<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/">
    <channel>
        <title>Competitor Portal Blog</title>
        <link>https://competitor.geocomply.dev/updates</link>
        <description>Competitor Portal Blog</description>
        <lastBuildDate>Mon, 11 May 2026 00:00:00 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>https://github.com/jpmonette/feed</generator>
        <language>en</language>
        <item>
            <title><![CDATA[Cross-operator: iOS PlayCover sideloading blocked at Bet365 MI, Fanatics TN, Bet Saracen AR ✓]]></title>
            <link>https://competitor.geocomply.dev/updates/2026/05/11/cross-operator-playcover-blocked</link>
            <guid>https://competitor.geocomply.dev/updates/2026/05/11/cross-operator-playcover-blocked</guid>
            <pubDate>Mon, 11 May 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Desktop-based emulation of iOS applications via PlayCover is successfully restricted across all three tested operators. Bet365 and Fanatics neutralized the vector during authentication; Bet Saracen identified the unauthorized environment at the betting stage.]]></description>
            <content:encoded><![CDATA[<p><strong>Source.</strong> May 11, 2026 weekly sync — "Unsuccessful Spoofing Methods"
section.</p>
<h3 class="anchor anchorWithStickyNavbar_LWe7" id="what-we-tested">What we tested<a href="https://competitor.geocomply.dev/updates/2026/05/11/cross-operator-playcover-blocked#what-we-tested" class="hash-link" aria-label="Direct link to What we tested" title="Direct link to What we tested">​</a></h3>
<p>PlayCover-based sideloading of iOS apps onto ARM-based macOS, attempted
against three operators in three jurisdictions:</p>
<table><thead><tr><th>Operator</th><th>Geo provider</th><th>Result</th></tr></thead><tbody><tr><td><strong>Bet365 MI</strong></td><td>Xpoint (web)</td><td>✓ Neutralized at authentication</td></tr><tr><td><strong>Fanatics TN</strong></td><td>OpenBet Locator</td><td>✓ Neutralized at authentication</td></tr><tr><td><strong>Bet Saracen AR</strong></td><td>Radar</td><td>✓ Identified at the betting stage</td></tr></tbody></table>
<h3 class="anchor anchorWithStickyNavbar_LWe7" id="what-happened">What happened<a href="https://competitor.geocomply.dev/updates/2026/05/11/cross-operator-playcover-blocked#what-happened" class="hash-link" aria-label="Direct link to What happened" title="Direct link to What happened">​</a></h3>
<p><strong>No successful exploitations</strong> across the three tested jurisdictions.
All three platforms have <strong>robust defense</strong> against this hardware-
abstraction method.</p>
<h3 class="anchor anchorWithStickyNavbar_LWe7" id="why-it-matters">Why it matters<a href="https://competitor.geocomply.dev/updates/2026/05/11/cross-operator-playcover-blocked#why-it-matters" class="hash-link" aria-label="Direct link to Why it matters" title="Direct link to Why it matters">​</a></h3>
<p>PlayCover is the most credible iOS-on-Mac sideload tool. Three different
geo vendors blocking it on three different operators is a clean
"compliant tier" signal — worth recording as parity context against the
<strong>FD WV PlayCover bypass</strong> on the same day, which is the outlier.</p>
<p><a href="https://competitor.geocomply.dev/updates/2026/05/11/radar-fd-wv-three-method-bypass">FD WV PlayCover bypass (failure) →</a> ·
<a href="https://competitor.geocomply.dev/weekly/2026-05-11">May 11 weekly sync →</a></p>]]></content:encoded>
            <category>radar</category>
            <category>xpoint</category>
            <category>openbet</category>
            <category>playcover</category>
            <category>sideload</category>
            <category>positive</category>
        </item>
        <item>
            <title><![CDATA[DraftKings DFS NJ migrated from GeoComply to Radar (web only)]]></title>
            <link>https://competitor.geocomply.dev/updates/2026/05/11/draftkings-dfs-nj-radar-migration</link>
            <guid>https://competitor.geocomply.dev/updates/2026/05/11/draftkings-dfs-nj-radar-migration</guid>
            <pubDate>Mon, 11 May 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Confirmed provider transition: DraftKings has moved its New Jersey DFS web product from GeoComply to Radar. Sportsbook and mobile apps stay on GeoComply. Dual-vendor compliance testing underway.]]></description>
            <content:encoded><![CDATA[<p><strong>What happened.</strong> DraftKings has moved its <strong>web DFS product in New
Jersey</strong> from GeoComply to <strong>Radar</strong>.</p>
<p><strong>What stayed.</strong> The DraftKings Sportsbook and the DraftKings mobile apps
remain on <strong>GeoComply</strong>. This is a partial-displacement, not a wholesale
loss.</p>
<p><strong>Open question being tested.</strong> Whether running two different geolocation
providers side by side introduces compliance or security gaps — internal
ticket <a href="https://geocomply.atlassian.net/browse/CIV-65" target="_blank" rel="noopener noreferrer"><strong>CIV-65: DraftKings DFS - validate the competitor's integration</strong></a>.</p>
<p><strong>Why it matters.</strong> This is Radar's first major US live-traffic win on a
Tier-1 operator. The sales narrative is two-sided:</p>
<ul>
<li><strong>Concerning:</strong> DK's procurement team has now signed off on Radar for a
regulated US product. Other operators may treat this as permission.</li>
<li><strong>Constructive:</strong> The pattern "challenger gets the DFS web slice, GeoComply
keeps everything else" is the new template for second-source attempts.
