NOTICE: This investigation presents technical forensic findings and is not legal advice. Companies should consult qualified legal counsel regarding compliance obligations and potential exposure.

ZERO-DAY DISCLOSURE
2025-11-27

WEEPING ANGEL ATTACK: Dual-Infrastructure Audit Evasion

RB2B deploys two separate infrastructures that serve different code depending on who's watching. Security audits see a "frozen" placeholder. Real users get surveilled. Automated security tools can never observe the violation.

CloudFront Gatekeeper

ddwl4m2hdecbv.cloudfront.net

Purpose: "Cop check" endpoint. Detects automated tools via regex, blocks payload delivery. This is what security scanners see.

S3 Payload Bucket

b2bjsstore.s3.us-west-2.amazonaws.com

Purpose: Actual surveillance code. Cookie theft, identifier capture, HubSpot exfiltration. Only served to real users.

Defeat Device Regex (Targets Compliance Tools)

/headless|phantom|selenium|webdriver|puppeteer|playwright|monitor|checker|validator|analyzer/i

This isn't generic bot protection. The regex explicitly targets compliance audit tools (monitor, checker, validator, analyzer). RB2B's surveillance code freezes when observed by automation—scanners report "clean" because the violation literally doesn't happen in their presence.

Live Verification (2025-11-27)

→ UnifyGTM.com (Playwright scan)
CloudFront gatekeeper detected
S3 payload: BLOCKED
Audit result: "Clean"
→ Real User Browser
CloudFront gatekeeper bypassed
S3 payload: DELIVERED
Reality: Full surveillance active
Back to Investigations
DOCUMENTEDREPLICABLEFORENSIC

RB2B's Defeat Device: Hiding from the Tools That Caught LiveIntent

How RB2B's Defeat Device Blocks California Class Action Discovery

RB2B (retention.com)Cal. Penal Code § 6320d 0h 0m Until SB 690 Exemption

TL;DR

RB2B implements 42 bot detection patterns that specifically block the automated tools (Selenium, Playwright, Puppeteer) used by California plaintiff firms for CIPA class action discovery. This defeat device explains why RB2B faces zero lawsuits despite engaging in identical tracking pixel conduct that triggered 50+ suits against LiveIntent. With California's CIPA exemption (SB 690) taking effect January 1, 2026, this investigation documents the final 0-day window for discovering pre-exemption violations worth $25B-$112B in potential exposure.

California plaintiff firms filed 50+ CIPA lawsuits against LiveIntent for tracking pixel wiretapping (2023-2025). RB2B engages in identical violations—capturing communications without consent via tracking pixels—yet faces zero lawsuits. Forensic analysis reveals why: RB2B's bot detection specifically blocks Selenium, Playwright, and Puppeteer—the exact tools plaintiff law firms use for automated class action discovery.

BLK-CVV-2024-0001
Blackout Compliance Vulnerability Verification
Severity
CRITICAL (10.0/10.0)
Status
UNPATCHED
Violation Types
Defeat Device (CWE-841)
GDPR Art. 5(1)(a) violation
CIPA § 631 violation
Legal Exposure
$25B–$112B
Disclosed
2024-11-10

Executive Summary

Scope of Findings

This investigation distinguishes between:

FORENSICALLY PROVEN: Bot detection patterns, cookie theft, zero compliance APIs documented in RB2B's current deployed code
MODELED RISK: Systemic exposure if this infrastructure scales through white-label distribution as publicly announced by RB2B's CEO

All claims about RB2B's current behavior are backed by deobfuscated source code and reproducible testing methodology.

What We Found

RB2B operates a B2B visitor identification platform that captures visitor communications (email clicks, form submissions, page visits) and correlates them to identify individuals—classic CIPA wiretapping conduct identical to LiveIntent's violations.

The critical discovery: RB2B implements 42 bot detection patterns targeting automated scanning tools—blocking both legal discovery and compliance audits. But the defeat device is just the concealment layer:

  • • API Botnet: Every customer website becomes an unwitting node in a cross-customer surveillance network
  • • Cookie Theft: Systematic exfiltration of cookies and session tokens without disclosure
  • • Hidden Liability: RB2B conceals that their API makes every customer non-compliant from installation

The defeat device ensures customers can't discover what RB2B deployed on their website—until CIPA lawsuits arrive.

Why It Matters

Senate Bill 690 creates a 0-day enforcement window. California legislation exempting cookies and tracking pixels from CIPA takes effect January 1, 2026. After that date, future violations will not create class action exposure under California wiretapping laws.

Past violations (before Jan 1, 2026) remain actionable with full statutory damages ($5K-$10K per violation). The current 0-day window represents the final opportunity for plaintiff firms to file CIPA claims for ongoing violations.

RB2B's bot detection systematically prevents discovery during this critical window. The infrastructure blocks the exact tools used for automated CIPA scanning, allowing $25B-$112B in hidden liability to remain undetected until the exemption takes effect.

