NOTICE: This investigation presents technical forensic findings and is not legal advice. Companies should consult qualified legal counsel regarding compliance obligations and potential exposure.
RB2B deploys two separate infrastructures that serve different code depending on who's watching. Security audits see a "frozen" placeholder. Real users get surveilled. Automated security tools can never observe the violation.
ddwl4m2hdecbv.cloudfront.netPurpose: "Cop check" endpoint. Detects automated tools via regex, blocks payload delivery. This is what security scanners see.
b2bjsstore.s3.us-west-2.amazonaws.comPurpose: Actual surveillance code. Cookie theft, identifier capture, HubSpot exfiltration. Only served to real users.
/headless|phantom|selenium|webdriver|puppeteer|playwright|monitor|checker|validator|analyzer/iThis isn't generic bot protection. The regex explicitly targets compliance audit tools (monitor, checker, validator, analyzer). RB2B's surveillance code freezes when observed by automation—scanners report "clean" because the violation literally doesn't happen in their presence.
How RB2B's Defeat Device Blocks California Class Action Discovery
RB2B implements 42 bot detection patterns that specifically block the automated tools (Selenium, Playwright, Puppeteer) used by California plaintiff firms for CIPA class action discovery. This defeat device explains why RB2B faces zero lawsuits despite engaging in identical tracking pixel conduct that triggered 50+ suits against LiveIntent. With California's CIPA exemption (SB 690) taking effect January 1, 2026, this investigation documents the final 0-day window for discovering pre-exemption violations worth $25B-$112B in potential exposure.
California plaintiff firms filed 50+ CIPA lawsuits against LiveIntent for tracking pixel wiretapping (2023-2025). RB2B engages in identical violations—capturing communications without consent via tracking pixels—yet faces zero lawsuits. Forensic analysis reveals why: RB2B's bot detection specifically blocks Selenium, Playwright, and Puppeteer—the exact tools plaintiff law firms use for automated class action discovery.
This investigation distinguishes between:
All claims about RB2B's current behavior are backed by deobfuscated source code and reproducible testing methodology.
RB2B operates a B2B visitor identification platform that captures visitor communications (email clicks, form submissions, page visits) and correlates them to identify individuals—classic CIPA wiretapping conduct identical to LiveIntent's violations.
The critical discovery: RB2B implements 42 bot detection patterns targeting automated scanning tools—blocking both legal discovery and compliance audits. But the defeat device is just the concealment layer:
The defeat device ensures customers can't discover what RB2B deployed on their website—until CIPA lawsuits arrive.
Senate Bill 690 creates a 0-day enforcement window. California legislation exempting cookies and tracking pixels from CIPA takes effect January 1, 2026. After that date, future violations will not create class action exposure under California wiretapping laws.
Past violations (before Jan 1, 2026) remain actionable with full statutory damages ($5K-$10K per violation). The current 0-day window represents the final opportunity for plaintiff firms to file CIPA claims for ongoing violations.
RB2B's bot detection systematically prevents discovery during this critical window. The infrastructure blocks the exact tools used for automated CIPA scanning, allowing $25B-$112B in hidden liability to remain undetected until the exemption takes effect.
Forensic analysis of RB2B's deployed tracking script reveals comprehensive bot detection specifically targeting the automation frameworks used for CIPA class action discovery:
seleniumplaywrightpuppeteerburpsuiteThe Pattern: Bot detection specifically targets legal discovery and compliance audit tools while allowing actual security threats to proceed. This selective targeting is inconsistent with security defense and consistent with litigation evasion.
This isn't two separate codebases. It's one codebase that switches execution states based on who's observing it. The script inspects the user agent string at runtime—if it detects automated testing tools used by plaintiff firms or compliance monitors, it exits before performing violations. For everyone else, it executes the full tracking payload.
Same source code. Same domain. Different behavior depending on the observer.
That's the definition of a defeat device.
// Actual deobfuscated regex pattern:
/bot|spider|crawler|scraper|fetcher|monitor|checker|validator|analyzer|automated|headless|phantom|selenium|webdriver|puppeteer|playwright/i
// Key targets:
// - selenium, webdriver, puppeteer, playwright = plaintiff law firm discovery
// - monitor, checker, validator, analyzer = compliance audit tools
// - phantom, headless = automated security testing
// If pattern matches: exit before violations occurmonitor|checker|validator|analyzer explicitly targets compliance monitoring infrastructure. Not bot protection—compliance evasion by design.
Independent security professional reviewed the 42 detection patterns:
"That combination, especially the mainstream search engines plus Burp, does not align with any established security standard. Yes, some of those tools could be considered security tools, but the regex looks like it was designed to specifically starve compliance reviewers and security researchers while the production traffic continues business as usual."
