All Vendors
deanon

LiveIntent ID Exchange

LiveIntent ID Exchange deploys comprehensive identity infrastructure - consent bypass, persistence mechanisms, identity resolution, and tag manager injection.

83 IOCs54 detections59% pre-consent35 sites
70
Vendor Risk Score

How This Briefing Works

This report opens with key findings, then maps the gaps between what LiveIntent ID Exchange discloses and what BLACKOUT observed at runtime. From there: what it means for your organization, what to do about it, and the detection data and evidence underneath.

Key Findings

Key Findings

54 detections across 35 sites59% pre-consent activity
CRITICAL

Pre-Consent Activity

LiveIntent ID Exchange was observed loading and executing before user consent was obtained on 59% of sites where it was detected.

GDPRePrivacy
Disclosure Gaps

Claims vs. Observed Behavior

1 gaps

identity_coordination

CRITICAL
They Claim

Unknown - requires claims extraction

Observed Behavior

C09+C13+C14+C15 detected - comprehensive identity graph infrastructure

Customer Impact

What This Means For You

Publishers integrating LiveIntent ID Exchange face maximum identity tracking liability. Multi-vector identity coordination (email, web, device) creates compounding compliance exposure. Tag manager injection enables capability expansion without oversight. Pre-consent identity synchronization violates fundamental privacy requirements. Advertising monetization built on non-consented comprehensive identity graph produces legally indefensible revenue.
Recommended Actions

What To Do About It

Role-specific actions based on observed behavior

If You Use LiveIntent ID Exchange

  • IMMEDIATE: Audit complete LiveIntent ID Exchange scope - catalog identity resolution capabilities
  • Map all identifier types synchronized - email, cookies, device IDs, other
  • Verify tag manager injection scope - what can LiveIntent deploy autonomously?
  • Enforce strict consent gate - identity synchronization must not occur pre-consent
  • Document persistence mechanisms across channels and devices

If You're Evaluating LiveIntent ID Exchange

  • Evaluate newsletter monetization without identity graph participation
  • Consider contextual advertising eliminating identity resolution
  • Investigate first-party email advertising without cross-publisher identity coordination
  • Prepare LiveIntent removal plan - comprehensive identity tracking may exceed acceptable risk

Negotiation Leverage

  • LiveIntent ID Exchange deploys C09+C13+C14+C15 - vendor must explain comprehensive identity infrastructure
  • Demand complete technical disclosure of identity resolution methodology and identifier types
  • Require consent-first operation - no pre-consent identity synchronization
  • Negotiate removal of tag manager injection capabilities - require explicit approval for capability changes
  • Establish absolute liability for identity tracking violations - vendor accountability is non-negotiable
  • Consider contract termination - identity graph scope may exceed acceptable compliance risk
Runtime Detections

Runtime Detections

4 BTI-C CODES

BLACKOUT observed this vendor's JavaScript executing in a live browser and classified each hostile behavior using our BTI-C (Behavioral Threat Intelligence — Capability) taxonomy. These are not theoretical risks — each code below was triggered by something we watched this vendor's code actually do.

BTI-C09Consent Bypass

Ignoring CMP signals

BTI-C13Persistence Mechanisms

Long-lived identifiers

BTI-C14Identity Resolution

PII deanonymization

BTI-C15Tag Manager

Container/loader (neutral)

IOC Manifest

IOC Manifest

72 INDICATORS

Indicators of compromise across 4 categories. Use for detection rules, CSP policies, or Pi-hole blocklists.

TRACK
*www.liveintent.com/wp-content/cache/autoptimize/js/autoptimize_*.js*
Tracking script
TRACK
idx.liadm.com
Tracking script
TRACK
www.liveintent.com/wp-content/cache/autoptimize/js/autoptimize_35f806c25f32042a9fa67b61b4c007b0.js
Auto-extracted from scan
Ecosystem

Ecosystem & Supply Chain

Operates as identity resolution infrastructure for email advertising ecosystem. Tag manager injection creates autonomous deployment capability. Integration across email service providers, ad exchanges, and publisher properties enables comprehensive identity graph construction.
Evidence

Evidence Artifacts

Artifacts collected during analysis, available with evidence-tier access.

HAR Capture

Complete network capture with all requests and responses

IOC Manifest

83 detection signatures across scripts, domains, cookies, and network endpoints

Vendor Details