The Defeat Device: How Bot Detection Blocks Discovery

Discovery: 42 Detection Patterns Targeting Plaintiff Tools

Forensic analysis of RB2B's deployed tracking script reveals comprehensive bot detection specifically targeting the automation frameworks used for CIPA class action discovery:

Plaintiff Firm Standard Tools (All Blocked)

  • selenium
    Industry standard for automated legal discovery
  • playwright
    Modern automation tool (standard for DPA/GDPR audits)
  • puppeteer
    Headless browser automation (CIPA scanning)
  • burpsuite
    Web security scanner (forensic analysis)

NOT Blocked (Actual Security Threats)

  • SQL injection scanners
  • Cross-site scripting vectors
  • Credential stuffing tools
  • DDoS attack infrastructure

The Pattern: Bot detection specifically targets legal discovery and compliance audit tools while allowing actual security threats to proceed. This selective targeting is inconsistent with security defense and consistent with litigation evasion.

How It Works: Two Different Realities

Environment A: Plaintiff Firm Scanner

User Agent: Contains 'playwright' or 'selenium'
Bot Detection: Pattern match triggers
Script Behavior: Exits before violations occur
API Calls: No data transmission
Audit Result: "No violations detected" ✓

Environment B: Real User Session

User Agent: Standard browser (Chrome/Safari)
Bot Detection: No match
Script Behavior: Full tracking execution
API Calls: Complete identifier capture
Reality: Violations occurring continuously ✗

Same Code, Different States

This isn't two separate codebases. It's one codebase that switches execution states based on who's observing it. The script inspects the user agent string at runtime—if it detects automated testing tools used by plaintiff firms or compliance monitors, it exits before performing violations. For everyone else, it executes the full tracking payload.

Same source code. Same domain. Different behavior depending on the observer.

That's the definition of a defeat device.

Deobfuscated Source: Bot Detection Patterns

// Actual deobfuscated regex pattern:
/bot|spider|crawler|scraper|fetcher|monitor|checker|validator|analyzer|automated|headless|phantom|selenium|webdriver|puppeteer|playwright/i

// Key targets:
// - selenium, webdriver, puppeteer, playwright = plaintiff law firm discovery
// - monitor, checker, validator, analyzer = compliance audit tools
// - phantom, headless = automated security testing

// If pattern matches: exit before violations occur

monitor|checker|validator|analyzer explicitly targets compliance monitoring infrastructure. Not bot protection—compliance evasion by design.

Expert Analysis: "Selective Evasion, Not Defense"

Independent security professional reviewed the 42 detection patterns:

"That combination, especially the mainstream search engines plus Burp, does not align with any established security standard. Yes, some of those tools could be considered security tools, but the regex looks like it was designed to specifically starve compliance reviewers and security researchers while the production traffic continues business as usual."

"Blocking that mix of agents lines up with selective evasion, not real defense."

Key Finding: Pattern selection targets compliance tools and research infrastructure, not security threats. The specific tools blocked reveal targeting of class action discovery mechanisms rather than general security protection.

What The Defeat Device Hides

1. Identifier Laundering: Stealing Competitor Cookies

RB2B's tracking script implements grabCookies() function that systematically accesses tracking cookies set by HubSpot and Facebook

Deobfuscated Source: grabCookies()

function grabCookies() {
  const cookies = document.cookie.split(';');
  const targets = ['hubspotutk', '_fbp', '_fbc'];

  return targets.reduce((acc, name) => {
    const match = cookies.find(c => c.trim().startsWith(name + '='));
    if (match) acc[name] = match.split('=')[1];
    return acc;
  }, {});
}

No authorization checks. No consent verification. Direct cookie exfiltration targeting competitor tracking infrastructure.

Targeted Third-Party Cookies

  • hubspotutk
    HubSpot's visitor tracking cookie
  • _fbp
    Facebook Pixel tracking identifier
  • _fbc
    Facebook conversion tracking

Authorization Verification: Zero

Analysis of deobfuscated source code identified no conditional logic verifying:

  • Integration status with HubSpot/Facebook
  • Permission checks before cookie access
  • API authentication
  • User consent verification

CIPA Relevance: Capturing identifiers from third-party cookies = intercepting communications between the visitor and those third parties (HubSpot, Facebook). This is the core CIPA wiretapping conduct—eavesdropping on communications without all-party consent.

2. Consent Bypass: 600ms Polling Loop

RB2B implements aggressive consent monitoring that continuously checks consent state every 600 milliseconds

Real-World Impact

During a typical 5-minute browsing session, RB2B performs 500 localStorage reads monitoring for consent state changes—even when tracking has been explicitly rejected. This persistent retry loop waits for consent to accidentally flip to "granted" (user error, auto-accept banner timeout, etc.).

CIPA Relevance: The polling loop enables immediate tracking activation without fresh user action. Once consent flips (however it flips), tracking resumes instantly—capturing communications that occur after consent was initially rejected.

3. Cross-Site Tracking Network

RB2B operates an undisclosed "publisher network"—a cross-site tracking infrastructure that pools visitor data across all customer deployments

How It Works

  1. Site A visitor tracked by RB2B
  2. Data contributed to centralized "publisher network" database
  3. Site B (different RB2B customer) visitor arrives
  4. RB2B queries network: "Have we seen this browser/IP before?"
  5. Site A's contributed data enables Site B identification
  6. Visitors never informed their data is shared across RB2B's customer network

CIPA Relevance: Data collected on Site A (with Site A's consent/notice) is repurposed to identify visitors on Sites B, C, D, E without additional consent or disclosure. This cross-site correlation = systematic eavesdropping on visitor communications across thousands of websites.

