All Vendors
deanon
FingerprintJS

FingerprintJS

100% pre-consent device fingerprinting rate — the most persistent form of tracking, impossible for users to clear. Discloses 4 subprocessors (AWS, Rollbar, Postmark, WorkOS) while 59 vendors detected at runtime including Apollo.io, Clearbit, and HubSpot. A 14.75x vendor disclosure gap.

92 IOCs3 detections100% pre-consent3 sites
85
Vendor Risk Score

How This Briefing Works

This report opens with key findings, then maps the gaps between what FingerprintJS discloses and what BLACKOUT observed at runtime. From there: what it means for your organization, what to do about it, and the detection data and evidence underneath.

Key Findings

Key Findings

3 detections across 3 sites100% pre-consent activity2 critical disclosure gaps
CRITICAL

Subprocessor Disclosure

59 vendors detected on fingerprint.com including identity resolution platforms

GDPR Article 28GDPR Article 13/14
CRITICAL

Pre-Consent Tracking

100% pre-consent tracking rate in BLACKOUT detection data

GDPR Article 6CCPA 1798.100ePrivacy Directive
CRITICAL

Pre-Consent Activity

FingerprintJS was observed loading and executing before user consent was obtained on 100% of sites where it was detected.

GDPRePrivacy
HIGH

Do Not Track

Honest disclosure but problematic for compliance

CCPA 1798.135Colorado Privacy Act
HIGH

Product Purpose

Product enables persistent cross-site identity resolution

GDPR Article 5(1)(b) - purpose limitation
Disclosure Gaps

Claims vs. Observed Behavior

4 gaps
2 CRIT2 HIGH
Classified:BTI-X01BTI-X02BTI-X04BTI-X05BTI-X08BTI-X10

Subprocessor Disclosure

GDPR Article 28 · GDPR Article 13/14CRITICAL
They Claim

DPA lists 4 subprocessors (AWS, Rollbar, Postmark, WorkOS)

Observed Behavior

59 vendors detected on fingerprint.com including identity resolution platforms

Runtime scan detected Apollo.io, Clearbit, HubSpot, MetaPixel, LinkedIn, LiveIntent, G2, PostHog, Vector, Verisoul, and 49 others

Do Not Track

CCPA 1798.135 · Colorado Privacy ActHIGH
They Claim

None - explicitly states they do not honor GPC/DNT

Observed Behavior

Honest disclosure but problematic for compliance

Privacy policy states: we are unable to respond to Do Not Track signals set by your browser at this time

Product Purpose

GDPR Article 5(1)(b) - purpose limitationHIGH
They Claim

Fraud detection and prevention

Observed Behavior

Product enables persistent cross-site identity resolution

Device fingerprinting creates identifiers that persist across consent boundaries, sessions, and browser resets

Customer Impact

What This Means For You

If FingerprintJS identifies devices on your site, their technology generates persistent fingerprints that users cannot clear — unlike cookies, fingerprints survive private browsing, cache clearing, and browser updates. Under ePrivacy Art 5(3), device fingerprinting requires the same consent as cookies, meaning their 100% pre-consent rate creates absolute consent violations on EU traffic. FingerprintJS discloses 4 subprocessors while 59 vendors operate at runtime on fingerprint.com — a 14.75x disclosure gap that makes GDPR Art 28 compliance impossible. While marketed for "fraud detection," the underlying technology fundamentally enables cross-site identity resolution. Their SOC2 certification alongside this extreme disclosure gap requires explanation from your compliance team.
Recommended Actions

What To Do About It

Role-specific actions based on observed behavior

If You Use FingerprintJS

  • Audit your consent flow — FingerprintJS cannot operate compliantly if loaded pre-consent under ePrivacy Directive and GDPR Art 7
  • Review your privacy policy subprocessor list — FingerprintJS creates downstream disclosure obligations for all 59 detected vendors
  • Assess fingerprinting necessity — most fraud detection can be achieved without persistent device identification that survives browser clearing
  • Request their SOC2 report and verify scope covers client-side fingerprinting operations, not just server infrastructure
  • Consider the regulatory risk of deploying technology that users cannot opt out of through standard browser privacy controls

