How This Briefing Works
This report opens with key findings, then maps the gaps between what Illumin discloses and what BLACKOUT observed at runtime. From there: what it means for your organization, what to do about it, and the detection data and evidence underneath.
Key Findings
Pre-Consent Activity
Illumin was observed loading and executing before user consent was obtained on 15% of sites where it was detected.
Pending Analysis
7 BTI behavioral codes detected across 26 deployments including cross-domain sync. Full claims extraction required for gap analysis.
Claims vs. Observed Behavior
Pending Analysis
“Claims analysis pending”
7 BTI behavioral codes detected across 26 deployments including cross-domain sync. Full claims extraction required for gap analysis.
What This Means For You
What To Do About It
Role-specific actions based on observed behavior
If You Use Illumin
- →Immediately audit whether Illumin's cross-domain sync (C08) is disclosed in your privacy policy and covered in your DPA
- →Verify your CMP blocks Illumin before consent — 15% pre-consent rate indicates likely consent flow gaps
- →Request Illumin's complete list of domains participating in their cross-domain identity sync
- →Assess whether GDPR Art. 26 joint controller obligations apply to your Illumin deployment
If You're Evaluating Illumin
- →Require Illumin to provide a data flow map showing exactly how visitor data from your site is used across their network before deployment
- →Demand contractual prohibition on cross-domain identity stitching using data collected from your property
- →Establish consent-gate verification as a deployment prerequisite with technical enforcement
- →Evaluate whether journey advertising benefits justify the joint controller liability exposure
Negotiation Leverage
- →Cross-domain sync (C08) triggers GDPR Art. 26 joint controller obligations — use as leverage to demand comprehensive data flow transparency and favorable liability allocation
- →15% pre-consent rate is documented evidence of consent violations — require contractual guarantee of consent-gate compliance with financial penalties for breach
- →51-script footprint is tied for highest in VRS 90 tier — demand script reduction roadmap and performance impact compensation
- →Rebrand from AcuityAds to Illumin may indicate regulatory pressure on previous practices — request disclosure of any regulatory actions or settlements
- →7 behavioral threat codes including identity resolution + cross-domain sync represents full identity stitching — demand explicit data minimization commitments aligned with GDPR Art. 5(1)(c)
Runtime Detections
BLACKOUT observed this vendor's JavaScript executing in a live browser and classified each hostile behavior using our BTI-C (Behavioral Threat Intelligence — Capability) taxonomy. These are not theoretical risks — each code below was triggered by something we watched this vendor's code actually do.
Evasion infrastructure, auditor bypass
Impact: Evasion infrastructure may cause Illumin to behave differently during compliance audits, making it difficult to observe the full scope of their cross-domain sync and identity stitching during vendor assessments.
Keystroke/mouse tracking
Impact: Keystroke and mouse tracking through a journey advertising platform captures granular interaction patterns that feed into cross-domain behavioral profiles — your visitors' micro-behaviors contribute to identity graphs spanning 24 sites.
Full session replay
Impact: Full session replay within journey advertising means complete user sessions are captured and correlated with cross-domain identity data, creating comprehensive behavioral dossiers that extend far beyond advertising attribution.
Identity stitching
Impact: Identity stitching across domains means a visitor identified on your site is correlated with their activity on other sites in Illumin's network. This creates undisclosed data sharing that may trigger GDPR joint controller obligations and CCPA 'sale' definitions.
Ignoring CMP signals
Impact: 15% pre-consent rate means Illumin initiates cross-domain tracking and identity resolution before users can express preferences — creating per-pageview violations across GDPR, ePrivacy Directive, and CCPA for affected visitors.
Device identification
Impact: Device fingerprinting enables persistent cross-domain identification that survives cookie deletion and browser privacy controls, making it nearly impossible for users to exercise their right to opt out of Illumin's identity graph.
PII deanonymization
Impact: PII deanonymization combined with cross-domain sync (C08) means Illumin is building identity-resolved journey maps across their entire network. Your visitors' identities resolved on your site become nodes in a cross-site behavioral graph.
IOC Manifest
Indicators of compromise across 4 categories. Use for detection rules, CSP policies, or Pi-hole blocklists.
Ecosystem & Supply Chain
Evidence Artifacts
Artifacts collected during analysis, available with evidence-tier access.
Complete network capture with all requests and responses
247 detection signatures across scripts, domains, cookies, and network endpoints