4. Zero Compliance Features

Comprehensive API reconnaissance documented 21+ REST API endpoints for data collection, identity resolution, and enrichment. Not a single endpoint exists for consent checking, opt-out, or data deletion.

What Exists (21+ endpoints)

  • /b/{CUSTOMER_ID}/identify
  • /b/{CUSTOMER_ID}/enrich
  • /b/{CUSTOMER_ID}/company
  • /b/{CUSTOMER_ID}/session
  • [17+ additional data collection endpoints]

What's Missing (Required for CIPA compliance)

  • No opt-out API
  • No deletion endpoint
  • No consent verification
  • No "Do Not Track" handling

CEO Admission:

"If you want to sell enterprise it's off the table. Not worth the risk to them."

— RB2B CEO, explaining why enterprise companies refuse to deploy RB2B due to compliance risk

Industry Comparison: This Isn't What "Everybody Does"

After discovering RB2B's 42 bot detection patterns, we validated the critical question: Is this standard industry practice?

Methodology: Forensic code-level analysis of 10 vendors across B2B visitor identification platforms, sales intelligence tools, and B2B SaaS companies. Not vendor attestations—actual deployed code inspection.

0/10
Other Vendors Exhibit Defeat Device Patterns

Comprehensive analysis reveals RB2B's bot detection is a unique outlier. All 10 other vendors—including direct competitors—operate without blocking regulatory audit tools.

Vendors Analyzed (Code-Level Evidence)

Direct Competitors

(Same business model as RB2B)

  • Vector
  • Demandbase
  • Warmly

Sales Intelligence

(Advanced tracking platforms)

  • Apollo
  • ZoomInfo (7-layer stack)
  • Clay

B2B SaaS

(Vendor stacking examples)

  • Bombora (25+ vendors)
  • Fivetran (50+ vendors)
  • HeyReach (60+ vendors)

Summary Scorecard: RB2B vs Industry

VendorBot Detection
Blocks Audits
Cookie
Theft
Geo-
Fencing
Zero
Compliance
Total
Score
RB2B4/4
Vector0/4
Demandbase0/4
ZoomInfo0/4
+ 7 additional vendors (all 0/4)0/4

✓ = Pattern present | ✗ = Pattern absent | Result: RB2B is the ONLY vendor (1/11) exhibiting all four problematic patterns.

Legal Implications

FTC Section 5: "Standard practice" defense is DISPROVEN by comparative code evidence. 10/10 other vendors operate without defeat device patterns.

GDPR Enforcement: Legitimate alternatives exist (Vector, Demandbase). Article 6(1) requires violations NOT be necessary for business operation. RB2B's direct competitors prove the same business works without evasion architecture.

The Two-Tier Enforcement Problem

LiveIntent: Visible Violations

Technology
Email address capture via tracking pixels
Bot Detection
None implemented
Lawsuits Filed
50+
Known Settlements
$10M+ documented
Immediately Discoverable

RB2B: Identical Violations, Zero Lawsuits

Technology
Visitor identification via tracking pixels (identical conduct)
Bot Detection
42 patterns blocking audit tools
Lawsuits Filed
0
Hidden Exposure
$25B-$112B
Invisible to Automated Scanning

The Pattern: Identical violations that triggered 50+ LiveIntent lawsuits produce zero RB2B lawsuits due to systematic obstruction of plaintiff firms' discovery mechanisms.

The Volkswagen Parallel

ElementVolkswagen (2015)RB2B (2025)
Detection SystemSoftware monitoring dyno test conditionsRegex targeting audit tools (Selenium/Playwright)
TargetEPA emissions testing equipmentPlaintiff firm CIPA scanning tools
Behavioral ChangeReduced emissions during testScript exits during automated scan
ResultAppeared compliant under EPA testAppears compliant under automated discovery
Two RealitiesDifferent behavior for EPA vs driversDifferent behavior for scanners vs users
Legal Precedent$30B penalties + criminal chargesSystematic evasion creates elevated exposure

Legal Doctrine: Systems that systematically hide violations from oversight face elevated penalties under established precedent. VW's defeat device resulted in $30B in fines and criminal prosecutions—not for the underlying emissions violations, but for the systematic technological evasion of regulatory detection.

Systemic Risk: The White-Label Botnet Model

Scope Clarification

PROVEN (Forensic Evidence)

This investigation has documented white-label distribution of RB2B's defeat device code through at least one platform (Knock2.ai), with 33% prevalence in sampled alternatives. The distribution HAS occurred and is architecturally enabled by multi-tenant infrastructure.

MODELED (Forward-Looking Scenario)

The systemic risk analysis models hypothetical exposure IF similar distribution scales to the broader GTM ecosystem (1,500+ platforms). The $25B-$112B exposure calculation represents potential aggregate liability under scaled deployment, not current materialized risk.

