How This Briefing Works
This report opens with key findings, then maps the gaps between what Crisp discloses and what BLACKOUT observed at runtime. From there: what it means for your organization, what to do about it, and the detection data and evidence underneath.
Key Findings
Consent Compliance
53.8% pre-consent tracking rate with 6 ad/tracking vendors loading before consent
Pre-Consent Activity
Crisp was observed loading and executing before user consent was obtained on 54% of sites where it was detected.
Transparency
30 third-party vendors detected, zero named in privacy policy
Subprocessor Disclosure
GDPR Article 28 requires controllers to disclose processors
Undisclosed Party
Not in privacy policy
Claims vs. Observed Behavior
Consent Compliance
“Crisp strictly implements the GDPR regulation”
53.8% pre-consent tracking rate with 6 ad/tracking vendors loading before consent
Runtime scan data from intel_detections showing pre_consent=true for DoubleClick, GoogleAds, LinkedIn, MetaPixel, PostHog, TwitterPixel
Transparency
“Privacy policy references external partners”
30 third-party vendors detected, zero named in privacy policy
Scan detected vendors including identity resolution (RB2B, Usergems), ad platforms (Google, Meta, LinkedIn), and analytics (PostHog, GA4, HockeyStack)
Subprocessor Disclosure
“No subprocessor list published”
GDPR Article 28 requires controllers to disclose processors
No subprocessor_list_url found on crisp.chat or docs.crisp.chat
Data Localization
“Data hosted in Netherlands and Germany”
Runtime shows data transmission to US-based platforms (Google, Meta, LinkedIn, Twitter)
Network requests to doubleclick.net, facebook.com, linkedin.com detected in scans
What This Means For You
What To Do About It
Role-specific actions based on observed behavior
If You Use Crisp
- →Audit your CMP to ensure the Crisp chat widget script loads only after consent — their 53.8% pre-consent rate suggests their code may not respect CMP signals
- →Request Crisp's DPA and subprocessor list in writing — they do not publish one despite GDPR Art 28 requirements
- →Review your privacy policy to ensure Crisp and their undisclosed third-party vendors are properly disclosed to your users
- →Monitor network requests from the Crisp widget for unexpected third-party calls to deanonymization or advertising services
- →Consider whether Crisp's own compliance gaps create vicarious GDPR liability for your organization under Art 28
If You're Evaluating Crisp
- →Request complete subprocessor list before signing — Crisp's refusal to publish one is itself a GDPR Art 28 violation
- →Ask for evidence of consent mechanism implementation on their own properties — 53.8% pre-consent rate contradicts GDPR claims
- →Conduct runtime scan of crisp.chat to verify current vendor footprint before procurement decision
- →Negotiate contractual protections against their compliance gaps including pre-consent tracking indemnification
- →Consider EU-headquartered alternatives with published subprocessor lists and demonstrable consent compliance (Intercom, Zendesk)
Negotiation Leverage
- →Subprocessor list requirement: Crisp publishes no subprocessor list despite GDPR Article 28 mandate. Require complete subprocessor enumeration as a contract precondition — their refusal to publish one is itself a compliance violation.
- →Pre-consent SLA: 53.8% pre-consent rate on crisp.chat with 6 ad/tracking vendors loading before consent. Require contractual guarantee that the Crisp chat widget loads zero third-party vendors before consent on your property.
- →Deanonymization disclosure: RB2B, HockeyStack, Usergems, Hunter, and Pitchbook on crisp.chat identify visitors for sales targeting. Require written confirmation of whether these deanonymization capabilities extend to sites embedding the Crisp widget.
- →Widget data isolation: Require contractual guarantee that data collected through the Crisp chat widget on your site is not shared with any third-party vendor detected on crisp.chat or used for Crisp's own sales intelligence.
- →EU-headquartered accountability: As a French company, Crisp is directly subject to GDPR. Their non-compliance on their own site (no subprocessor list, pre-consent tracking) creates vicarious liability for customers who trust their GDPR claims.
Runtime Detections
BLACKOUT observed this vendor's JavaScript executing in a live browser and classified each hostile behavior using our BTI-C (Behavioral Threat Intelligence — Capability) taxonomy. These are not theoretical risks — each code below was triggered by something we watched this vendor's code actually do.
Evasion infrastructure, auditor bypass
Keystroke/mouse tracking
Full session replay
Ignoring CMP signals
Device identification
PII deanonymization
Container/loader (neutral)
IOC Manifest
Indicators of compromise across 4 categories. Use for detection rules, CSP policies, or Pi-hole blocklists.
Ecosystem & Supply Chain
Evidence Artifacts
Artifacts collected during analysis, available with evidence-tier access.
Complete network capture with all requests and responses
224 detection signatures across scripts, domains, cookies, and network endpoints