How This Briefing Works
This report opens with key findings, then maps the gaps between what BeeswaxRTB discloses and what BLACKOUT observed at runtime. From there: what it means for your organization, what to do about it, and the detection data and evidence underneath.
Key Findings
Pre-Consent Activity
BeeswaxRTB was observed loading and executing before user consent was obtained on 11% of sites where it was detected.
Disclosure Gap
23 specific third-party vendors detected on beeswax.com including GoogleAnalytics4, HubSpot, Pardot, DoubleClick, Intentdata, Peer39, Rockerbox, Semcasting
Pre-Consent Tracking
GoogleAnalytics4, HubSpot, and Pardot load pre-consent on beeswax.com. 11.1% pre-consent rate on sites where Beeswax is detected.
Undisclosed Party
Not in privacy policy
Undisclosed Sharing
Hidden data recipients
Claims vs. Observed Behavior
Disclosure Gap
“Privacy policy references generic vendor categories (data analytics vendors, optimization vendors)”
23 specific third-party vendors detected on beeswax.com including GoogleAnalytics4, HubSpot, Pardot, DoubleClick, Intentdata, Peer39, Rockerbox, Semcasting
Runtime scan of beeswax.com detected 23 distinct vendor scripts
Pre-Consent Tracking
“Claims GDPR and CCPA compliance”
GoogleAnalytics4, HubSpot, and Pardot load pre-consent on beeswax.com. 11.1% pre-consent rate on sites where Beeswax is detected.
Runtime detection data shows pre_consent=true for GA4, HubSpot, Pardot on beeswax.com
Data Sale Disclosure
“Transparent about data sale practices”
While transparent about selling data, customers may not realize their campaign data becomes part of this data sale ecosystem
Privacy policy states: We may sell or share the categories of Personal Information
What This Means For You
What To Do About It
Role-specific actions based on observed behavior
If You Use BeeswaxRTB
- →Review your DPA to ensure specific subprocessor disclosure requirements are met — current disclosures are generic categories only
- →Audit pre-consent behavior on your properties where Beeswax is integrated
- →Assess data sale implications — Beeswax explicitly sells personal information; verify your contract restricts this for your campaign data
- →Request documentation on data flows within the Comcast/FreeWheel corporate structure
If You're Evaluating BeeswaxRTB
- →Request named subprocessor list rather than generic vendor categories before signing
- →Verify what bid stream data is retained and how it flows within the Comcast ecosystem
- →Compare with independent DSPs that do not carry conglomerate data aggregation risk
- →Require contractual restrictions on personal information sales related to your campaigns
Negotiation Leverage
- →Personal information sales: Beeswax explicitly states they sell personal information — use this disclosure to negotiate data usage restrictions and opt-out mechanisms for your campaign data
- →Generic vendor disclosure: Privacy policy lists only vendor categories while 23 specific vendors detected — require named subprocessor disclosure as a contract condition
- →Comcast subsidiary risk: As a FreeWheel/Comcast entity, bid stream data may flow across the conglomerate — negotiate explicit restrictions on data sharing within the Comcast corporate family
- →Pre-consent behavior: Vendors firing before consent on beeswax.com suggests systemic consent architecture issues — leverage for consent compliance guarantees in your DSP agreement
Runtime Detections
BLACKOUT observed this vendor's JavaScript executing in a live browser and classified each hostile behavior using our BTI-C (Behavioral Threat Intelligence — Capability) taxonomy. These are not theoretical risks — each code below was triggered by something we watched this vendor's code actually do.
Keystroke/mouse tracking
Full session replay
Identity stitching
Ignoring CMP signals
PII deanonymization
IOC Manifest
Indicators of compromise across 3 categories. Use for detection rules, CSP policies, or Pi-hole blocklists.
Ecosystem & Supply Chain
Evidence Artifacts
Artifacts collected during analysis, available with evidence-tier access.
Complete network capture with all requests and responses
15 detection signatures across scripts, domains, cookies, and network endpoints
