How This Briefing Works
This report opens with key findings, then maps the gaps between what Singular discloses and what BLACKOUT observed at runtime. From there: what it means for your organization, what to do about it, and the detection data and evidence underneath.
Key Findings
Analysis pending. Findings will appear here once intelligence collection is complete.
Claims vs. Observed Behavior
pending_verification
“No fingerprinting on iOS post-ATT”
Public commitment verified in blog posts; runtime SDK behavior not yet observed via scanner
pending_verification
“Privacy-compliant modeled measurement”
Model methodology is opaque; awaiting technical documentation review and scanner verification of actual data collection
pending
“Awaiting full scanner observation”
Analysis based on public documentation, blog posts, and published integration framework. Runtime SDK behavior and actual postback contents require direct observation.
What This Means For You
What To Do About It
Role-specific actions based on observed behavior
Recommended Actions for Singular
- →- Audit postback configurations to understand exactly what user-level data is being shared with each ad network partner and whether data minimization principles are applied. - Review Singular's data retention policies and request documentation of what data is stored, for how long, and who has access within their organization. - Evaluate whether cross-platform attribution is necessary for your use case or whether channel-specific measurement would reduce data exposure while maintaining actionable insights. - Implement Singular's available privacy controls (data sharing filters, privacy configurations) to limit unnecessary data distribution to partners. - Consider independent measurement validation using server-side tracking or incrementality testing to verify attribution accuracy without sole reliance on MMP-reported data.
Negotiation Leverage
- →Leverage Points: Singular operates in a competitive MMP market alongside AppsFlyer, Adjust, Kochava, and Branch. This competition creates leverage for demanding stronger data protection terms and customized privacy configurations. The post-ATT environment has made privacy positioning a key differentiator, which means Singular is incentivized to accommodate privacy-forward contractual demands.
- →Key Questions: (1) What specific user-level data fields are included in postbacks to each ad network partner? (2) Does Singular use any aggregated or anonymized customer data for its own product development, benchmarking, or cross-customer insights? (3) What is the data retention period for user-level attribution data, and can it be reduced contractually? (4) How does modeled measurement work technically, and what data inputs feed the models?
- →Contract Protections: Negotiate explicit restrictions on secondary use of attribution data beyond your direct measurement needs. Require audit rights for data sharing practices with ad network partners. Include data deletion provisions with verified confirmation. Ensure contractual commitment to the no-fingerprinting policy with remediation provisions if violated.
IOC Manifest
Indicators of compromise across 4 categories. Use for detection rules, CSP policies, or Pi-hole blocklists.
Ecosystem & Supply Chain
Evidence Artifacts
Artifacts collected during analysis, available with evidence-tier access.
Complete network capture with all requests and responses
122 detection signatures across scripts, domains, cookies, and network endpoints