Lead with "we keep the high-stakes stuff" in displacement conversations.</li>
</ul>
<p><strong>Counter-evidence.</strong> Radar's compliance gaps across other operators
(rooted-hidden Android, resigned iOS, GPS simulator, jailbroken iOS at
Sleeper/PrizePicks/Fliff, Chrome extension at Underdog) are independent
of this migration and should be in every DK-adjacent conversation.</p>
<p><a href="https://competitor.geocomply.dev/competitors/radar">Radar profile →</a></p>]]></content:encoded>
            <category>radar</category>
            <category>draftkings</category>
            <category>displacement</category>
            <category>dfs-nj</category>
        </item>
        <item>
            <title><![CDATA[Radar / FanDuel WV: three exploitation methods bypass restrictions from Tennessee]]></title>
            <link>https://competitor.geocomply.dev/updates/2026/05/11/radar-fd-wv-three-method-bypass</link>
            <guid>https://competitor.geocomply.dev/updates/2026/05/11/radar-fd-wv-three-method-bypass</guid>
            <pubDate>Mon, 11 May 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Confirmed compliance vulnerabilities at FanDuel WV: users can bypass geographical restrictions from Tennessee via iOS app resigning, virtualised environment emulation via VMOS, and sideloading via PlayCover on ARM-based macOS. Each technique successfully facilitated out-of-state betting.]]></description>
            <content:encoded><![CDATA[<p><strong>Source.</strong> <a href="https://competitor.geocomply.dev/weekly/2026-05-11">May 11, 2026 weekly sync</a>.<br>
<strong>Test evidence (internal Drive):</strong> <a href="https://drive.google.com/drive/u/0/folders/0AJBslLvZZvDpUk9PVA" target="_blank" rel="noopener noreferrer">PlayCover videos</a> · <a href="https://drive.google.com/drive/u/0/folders/0AJBslLvZZvDpUk9PVA" target="_blank" rel="noopener noreferrer">FD WV: Spoofing Tests</a></p>
<h3 class="anchor anchorWithStickyNavbar_LWe7" id="what-we-tested">What we tested<a href="https://competitor.geocomply.dev/updates/2026/05/11/radar-fd-wv-three-method-bypass#what-we-tested" class="hash-link" aria-label="Direct link to What we tested" title="Direct link to What we tested">​</a></h3>
<p>Three distinct exploitation methods against the FanDuel WV (Radar)
deployment, from Tennessee:</p>
<ol>
<li><strong>iOS app resigning</strong> — re-signed FanDuel iOS app with security
controls bypassed.</li>
<li><strong>Virtualised environment emulation via VMOS</strong> — Android device-farm
environment running a cloned profile.</li>
<li><strong>Sideloading via PlayCover on ARM-based macOS</strong> — iOS app loaded
on Apple Silicon Mac via PlayCover.</li>
</ol>
<h3 class="anchor anchorWithStickyNavbar_LWe7" id="what-happened">What happened<a href="https://competitor.geocomply.dev/updates/2026/05/11/radar-fd-wv-three-method-bypass#what-happened" class="hash-link" aria-label="Direct link to What happened" title="Direct link to What happened">​</a></h3>
<p><strong>All three succeeded.</strong> Each technique facilitated out-of-state betting
on the WV app. Critical and persistent failure to prevent unauthorized
access or potential multi-accounting activities.</p>
<h3 class="anchor anchorWithStickyNavbar_LWe7" id="cross-reference--same-vectors-different-results-elsewhere">Cross-reference — same vectors, different results elsewhere<a href="https://competitor.geocomply.dev/updates/2026/05/11/radar-fd-wv-three-method-bypass#cross-reference--same-vectors-different-results-elsewhere" class="hash-link" aria-label="Direct link to Cross-reference — same vectors, different results elsewhere" title="Direct link to Cross-reference — same vectors, different results elsewhere">​</a></h3>
<ul>
<li>iOS app <strong>resigning</strong> was <strong>detected</strong> at Bet Saracen AR on April 7 — see
<a href="https://competitor.geocomply.dev/updates/2026/04/07/radar-saracen-resigned-ios-detected">Radar / Saracen AR: resigned iOS app detected</a>.
The gap is FD-WV-specific or build-specific.</li>
<li><strong>PlayCover</strong> was <strong>detected</strong> at Bet365 MI, Fanatics TN, and Bet Saracen AR
on the same day — see <a href="https://competitor.geocomply.dev/updates/2026/05/11/cross-operator-playcover-blocked">cross-operator PlayCover blocked</a>.
FD WV is the outlier.</li>
<li><strong>VMOS</strong> is also undetected at Bet Saracen AR — see
<a href="https://competitor.geocomply.dev/updates/2026/05/11/radar-saracen-vmos-not-detected">Bet Saracen AR: VMOS not detected</a>.
The Android device-farm gap is wider than just FD WV.</li>
</ul>
<p><a href="https://competitor.geocomply.dev/competitors/radar">Radar profile →</a> ·
<a href="https://competitor.geocomply.dev/weekly/2026-05-11">May 11 weekly sync →</a></p>]]></content:encoded>
            <category>radar</category>
            <category>fanduel-wv</category>
            <category>ios-resigning</category>
            <category>vmos</category>
            <category>playcover</category>
        </item>
        <item>
            <title><![CDATA[Radar / Bet Saracen AR: VMOS not detected — but PlayCover + resigned iOS blocked ✓]]></title>
            <link>https://competitor.geocomply.dev/updates/2026/05/11/radar-saracen-vmos-not-detected</link>
            <guid>https://competitor.geocomply.dev/updates/2026/05/11/radar-saracen-vmos-not-detected</guid>
            <pubDate>Mon, 11 May 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Radar was unable to identify virtualized device simulation through VMOS, which permitted a successful out-of-state bet from Tennessee. However, Radar correctly detected and restricted sideloading via PlayCover and the use of resigned iOS apps during the betting process.]]></description>
            <content:encoded><![CDATA[<p><strong>Source.</strong> <a href="https://competitor.geocomply.dev/weekly/2026-05-11">May 11, 2026 weekly sync</a>. Test video: <a href="https://drive.google.com/drive/u/0/folders/0AJBslLvZZvDpUk9PVA" target="_blank" rel="noopener noreferrer">BetSaracen VMOS Test.mov</a>
(internal Drive).</p>
<h3 class="anchor anchorWithStickyNavbar_LWe7" id="what-we-tested">What we tested<a href="https://competitor.geocomply.dev/updates/2026/05/11/radar-saracen-vmos-not-detected#what-we-tested" class="hash-link" aria-label="Direct link to What we tested" title="Direct link to What we tested">​</a></h3>
<p>Three spoof vectors against Bet Saracen AR (Radar): VMOS Android
device-farm, PlayCover sideloading on ARM-based macOS, resigned iOS app.</p>
<h3 class="anchor anchorWithStickyNavbar_LWe7" id="what-happened">What happened<a href="https://competitor.geocomply.dev/updates/2026/05/11/radar-saracen-vmos-not-detected#what-happened" class="hash-link" aria-label="Direct link to What happened" title="Direct link to What happened">​</a></h3>
<ul>
<li><strong>VMOS (Android)</strong> — <strong>NOT detected</strong>. Out-of-state bet placed from
Tennessee.</li>
<li><strong>PlayCover (ARM macOS)</strong> — <strong>detected and restricted</strong> ✓</li>
<li><strong>Resigned iOS app</strong> — <strong>detected and blocked</strong> ✓</li>
</ul>
