How This Briefing Works
This report opens with key findings, then maps the gaps between what LiveIntent discloses and what BLACKOUT observed at runtime. From there: what it means for your organization, what to do about it, and the detection data and evidence underneath.
Key Findings
Pre-Consent Activity
LiveIntent was observed loading and executing before user consent was obtained on 53% of sites where it was detected.
Claims vs. Observed Behavior
pending
“Unknown”
Requires claims extraction via CDT
What This Means For You
What To Do About It
Role-specific actions based on observed behavior
If You Use LiveIntent
- →Audit email template source for LiveIntent pixel presence—often deployed without marketing awareness
- →Extract ID sync logs showing universal ID distribution to 200+ platforms
- →Map customer email hashes to programmatic audience segment appearance
If You're Evaluating LiveIntent
- →Quantify competitor retargeting enabled by LiveIntent ID syndication
- →Calculate CAC increase from advertising ecosystem powered by your email list
- →Document GDPR Article 6 violations from processing without lawful basis
Negotiation Leverage
- →LiveIntent DPA authorizes universal ID syndication to 200+ advertising platforms—complete loss of data control
- →100/100 CAC subsidization as every email open powers competitor programmatic infrastructure
- →Consent bypass (C09) initiates tracking on email open—no user authorization possible in email context
- →Cross-domain sync (C08) creates permanent surveillance network across advertising ecosystem
- →Persistence (C13) means universal IDs survive cookie deletion and privacy regulations
- →100/100 legal exposure represents maximum regulatory risk—GDPR Article 6 violations certain
- →Evidence pack includes ID sync captures showing distribution to competitor DSP platforms
Runtime Detections
BLACKOUT observed this vendor's JavaScript executing in a live browser and classified each hostile behavior using our BTI-C (Behavioral Threat Intelligence — Capability) taxonomy. These are not theoretical risks — each code below was triggered by something we watched this vendor's code actually do.
Form data interception
Identity stitching
Impact: Universal ID synced across 200+ advertising platforms creates comprehensive cross-publisher surveillance
Ignoring CMP signals
Impact: Email pixel fires on open before user can consent—processing initiates without authorization
Long-lived identifiers
Impact: Universal ID persists indefinitely across devices and browsers through deterministic email matching
PII deanonymization
Impact: Email hash resolution creates permanent link between anonymous web sessions and known identity
Container/loader (neutral)
IOC Manifest
Indicators of compromise across 4 categories. Use for detection rules, CSP policies, or Pi-hole blocklists.
Ecosystem & Supply Chain
Evidence Artifacts
Artifacts collected during analysis, available with evidence-tier access.
Complete network capture with all requests and responses
87 detection signatures across scripts, domains, cookies, and network endpoints