How This Briefing Works
This report opens with key findings, then maps the gaps between what Audiencex discloses and what BLACKOUT observed at runtime. From there: what it means for your organization, what to do about it, and the detection data and evidence underneath.
Key Findings
Vendor Disclosure
66 third-party vendors detected on audiencex.com, 12 firing pre-consent
Consent Mechanism
12 vendors fire before consent including identity resolution
Pre-Consent Activity
Audiencex was observed loading and executing before user consent was obtained on 15% of sites where it was detected.
Privacy Marketing
Identity resolution (Apollo.io, Clearbit) deployed pre-consent
Signal Honoring
Explicitly states Does not support DNT signals
Claims vs. Observed Behavior
Vendor Disclosure
“Privacy policy lists 3 vendors (Google Analytics, AdWords, Facebook)”
66 third-party vendors detected on audiencex.com, 12 firing pre-consent
Runtime scan shows Apollo.io, Clearbit, Clarity, ClickCease, HubSpot, LinkedIn, Twitter undisclosed
Consent Mechanism
“Ketch CMP deployed for consent management”
12 vendors fire before consent including identity resolution
Pre-consent tracking includes Apollo.io, Clearbit, Clarity, DoubleClick, GoogleAds, GA4, HubSpot, LinkedIn, MetaPixel, TwitterPixel
Privacy Marketing
“Homepage markets privacy-safe data”
Identity resolution (Apollo.io, Clearbit) deployed pre-consent
AX homepage claims blend proprietary technology, privacy-safe data - contradicted by runtime behavior
Signal Honoring
“CCPA compliance claimed”
Explicitly states Does not support DNT signals
Privacy policy Section: We do not support Do Not Track (DNT)
What This Means For You
What To Do About It
Role-specific actions based on observed behavior
If You Use Audiencex
- →Audit all third-party vendors loaded through AUDIENCEX integration on your properties
- →Update privacy policies to disclose Apollo.io, Clearbit, and other identity resolution vendors AUDIENCEX introduces
- →Configure consent enforcement to block all 12 pre-consent vendors identified in AUDIENCEX ecosystem
- →Request documentation supporting the privacy-safe data claim against 66-vendor runtime evidence
If You're Evaluating Audiencex
- →Request complete vendor list and compare against the 3 disclosed before signing
- →Verify whether the privacy-safe data positioning survives scrutiny of 66 detected vendors
- →Compare with other programmatic platforms on vendor transparency — 22x disclosure gap is among the worst
- →Require contractual representations on privacy-safe data with financial penalties for violations
Negotiation Leverage
- →Privacy-safe data contradiction: AUDIENCEX markets privacy-safe data while running 66 vendors with 12 pre-consent — use this fundamental contradiction to negotiate enhanced data protection guarantees or price concessions
- →22x vendor disclosure gap: 66 vendors detected vs. 3 disclosed (Google Analytics, AdWords, Facebook) — require complete named vendor disclosure as a contract condition
- →Identity resolution pre-consent: Apollo.io and Clearbit fire before consent — negotiate removal of identity resolution from your campaign infrastructure or require explicit consent gates
- →Ketch CMP failure: AUDIENCEX deploys Ketch but 12 vendors still fire pre-consent — leverage for documented consent enforcement effectiveness requirements
Runtime Detections
BLACKOUT observed this vendor's JavaScript executing in a live browser and classified each hostile behavior using our BTI-C (Behavioral Threat Intelligence — Capability) taxonomy. These are not theoretical risks — each code below was triggered by something we watched this vendor's code actually do.
Evasion infrastructure, auditor bypass
Keystroke/mouse tracking
Full session replay
Ignoring CMP signals
Device identification
IOC Manifest
Indicators of compromise across 4 categories. Use for detection rules, CSP policies, or Pi-hole blocklists.
Ecosystem & Supply Chain
Evidence Artifacts
Artifacts collected during analysis, available with evidence-tier access.
Complete network capture with all requests and responses
163 detection signatures across scripts, domains, cookies, and network endpoints