How This Briefing Works
This report opens with key findings, then maps the gaps between what WhatConverts discloses and what BLACKOUT observed at runtime. From there: what it means for your organization, what to do about it, and the detection data and evidence underneath.
Key Findings
Analysis pending. Findings will appear here once intelligence collection is complete.
Claims vs. Observed Behavior
pending
“HIPAA compliance and PCI redaction available”
Awaiting scanner verification of JavaScript behavior, DNI implementation, and data collection endpoints at runtime
pending
“Full lead attribution across channels”
Scope of session tracking and visitor profiling needs direct observation to characterize
What This Means For You
What To Do About It
Role-specific actions based on observed behavior
Recommended Actions for WhatConverts
- →- Audit WhatConverts JavaScript deployment to understand the full scope of visitor data collected beyond attribution (session recording, behavioral tracking, device fingerprinting). - Review call recording consent mechanisms to ensure compliance with two-party consent states and GDPR — verify that adequate notice is provided to all callers before recording begins. - Map data flows from WhatConverts to all connected CRM and ad platforms to understand where recorded calls, transcripts, and lead data ultimately reside. - Evaluate API access controls to ensure call recordings and transcripts are not accessible beyond authorized personnel. - Assess data retention policies for call recordings and transcripts, and establish deletion schedules appropriate for your regulatory environment.
Negotiation Leverage
- →Leverage: WhatConverts' call recording and transcription capabilities create significant liability for its customers — negotiate for strong data breach notification commitments and indemnification covering regulatory actions related to call recording consent. The platform's HIPAA and PCI compliance options indicate awareness of sensitive data risks; insist on these protections regardless of vertical.
- →Key questions: Where are call recordings stored and for how long? Who at WhatConverts can access customer call recordings? What happens to all stored recordings and transcripts upon contract termination? Does the DNI JavaScript collect data beyond what is necessary for attribution? How are two-party consent requirements handled across state lines?
- →Contractual protections: Require encryption at rest and in transit for all call recordings. Include data deletion upon termination with certification. Negotiate for customer-controlled retention periods. Ensure the DPA specifically covers call recording as a processing activity. Include breach notification timelines shorter than regulatory minimums given the sensitivity of recorded communications.
Runtime Detections
BLACKOUT observed this vendor's JavaScript executing in a live browser and classified each hostile behavior using our BTI-C (Behavioral Threat Intelligence — Capability) taxonomy. These are not theoretical risks — each code below was triggered by something we watched this vendor's code actually do.
Keystroke/mouse tracking
Full session replay
Container/loader (neutral)
IOC Manifest
Indicators of compromise across 4 categories. Use for detection rules, CSP policies, or Pi-hole blocklists.
Ecosystem & Supply Chain
Evidence Artifacts
Artifacts collected during analysis, available with evidence-tier access.
Complete network capture with all requests and responses
106 detection signatures across scripts, domains, cookies, and network endpoints