How This Briefing Works
This report opens with key findings, then maps the gaps between what Journey discloses and what BLACKOUT observed at runtime. From there: what it means for your organization, what to do about it, and the detection data and evidence underneath.
Key Findings
Claims vs. Observed Behavior
pending
“Unknown”
Requires claims extraction via CDT
What This Means For You
What To Do About It
Role-specific actions based on observed behavior
If You Use Journey
- →Audit journey data retention policies—look for indefinite storage clauses
- →Extract fingerprinting evidence from incognito session continuity
- →Document journey pattern appearance in industry benchmark reports
If You're Evaluating Journey
- →Quantify attribution inflation from multi-touchpoint claiming
- →Map competitive intelligence leakage through anonymized journey syndication
- →Calculate GDPR Article 17 exposure from right-to-erasure request backlogs
Negotiation Leverage
- →Journey DPA lacks data retention limits—behavioral profiles persist indefinitely
- →90/100 CAC subsidization through anonymized journey pattern monetization
- →Fingerprinting (C10) enables tracking despite user opt-out—consent bypass documented
- →Session recording captures PII in form fields—data breach exposure compounds with every session
- →Industry benchmark reports contain your competitive moat data disguised as aggregates
- →Evidence pack includes cross-session tracking captures and fingerprinting proof
Runtime Detections
BLACKOUT observed this vendor's JavaScript executing in a live browser and classified each hostile behavior using our BTI-C (Behavioral Threat Intelligence — Capability) taxonomy. These are not theoretical risks — each code below was triggered by something we watched this vendor's code actually do.
Evasion infrastructure, auditor bypass
Impact: Journey tracking persists through privacy mode and cookie deletion via fingerprinting fallback
Keystroke/mouse tracking
Impact: Mouse movement and scroll patterns captured to detect user intent and friction points
Full session replay
Impact: Complete session playback including form interactions and abandoned cart contents
Device identification
Impact: Canvas and WebGL fingerprinting enables cross-device journey stitching
Container/loader (neutral)
Impact: Dynamic event tracking code adapts to site changes without deployment
IOC Manifest
Indicators of compromise across 4 categories. Use for detection rules, CSP policies, or Pi-hole blocklists.
Ecosystem & Supply Chain
Evidence Artifacts
Artifacts collected during analysis, available with evidence-tier access.
Complete network capture with all requests and responses
167 detection signatures across scripts, domains, cookies, and network endpoints