How This Briefing Works
This report opens with key findings, then maps the gaps between what Adara discloses and what BLACKOUT observed at runtime. From there: what it means for your organization, what to do about it, and the detection data and evidence underneath.
Key Findings
Pre-Consent Activity
Adara was observed loading and executing before user consent was obtained on 2% of sites where it was detected.
Consent Framework
13 tracking vendors fire before any consent action on adara.com
Compliance Claim Mismatch
False certification claims
Scope Creep
Collection exceeds disclosed scope
Claims vs. Observed Behavior
Consent Framework
“GDPR legal basis is user consent”
13 tracking vendors fire before any consent action on adara.com
Scan SCAN-1769087739876 shows Clarity, DoubleClick, Drift, GA4, LinkedIn, MetaPixel, OneTrust, Pardot, Slack, Verisoul, Zenrows, ZoomInfo all pre-consent
Data Scope
“Pseudonymized travel intent data”
Deploys identity resolution (ZoomInfo) and session recording (Clarity) capable of de-anonymization
Detected vendors include ZoomInfo (B2B identity resolution), Clarity (session replay), MetaPixel (cross-site identity)
Data Sale Transparency
“Privacy Promise emphasizes user consent”
CCPA disclosure explicitly states they sell data to third parties
Adara FAQ states: we do transfer personal information collected via their publishers websites or Adaras website to third parties, which is considered a sale under the CCPA
What This Means For You
What To Do About It
Role-specific actions based on observed behavior
If You Use Adara
- →Audit your consent mechanism to ensure Adara pixels only fire post-consent on your properties
- →Request Adara's complete subprocessor list and cross-reference against your privacy policy disclosures
- →Review data processing agreements for scope — verify your traveler data stays isolated from the broader co-op
- →Assess competitive intelligence exposure from your booking data flowing through a 270+ partner co-op
If You're Evaluating Adara
- →Request documentation on how your data is isolated within the 270+ partner co-op before signing
- →Verify Adara's GDPR consent framework against pre-consent evidence before any implementation
- →Compare with non-co-op travel data alternatives that do not pool your demand signals with competitors
- →Negotiate contractual restrictions on data sharing within the RateGain corporate family
Negotiation Leverage
- →Data co-op exposure: Adara pools traveler data from 270+ partners — use this to negotiate data isolation preventing your booking data from enriching competitors' targeting
- →Pre-consent tracking: 13 vendors fire before consent on adara.com — leverage to require consent architecture guarantees and audit rights for your implementation
- →RateGain acquisition: As a RateGain subsidiary, data flows may extend to rate intelligence products — negotiate restrictions on data sharing within the RateGain corporate family
- →Consent legal basis contradiction: Adara claims consent as GDPR legal basis while firing 13 vendors pre-consent — use this to negotiate enhanced consent enforcement or alternative legal basis documentation
Runtime Detections
BLACKOUT observed this vendor's JavaScript executing in a live browser and classified each hostile behavior using our BTI-C (Behavioral Threat Intelligence — Capability) taxonomy. These are not theoretical risks — each code below was triggered by something we watched this vendor's code actually do.
Evasion infrastructure, auditor bypass
Keystroke/mouse tracking
Full session replay
Identity stitching
Ignoring CMP signals
Device identification
IOC Manifest
Indicators of compromise across 4 categories. Use for detection rules, CSP policies, or Pi-hole blocklists.
Ecosystem & Supply Chain
Evidence Artifacts
Artifacts collected during analysis, available with evidence-tier access.
Complete network capture with all requests and responses
250 detection signatures across scripts, domains, cookies, and network endpoints