"Blocking that mix of agents lines up with selective evasion, not real defense."
Key Finding: Pattern selection targets compliance tools and research infrastructure, not security threats. The specific tools blocked reveal targeting of class action discovery mechanisms rather than general security protection.
RB2B's tracking script implements grabCookies() function that systematically accesses tracking cookies set by HubSpot and Facebook
function grabCookies() {
const cookies = document.cookie.split(';');
const targets = ['hubspotutk', '_fbp', '_fbc'];
return targets.reduce((acc, name) => {
const match = cookies.find(c => c.trim().startsWith(name + '='));
if (match) acc[name] = match.split('=')[1];
return acc;
}, {});
}No authorization checks. No consent verification. Direct cookie exfiltration targeting competitor tracking infrastructure.
hubspotutk_fbp_fbcAnalysis of deobfuscated source code identified no conditional logic verifying:
CIPA Relevance: Capturing identifiers from third-party cookies = intercepting communications between the visitor and those third parties (HubSpot, Facebook). This is the core CIPA wiretapping conduct—eavesdropping on communications without all-party consent.
RB2B implements aggressive consent monitoring that continuously checks consent state every 600 milliseconds
During a typical 5-minute browsing session, RB2B performs 500 localStorage reads monitoring for consent state changes—even when tracking has been explicitly rejected. This persistent retry loop waits for consent to accidentally flip to "granted" (user error, auto-accept banner timeout, etc.).
CIPA Relevance: The polling loop enables immediate tracking activation without fresh user action. Once consent flips (however it flips), tracking resumes instantly—capturing communications that occur after consent was initially rejected.
RB2B operates an undisclosed "publisher network"—a cross-site tracking infrastructure that pools visitor data across all customer deployments
CIPA Relevance: Data collected on Site A (with Site A's consent/notice) is repurposed to identify visitors on Sites B, C, D, E without additional consent or disclosure. This cross-site correlation = systematic eavesdropping on visitor communications across thousands of websites.
Comprehensive API reconnaissance documented 21+ REST API endpoints for data collection, identity resolution, and enrichment. Not a single endpoint exists for consent checking, opt-out, or data deletion.
CEO Admission:
"If you want to sell enterprise it's off the table. Not worth the risk to them."
— RB2B CEO, explaining why enterprise companies refuse to deploy RB2B due to compliance risk
After discovering RB2B's 42 bot detection patterns, we validated the critical question: Is this standard industry practice?
Methodology: Forensic code-level analysis of 10 vendors across B2B visitor identification platforms, sales intelligence tools, and B2B SaaS companies. Not vendor attestations—actual deployed code inspection.
Comprehensive analysis reveals RB2B's bot detection is a unique outlier. All 10 other vendors—including direct competitors—operate without blocking regulatory audit tools.
(Same business model as RB2B)
(Advanced tracking platforms)
(Vendor stacking examples)
| Vendor | Bot Detection Blocks Audits | Cookie Theft | Geo- Fencing | Zero Compliance | Total Score |
|---|---|---|---|---|---|
| RB2B | ✓ | ✓ | ✓ | ✓ | 4/4 |
| Vector | ✗ | ✗ | ✗ | ✗ | 0/4 |
| Demandbase | ✗ | ✗ | ✗ | ✗ | 0/4 |
| ZoomInfo | ✗ | ✗ | ✗ | ✗ | 0/4 |
| + 7 additional vendors (all 0/4) | 0/4 | ||||
✓ = Pattern present | ✗ = Pattern absent | Result: RB2B is the ONLY vendor (1/11) exhibiting all four problematic patterns.
FTC Section 5: "Standard practice" defense is DISPROVEN by comparative code evidence. 10/10 other vendors operate without defeat device patterns.
GDPR Enforcement: Legitimate alternatives exist (Vector, Demandbase). Article 6(1) requires violations NOT be necessary for business operation. RB2B's direct competitors prove the same business works without evasion architecture.
The Pattern: Identical violations that triggered 50+ LiveIntent lawsuits produce zero RB2B lawsuits due to systematic obstruction of plaintiff firms' discovery mechanisms.
| Element | Volkswagen (2015) | RB2B (2025) |
|---|---|---|
| Detection System | Software monitoring dyno test conditions | Regex targeting audit tools (Selenium/Playwright) |
| Target | EPA emissions testing equipment | Plaintiff firm CIPA scanning tools |
| Behavioral Change | Reduced emissions during test | Script exits during automated scan |
| Result | Appeared compliant under EPA test | Appears compliant under automated discovery |
| Two Realities | Different behavior for EPA vs drivers | Different behavior for scanners vs users |
| Legal Precedent | $30B penalties + criminal charges | Systematic evasion creates elevated exposure |
Legal Doctrine: Systems that systematically hide violations from oversight face elevated penalties under established precedent. VW's defeat device resulted in $30B in fines and criminal prosecutions—not for the underlying emissions violations, but for the systematic technological evasion of regulatory detection.
