All Vendors
chat

Ada

Ada is a chat vendor with a VRS of 80. Demonstrates aggressive post-rejection tracking and cross-domain synchronization across chat deployments.

5 IOCs5 detections80% pre-consent4 sites
80
Vendor Risk Score

How This Briefing Works

This report opens with key findings, then maps the gaps between what Ada discloses and what BLACKOUT observed at runtime. From there: what it means for your organization, what to do about it, and the detection data and evidence underneath.

Key Findings

Key Findings

5 detections across 4 sites80% pre-consent activity
CRITICAL

Pre-Consent Activity

Ada was observed loading and executing before user consent was obtained on 80% of sites where it was detected.

GDPRePrivacy
Disclosure Gaps

Claims vs. Observed Behavior

1 gaps

pending

UNKNOWN
They Claim

Unknown

Observed Behavior

Requires claims extraction via CDT

Customer Impact

What This Means For You

Customers visiting sites with Ada face persistent chat tracking that survives consent rejection and cookie deletion. Chat interaction data including questions asked, pages visited during chat sessions, and response patterns are captured and synchronized across domains. This creates behavioral profiles that inform competitor targeting even for users who never completed a purchase or form fill.
Recommended Actions

What To Do About It

Role-specific actions based on observed behavior

If You Use Ada

  • Audit Ada consent implementation via HAR capture to verify post-rejection tracking cessation
  • Review DPA for cross-domain data sharing restrictions and enforce strict first-party boundaries
  • Implement chat analytics isolation to prevent Ada data from polluting core conversion measurement
  • Establish session recording controls to prevent chat interaction capture without explicit consent

If You're Evaluating Ada

  • Request Ada deployment in strict first-party mode with all cross-domain sync disabled
  • Require contractual prohibition on chat data sharing with demand generation networks
  • Verify chat widget does not initialize tracking libraries before user interaction
  • Assess alternative chat vendors (Intercom with privacy controls, self-hosted solutions) for comparison

Negotiation Leverage

  • VRS 80 classification requires premium DPA terms including cross-domain sync prohibition and post-rejection tracking cessation guarantees
  • 85% legal tail risk demands indemnification for consent violations and GDPR Article 7 non-compliance
  • 80% CAC subsidization impact justifies pricing concessions if strict first-party deployment mode is enforced
  • Request evidence that chat analytics do not feed external demand networks or require contractual data sharing restrictions
  • Require monthly attestation that defeat device mechanisms (background tracking) have been disabled in your deployment
Runtime Detections

Runtime Detections

4 BTI-C CODES

BLACKOUT observed this vendor's JavaScript executing in a live browser and classified each hostile behavior using our BTI-C (Behavioral Threat Intelligence — Capability) taxonomy. These are not theoretical risks — each code below was triggered by something we watched this vendor's code actually do.

BTI-C01Defeat Device

Evasion infrastructure, auditor bypass

Impact: Chat widget continues data collection in background even when minimized or after consent rejection, violating user expectations.

BTI-C08Cross-Domain Sync

Identity stitching

Impact: Chat session IDs synchronized across customer properties and Ada network, enabling cross-site behavior correlation.

BTI-C09Consent Bypass

Ignoring CMP signals

Impact: Maintains persistent chat analytics after explicit rejection, creating consent theater rather than genuine user control.

BTI-C10Fingerprinting

Device identification

Impact: Browser fingerprinting used to reconnect chat sessions across devices and visits, bypassing cookie controls.

IOC Manifest

IOC Manifest

5 INDICATORS

Indicators of compromise across 4 categories. Use for detection rules, CSP policies, or Pi-hole blocklists.

TRACK
static.ada.support
Tracking script
Ecosystem

Ecosystem & Supply Chain

Ada occupies the conversational AI layer of the GTM stack, typically deployed alongside analytics platforms (Google Analytics, Adobe) and CRM systems (Salesforce, HubSpot). The vendor sits at a critical interception point where customer support interactions generate behavioral data that feeds both internal analytics and external demand networks.
Evidence

Evidence Artifacts

Artifacts collected during analysis, available with evidence-tier access.

HAR Capture

Complete network capture with all requests and responses

IOC Manifest

5 detection signatures across scripts, domains, cookies, and network endpoints

Vendor Details