How This Briefing Works
This report opens with key findings, then maps the gaps between what Bytemine discloses and what BLACKOUT observed at runtime. From there: what it means for your organization, what to do about it, and the detection data and evidence underneath.
Key Findings
Pre-Consent Activity
Bytemine was observed loading and executing before user consent was obtained on 100% of sites where it was detected.
Claims vs. Observed Behavior
consent
“Pending claims extraction via CDT”
Consent bypass detected, platform purpose unclear
purpose
“Platform purpose unknown”
Requires vendor documentation review to understand processing scope
What This Means For You
What To Do About It
Role-specific actions based on observed behavior
If You Use Bytemine
- →Configure Bytemine to activate only after consent collection
- →Verify actual data processing activities and purpose
- →Implement privacy-by-design workflows where consent precedes platform initialization
If You're Evaluating Bytemine
- →Request documentation on Bytemine processing activities and data handling
- →Verify data retention periods and third-party sharing
- →Assess whether Bytemine deployment is necessary vs. alternative services
Negotiation Leverage
- →Bytemine consent bypass (BTI-C09) creates pre-consent processing—require technical controls to delay initialization until after consent
- →Clarify actual data processing activities and purpose for deployment
- →Request DPA with explicit scope of processing and retention periods
Runtime Detections
BLACKOUT observed this vendor's JavaScript executing in a live browser and classified each hostile behavior using our BTI-C (Behavioral Threat Intelligence — Capability) taxonomy. These are not theoretical risks — each code below was triggered by something we watched this vendor's code actually do.
Ignoring CMP signals
Impact: Initializes processing before consent collection, creating automatic legal violations.
IOC Manifest
Indicators of compromise across 3 categories. Use for detection rules, CSP policies, or Pi-hole blocklists.
No indicators in this category
Ecosystem & Supply Chain
Evidence Artifacts
Artifacts collected during analysis, available with evidence-tier access.
Complete network capture with all requests and responses
4 detection signatures across scripts, domains, cookies, and network endpoints