How This Briefing Works
This report opens with key findings, then maps the gaps between what Demio discloses and what BLACKOUT observed at runtime. From there: what it means for your organization, what to do about it, and the detection data and evidence underneath.
Key Findings
Analysis pending. Findings will appear here once intelligence collection is complete.
Claims vs. Observed Behavior
pending
“Awaiting scanner verification”
Demio's runtime tracking behavior including cookies, scripts loaded during webinar sessions, and pixel deployments has not yet been observed via scanner analysis. Current assessment is based on documented features and public marketing materials.
What This Means For You
What To Do About It
Role-specific actions based on observed behavior
Recommended Actions for Demio
- →- Review webinar registration consent language to ensure it covers focus tracking, engagement scoring, and data sharing with CRM and marketing automation systems. - Audit tracking pixels deployed on Demio registration pages — identify what data flows to advertising platforms. - Assess whether focus tracking (active window monitoring) is disclosed to attendees and whether it complies with applicable privacy regulations. - Map the complete data flow from Demio registration through engagement scoring to CRM export, identifying all systems that receive attendee behavioral data. - Confirm data retention policies for attendee engagement profiles within Demio and downstream systems.
Negotiation Leverage
- →Demio captures granular behavioral data including browser focus state — a level of monitoring that may require explicit disclosure. Negotiate DPA terms that specify exactly what engagement data is collected, how long it is retained, and what happens to attendee profiles when your subscription ends. Clarify whether Demio uses aggregated attendee data to improve its own products or benchmarks. Request transparency on what data tracking pixels capture and confirm that pixel deployment is under your control, not enabled by default.
IOC Manifest
Indicators of compromise across 3 categories. Use for detection rules, CSP policies, or Pi-hole blocklists.
No indicators in this category
Ecosystem & Supply Chain
Evidence Artifacts
Artifacts collected during analysis, available with evidence-tier access.
Complete network capture with all requests and responses
4 detection signatures across scripts, domains, cookies, and network endpoints