<h3 class="anchor anchorWithStickyNavbar_LWe7" id="why-it-matters">Why it matters<a href="https://competitor.geocomply.dev/updates/2026/05/11/radar-saracen-vmos-not-detected#why-it-matters" class="hash-link" aria-label="Direct link to Why it matters" title="Direct link to Why it matters">​</a></h3>
<p>The mixed result confirms Radar's posture is per-vector-uneven: catches
the ARM-macOS hardware-abstraction vector and resigned iOS app integrity,
but the Android VMOS device-farm slips through. This is also the second
operator (after FanDuel WV) where the same VMOS gap shows up — a
structural Android detector issue.</p>
<p><a href="https://competitor.geocomply.dev/competitors/radar">Radar profile →</a> ·
<a href="https://competitor.geocomply.dev/updates/2026/05/11/radar-fd-wv-three-method-bypass">FD WV three-method bypass →</a> ·
<a href="https://competitor.geocomply.dev/weekly/2026-05-11">May 11 weekly sync →</a></p>]]></content:encoded>
            <category>radar</category>
            <category>saracen</category>
            <category>vmos</category>
            <category>playcover</category>
            <category>resigned-ios</category>
        </item>
        <item>
            <title><![CDATA[RobinHood (TN, prediction markets): no device-level geolocation — IP-only, trivially bypassed]]></title>
            <link>https://competitor.geocomply.dev/updates/2026/05/11/robinhood-no-device-geo</link>
            <guid>https://competitor.geocomply.dev/updates/2026/05/11/robinhood-no-device-geo</guid>
            <pubDate>Mon, 11 May 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Replay-attack testing on RobinHood TN: no device-level geolocation in place. RobinHood relies solely on IP to verify player location. Basic spoofing tools went undetected — bypass requires zero technical skill.]]></description>
            <content:encoded><![CDATA[<p><strong>What we tested.</strong> RobinHood Tennessee prediction-markets product. Internal
ticket <a href="https://geocomply.atlassian.net/browse/CIV-60" target="_blank" rel="noopener noreferrer"><strong>CIV-60: RobinHood - RAT</strong></a>. Replay-attack test cycle (<a href="https://competitor.geocomply.dev/weekly/2026-05-11">May 11
weekly</a>).</p>
<p><strong>What happened.</strong> <strong>No device-level geolocation in place.</strong> RobinHood
relies solely on IP address to verify player location. Basic location-
spoofing tools went undetected. A player can bypass all location
restrictions without any sophisticated technical knowledge.</p>
<p><strong>Why it matters.</strong> This is not a geo vendor finding — RobinHood is <strong>not
using a geolocation product</strong>. It falls significantly short of regulated
gaming standards and represents a meaningful compliance exposure. Worth
tracking as a competitive opportunity (RobinHood prediction markets is a
greenfield for a real geo product) and as context when evaluating
competitor footprints in prediction markets (Kalshi, Polymarket are also
in Locance's expansion list).</p>
<p><strong>Cross-reference, same test cycle.</strong> Bet365 TN (Radar) replay-attack:
network-level attacks <strong>fully blocked</strong>. Minor visibility gap in the
verification flow but not exploitable in practice — no compliance risk.</p>
<p><a href="https://competitor.geocomply.dev/competitors/radar">Radar profile →</a> ·
<a href="https://competitor.geocomply.dev/competitors/xpoint">Xpoint profile →</a></p>]]></content:encoded>
            <category>robinhood</category>
            <category>replay-attack</category>
            <category>ip-only</category>
            <category>prediction-markets</category>
        </item>
        <item>
            <title><![CDATA[OpenBet / Fanatics TN: HopToDesk + iPhone screen mirroring bypassed detection]]></title>
            <link>https://competitor.geocomply.dev/updates/2026/05/05/openbet-fanatics-hoptodesk-iphone-mirror</link>
            <guid>https://competitor.geocomply.dev/updates/2026/05/05/openbet-fanatics-hoptodesk-iphone-mirror</guid>
            <pubDate>Tue, 05 May 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Fanatics TN flagship deployment: HopToDesk + iPhone screen mirroring both bypassed OpenBet Locator's RDP protocols. Out-of-Tennessee wagering succeeded on both iOS and Android.]]></description>
            <content:encoded><![CDATA[<p><strong>What we tested.</strong> Fanatics Sportsbook TN deployment (full OpenBet Locator
Protect Suite, live since Dec 2025). Drove remote sessions via <strong>HopToDesk</strong>
on Android and <strong>iPhone screen mirroring</strong> on iOS, from outside Tennessee.</p>
<p><strong>What happened.</strong> Both tools bypassed Locator's RDP detection. Out-of-state
wagering succeeded on both platforms.</p>
<p><strong>Three more gaps from the same test cycle (May 5 weekly).</strong></p>
<ul>
<li><strong>No state border buffer zones</strong> — players within 50m of the boundary experience frequent state-switching, persistent page refreshes, and inability to finalise cash-out.</li>
<li><strong>No IP-change monitoring</strong> — IP address changes during active sessions are not flagged. A critical spoofing indicator is missed.</li>
<li><strong>VPN restriction false positives</strong> — aggressive VPN blocks fire on legitimate corporate-network users, increasing support overhead.</li>
</ul>
<p><strong>Why it matters.</strong> Four distinct compliance gaps in a single Fanatics TN
test, all in the flagship US deployment. This is the single strongest sales
asset against a bundled-OpenBet platform pitch. Pair with the prior border-
jumping finding and the TQJ-churn data point.</p>
<p><a href="https://competitor.geocomply.dev/competitors/openbet">OpenBet profile →</a> ·
<a href="https://docs.google.com/spreadsheets/d/1OKlnWRok8yVWMQptCCWgHSXR-6OOJ8zcE5gr4PFUy3c/edit?gid=1822681531" target="_blank" rel="noopener noreferrer">SDK comparison →</a></p>]]></content:encoded>
            <category>openbet</category>
            <category>fanatics</category>
            <category>hoptodesk</category>
            <category>iphone-mirror</category>
            <category>rdp</category>
        </item>
        <item>
            <title><![CDATA[Radar / Saracen AR: 100m from border — Mac 44% pass rate, Windows persistent lockout]]></title>
            <link>https://competitor.geocomply.dev/updates/2026/05/05/radar-saracen-100m-mac-44pct</link>
            <guid>https://competitor.geocomply.dev/updates/2026/05/05/radar-saracen-100m-mac-44pct</guid>
            <pubDate>Tue, 05 May 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Saracen AR proximity testing: success rates remained high beyond 350m from the state line, but at 100m Mac devices only cleared 44% of verifications. Windows users experienced a persistent lockout after a single failure, complicated by an atypical 'fraud_jumped_single_device' flag during betting attempts.]]></description>
            <content:encoded><![CDATA[<p><strong>Source.</strong> <a href="https://competitor.geocomply.dev/weekly/2026-05-05">May 5, 2026 weekly sync</a> (monthly brief) — Radar Browser-Based
