE equivalent for MarTech. Complete inventory of threat categories, published advisories, and gap analysis.
BTSS_SCORING
Severity Levels
Score Factors
THREAT_CATEGORIES
10 Categories DefinedDefeat Device
Scripts that detect auditors and modify behavior to appear compliant
Pre-Submit Capture
Form field data captured before submit button clicked
HEM Extractor
Scripts scanning browser storage for email/hash patterns
White-Label
Tracking distributed through third parties, obscuring true origin
Fourth Party
Data sent to vendors not in privacy policy
Biometrics
Mouse movements, keystroke dynamics, touch gestures
Session Replay
Full session recording (FullStory, Hotjar, etc.)
Cookie Sync
ID syncing across ad networks and data brokers
Pre-Consent
Tracking executes before consent obtained
Fingerprinting
Canvas, WebGL, audio, font enumeration
PUBLISHED_ADVISORIES
3 PublishedRB2B(Retention.com)
50+ bot detection signatures disable tracking for compliance tools while maintaining full surveillance for real users. VW Dieselgate for MarTech.
ZoomInfo
Captures email addresses from form fields before submit, including browser autofill. Identical technique to banking trojan form grabbers.
IdentityMatrix
extractHems() function scans ALL browser storage for email addresses and hashes. Cookie stealer technique repackaged as 'identity resolution.'
PENDING_ADVISORIES
Mentioned but not publishedClay
RB2B bundled invisibly to 1,500+ customers
Face2Face.io
"stalkingSessionsCount" field
Sardine.ai
Pre-consent biometrics + fingerprinting
GAP_ANALYSIS
High-priority missing advisories
| Vendor | Category | Why Priority |
|---|---|---|
| Clay | BTI-C04 | White-labels RB2B to 1,500+ customers |
| Warmly | BTI-C04 | Bundles RB2B + Vector + Koala |
| 6sense | Multiple | Major enterprise deployment |
| Clearbit | BTI-C03 | HEM extraction at scale (HubSpot-owned) |
| Bombora | BTI-C08 | Intent data syndication network |
BTI_vs_BLK
BTI (Threat Intel)
- Purpose: Offense — document what vendors are doing
- Model: CVE-style advisories
- Audience: Security teams, researchers
- Scoring: BTSS (0-10)
BLK (Controls)
- Purpose: Defense — detect if you're exposed
- Model: ISO/NIST-style controls
- Audience: GRC, legal, compliance
- Scoring: HIGH/MEDIUM/LOW
Both are needed: BTI documents WHAT vendors are doing. BLK detects IF you're exposed.