How This Briefing Works
This report opens with key findings, then maps the gaps between what Quividi discloses and what BLACKOUT observed at runtime. From there: what it means for your organization, what to do about it, and the detection data and evidence underneath.
Key Findings
Pre-Consent Activity
Quividi was observed loading and executing before user consent was obtained on 23% of sites where it was detected.
Claims vs. Observed Behavior
visual_surveillance
“Pending claims extraction”
Runtime shows vision-based tracking active before consent with session recording
What This Means For You
What To Do About It
Role-specific actions based on observed behavior
If You Use Quividi
- →Verify vision analytics scope and methodology in web deployment
- →Audit consent timing for ALL tracking components
- →Map data flow from vision analytics to external platforms
If You're Evaluating Quividi
- →Require technical documentation of computer vision methodology in web context
- →Demand consent-first activation with visual tracking disabled pre-consent
- →Evaluate conventional heatmap alternatives without surveillance heritage
Negotiation Leverage
- →C07+C09: Demand DPA provisions requiring consent before ANY visual/behavioral tracking
- →Request disclosure of computer vision methodology applied to web properties
- →Require audit rights covering session recording scope and visual data retention
- →If physical+digital deployment: Negotiate separate consent frameworks for each context
Runtime Detections
BLACKOUT observed this vendor's JavaScript executing in a live browser and classified each hostile behavior using our BTI-C (Behavioral Threat Intelligence — Capability) taxonomy. These are not theoretical risks — each code below was triggered by something we watched this vendor's code actually do.
Keystroke/mouse tracking
Full session replay
Ignoring CMP signals
Container/loader (neutral)
IOC Manifest
Indicators of compromise across 4 categories. Use for detection rules, CSP policies, or Pi-hole blocklists.
Ecosystem & Supply Chain
Evidence Artifacts
Artifacts collected during analysis, available with evidence-tier access.
Complete network capture with all requests and responses
199 detection signatures across scripts, domains, cookies, and network endpoints