Solution / Saracen AR section. Full recording: <a href="https://drive.google.com/drive/u/0/folders/0AJBslLvZZvDpUk9PVA" target="_blank" rel="noopener noreferrer">BetSaracenFullTestingSession.mov</a>
(21 min, internal Drive).</p>
<h3 class="anchor anchorWithStickyNavbar_LWe7" id="what-we-tested">What we tested<a href="https://competitor.geocomply.dev/updates/2026/05/05/radar-saracen-100m-mac-44pct#what-we-tested" class="hash-link" aria-label="Direct link to What we tested" title="Direct link to What we tested">​</a></h3>
<p>Distance-graded validation runs against Bet Saracen AR (Radar
browser-based deployment) from inside the regulated jurisdiction, on
Mac + Windows desktops.</p>
<h3 class="anchor anchorWithStickyNavbar_LWe7" id="what-happened">What happened<a href="https://competitor.geocomply.dev/updates/2026/05/05/radar-saracen-100m-mac-44pct#what-happened" class="hash-link" aria-label="Direct link to What happened" title="Direct link to What happened">​</a></h3>
<ul>
<li><strong>350m+ from the state line</strong> — success rates remained high. ✓</li>
<li><strong>100m mark</strong> — Mac devices cleared only <strong>44%</strong> of verifications.</li>
<li><strong>Windows users</strong> — hit a <strong>persistent lockout</strong> after a single failure,
further complicated by an atypical <code>fraud_jumped_single_device</code> flag
during betting attempts.</li>
</ul>
<h3 class="anchor anchorWithStickyNavbar_LWe7" id="why-it-matters">Why it matters<a href="https://competitor.geocomply.dev/updates/2026/05/05/radar-saracen-100m-mac-44pct#why-it-matters" class="hash-link" aria-label="Direct link to Why it matters" title="Direct link to Why it matters">​</a></h3>
<p>100m is a city-block distance — well inside the state. A 44% pass rate
at that range is direct booked-bet revenue loss for the operator. The
Windows persistent-lockout behaviour is worse: a single retry triggers
an account-level block with no clear self-service recovery path. Support
ticket volume scales linearly.</p>
<p>The <code>fraud_jumped_single_device</code> flag is interesting — it suggests
Radar's device-fingerprint logic is misidentifying repeat verification
attempts as suspicious device-jumping behaviour. Pair with the Underdog
DFS device-counting bug (every login = new device) — same architectural
class of problem.</p>
<p><a href="https://competitor.geocomply.dev/competitors/radar">Radar profile →</a> ·
<a href="https://competitor.geocomply.dev/updates/2026/04/28/radar-chrome-extension-underdog">Underdog device-counting bug →</a> ·
<a href="https://competitor.geocomply.dev/weekly/2026-05-05">May 5 weekly sync →</a></p>]]></content:encoded>
            <category>radar</category>
            <category>saracen</category>
            <category>near-border</category>
            <category>100m</category>
            <category>fraud-jumped-single-device</category>
        </item>
        <item>
            <title><![CDATA[Radar / Saracen AR: AnyDesk + TeamViewer correctly restricted]]></title>
            <link>https://competitor.geocomply.dev/updates/2026/05/05/radar-saracen-anydesk-detected</link>
            <guid>https://competitor.geocomply.dev/updates/2026/05/05/radar-saracen-anydesk-detected</guid>
            <pubDate>Tue, 05 May 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Saracen AR Radar deployment: active sessions via AnyDesk and TeamViewer were effectively restricted. A rare positive Radar result — worth recording for parity.]]></description>
            <content:encoded><![CDATA[<p><strong>What we tested.</strong> Bet Saracen Arkansas, Radar browser-based deployment.
Driven sessions via <strong>AnyDesk</strong> and <strong>TeamViewer</strong>.</p>
<p><strong>What happened.</strong> Radar effectively restricted both active sessions —
wagering outside permitted borders was prevented during tool operation.</p>
<p><strong>Why it matters.</strong> This is one of the few positive Radar results we have.
Sales conversations should be honest: AnyDesk + TeamViewer are detected at
Saracen AR. The narrative is "Radar catches the obvious ones but misses the
adjacent ones."</p>
<p><strong>Cross-reference (same test cycle, less positive).</strong></p>
<ul>
<li>Pre-loaded Windows "Remote Screen Sharing" triggered account restriction silently — false-positive RDP flag, high support-ticket risk.</li>
<li>Cross-Boundary Validation passed: attempts to wager from Oklahoma uniformly blocked across all test cases.</li>
<li>350m+ from border: high success rates. 100m: <strong>Mac 44% pass rate</strong>; Windows users hit <strong>persistent lockout after a single failure</strong> with atypical <code>fraud_jumped_single_device</code> flag.</li>
</ul>
<p><strong>Action.</strong> Add HopToDesk, iPhone screen mirroring, RustDesk, VNC, MS Teams
remote-control to the Radar test scope per the May 11 Betting Hero plan —
these are the adjacent tools that distinguish "catches the obvious" from
"is a compliance product."</p>
<p><a href="https://competitor.geocomply.dev/competitors/radar">Radar profile →</a></p>]]></content:encoded>
            <category>radar</category>
            <category>saracen</category>
            <category>anydesk</category>
            <category>teamviewer</category>
            <category>positive</category>
        </item>
        <item>
            <title><![CDATA[Radar / Saracen AR: pre-loaded Windows 'Remote Screen Sharing' silently blocks accounts]]></title>
            <link>https://competitor.geocomply.dev/updates/2026/05/05/radar-saracen-remote-screen-sharing-false-positive</link>
            <guid>https://competitor.geocomply.dev/updates/2026/05/05/radar-saracen-remote-screen-sharing-false-positive</guid>
            <pubDate>Tue, 05 May 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[The pre-loaded Windows Remote Desktop Connection app ('Remote Screen Sharing') triggers account restrictions without notifying the user. Significant risk for support teams — high ticket volumes and player dissatisfaction with no clear resolution path.]]></description>
            <content:encoded><![CDATA[<p><strong>Source.</strong> May 5, 2026 weekly sync.</p>
<h3 class="anchor anchorWithStickyNavbar_LWe7" id="the-finding">The finding<a href="https://competitor.geocomply.dev/updates/2026/05/05/radar-saracen-remote-screen-sharing-false-positive#the-finding" class="hash-link" aria-label="Direct link to The finding" title="Direct link to The finding">​</a></h3>
<p>The pre-loaded Windows <strong>Remote Desktop Connection app</strong> (labelled
<em>"Remote Screen Sharing"</em> in the OS) triggers Radar account
restrictions <strong>without notifying the user</strong>.</p>
<h3 class="anchor anchorWithStickyNavbar_LWe7" id="why-it-matters">Why it matters<a href="https://competitor.geocomply.dev/updates/2026/05/05/radar-saracen-remote-screen-sharing-false-positive#why-it-matters" class="hash-link" aria-label="Direct link to Why it matters" title="Direct link to Why it matters">​</a></h3>
<p>This is a <strong>false-positive RDP flag</strong>: the app is present on virtually
every Windows install, and is not running an active remote session.