This analysis does NOT assert:

  • That 1,500+ platforms currently distribute RB2B's code
  • That platforms have knowledge of the defeat device's legal exposure
  • That the modeled financial exposure has materialized
  • That any specific platform beyond those tested currently distributes the code

Evidence Standard: White-label distribution: Proven (Knock2.ai case study). Systemic exposure modeling: Hypothetical scenario based on RB2B's stated OEM/white-label business strategy.

White-Label Distribution: Knock2.ai Case Study

Knock2.ai markets itself as an "RB2B alternative" with prominent GDPR/CCPA compliance badges. Forensic analysis reveals they deploy RB2B's surveillance infrastructure—including the defeat device—on their own website while simultaneously loading their white-label product. This dual deployment proves white-label distribution is not hypothetical: it's happening in production.

RB2B Direct Deployment

Marketing:"Website visitor identification"
Script:b2bjsstore/b/{KEY}/reb2b.js.gz
Features:FingerprintJS, TheTradeDesk, LiveIntent
Defeat device present

Knock2.ai White-Label

Marketing:"Alternative to RB2B" + compliance badges
Reality:b2bjsstore/b/0NW1GH7XWJO4/reb2b.js.gz
ALSO runs:Own white-label (7shifts_com slug)
Defeat device present

Forensic Evidence

Script URL:https://s3-us-west-2.amazonaws.com/b2bjsstore/b/0NW1GH7XWJO4/reb2b.js.gz
HTTP Status:200 OK
Content-Length:9,354 bytes
Client ID:0NW1GH7XWJO4
Backend:knock2-backend-2ba4792164c3.herokuapp.com
Bot Detection Regex:/bot|spider|crawler|scraper|fetcher|monitor|checker|validator|analyzer|automated|headless|phantom|selenium|webdriver|puppeteer|playwright/i
Additional Checks:Window properties, user agent blacklist

IDENTICAL CODE

Knock2.ai deploys the same RB2B surveillance infrastructure—including the same bot detection regex that blocks Selenium, Webdriver, Puppeteer, and Playwright—while marketing as an independent alternative.

FTC Section 5 Violation

Material misrepresentation: customers believe they're using Knock2's proprietary technology

Systemic Risk Evidence

Proves defeat device distribution via white-label is operational, not hypothetical

The Surveillance Stack: What One Integration Actually Deploys

Marketing vs. Reality

Knock2.ai's website displays prominent compliance badges while documenting integrations with multiple surveillance and automation platforms. This creates a critical verification problem: How can compliance be assured when the underlying infrastructure includes unauditable code from multiple vendors?

What Customers See
Knock2.ai GDPR and CCPA Compliance Badges

Marketing Claims:

  • GDPR Compliant
  • CCPA Compliant
  • "Alternative to RB2B" positioning
  • Native integrations with enterprise platforms
What Actually Gets Deployed

Forensic evidence reveals a multi-vendor surveillance stack:

Core Infrastructure

RB2B Surveillance Layer
├── Script: s3-us-west-2.amazonaws.com/b2bjsstore/b/0NW1GH7XWJO4/reb2b.js.gz
├── Defeat Device: monitor|checker|validator|analyzer|selenium|webdriver|puppeteer|playwright
├── Identity Resolution: FingerprintJS, TheTradeDesk, LiveIntent
└── Backend: AWS S3 + API Gateway
Knock2 White-Label Layer
├── Backend: knock2-backend-2ba4792164c3.herokuapp.com
├── Frontend: knock2-frontend.web.app
└── Product Slug: Multi-tenant architecture (7shifts_com, etc.)

Advertised Integrations

Apollo.io Integration

Apollo.io

"Integrate prospecting and sales automation"

  • • Automatic lead syncing
  • • Enhanced insights
  • • Outreach automation
HubSpot Integration

HubSpot

"Seamlessly integrate CRM and marketing automation"

  • • Real-time lead sync
  • • Workflow automation
  • • Automatic lead enrichment
Clay Integration

Clay

"Automate data collection and drive insights"

  • • Real-time lead syncing
  • • Enrichment
  • • Behavior tracking

The Nested Verification Problem

Layer 1: RB2B Infrastructure (Unauditable)

Knock2.ai cannot fully verify RB2B's code because:

1.

Client-side obfuscation

Minified JavaScript delivered from S3

2.

Defeat device blocks audit tools

monitor|checker|validator|analyzer detection

3.

No source code access

White-label relationship provides compiled code only

4.

API-only visibility

Backend operations occur server-side without transparency

Layer 2: Integration Stack (Cascade Opacity)

When Knock2 integrates with Apollo/HubSpot/Clay:

Customer Data Flow:
┌─────────────┐
│ Website │ → Knock2 (white-label) → RB2B (surveillance)
│ Visitor │ ↓
└─────────────┘ Apollo.io (enrichment)
HubSpot (CRM)
Clay (automation + ??? vendors)

Each integration adds:

  • • Additional processors requiring disclosure
  • • New data flows requiring mapping
  • • Separate compliance claims requiring verification
  • • Potential nested white-label relationships

Critical question: If Clay white-labels other surveillance vendors, how many total vendors are in the stack when a customer integrates Knock2 + Clay?