If You're Evaluating FingerprintJS

  • Understand that 'cookieless' fingerprinting is MORE invasive than cookies — users cannot clear, detect, or opt out of fingerprints through browser settings
  • Request complete subprocessor list — 4 disclosed versus 59 detected is the largest disclosure gap in our network
  • Verify fraud detection scope — ensure the SDK is not being used for identity resolution or advertising beyond your intended use case
  • Assess alternatives for fraud detection that do not require persistent device identification (reCAPTCHA, Arkose Labs)
  • Require contractual limitation that fingerprint data is used exclusively for fraud prevention with no secondary use

Negotiation Leverage

  • Subprocessor disclosure: 4 disclosed versus 59 detected — a 14.75x gap, the largest vendor disclosure ratio in our detection network. Require complete enumeration of all data recipients as a contract precondition.
  • Consent architecture: 100% pre-consent rate means fingerprinting begins immediately on page load. Require contractual guarantee of consent-gated initialization with documented SDK configuration.
  • Fingerprint data scope: Require contractual specification of what device attributes are collected, how fingerprints are stored, and who receives fingerprint data — with right to audit.
  • Fraud-only use restriction: If deployed for fraud detection, require contractual limitation that fingerprint data cannot be used for identity resolution, advertising, or visitor identification purposes.
  • SOC2 scope verification: Request SOC2 report and verify scope covers client-side fingerprinting operations and the 59 third-party data flows, not just server infrastructure.
Runtime Detections

Runtime Detections

7 BTI-C CODES

BLACKOUT observed this vendor's JavaScript executing in a live browser and classified each hostile behavior using our BTI-C (Behavioral Threat Intelligence — Capability) taxonomy. These are not theoretical risks — each code below was triggered by something we watched this vendor's code actually do.

BTI-C01Defeat Device

Evasion infrastructure, auditor bypass

BTI-C06Behavioral Biometrics

Keystroke/mouse tracking

BTI-C08Cross-Domain Sync

Identity stitching

BTI-C09Consent Bypass

Ignoring CMP signals

BTI-C10Fingerprinting

Device identification

BTI-C14Identity Resolution

PII deanonymization

BTI-C15Tag Manager

Container/loader (neutral)

IOC Manifest

IOC Manifest

92 INDICATORS

Indicators of compromise across 6 categories. Use for detection rules, CSP policies, or Pi-hole blocklists.