Triggering account restrictions silently from its mere presence is the
worst case for support teams — the user has no idea what failed, no
suggested resolution path, and no diagnostic message.</p>
<h3 class="anchor anchorWithStickyNavbar_LWe7" id="cross-reference-same-test-cycle">Cross-reference (same test cycle)<a href="https://competitor.geocomply.dev/updates/2026/05/05/radar-saracen-remote-screen-sharing-false-positive#cross-reference-same-test-cycle" class="hash-link" aria-label="Direct link to Cross-reference (same test cycle)" title="Direct link to Cross-reference (same test cycle)">​</a></h3>
<p>On the <strong>same operator + same week</strong>, AnyDesk and TeamViewer were
correctly restricted during <strong>active</strong> sessions (<a href="https://competitor.geocomply.dev/updates/2026/05/05/radar-saracen-anydesk-detected">positive result</a>).
So the detector posture is: detects two real RDP tools, false-positives
on one pre-installed Windows app it shouldn't flag. The RDP class is
where Radar is most inconsistent.</p>
<p><a href="https://competitor.geocomply.dev/competitors/radar">Radar profile →</a> ·
<a href="https://competitor.geocomply.dev/weekly/2026-05-05">May 5 weekly sync →</a></p>]]></content:encoded>
            <category>radar</category>
            <category>saracen</category>
            <category>rdp</category>
            <category>false-positive</category>
            <category>windows</category>
        </item>
        <item>
            <title><![CDATA[Monthly social brief: location verification failures = 38% of all complaints]]></title>
            <link>https://competitor.geocomply.dev/updates/2026/05/05/social-location-failures-38pct</link>
            <guid>https://competitor.geocomply.dev/updates/2026/05/05/social-location-failures-38pct</guid>
            <pubDate>Tue, 05 May 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[May 5 monthly brief: location verification failures dominate end-user complaints (38% of all findings), with DraftKings (11) and FanDuel (9) generating the highest complaint volumes across March 30 – April 27.]]></description>
            <content:encoded><![CDATA[<p><strong>Source.</strong> Monthly social-media brief, May 5 weekly sync. Reddit + X /
Twitter monitoring. Span: March 30 → April 27, 2026.</p>
<h3 class="anchor anchorWithStickyNavbar_LWe7" id="volumes">Volumes<a href="https://competitor.geocomply.dev/updates/2026/05/05/social-location-failures-38pct#volumes" class="hash-link" aria-label="Direct link to Volumes" title="Direct link to Volumes">​</a></h3>
<ul>
<li><strong>Location verification failures</strong> dominate end-user complaints — <strong>38%
of all findings</strong> in the monitoring window.</li>
<li><strong>DraftKings: 11 mentions</strong> — app lag causing re-verify loops.</li>
<li><strong>FanDuel: 9 mentions</strong> — location dropping mid-session.</li>
</ul>
<p>Both patterns are consistent with <strong>geo-check frequency friction</strong>, not
outright failures. That's an account-management conversation, not a
displacement conversation.</p>
<h3 class="anchor anchorWithStickyNavbar_LWe7" id="circumvention-sophistication-is-growing">Circumvention sophistication is growing<a href="https://competitor.geocomply.dev/updates/2026/05/05/social-location-failures-38pct#circumvention-sophistication-is-growing" class="hash-link" aria-label="Direct link to Circumvention sophistication is growing" title="Direct link to Circumvention sophistication is growing">​</a></h3>
<p>Circumvention attempts are present in every weekly report and rising:
<strong>2 → 3 flags per week</strong>. The community has moved beyond basic VPN
queries to peer-sharing GPS spoofing and mock-location methods on Reddit.
An active <strong>DraftKings VPN bypass thread</strong> was still gaining replies in
the April 27 report. Reddit-sourced bypass methods should feed directly
into our spoofing test backlog.</p>
<blockquote>
<p><strong>ACTION ITEM:</strong> All spoofing cases (even implied) should be reported to
the testing team to reproduce. Claimed DK Magisk bypass — test already
requested.</p>
</blockquote>
<h3 class="anchor anchorWithStickyNavbar_LWe7" id="kyc-friction-is-the-halo-problem-23">KYC friction is the halo problem (23%)<a href="https://competitor.geocomply.dev/updates/2026/05/05/social-location-failures-38pct#kyc-friction-is-the-halo-problem-23" class="hash-link" aria-label="Direct link to KYC friction is the halo problem (23%)" title="Direct link to KYC friction is the halo problem (23%)">​</a></h3>
<p>KYC friction (23% of findings) is concentrated at <strong>Fanatics</strong> and
<strong>DraftKings</strong> — duplicate account suspensions, document rejection loops,
2+ week verification delays, SSN privacy objections.</p>
<blockquote>
<p><strong>QUESTION:</strong> Do we want to perform KYC competitor research? Do we want
a list of all geolocation operators and their known KYC, with feedback
about every KYC provider?</p>
</blockquote>]]></content:encoded>
            <category>social</category>
            <category>monthly-brief</category>
            <category>draftkings</category>
            <category>fanduel</category>
        </item>
        <item>
            <title><![CDATA[Radar / Underdog DFS: Chrome extension (Location Guard) undetected]]></title>
            <link>https://competitor.geocomply.dev/updates/2026/04/28/radar-chrome-extension-underdog</link>
            <guid>https://competitor.geocomply.dev/updates/2026/04/28/radar-chrome-extension-underdog</guid>
            <pubDate>Tue, 28 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Underdog DFS browser-based Radar deployment: location-spoofing via the free Location Guard Chrome extension was not detected. Free, no technical skill required.]]></description>
            <content:encoded><![CDATA[<p><strong>What we tested.</strong> Underdog DFS, browser-based Radar geolocation deployment.