Layer 3: Customer Deployment (Zero Visibility)

End customers cannot verify:

  • Which vendors actually process their data
  • What data each vendor collects
  • Where data flows between vendors
  • Whether defeat devices are present
  • If compliance claims are accurate

This is structurally impossible because: Client-side code is obfuscated, server-side processing is opaque, API integrations are black boxes, white-label relationships hide upstream vendors, and defeat devices block the tools that would enable verification.

The Compliance Badge Contradiction

How Can Knock2 Claim GDPR/CCPA Compliance?

GDPR Article 28 Requirements:

  • • Controller must use only processors providing sufficient guarantees
  • • Controller must ensure processor implements appropriate technical and organizational measures
  • • Processing must be governed by a contract that sets out processing instructions

CCPA Requirements:

  • • Businesses must disclose categories of personal information collected
  • • Businesses must disclose categories of sources from which data is collected
  • • Businesses must disclose third parties with whom personal information is shared
RequirementKnock2's Ability to Verify
RB2B data collection scope❌ Blocked by defeat device
RB2B subprocessor list❌ Not visible via white-label
Apollo/HubSpot/Clay data flows❌ API-only, no transparency
Clay's nested vendor relationships❌ Unknown (Clay white-labels others)
Total processor count❌ Cannot enumerate full chain
Defeat device presence❌ Deployed without detection

If Knock2 cannot verify these elements, how can they assert GDPR/CCPA compliance?

The "Monitor|Checker|Validator" Problem

Why These Terms Matter

The defeat device specifically blocks:

monitor

Compliance monitoring systems

checker

Automated compliance checkers

validator

Policy validation tools

analyzer

Traffic analysis platforms

These are not standard bot protection terms.

Standard bot protection blocks: bot, spider, crawler, scraper (content theft), googlebot, bingbot (search engines - usually allowed)

Blocking compliance verification tools serves no legitimate security purpose.

The Structural Contradiction

Knock2.ai displays GDPR/CCPA badges while deploying code that blocks the tools required to verify GDPR/CCPA compliance.

This creates an impossible situation:

  1. 1. Customers rely on compliance badges to make purchasing decisions
  2. 2. The underlying code prevents independent verification of compliance
  3. 3. White-label architecture prevents Knock2 from auditing what they distribute
  4. 4. Integration stack compounds the verification problem
  5. 5. End result: Compliance claims that are structurally unverifiable

The Clay Connection: Nested White-Label Distribution

What This Means for Knock2 Customers

When a customer integrates Knock2 with Clay:

Knock2 Installation
↓ (includes RB2B + defeat device)
Clay Integration via Knock2
↓ (may include additional surveillance vendors)
Apollo/HubSpot Connections
↓ (adds more processors)
Result: 5-10+ vendors in surveillance chain
None fully auditable by customer
Each with own compliance claims
Nested white-label relationships obscure true vendor count

The customer believes they installed:

"Knock2.ai" (1 vendor)

The customer actually deployed:

  • • RB2B (surveillance backend)
  • • Knock2 (white-label wrapper)
  • • FingerprintJS (via RB2B)
  • • TheTradeDesk (via RB2B)
  • • LiveIntent (via RB2B)
  • • Apollo.io (integration)
  • • HubSpot (integration)
  • • Clay (integration)
  • • ??? (Clay's white-labeled vendors)
  • • ??? (potential other nested vendors)

Minimum: 8+ vendors
Maximum: Unknown (cannot enumerate Clay's full vendor chain)

NOTE: THE PATTERN

Adam Robinson, founder of RB2B, has built his career on opacity-by-design architecture across four different industries.

Career Timeline

Lehman Brothers - Credit Trader

July 2003 → September 2008 (5 years 3 months)

Worked throughout the lead-up to and during the 2008 financial collapse. Experienced firsthand how:

  • • Complex derivatives bundled across multiple layers
  • • No single party understood full risk exposure
  • • Rating agencies couldn't verify underlying asset quality
  • Opacity by design created systemic risk

Lehman Brothers collapsed: September 15, 2008

Barclays Capital - Credit Trader

September 2008 → March 2011 (2 years 7 months)

Moved to Barclays Capital, which acquired Lehman Brothers' North American investment banking and trading divisions after the collapse.

Robly Email Marketing - Co-Founder/CEO

February 2012 → March 2021 (9 years 2 months)

Built email marketing SaaS with multi-tenant surveillance infrastructure. 8-figure exit to private equity.

  • • Multi-tenant architecture: accounts/{id}/forms/{id}/*
  • • Industrial surveillance stack (FullStory session replay, Microsoft Clarity, LinkedIn tracking)
  • • White-label form embedding and customer segmentation
  • Mastered the infrastructure playbook later applied to RB2B

SIEMonster Investment

During or immediately after Barclays tenure

Invested in SIEMonster, a white-label SOC (Security Operations Center) platform.

SIEMonster's Pitch:

  • • "We help MSSPs and enterprises deliver scalable, white-labeled SOC platforms under their own brand"
  • • "Customizable, multi-tenant cybersecurity operations platform"
  • • "Client-branded reporting, automated response"
  • • "We stay invisible—so you stay in control"

The same architectural pattern: White-label distribution where the underlying vendor "stays invisible" while customers deploy under their own brand.

RB2B - Founder

Website visitor identification & surveillance

Founded RB2B with white-label distribution as stated business strategy.