This investigation has documented white-label distribution of RB2B's defeat device code through at least one platform (Knock2.ai), with 33% prevalence in sampled alternatives. The distribution HAS occurred and is architecturally enabled by multi-tenant infrastructure.
The systemic risk analysis models hypothetical exposure IF similar distribution scales to the broader GTM ecosystem (1,500+ platforms). The $25B-$112B exposure calculation represents potential aggregate liability under scaled deployment, not current materialized risk.
This analysis does NOT assert:
Evidence Standard: White-label distribution: Proven (Knock2.ai case study). Systemic exposure modeling: Hypothetical scenario based on RB2B's stated OEM/white-label business strategy.
Knock2.ai markets itself as an "RB2B alternative" with prominent GDPR/CCPA compliance badges. Forensic analysis reveals they deploy RB2B's surveillance infrastructure—including the defeat device—on their own website while simultaneously loading their white-label product. This dual deployment proves white-label distribution is not hypothetical: it's happening in production.
b2bjsstore/b/{KEY}/reb2b.js.gzb2bjsstore/b/0NW1GH7XWJO4/reb2b.js.gzhttps://s3-us-west-2.amazonaws.com/b2bjsstore/b/0NW1GH7XWJO4/reb2b.js.gz0NW1GH7XWJO4knock2-backend-2ba4792164c3.herokuapp.com/bot|spider|crawler|scraper|fetcher|monitor|checker|validator|analyzer|automated|headless|phantom|selenium|webdriver|puppeteer|playwright/iKnock2.ai deploys the same RB2B surveillance infrastructure—including the same bot detection regex that blocks Selenium, Webdriver, Puppeteer, and Playwright—while marketing as an independent alternative.
FTC Section 5 Violation
Material misrepresentation: customers believe they're using Knock2's proprietary technology
Systemic Risk Evidence
Proves defeat device distribution via white-label is operational, not hypothetical
Knock2.ai's website displays prominent compliance badges while documenting integrations with multiple surveillance and automation platforms. This creates a critical verification problem: How can compliance be assured when the underlying infrastructure includes unauditable code from multiple vendors?

Marketing Claims:
Forensic evidence reveals a multi-vendor surveillance stack:
Core Infrastructure
s3-us-west-2.amazonaws.com/b2bjsstore/b/0NW1GH7XWJO4/reb2b.js.gzmonitor|checker|validator|analyzer|selenium|webdriver|puppeteer|playwrightknock2-backend-2ba4792164c3.herokuapp.comknock2-frontend.web.appAdvertised Integrations

Apollo.io
"Integrate prospecting and sales automation"

HubSpot
"Seamlessly integrate CRM and marketing automation"

Clay
"Automate data collection and drive insights"
Knock2.ai cannot fully verify RB2B's code because:
Client-side obfuscation
Minified JavaScript delivered from S3
Defeat device blocks audit tools
monitor|checker|validator|analyzer detection
No source code access
White-label relationship provides compiled code only
API-only visibility
Backend operations occur server-side without transparency
When Knock2 integrates with Apollo/HubSpot/Clay:
Each integration adds:
Critical question: If Clay white-labels other surveillance vendors, how many total vendors are in the stack when a customer integrates Knock2 + Clay?
End customers cannot verify:
This is structurally impossible because: Client-side code is obfuscated, server-side processing is opaque, API integrations are black boxes, white-label relationships hide upstream vendors, and defeat devices block the tools that would enable verification.
GDPR Article 28 Requirements:
CCPA Requirements:
| Requirement | Knock2's Ability to Verify |
|---|---|
| RB2B data collection scope | ❌ Blocked by defeat device |
| RB2B subprocessor list | ❌ Not visible via white-label |
| Apollo/HubSpot/Clay data flows | ❌ API-only, no transparency |
| Clay's nested vendor relationships | ❌ Unknown (Clay white-labels others) |
| Total processor count | ❌ Cannot enumerate full chain |
| Defeat device presence | ❌ Deployed without detection |
If Knock2 cannot verify these elements, how can they assert GDPR/CCPA compliance?
