How This Briefing Works
This report opens with key findings, then maps the gaps between what Securiti discloses and what BLACKOUT observed at runtime. From there: what it means for your organization, what to do about it, and the detection data and evidence underneath.
Key Findings
Analysis pending. Findings will appear here once intelligence collection is complete.
Claims vs. Observed Behavior
Pending Analysis
“Claims extraction pending”
No runtime behavioral analysis completed. CDT browser forensics needed to verify: (1) what data the reverse-IP detection collects pre-consent, (2) auto-blocking completeness across cookie categories, (3) whether AI cookie categorization accurately classifies all tracking technologies, (4) consent data flows between CMP module and broader Securiti platform, (5) whether consent optimization recommendations constitute dark patterns, (6) multi-channel consent signal consistency.
What This Means For You
What To Do About It
Role-specific actions based on observed behavior
If You Use Securiti
- →Audit Securiti's reverse-IP detection for pre-consent data collection scope
- →Verify AI cookie categorization accuracy against manual classification
- →Test auto-blocking completeness across all cookie categories and jurisdictions
- →Confirm consent data isolation from broader Securiti platform modules (DSPM, AI governance)
- →Review consent optimization recommendations for dark pattern characteristics
If You're Evaluating Securiti
- →Independent scanner verification of pre-consent network requests by Securiti JavaScript
- →Assess whether reverse-IP geolocation data is retained beyond consent session
- →Evaluate consent data flows between CMP and unified intelligence platform
Negotiation Leverage
- →Reverse-IP geolocation fires pre-consent — the consent platform identifies visitors before asking permission
- →AI-driven consent decisions at enterprise scale amplify blast radius of any miscategorization
- →Unified platform architecture means consent data may flow into DSPM, AI governance, and data intelligence modules
- →Google certification does not verify behavioral compliance — only TCF string format compliance
- →Request contractual guarantee that consent data is isolated from non-consent platform modules
IOC Manifest
Indicators of compromise across 4 categories. Use for detection rules, CSP policies, or Pi-hole blocklists.
Ecosystem & Supply Chain
Evidence Artifacts
Artifacts collected during analysis, available with evidence-tier access.
Complete network capture with all requests and responses
85 detection signatures across scripts, domains, cookies, and network endpoints