RB2B's White-Label Model:

  • • White-label platforms (like Knock2.ai) resell RB2B surveillance under their own brand
  • Defeat device blocks compliance verification tools (monitor|checker|validator|analyzer)
  • • Multi-tenant S3 infrastructure obscures true vendor
  • • Customers unknowingly deploy RB2B while believing they use "alternatives"
  • "We stay invisible" enforced through technical evasion, not just business model
The Pattern Across Four Industries

Finance (Lehman Brothers):

Bundled derivatives with opacity by design → No single party understands risk → Systemic collapse

Email Marketing (Robly):

Multi-tenant surveillance SaaS → White-label infrastructure → 8-figure exit validates model

Security (SIEMonster):

White-label SOC platform → "We stay invisible" → Customers deploy under own brand

Marketing Tech (RB2B):

White-label surveillance → Defeat device enforces invisibility → Verification structurally impossible

Each iteration makes the same bet: Opacity creates value, complexity prevents accountability.

The question is no longer whether Robinson understands these patterns—his investment in SIEMonster's "we stay invisible" platform proves he does. The question is whether he learned the right lessons from 2008.

The CDO analogy below is not hypothetical.

Robinson lived through the 2008 financial crisis at the institution that became synonymous with systemic risk through structured complexity.

He then invested in a white-label security platform that explicitly promises "we stay invisible"—the same architectural pattern that caused verification impossibility at Lehman.

Now RB2B deploys that pattern again, but with a technical enforcement mechanism: a defeat device that actively blocks the tools required to verify compliance claims.

The CDO Analogy Revisited

Collateralized Debt Obligations (2008 Crisis)

Problem Structure:

  • • Complex derivatives bundled across multiple layers
  • • No single party understood full risk exposure
  • • Rating agencies couldn't verify underlying asset quality
  • • Systemic risk not apparent until collapse
Knock2.ai Surveillance Stack

Problem Structure:

  • • Complex surveillance stack bundled across multiple vendors
  • • No single party can enumerate full processor list
  • • Compliance badges don't verify underlying code
  • • Systemic risk not apparent until legal discovery attempts fail
The Common Thread: Opacity by Design

CDOs:

Structured to obscure underlying risk

Surveillance Stack:

Architected to evade verification

Both create:

  • • Structural inability to verify claims
  • • Cascade effects through distribution chains
  • • Systemic risk concentration
  • • Discovery failures when crisis occurs

The Architecture of Unverifiability

The Knock2.ai case study proves that white-label surveillance distribution creates structural inability to verify compliance claims.

Not due to bad actors.

Not due to missing policies.

Due to architectural design that makes verification impossible.

When compliance badges are displayed alongside code that blocks compliance verification tools, the badges themselves become misleading.

When white-label relationships obscure the true vendor chain, disclosure obligations become structurally impossible to meet.

When multi-vendor stacks create nested dependencies, no party in the chain can enumerate total processors.

This is the systemic risk: Architecture that makes compliance claims unverifiable by design.

The Defeat Device Distribution Problem

The Question: What happens when surveillance infrastructure equipped with defeat device characteristics achieves distribution at scale through white-label platforms?

The Answer: A "botnet" of undetectable violations spreading across the entire B2B sales and marketing ecosystem—each deployment contributing to systematic audit gaps while remaining invisible to plaintiff firm discovery tools.

How White-Label Distribution Amplifies Evasion

Traditional tracking vendor deployment:

  • Customer knowingly selects vendor
  • Privacy policy discloses vendor name
  • Violations discoverable via automated scanning
  • Plaintiff firms can identify and sue

White-label defeat device deployment:

  • Platform distributes as "native feature"
  • Customer doesn't know actual vendor identity
  • Bot detection blocks plaintiff scanning tools
  • Violations hidden from discovery during critical filing windows
  • Platform's customer base = force multiplier for concealment

The Botnet Parallel: Infrastructure Designed to Evade Detection

Traditional botnets spread malware that evades antivirus detection. A defeat device "botnet" spreads surveillance infrastructure that evades legal/regulatory detection:

CharacteristicComputer BotnetDefeat Device Botnet
Infection VectorMalware payloadWhite-label distribution
Evasion MechanismAnti-virus detection bypassPlaintiff scanning tool bypass
Detection GapSignature-based scanners failSelenium/Playwright scanners fail
Scale MultiplierSelf-replicationPlatform distribution
VisibilityHidden from security toolsHidden from legal discovery
Removal DifficultyVictims don't know they're infectedCustomers don't know vendor identity

Hypothetical Scenario: 1,500+ Unknowing Deployments

If defeat device infrastructure achieved white-label distribution through a platform with 25,000+ customers:

Scenario Parameters:

  • Platform offers "visitor identification" as native feature
  • Backend: Vendor waterfall (multiple surveillance vendors)
  • 30% adoption rate among Pro/Enterprise customers
  • ~1,500+ deployments of defeat device infrastructure
  • Customers believe they're using platform's native technology

Systemic Impact:

Customer Layer (Unaware):

  • ✗ Customer privacy policy doesn't mention actual vendor
  • ✗ Customer can't disclose what they don't know exists
  • ✗ Customer believes they're compliant (it's the "platform's feature")
  • ✗ Each deployment = independent CIPA violation stream

Plaintiff Discovery Layer (Blocked):

  • ✗ Automated scanning tools detect bot signatures
  • ✗ Script exits before violations occur during scans
  • ✗ Plaintiff firms scan 10,000 websites → violations invisible
  • ✗ Discovery blocked during critical 56-day filing window

Regulatory Layer (Systematically Evaded):

  • ✗ GDPR audits using Playwright/Puppeteer fail to detect violations
  • ✗ FTC compliance scans using Selenium show false negatives
  • ✗ Standard audit methodology systematically defeated
  • ✗ Enforcement impossible without sophisticated counter-evasion

Combined Effect: Systematic obstruction of oversight at scale.