Why These Terms Matter
The defeat device specifically blocks:
monitorCompliance monitoring systems
checkerAutomated compliance checkers
validatorPolicy validation tools
analyzerTraffic analysis platforms
These are not standard bot protection terms.
Standard bot protection blocks: bot, spider, crawler, scraper (content theft), googlebot, bingbot (search engines - usually allowed)
Blocking compliance verification tools serves no legitimate security purpose.
The Structural Contradiction
Knock2.ai displays GDPR/CCPA badges while deploying code that blocks the tools required to verify GDPR/CCPA compliance.
This creates an impossible situation:
When a customer integrates Knock2 with Clay:
The customer believes they installed:
"Knock2.ai" (1 vendor)
The customer actually deployed:
Minimum: 8+ vendors
Maximum: Unknown (cannot enumerate Clay's full vendor chain)
Adam Robinson, founder of RB2B, has built his career on opacity-by-design architecture across four different industries.
Lehman Brothers - Credit Trader
July 2003 → September 2008 (5 years 3 months)
Worked throughout the lead-up to and during the 2008 financial collapse. Experienced firsthand how:
Lehman Brothers collapsed: September 15, 2008
Barclays Capital - Credit Trader
September 2008 → March 2011 (2 years 7 months)
Moved to Barclays Capital, which acquired Lehman Brothers' North American investment banking and trading divisions after the collapse.
Robly Email Marketing - Co-Founder/CEO
February 2012 → March 2021 (9 years 2 months)
Built email marketing SaaS with multi-tenant surveillance infrastructure. 8-figure exit to private equity.
accounts/{id}/forms/{id}/*SIEMonster Investment
During or immediately after Barclays tenure
Invested in SIEMonster, a white-label SOC (Security Operations Center) platform.
SIEMonster's Pitch:
The same architectural pattern: White-label distribution where the underlying vendor "stays invisible" while customers deploy under their own brand.
RB2B - Founder
Website visitor identification & surveillance
Founded RB2B with white-label distribution as stated business strategy.
RB2B's White-Label Model:
monitor|checker|validator|analyzer)Finance (Lehman Brothers):
Bundled derivatives with opacity by design → No single party understands risk → Systemic collapse
Email Marketing (Robly):
Multi-tenant surveillance SaaS → White-label infrastructure → 8-figure exit validates model
Security (SIEMonster):
White-label SOC platform → "We stay invisible" → Customers deploy under own brand
Marketing Tech (RB2B):
White-label surveillance → Defeat device enforces invisibility → Verification structurally impossible
Each iteration makes the same bet: Opacity creates value, complexity prevents accountability.
The question is no longer whether Robinson understands these patterns—his investment in SIEMonster's "we stay invisible" platform proves he does. The question is whether he learned the right lessons from 2008.
The CDO analogy below is not hypothetical.
Robinson lived through the 2008 financial crisis at the institution that became synonymous with systemic risk through structured complexity.
He then invested in a white-label security platform that explicitly promises "we stay invisible"—the same architectural pattern that caused verification impossibility at Lehman.
Now RB2B deploys that pattern again, but with a technical enforcement mechanism: a defeat device that actively blocks the tools required to verify compliance claims.
Problem Structure:
Problem Structure:
CDOs:
Structured to obscure underlying risk
Surveillance Stack:
Architected to evade verification
Both create:
The Knock2.ai case study proves that white-label surveillance distribution creates structural inability to verify compliance claims.
Not due to bad actors.
Not due to missing policies.
Due to architectural design that makes verification impossible.
When compliance badges are displayed alongside code that blocks compliance verification tools, the badges themselves become misleading.
When white-label relationships obscure the true vendor chain, disclosure obligations become structurally impossible to meet.
When multi-vendor stacks create nested dependencies, no party in the chain can enumerate total processors.
This is the systemic risk: Architecture that makes compliance claims unverifiable by design.
The Question: What happens when surveillance infrastructure equipped with defeat device characteristics achieves distribution at scale through white-label platforms?
The Answer: A "botnet" of undetectable violations spreading across the entire B2B sales and marketing ecosystem—each deployment contributing to systematic audit gaps while remaining invisible to plaintiff firm discovery tools.
Traditional botnets spread malware that evades antivirus detection. A defeat device "botnet" spreads surveillance infrastructure that evades legal/regulatory detection:
| Characteristic | Computer Botnet | Defeat Device Botnet |
|---|---|---|
| Infection Vector | Malware payload | White-label distribution |
| Evasion Mechanism | Anti-virus detection bypass | Plaintiff scanning tool bypass |
| Detection Gap | Signature-based scanners fail | Selenium/Playwright scanners fail |
| Scale Multiplier | Self-replication | Platform distribution |
| Visibility | Hidden from security tools | Hidden from legal discovery |
| Removal Difficulty | Victims don't know they're infected | Customers don't know vendor identity |
Scenario Parameters:
Customer Layer (Unaware):
Plaintiff Discovery Layer (Blocked):
Regulatory Layer (Systematically Evaded):
Combined Effect: Systematic obstruction of oversight at scale.
