How This Briefing Works
This report opens with key findings, then maps the gaps between what Sonobi discloses and what BLACKOUT observed at runtime. From there: what it means for your organization, what to do about it, and the detection data and evidence underneath.
Key Findings
Pre-Consent Activity
Sonobi was observed loading and executing before user consent was obtained on 2% of sites where it was detected.
Claims vs. Observed Behavior
pending
“Unknown”
Requires claims extraction via CDT
What This Means For You
What To Do About It
Role-specific actions based on observed behavior
If You Use Sonobi
- →Audit ad serving timing - verify NO ads load before consent collection
- →Implement consent-first header bidding - all auctions must halt until explicit opt-in
- →Request bid stream data segregation - your audience should not train competitor targeting models
- →Replace behavioral targeting with contextual advertising (no user profiling required)
If You're Evaluating Sonobi
- →Contextual advertising platforms (no behavioral tracking required)
- →Consent-aware header bidding wrappers with pre-consent blocking
- →Direct ad sales eliminating programmatic data sharing
Negotiation Leverage
- →Perfect legal tail risk (100) reflects pre-consent ad serving - DPA must include unlimited indemnification for ALL impressions
- →Header bidding architecture exposes audience to entire programmatic ecosystem - confirm data segregation guarantees
- →Behavioral targeting creates 40% signal loss from privacy controls - demand transparency on CPM impact
- →Cross-site fingerprinting violates ePrivacy Directive - verify consent enforcement exists
- →Ad tech revenue model depends on consent bypass - standard DPA terms cannot address this structural violation
Runtime Detections
BLACKOUT observed this vendor's JavaScript executing in a live browser and classified each hostile behavior using our BTI-C (Behavioral Threat Intelligence — Capability) taxonomy. These are not theoretical risks — each code below was triggered by something we watched this vendor's code actually do.
Evasion infrastructure, auditor bypass
Keystroke/mouse tracking
Full session replay
Impact: Behavioral targeting requires page context capture including content consumption patterns, creating GDPR Article 15 access request complications.
Ignoring CMP signals
Impact: Header bidding initiates before consent banner interaction. Every pre-consent ad auction creates GDPR Article 6 violation with €20M/4% revenue penalty exposure.
Device identification
Impact: Device fingerprinting enables cross-site ad tracking without cookies, violating ePrivacy Directive and GDPR Article 21 (right to object).
IOC Manifest
Indicators of compromise across 3 categories. Use for detection rules, CSP policies, or Pi-hole blocklists.
Ecosystem & Supply Chain
Evidence Artifacts
Artifacts collected during analysis, available with evidence-tier access.
Complete network capture with all requests and responses
146 detection signatures across scripts, domains, cookies, and network endpoints