How This Briefing Works
This report opens with key findings, then maps the gaps between what Snitcher discloses and what BLACKOUT observed at runtime. From there: what it means for your organization, what to do about it, and the detection data and evidence underneath.
Key Findings
Analysis pending. Findings will appear here once intelligence collection is complete.
Claims vs. Observed Behavior
data_sharing
“GDPR-compliant with focus on firmographic data over personal data”
Privacy policy discloses data sharing with Facebook, Adroll, Mailchimp, Mixpanel, Heap, Inspectlet, and Segment — many established outside the EU. Third-party data sharing for marketing purposes extends beyond firmographic focus.
consent
“Consent management platform integration ensures compliance”
Snitcher tracks pageviews and sessions before consent is given. Only identity persistence is gated behind consent, meaning behavioral data collection occurs regardless of consent status.
data_collection
“Filters out personally identifiable information”
Visitor ID product explicitly surfaces individual names, titles, and LinkedIn profiles. The claim of PII filtering contradicts the individual identification product offering.
pending
“Awaiting scanner verification”
Runtime analysis needed to verify pre-consent data transmission scope, actual cookie lifetimes, and third-party network requests initiated by the Snitcher tracker.
What This Means For You
What To Do About It
Role-specific actions based on observed behavior
Recommended Actions for Snitcher
- →- Audit Snitcher's pre-consent data collection by testing with consent denied — verify what data is transmitted before CMP approval - Review the complete list of sub-processors (Intercom, Adroll, Facebook, Mailchimp, Mixpanel, Heap, Inspectlet, Segment) and assess whether each is covered in your privacy policy - If using Visitor ID (individual identification), conduct a DPIA and ensure you have valid legal basis for processing employee personal data from anonymous visits - Restrict Zapier and CRM integration workflows to prevent Snitcher data from propagating to systems not covered in your data processing inventory - Verify Google Analytics integration does not create GDPR-non-compliant audience segments based on individually identified visitor data
Negotiation Leverage
- →When negotiating with Snitcher, focus on the gap between their GDPR compliance claims and the disclosed third-party data sharing. Request a complete and current sub-processor list with specific data categories shared with each party. Demand contractual restrictions on data sharing with advertising platforms (Adroll, Facebook) if you did not consent to this use of your visitor data. Ask for explicit documentation of what data is collected before consent is granted versus after.
- →Key leverage points: the contradiction between claiming to filter PII while simultaneously offering individual-level Visitor ID creates a credibility gap that justifies enhanced contractual protections. Request the right to disable specific sub-processor data flows, particularly those involving advertising and behavioral analytics platforms (Adroll, Facebook, Inspectlet, Heap). Ensure your DPA includes provisions requiring Snitcher to notify you before adding new sub-processors, with the right to object and terminate if new data sharing arrangements create unacceptable compliance exposure.
IOC Manifest
Indicators of compromise across 5 categories. Use for detection rules, CSP policies, or Pi-hole blocklists.
Ecosystem & Supply Chain
Evidence Artifacts
Artifacts collected during analysis, available with evidence-tier access.
Complete network capture with all requests and responses
54 detection signatures across scripts, domains, cookies, and network endpoints