Installed the free <strong>Location Guard</strong> Chrome extension and reported a spoofed
location.</p>
<p><strong>What happened.</strong> Undetected. Radar did not flag the browser-extension
spoofing.</p>
<p><strong>Adjacent gaps from the same test (April 28 weekly).</strong></p>
<ul>
<li><strong>Device-counting logic flaw</strong> — every login at Underdog is recorded as a new device, regardless of whether the device has been seen before. Inflates device counts and prevents multi-account detection — significantly weakening fraud detection.</li>
<li><strong>Border crossing</strong> — testing confirmed users can continue placing wagers for <strong>approximately 1 minute</strong> after entering a restricted zone before Radar intervenes. Regulatory compliance risk.</li>
<li><strong>Increased geolocation frequency + buffer-zone false positives</strong> — no single-license support; more frequent checks; unnecessary failures.</li>
<li><strong>Loss of meaningful error messaging</strong> — generic error messages for all geolocation failures post-GeoComply switch; ability to self-troubleshoot eliminated; support contact volume likely up.</li>
</ul>
<p><strong>Why it matters.</strong> A free Chrome extension that anyone can install
defeating Radar's regulated-DFS deployment is the entry-level
sophistication. The device-counting flaw makes multi-accounting effectively
free. Bundle these into the Underdog talking points.</p>
<p><a href="https://competitor.geocomply.dev/competitors/radar">Radar profile →</a></p>]]></content:encoded>
            <category>radar</category>
            <category>underdog</category>
            <category>browser-extension</category>
            <category>location-guard</category>
        </item>
        <item>
            <title><![CDATA[Radar v3.31.0 (Apr 24, 2026): SDK generates geofence events offline, without server]]></title>
            <link>https://competitor.geocomply.dev/updates/2026/04/28/radar-v3-31-offline-geofence</link>
            <guid>https://competitor.geocomply.dev/updates/2026/04/28/radar-v3-31-offline-geofence</guid>
            <pubDate>Tue, 28 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Notable Radar SDK release: when the backend is unreachable, the SDK generates geofence entry/exit events directly on the device from cached data, tagged as offline. Backend-toggled. Watch point: does this satisfy regulatory requirements?]]></description>
            <content:encoded><![CDATA[<p><strong>What's new.</strong> Radar SDK iOS + Android <strong>v3.31.0</strong> released April 24, 2026.
The notable feature: <strong>when Radar's backend is unreachable, the SDK
generates geofence entry/exit events directly on the device from cached
data, tagged as offline.</strong></p>
<p>It's a backend-toggled feature (Radar's backend enables it per integration),
so we don't yet know whether it will be enabled for gaming markets. Tracking
intensity also adjusts automatically based on geofence context — even
mid-outage.</p>
<p><strong>Why it matters.</strong> This is a meaningful step in Radar's strategic
direction documented in the Apr 14 weekly: shifting from "where is the
user?" to "can we continuously trust this location?" The 3-week-to-2-month
release cadence is producing functionality that's interesting in retail / non-
gaming contexts but unproven in regulated contexts.</p>
<p><strong>Watch point.</strong> We need to validate whether offline-generated geofence
events satisfy regulatory requirements (the regulator typically expects a
server-side decision and full audit trail per transaction). If Radar
enables offline events on a gaming integration, this is a finding worth
escalating.</p>
<p><strong>GitHub monitoring.</strong> As of Apr 14, we are subscribed to both XPoint and
Radar GitHub repos to track new releases, SDK changes, and any publicly
visible technical updates going forward.</p>
<p><a href="https://competitor.geocomply.dev/competitors/radar">Radar profile →</a></p>]]></content:encoded>
            <category>radar</category>
            <category>sdk-release</category>
            <category>offline-geofence</category>
            <category>v3.31.0</category>
        </item>
        <item>
            <title><![CDATA[Fanatics (OpenBet) account suspension immediately after a winning streak]]></title>
            <link>https://competitor.geocomply.dev/updates/2026/04/28/social-fanatics-winning-streak-suspension</link>
            <guid>https://competitor.geocomply.dev/updates/2026/04/28/social-fanatics-winning-streak-suspension</guid>
            <pubDate>Tue, 28 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[April 28 weekly: Two new KYC entries for Fanatics. Users report selfie/ID scans failing repeatedly on sign-up, and a separate account suspension immediately following a winning streak — funds held, bank statements submitted, no resolution.]]></description>
            <content:encoded><![CDATA[<p><strong>Source.</strong> April 28 weekly end-user-feedback section.</p>
<p><strong>The signals.</strong></p>
<ul>
<li><strong>Fanatics users report selfie / ID scans failing repeatedly on sign-up.</strong></li>
<li>A <strong>separate account suspension immediately following a winning streak</strong> — with funds held and bank statements submitted but no resolution.</li>
</ul>
<p>Consistent with the pattern of negative Fanatics / OpenBet sentiment
tracked since February.</p>
<p><strong>Why this matters.</strong> The "post-winning-streak suspension" is a specific
fraud-investigation playbook problem that operators run into when their
KYC + geo + risk stack is uncoordinated. Locator's lack of IP-change
monitoring (May 5 test) and the absence of state-line buffer zones
(50m state-switching at Fanatics TN) compound the post-win review pile.</p>
<p><strong>Bigger pattern (May 5 monthly brief).</strong> KYC friction is now <strong>23% of
all end-user complaints</strong> in monitoring. Not a geo issue but creates
halo damage: users conflate geo lockouts and KYC holds into a single
"the app won't let me play" complaint.</p>
<p><a href="https://competitor.geocomply.dev/competitors/openbet">OpenBet profile →</a></p>]]></content:encoded>
            <category>social</category>
            <category>fanatics</category>
            <category>openbet</category>
            <category>kyc</category>
            <category>account-suspension</category>
        </item>
        <item>
            <title><![CDATA[Radar desktop UX issues: auto-launch, hotspot incompatibility, 4% CPU pulses, macOS/Chrome compat gaps]]></title>
            <link>https://competitor.geocomply.dev/updates/2026/04/14/radar-desktop-ux-bundle</link>
            <guid>https://competitor.geocomply.dev/updates/2026/04/14/radar-desktop-ux-bundle</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[April 14 testing surfaced five distinct desktop UX problems on Radar Verify: persistent install download prompts, auto-launch on system startup without consent, 4% CPU spikes every 10s at 600m from the border, mobile-hotspot incompatibility, and inconsistent behaviour across macOS 26.0.1 vs 26.3.1 and Chrome 146 vs 147.]]></description>
            <content:encoded><![CDATA[<p><strong>Source.</strong> April 14, 2026 weekly sync — Installation, Network, and
Software Compatibility sections.</p>
