How This Briefing Works
This report opens with key findings, then maps the gaps between what Fathom discloses and what BLACKOUT observed at runtime. From there: what it means for your organization, what to do about it, and the detection data and evidence underneath.
Key Findings
Analysis pending. Findings will appear here once intelligence collection is complete.
Claims vs. Observed Behavior
pending
“No cookies or personal data collected”
Awaiting scanner verification to confirm zero cookie deployment and data transmission patterns
pending
“EU data processed in EU”
Data residency claim awaiting infrastructure verification
What This Means For You
What To Do About It
Role-specific actions based on observed behavior
Recommended Actions for Fathom
- →- Fathom is a low-risk deployment — no urgent remediation actions required - Verify the Fathom script tag is loading from the expected CDN (cdn.usefathom.com) and not a modified version - Consider Fathom as a replacement for higher-risk analytics vendors if your analytics needs are aggregate-level - Document Fathom in your data processing inventory as a minimal-footprint analytics processor - Review Fathom's DPA if operating in regulated industries to confirm jurisdictional coverage
Negotiation Leverage
- →Fathom's pricing is transparent and publicly listed, which limits negotiation leverage on cost. However, the value proposition is compliance simplification rather than feature depth. Key questions for evaluation: (1) What is the data retention period for aggregate analytics? (2) How does the pseudo-anonymization process work technically — is it documented for audit purposes? (3) What happens to data upon account termination? Fathom's independent, bootstrapped status means no venture capital pressure to monetize data in the future, which is a meaningful long-term trust signal.
IOC Manifest
Indicators of compromise across 3 categories. Use for detection rules, CSP policies, or Pi-hole blocklists.
Ecosystem & Supply Chain
Evidence Artifacts
Artifacts collected during analysis, available with evidence-tier access.
Complete network capture with all requests and responses
59 detection signatures across scripts, domains, cookies, and network endpoints