TRACK
*fingerprint.com/webpack-runtime-*.js*
Tracking script
TRACK
*fingerprint.com/framework-*.js*
Tracking script
TRACK
*fingerprint.com/app-*.js*
Tracking script
EXFIL
*fingerprint.com/page-data/app-data.json*
Data collection endpoint
EXFIL
*fingerprint.com/page-data/index/page-data.json*
Data collection endpoint
TRACK
*fingerprint.com/*-*.js*
Tracking script
TRACK
*fingerprint.com/commons-*.js*
Tracking script
EXFIL
*fingerprint.com/page-data/sq/d/*.json*
Data collection endpoint
TRACK
*fingerprint.com/component---src-pages-index-tsx-*.js*
Tracking script
TRACK
*fingerprint.com/Zb9M/*
Tracking script
EXFIL
*fingerprint.com/page-data/pricing/page-data.json*
Data collection endpoint
EXFIL
*fingerprint.com/page-data/demo/page-data.json*
Data collection endpoint
EXFIL
*fingerprint.com/page-data/contact-sales-a/page-data.json*
Data collection endpoint
EXFIL
*fingerprint.com/page-data/use-cases/page-data.json*
Data collection endpoint
TRACK
fingerprint.com/webpack-runtime-5cfb9f6678bb0b253a64.js
Auto-extracted from scan
TRACK
fingerprint.com/framework-9306c24c8c449bc56fa2.js
Auto-extracted from scan
TRACK
fingerprint.com/app-fe59049543cec9d74c33.js
Auto-extracted from scan
TRACK
fingerprint.com/commons-6def18751804cb77a530.js
Auto-extracted from scan
TRACK
fingerprint.com/6c770a7c4414ebf0a243eb678697a7f4ab27d0be-db038bf50ca6e3d1a928.js
Auto-extracted from scan
TRACK
fingerprint.com/1164cbd21b0c1d5b45e1f4b215392ff8f14b3959-d646baec9569ec1a65f3.js
Auto-extracted from scan
TRACK
fingerprint.com/a9f106a65383d4771ba85f9862e6f26d865b3280-6afc0286665b063aa8ec.js
Auto-extracted from scan
TRACK
fingerprint.com/9aa91b35023db9a7456bfbda853f7e45820d1c3e-8bc66cbf680e81668d9d.js
Auto-extracted from scan
TRACK
fingerprint.com/cb35ce02de780dcaa85a6ffc7949ffd3cdc5da0f-2f4f201230460a0941ff.js
Auto-extracted from scan
TRACK
fingerprint.com/c58c9bacf48119f1fff38999f35bde14d8801464-8597777f4f1a9aebdee9.js
Auto-extracted from scan
TRACK
fingerprint.com/972faf5ae66cabf65dfefc71dc6c6bfcd2dd659b-a100da654f460497de81.js
Auto-extracted from scan
TRACK
fingerprint.com/61b43e87475f0646cc5773f72fc42cd30f80ec75-11823344c9931e966a45.js
Auto-extracted from scan
TRACK
fingerprint.com/4b89f8f72d669dded3ad294253d9368625a25864-1f3c3cd427e644158e9f.js
Auto-extracted from scan
TRACK
fingerprint.com/9bf4e5ae4cd947a92a6cbaa52f04b9788e38c917-2a242a0f68d60855cf92.js
Auto-extracted from scan
TRACK
fingerprint.com/2d6c659afc76c0bd46e7a4933de7e4c5eb5c1833-c3bb55ac1b96989b1d53.js
Auto-extracted from scan
TRACK
fingerprint.com/b1c1976c6cdc70f2c94d1309371185d494062581-2e2441a3a68459b1ab99.js
Auto-extracted from scan
TRACK
fingerprint.com/f2c19169726a503428134b0160d9160bd6fcea89-170caf1043beac6979f8.js
Auto-extracted from scan
TRACK
fingerprint.com/component---src-pages-index-tsx-1c8835eedbd35c8e8d58.js
Auto-extracted from scan
TRACK
fingerprint.com/6115-7ad773bbf70337b64594.js
Auto-extracted from scan
TRACK
fingerprint.com/Zb9M/
Auto-extracted from scan
Ecosystem

Ecosystem & Supply Chain

FingerprintJS operates at the foundation of the identity resolution supply chain. Their device fingerprinting technology is loaded by websites (often via GTM or direct script inclusion) to generate persistent visitor identifiers. These identifiers then flow downstream to identity resolution platforms (detected: Clearbit, Apollo.io, Vector, Verisoul), advertising networks (detected: DoubleClick, MetaPixel, Google Ads, LinkedIn), and analytics platforms (detected: GA4, PostHog, HubSpot). Upstream, FingerprintJS depends on AWS infrastructure and integrates with Rollbar for error tracking. The company's 100% remote structure and VC backing ($77M Series C) indicates growth-focused operations. Their own website demonstrates the ecosystem problem: 59 vendors detected, creating a web of undisclosed data flows that their customers inherit.
Evidence

Evidence Artifacts

Artifacts collected during analysis, available with evidence-tier access.

HAR Capture

Complete network capture with all requests and responses

IOC Manifest

92 detection signatures across scripts, domains, cookies, and network endpoints

Vendor Details