<h3 class="anchor anchorWithStickyNavbar_LWe7" id="the-findings">The findings<a href="https://competitor.geocomply.dev/updates/2026/04/14/radar-desktop-ux-bundle#the-findings" class="hash-link" aria-label="Direct link to The findings" title="Direct link to The findings">​</a></h3>
<ul>
<li><strong>Mobile Hotspot Incompatibility</strong> — geolocation verification is
unstable when connected via mobile hotspots on Mac + Windows; prevents
legitimate wagering.</li>
<li><strong>Installation Workflow</strong> — access denial during web installation
triggers <strong>persistent download prompts</strong>, regardless of whether the
software is already on the system.</li>
<li><strong>Auto-Launch</strong> — Radar initiates <strong>automatically on system startup</strong>
(Mac + Windows) <strong>without consent</strong>. Intrusive UX, support load.</li>
<li><strong>Desktop CPU</strong> — location checks trigger <strong>4% CPU spikes every 10s
at 600m from the border</strong>. Consistent resource drain — and the
closer you get to the border, the more frequent the checks.</li>
<li><strong>Software Compatibility</strong> — inconsistent Radar performance across
<strong>macOS Tahoe 26.0.1 vs 26.3.1</strong> and <strong>Chrome 146 vs 147</strong>. Point
releases break the integration.</li>
</ul>
<h3 class="anchor anchorWithStickyNavbar_LWe7" id="why-it-matters">Why it matters<a href="https://competitor.geocomply.dev/updates/2026/04/14/radar-desktop-ux-bundle#why-it-matters" class="hash-link" aria-label="Direct link to Why it matters" title="Direct link to Why it matters">​</a></h3>
<p>Three of these (auto-launch, install prompts, hotspot incompat) generate
support tickets. The CPU pulses are not catastrophic but become
noticeable on poker tables. The macOS / Chrome version sensitivity is
the most concerning — Radar's desktop integration is fragile across the
exact version range that most US users sit on.</p>
<p>For BetSaracen players this stacks on top of the existing generic
<em>"account security"</em> error messaging (no diagnostic data, high
self-troubleshoot friction).</p>
<p><a href="https://competitor.geocomply.dev/competitors/radar">Radar profile →</a> ·
<a href="https://competitor.geocomply.dev/weekly/2026-04-14">April 14 weekly sync →</a></p>]]></content:encoded>
            <category>radar</category>
            <category>saracen</category>
            <category>verify-desktop</category>
            <category>cpu</category>
            <category>auto-launch</category>
        </item>
        <item>
            <title><![CDATA[Radar near-border: validation fails until 100m (iOS) and 220m (Android) from OK line]]></title>
            <link>https://competitor.geocomply.dev/updates/2026/04/14/radar-near-border-100m-220m</link>
            <guid>https://competitor.geocomply.dev/updates/2026/04/14/radar-near-border-100m-220m</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Proximity Constraints — validation unsuccessful until reaching 100m (iOS) / 220m (Android) from the OK state line. Static desktop verification failed at 1,750m from the border via public Wi-Fi (Mac/Windows). Success threshold remains undetermined.]]></description>
            <content:encoded><![CDATA[<p><strong>Source.</strong> April 14, 2026 weekly sync — Border Performance Limitations.</p>
<p><strong>What we tested.</strong> Approach to the <strong>OK state border</strong> from inside the
regulated jurisdiction at varying distances, on iOS / Android / desktop
(Mac+Windows over public Wi-Fi).</p>
<p><strong>What happened.</strong></p>
<ul>
<li><strong>iOS</strong> — validation unsuccessful until <strong>100m</strong> from the state line.</li>
<li><strong>Android</strong> — validation unsuccessful until <strong>220m</strong> from the state line.</li>
<li><strong>Desktop (static, public Wi-Fi)</strong> — verification <strong>failed at 1,750m</strong>
from the border on both Mac and Windows. Success threshold undetermined.</li>
</ul>
<p><strong>Why it matters.</strong> Legitimate users physically inside the licensed
state — but close to the border — can't bet. The mobile case (100–220m
windows) maps directly to lost revenue: 100m and 220m are city-block
distances, not edge cases.</p>
<p>The 1,750m desktop failure is more severe — the user is <strong>nowhere near
the border</strong>, and the system still can't verify. That's not a buffer
zone, that's a broken validation flow.</p>
<p><a href="https://competitor.geocomply.dev/competitors/radar">Radar profile →</a> ·
<a href="https://competitor.geocomply.dev/weekly/2026-04-14">April 14 weekly sync →</a></p>]]></content:encoded>
            <category>radar</category>
            <category>near-border</category>
            <category>ok-border</category>
            <category>1750m</category>
        </item>
        <item>
            <title><![CDATA[Radar SDK release analysis: shifting from 'where is the user?' to 'can we continuously trust this location?']]></title>
            <link>https://competitor.geocomply.dev/updates/2026/04/14/radar-sdk-strategy-shift</link>
            <guid>https://competitor.geocomply.dev/updates/2026/04/14/radar-sdk-strategy-shift</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Radar release cadence: every 3 weeks to a couple of months. Strategic direction: continuous-trust location decisioning via IP-triggered re-validation, multi-signal decisioning (motion/device/network alongside GPS), indoor/floor-level accuracy with BLE beacons, and a modular plugin-based fraud architecture.]]></description>
            <content:encoded><![CDATA[<p><strong>Source.</strong> April 14, 2026 weekly research sync.<br>
<strong>Coverage window.</strong> April 2025 → April 2026 (full Radar SDK changelog).</p>
<h3 class="anchor anchorWithStickyNavbar_LWe7" id="cadence">Cadence<a href="https://competitor.geocomply.dev/updates/2026/04/14/radar-sdk-strategy-shift#cadence" class="hash-link" aria-label="Direct link to Cadence" title="Direct link to Cadence">​</a></h3>
<p>Radar ships <strong>every 3 weeks to a couple of months</strong>. We are now
subscribed to both <strong>XPoint and Radar GitHub repositories</strong> to track
new releases, SDK changes, and any publicly visible technical updates
going forward.</p>
<h3 class="anchor anchorWithStickyNavbar_LWe7" id="strategic-direction">Strategic direction<a href="https://competitor.geocomply.dev/updates/2026/04/14/radar-sdk-strategy-shift#strategic-direction" class="hash-link" aria-label="Direct link to Strategic direction" title="Direct link to Strategic direction">​</a></h3>
<p>Clear shift from <em>"where is the user?"</em> to <em>"can we continuously
trust this location?"</em> — via four axes:</p>
<ol>
<li><strong>IP-triggered re-validation</strong> — location re-checked on network /
IP change.</li>
<li><strong>Multi-signal decisioning</strong> — motion, device context, network
alongside GPS.</li>
<li><strong>Indoor / vertical accuracy</strong> — floor-level detection on mobile
plus BLE beacons.</li>
<li><strong>Modular fraud architecture</strong> — plugin-based, allows rapid new
detection logic.</li>
</ol>
<h3 class="anchor anchorWithStickyNavbar_LWe7" id="why-it-matters">Why it matters<a href="https://competitor.geocomply.dev/updates/2026/04/14/radar-sdk-strategy-shift#why-it-matters" class="hash-link" aria-label="Direct link to Why it matters" title="Direct link to Why it matters">​</a></h3>
<p>This is the architectural pitch Radar is making to non-gaming customers