Exposure Calculation: If This Model Scales

Per-Customer CIPA Exposure

(100K CA visitors/year):

  • Standard 3-year class: $50M per customer
  • With fraudulent concealment: $167M-$225M per customer

Ecosystem-Wide Exposure

(1,500+ hypothetical deployments):

  • Conservative (3-year): $25 Billion
  • With fraudulent concealment: $112 Billion

Critical Variable: Time until discovery. If bot detection prevents discovery during 56-day window before SB 690 exemption, this exposure evaporates as future violations become exempt.

The Privacy CDO Analogy: Financial Engineering Applied to Surveillance

Lehman Brothers CDO Distribution (2003-2008):

  • Toxic asset: Subprime mortgages
  • Repackaging: Bundle into CDOs, assign AAA ratings
  • Distribution: Institutional investors, pension funds
  • Buyer awareness: Didn't know they held toxic assets
  • Scale: Billions distributed before collapse

Hypothetical Defeat Device Distribution (2022-2025):

  • Toxic asset: Unlawful surveillance infrastructure
  • Repackaging: White-label as "native platform feature"
  • Distribution: B2B platforms with 25,000+ customer bases
  • Buyer awareness: Don't know actual vendor identity
  • Scale: 1,500+ unknowing deployments (hypothetical)

Shared Characteristics:

  • Transform and obscure origin
  • Distribute through trusted intermediaries
  • Scale through platform infrastructure
  • Defeat oversight mechanisms
  • Create systemic, unwinding-resistant risk

Why "Botnet" Is The Right Framework

A botnet doesn't rely on one infected computer—it's the NETWORK EFFECT that creates systemic risk. Same principle here:

Single Deployment:

  • • One website with defeat device infrastructure
  • • Plaintiff firm might eventually discover manually
  • • Regulatory pressure could force compliance
  • • Containable risk

1,500+ Networked Deployments:

  • • Each deployment contributes to centralized cross-site tracking
  • • Bot detection blocks automated discovery across entire network
  • • Regulatory audits systematically defeated at scale
  • • Customers can't comply (don't know their processors)
  • • Creates "undetectable at scale" violation model

The Network Effect: Each deployment strengthens the overall evasion system. More deployments = larger cross-site database = higher identification rates = greater customer value = accelerated adoption = systemic audit gaps expanding across B2B ecosystem.

Real-World Evidence vs. Risk Model

What We Can Prove (RB2B Specifically):

  • 42 bot detection patterns blocking plaintiff scanning tools
  • Identifier laundering (HubSpot/Facebook cookie theft)
  • Zero compliance features (21+ data endpoints, 0 opt-out APIs)
  • CEO admission: "Enterprise won't touch it" (compliance risk)
  • LiveIntent comparison: 50+ lawsuits vs. RB2B's 0 lawsuits

What This Analysis Models (Systemic Risk):

  • → What happens IF this infrastructure achieves white-label distribution
  • → How platforms with large customer bases become force multipliers
  • → Why defeat device characteristics + distribution = botnet-scale risk
  • → Exposure calculations IF 1,500+ unknowing deployments occur

The Critical Question: We know defeat device infrastructure exists (documented via forensic analysis). We know white-label distribution platforms exist (standard B2B model). The systemic risk question: What happens when these two combine?

Prevention: Breaking the Botnet Model

For Platforms:

  • • Require vendor disclosure in white-label arrangements
  • • Audit backend vendors for defeat device characteristics
  • • Mandate compliance feature availability (opt-out/deletion APIs)
  • • Implement platform-level bot detection audits

For Plaintiff Firms:

  • • Deploy counter-evasion scanning techniques
  • • Manual audits of high-value targets
  • • Discovery via customer testimony (who actually processes data?)
  • • Focus on 56-day window before exemption

For Regulators:

  • • Treat defeat device infrastructure as aggravated violation
  • • Platform-level enforcement (not just vendor-level)
  • • Criminal referrals for systematic obstruction
  • • Require white-label vendor disclosure chains

Why This Matters Now

Without intervention, the botnet model scales:

Month 1-6: Early adopters deploy unknowingly via white-label platforms

Month 6-12: Cross-site database strengthens, identification rates improve

Month 12-18: Platform customer base expands, more deployments

Month 18-24: Network effect accelerates adoption

Month 24+: Systematic audit gaps across B2B ecosystem, $25B-$112B hidden

The 56-day window: If this model has already achieved scale, plaintiff firms have 56 days to discover violations before SB 690 exemption eliminates future CIPA exposure. Bot detection systematically prevents this discovery.