(100K CA visitors/year):
(1,500+ hypothetical deployments):
Critical Variable: Time until discovery. If bot detection prevents discovery during 56-day window before SB 690 exemption, this exposure evaporates as future violations become exempt.
A botnet doesn't rely on one infected computer—it's the NETWORK EFFECT that creates systemic risk. Same principle here:
Single Deployment:
1,500+ Networked Deployments:
The Network Effect: Each deployment strengthens the overall evasion system. More deployments = larger cross-site database = higher identification rates = greater customer value = accelerated adoption = systemic audit gaps expanding across B2B ecosystem.
The Critical Question: We know defeat device infrastructure exists (documented via forensic analysis). We know white-label distribution platforms exist (standard B2B model). The systemic risk question: What happens when these two combine?
Without intervention, the botnet model scales:
Month 1-6: Early adopters deploy unknowingly via white-label platforms
Month 6-12: Cross-site database strengthens, identification rates improve
Month 12-18: Platform customer base expands, more deployments
Month 18-24: Network effect accelerates adoption
Month 24+: Systematic audit gaps across B2B ecosystem, $25B-$112B hidden
The 56-day window: If this model has already achieved scale, plaintiff firms have 56 days to discover violations before SB 690 exemption eliminates future CIPA exposure. Bot detection systematically prevents this discovery.
The botnet risk: Not one vendor. Not one deployment. A networked infrastructure designed to evade detection, distributed at scale through trusted platforms, creating systematic obstruction of oversight across the entire B2B sales and marketing ecosystem.
0 Days Remaining until CIPA exemption takes effect.
The 0-day window represents the final opportunity for plaintiff firms to file CIPA claims against ongoing violations before the exemption takes effect. After January 1, 2026, only pre-exemption violations will create exposure—and those claims must be discovered and filed within statute of limitations windows (potentially extended by fraudulent concealment).
Plaintiff firms cannot file lawsuits against violations they cannot discover. RB2B's infrastructure systematically blocks the automated scanning tools used during this critical 0-day window, allowing $25B-$112B in hidden liability to remain undetected until the exemption window closes.
This is not a "tracking vendor with compliance gaps." This is infrastructure specifically designed to function differently when accessed by automated tools used for mass litigation discovery vs. real user sessions.
Bot detection creates infrastructure where violations are systematically hidden from the primary enforcement mechanism—automated class action discovery. The result:
VW's emissions defeat device cost $30B in fines and triggered criminal prosecutions—not for the underlying emissions violations, but for the systematic technological evasion of regulatory detection.
Parallel pattern: VW detected EPA testing equipment → altered emissions behavior. RB2B detects plaintiff scanning tools → script exits before violations occur. Both: Different behavior when regulatory/legal oversight is detected. Both: Systematic obstruction of enforcement mechanisms.
Every day RB2B remains in your stack accumulates additional CIPA exposure. Remove the tracking script from all customer-facing properties.
Technical Steps:
Contact a privacy attorney experienced with CIPA litigation. Your historical deployment creates potential class action exposure that requires professional legal assessment.
Federal Trade Commission (FTC)
Report deceptive practices and defeat device architecture:
https://reportfraud.ftc.gov/
California Attorney General
CIPA violations and consumer privacy complaints:
https://oag.ca.gov/contact/consumer-complaint-against-business-or-company
Your State Privacy Regulator
If you're in a state with comprehensive privacy laws (Virginia, Colorado, Connecticut, etc.), file with your state attorney general or privacy enforcement authority.
Defeat devices that systematically evade regulatory oversight represent a gap in current enforcement frameworks. Your representatives need to understand:
If you're a California resident who visited websites using RB2B, you may have standing for a CIPA claim. Many plaintiff firms handle these cases on contingency.
Note: California plaintiff firms have successfully prosecuted 50+ CIPA cases against LiveIntent for identical tracking pixel conduct. RB2B's defeat device may be why similar violations haven't been discovered—until now.
The existence of defeat devices in marketing technology demonstrates a critical gap in compliance enforcement. Whether you use these tools, have been tracked by them, or simply care about privacy rights:
Complete technical documentation of third-party cookie access architecture and bot detection infrastructure. Evidence collected through industry-standard forensic analysis techniques. Methodology fully replicable.
Back to All Investigations