All Vendors
dsp

Yoc

YOC operates mobile advertising infrastructure while deploying defeat devices, behavioral biometrics, session recording, cross-domain sync, consent bypass, and fingerprinting across advertising campaigns. The platform positions itself as mobile-first DSP while enabling comprehensive visitor surveillance that extends well beyond standard mobile ad delivery functionality.

128 IOCs1 detections100% pre-consent1 sites
80
Vendor Risk Score

How This Briefing Works

This report opens with key findings, then maps the gaps between what Yoc discloses and what BLACKOUT observed at runtime. From there: what it means for your organization, what to do about it, and the detection data and evidence underneath.

Key Findings

Key Findings

1 detection across 1 site100% pre-consent activity
CRITICAL

Pre-Consent Activity

Yoc was observed loading and executing before user consent was obtained on 100% of sites where it was detected.

GDPRePrivacy
Disclosure Gaps

Claims vs. Observed Behavior

1 gaps

pending

UNKNOWN
They Claim

Requires claims extraction via CDT

Observed Behavior

Defeat device, behavioral biometrics, session recording, cross-domain sync, consent bypass, and fingerprinting detected in runtime

Customer Impact

What This Means For You

Marketing teams lose cross-device attribution clarity when mobile advertising distorts visitor tracking. Analytics teams face measurement corruption from mobile-specific behavioral layering. Legal teams inherit maximum liability exposure when mobile platform deploys consent bypass. Revenue operations teams subsidize complete competitor intelligence through shared mobile advertising infrastructure.
Recommended Actions

What To Do About It

Role-specific actions based on observed behavior

If You Use Yoc

  • Audit defeat device deployment within mobile advertising infrastructure
  • Review session recording scope in mobile campaign workflows
  • Verify cross-domain sync boundaries for mobile-to-web continuity
  • Require consent collection before YOC tracking initialization

If You're Evaluating Yoc

  • Mobile DSP solutions without embedded visitor surveillance beyond ad delivery
  • Privacy-respecting mobile advertising platforms limiting tracking scope
  • Contextual mobile advertising eliminating behavioral targeting and cross-customer intelligence leakage

Negotiation Leverage

  • Challenge defeat device mechanisms within mobile advertising infrastructure
  • Require disclosure of all surveillance capabilities beyond mobile campaign delivery
  • Demand opt-out from cross-customer mobile campaign monitoring analysis
  • Request data processing agreement amendments addressing visitor tracking through mobile DSP platform
  • Negotiate liability indemnification for maximum tracking deployed through mobile advertising infrastructure
Runtime Detections

Runtime Detections

6 BTI-C CODES

BLACKOUT observed this vendor's JavaScript executing in a live browser and classified each hostile behavior using our BTI-C (Behavioral Threat Intelligence — Capability) taxonomy. These are not theoretical risks — each code below was triggered by something we watched this vendor's code actually do.

BTI-C01Defeat Device

Evasion infrastructure, auditor bypass

Impact: Detection evasion mechanisms obscure tracking deployment within mobile advertising infrastructure.

BTI-C06Behavioral Biometrics

Keystroke/mouse tracking

Impact: Mobile interaction patterns captured to enhance audience profiles and optimize mobile targeting.

BTI-C07Session Recording

Full session replay

Impact: Mobile sessions captured to contextualize advertising engagement and improve campaign delivery.

BTI-C08Cross-Domain Sync

Identity stitching

Impact: Mobile advertising synchronized across web and app environments for cross-device continuity.

BTI-C09Consent Bypass

Ignoring CMP signals

Impact: Tracking mechanisms active through mobile advertising before visitor consent collection completes.

BTI-C10Fingerprinting

Device identification

Impact: Mobile device characteristics harvested for advertising continuity across apps and mobile web.

IOC Manifest

IOC Manifest

122 INDICATORS

Indicators of compromise across 3 categories. Use for detection rules, CSP policies, or Pi-hole blocklists.

TRACK
*yoc.com/_next/static/chunks/webpack-*.js*
Tracking script
TRACK
*yoc.com/_next/static/chunks/248-*.js*
Tracking script
TRACK
*yoc.com/_next/static/chunks/app/(frontend)/%5B%5B...slug%5D%5D/layout-*.js*
Tracking script
TRACK
*yoc.com/_next/static/chunks/*-*.js*
Tracking script
TRACK
*yoc.com/_next/static/chunks/app/(frontend)/%5B%5B...slug%5D%5D/not-found-*.js*
Tracking script
TRACK
*yoc.com/_next/static/chunks/app/(frontend)/%5B%5B...slug%5D%5D/page-*.js*
Tracking script
TRACK
*yoc.com/_next/static/chunks/main-app-*.js*
Tracking script
TRACK
yoc.com/_next/static/chunks/webpack-490ff56c5efe38dd.js
Auto-extracted from scan
TRACK
yoc.com/_next/static/chunks/4bd1b696-24357e731ee7632d.js
Auto-extracted from scan
TRACK
yoc.com/_next/static/chunks/1684-837a4f7bb2f229ae.js
Auto-extracted from scan
TRACK
yoc.com/_next/static/chunks/main-app-5518523dddf30468.js
Auto-extracted from scan
TRACK
yoc.com/_next/static/chunks/6874-4763a6b37cce40d3.js
Auto-extracted from scan
TRACK
yoc.com/_next/static/chunks/3228-7042bcc9e9e0d813.js
Auto-extracted from scan
TRACK
yoc.com/_next/static/chunks/9415-45ed926b31f2cbe3.js
Auto-extracted from scan
TRACK
yoc.com/_next/static/chunks/248-f6cc547357dcdb6f.js
Auto-extracted from scan
TRACK
yoc.com/_next/static/chunks/2478-e67fcb3427c7a89b.js
Auto-extracted from scan
TRACK
yoc.com/_next/static/chunks/app/(frontend)/%5B%5B...slug%5D%5D/layout-3c5dac517dc193be.js
Auto-extracted from scan
TRACK
yoc.com/_next/static/chunks/5775-b530f31d34afc071.js
Auto-extracted from scan
TRACK
yoc.com/_next/static/chunks/app/(frontend)/%5B%5B...slug%5D%5D/page-4e17e605e3a138ec.js
Auto-extracted from scan
TRACK
yoc.com/_next/static/chunks/app/(frontend)/%5B%5B...slug%5D%5D/not-found-f9de713d25420443.js
Auto-extracted from scan
Ecosystem

Ecosystem & Supply Chain

YOC integrates with mobile advertising exchanges and app publishers, creates measurement interference through mobile-first advertising layer, and establishes cross-customer monitoring channels observing mobile campaign strategies across shared customer base.
Loads (1)
Evidence

Evidence Artifacts

Artifacts collected during analysis, available with evidence-tier access.

HAR Capture

Complete network capture with all requests and responses

IOC Manifest

128 detection signatures across scripts, domains, cookies, and network endpoints

Vendor Details