The botnet risk: Not one vendor. Not one deployment. A networked infrastructure designed to evade detection, distributed at scale through trusted platforms, creating systematic obstruction of oversight across the entire B2B sales and marketing ecosystem.

Senate Bill 690: The 0-Day Window

Before January 1, 2026

  • Full CIPA exposure: $5K-$10K per violation
  • Standard 3-year statute of limitations (potentially 5-7 years with concealment)
  • Class action mechanisms fully available
  • Statutory damages + attorney fees + costs

After January 1, 2026

  • Future violations exempt from CIPA
  • No new class action exposure for cookie/pixel tracking
  • Past violations (pre-2026) still actionable with full damages

The Critical Filing Window

0 Days Remaining until CIPA exemption takes effect.

The 0-day window represents the final opportunity for plaintiff firms to file CIPA claims against ongoing violations before the exemption takes effect. After January 1, 2026, only pre-exemption violations will create exposure—and those claims must be discovered and filed within statute of limitations windows (potentially extended by fraudulent concealment).

RB2B's Bot Detection Prevents This Discovery

Plaintiff firms cannot file lawsuits against violations they cannot discover. RB2B's infrastructure systematically blocks the automated scanning tools used during this critical 0-day window, allowing $25B-$112B in hidden liability to remain undetected until the exemption window closes.

Why This Matters Now

Systematic Technological Concealment

This is not a "tracking vendor with compliance gaps." This is infrastructure specifically designed to function differently when accessed by automated tools used for mass litigation discovery vs. real user sessions.

  1. Identical violations to LiveIntent (50+ lawsuits, $10M+ settlements)
  2. Systematic blocking of plaintiff firm discovery tools (Selenium/Playwright/Puppeteer)
  3. Two different realities: Violations visible to users, invisible to scanners
  4. Critical timing: 0 days until exemption eliminates future exposure

Unauditable Violations at Scale

Bot detection creates infrastructure where violations are systematically hidden from the primary enforcement mechanism—automated class action discovery. The result:

  • Plaintiff firms scan 10,000 websites → RB2B violations invisible
  • LiveIntent violations immediately discoverable → 50+ lawsuits
  • RB2B violations systematically concealed → 0 lawsuits
  • $25B-$112B hidden exposure across customer base
  • 0-day window closing before discovery can occur

The Volkswagen Precedent

VW's emissions defeat device cost $30B in fines and triggered criminal prosecutions—not for the underlying emissions violations, but for the systematic technological evasion of regulatory detection.

Parallel pattern: VW detected EPA testing equipment → altered emissions behavior. RB2B detects plaintiff scanning tools → script exits before violations occur. Both: Different behavior when regulatory/legal oversight is detected. Both: Systematic obstruction of enforcement mechanisms.

Recommended Remediation

If You Currently Use RB2B

1. Remove RB2B Immediately

Every day RB2B remains in your stack accumulates additional CIPA exposure. Remove the tracking script from all customer-facing properties.

Technical Steps:

  • • Remove all RB2B script tags from your website
  • • Clear any RB2B integrations from GTM/Segment
  • • Audit third-party tag managers for RB2B remnants
  • • Document removal with screenshots and timestamps

2. Consult Legal Counsel

Contact a privacy attorney experienced with CIPA litigation. Your historical deployment creates potential class action exposure that requires professional legal assessment.

If You've Been Tracked by RB2B

1. File Complaints with Regulators

Federal Trade Commission (FTC)

Report deceptive practices and defeat device architecture:

https://reportfraud.ftc.gov/

California Attorney General

CIPA violations and consumer privacy complaints:

https://oag.ca.gov/contact/consumer-complaint-against-business-or-company

Your State Privacy Regulator

If you're in a state with comprehensive privacy laws (Virginia, Colorado, Connecticut, etc.), file with your state attorney general or privacy enforcement authority.

2. Contact Your Legislators

Defeat devices that systematically evade regulatory oversight represent a gap in current enforcement frameworks. Your representatives need to understand:

  • • Automated compliance tools are being specifically blocked
  • • Defeat device architecture enables systematic evasion at scale
  • • Current enforcement mechanisms are insufficient for detecting these violations

3. Consult a Class Action Attorney

If you're a California resident who visited websites using RB2B, you may have standing for a CIPA claim. Many plaintiff firms handle these cases on contingency.

Note: California plaintiff firms have successfully prosecuted 50+ CIPA cases against LiveIntent for identical tracking pixel conduct. RB2B's defeat device may be why similar violations haven't been discovered—until now.

Everyone: Demand Accountability

The existence of defeat devices in marketing technology demonstrates a critical gap in compliance enforcement. Whether you use these tools, have been tracked by them, or simply care about privacy rights:

  • Share this investigation with compliance professionals, privacy advocates, and industry peers
  • Demand vendor transparency about bot detection mechanisms and their impact on compliance monitoring
  • Support frameworks like Blackout that establish forensic compliance standards for marketing technology

Forensic Technical Analysis

Complete technical documentation of third-party cookie access architecture and bot detection infrastructure. Evidence collected through industry-standard forensic analysis techniques. Methodology fully replicable.

Back to All Investigations