(retail, mobility) — and the same plumbing is what lets them say "we're
adding compliance signals quickly." Worth watching whether the
<strong>v3.31.0 offline geolocation events</strong> (April 24) are enabled on any
gaming integration — that would be a notable regulator-attention
moment.</p>
<p><a href="https://competitor.geocomply.dev/competitors/radar">Radar profile →</a> ·
<a href="https://competitor.geocomply.dev/weekly/2026-04-14">April 14 weekly sync →</a> ·
<a href="https://competitor.geocomply.dev/updates/2026/04/28/radar-v3-31-offline-geofence">v3.31.0 offline events →</a></p>]]></content:encoded>
            <category>radar</category>
            <category>sdk-release</category>
            <category>strategy</category>
            <category>github-monitoring</category>
        </item>
        <item>
            <title><![CDATA[FanDuel: $12,000 payout denied due to 'suspicious location' flag]]></title>
            <link>https://competitor.geocomply.dev/updates/2026/04/14/social-fanduel-12k-payout-denied</link>
            <guid>https://competitor.geocomply.dev/updates/2026/04/14/social-fanduel-12k-payout-denied</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[April 14 weekly: FanDuel dominated complaints — one high-impact case: user denied a $12,000 payout due to a 'suspicious location' flag. DraftKings simultaneously hit with 10+ minute location-check delays.]]></description>
            <content:encoded><![CDATA[<p><strong>Source.</strong> April 14 weekly end-user-feedback section. 36 new posts added
to the tracking spreadsheet.</p>
<p><strong>Headline.</strong> <strong>FanDuel</strong> dominated complaints this week — persistent
location errors, bans for cross-state logins, and <strong>one high-impact case:
a user denied a $12,000 payout due to a "suspicious location" flag.</strong></p>
<p><strong>Adjacent signals.</strong></p>
<ul>
<li><strong>DraftKings</strong> — multiple reviews citing location checks taking 10+
minutes, disrupting live bets.</li>
<li><strong>Bet365 (XPoint web / Radar mobile)</strong> — continued app freeze + bet
slip erasure reports; one user must delete and reinstall the app every
session.</li>
<li><strong>Fanatics (OpenBet)</strong> — location error on first launch reported by
new users.</li>
</ul>
<p><strong>Why this matters.</strong> A denied $12K payout in public Reddit / X chatter
is the kind of operator-anxiety story account managers can use to start
a conversation about geo-check frequency tuning. Note: state attribution
is hard from the public posts; whether the user was on a GeoComply or
non-GeoComply state is uncertain.</p>
<blockquote>
<p><strong>QUESTION (from the weekly):</strong> Do we want to contact our clients
about feedback, and if so, how do we want to approach them?</p>
</blockquote>]]></content:encoded>
            <category>social</category>
            <category>fanduel</category>
            <category>geocomply</category>
            <category>payout-denied</category>
        </item>
        <item>
            <title><![CDATA[Bet365 confirmed dual-stack: XPoint web + Radar mobile]]></title>
            <link>https://competitor.geocomply.dev/updates/2026/04/07/bet365-dual-stack-radar-mobile</link>
            <guid>https://competitor.geocomply.dev/updates/2026/04/07/bet365-dual-stack-radar-mobile</guid>
            <pubDate>Tue, 07 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Confirmed in the April 7 weekly research: Bet365 runs XPoint on the web and Radar on mobile. Even the flagship XPoint reference is split across two geo providers.]]></description>
            <content:encoded><![CDATA[<p><strong>What we confirmed.</strong> Bet365's geolocation stack is split — <strong>XPoint on the
web, Radar on mobile</strong>.</p>
<p><strong>Why it matters.</strong> Bet365 is XPoint's flagship US reference, often quoted
in displacement conversations. Confirming that even Bet365 needed a
co-provider on the most important surface (mobile = the bulk of session
volume) reframes the displacement narrative. The pitch becomes "Bet365
needed two challengers to do the job GeoComply does with one."</p>
<p><strong>Adjacent signal.</strong> Bet365 (XPoint web) social signal continued through
April: wrong-state detection (MD placed in NJ), endless XPoint Verify
install loop, app freeze + bet slip erasure, delete-and-reinstall every
session, 1-star reviews. Bet365 (Radar) Android also accumulated 1-star
reviews ("location verification is trash", "Stuck on trying to find the
location, very bad app, likely a scam").</p>
<p><strong>Spoof posture, same operator.</strong> Reddit user publicly asked how to spoof
XPoint Verify from Florida. Two users offered help via <strong>Magisk</strong>. Worth a
dedicated Magisk + XPoint Verify investigation.</p>
<p><a href="https://competitor.geocomply.dev/competitors/xpoint">Xpoint profile →</a> ·
<a href="https://competitor.geocomply.dev/competitors/radar">Radar profile →</a></p>]]></content:encoded>
            <category>bet365</category>
            <category>xpoint</category>
            <category>radar</category>
            <category>dual-stack</category>
        </item>
        <item>
            <title><![CDATA[Radar: jailbroken root-hidden iOS not detected at Sleeper, PrizePicks, Fliff]]></title>
            <link>https://competitor.geocomply.dev/updates/2026/04/07/radar-jailbreak-sleeper-prizepicks-fliff</link>
            <guid>https://competitor.geocomply.dev/updates/2026/04/07/radar-jailbreak-sleeper-prizepicks-fliff</guid>
            <pubDate>Tue, 07 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Three operators, one structural gap: jailbroken root-hidden iOS devices bypass geolocation controls on Sleeper Sports, PrizePicks, and Fliff. Users can wager from prohibited locations without detection.]]></description>
            <content:encoded><![CDATA[<p><strong>Source.</strong> April 7, 2026 weekly sync — Field Testing section.</p>
<p><strong>What we tested.</strong> Jailbroken iOS device with root hiding enabled.
Attempted to wager from a prohibited location on three operators in
sequence: <strong>Sleeper Sports</strong>, <strong>PrizePicks</strong>, <strong>Fliff</strong>.</p>
<p><strong>What happened.</strong> All three allowed the wager through. Radar did <strong>not
detect</strong> the jailbroken / root-hidden state on any of the three.</p>
<p><strong>Why it matters.</strong> This is a structural Radar SDK gap that surfaces at
every operator, not an operator-specific bug. The same compliance hole
appears in three different deployments (DFS, sweepstakes, social gaming)
within a single week of testing.</p>
<p><a href="https://competitor.geocomply.dev/competitors/radar">Radar profile →</a> ·
<a href="https://competitor.geocomply.dev/weekly/2026-04-07">April 7 weekly sync →</a></p>]]></content:encoded>
            <category>radar</category>
            <category>jailbreak</category>
            <category>ios</category>
            <category>sleeper</category>
            <category>prizepicks</category>
            <category>fliff</category>
        </item>
        <item>
            <title><![CDATA[Radar / Saracen AR: resigned iOS app detected with clear error messaging ✓]]></title>
            <link>https://competitor.geocomply.dev/updates/2026/04/07/radar-saracen-resigned-ios-detected</link>
            <guid>https://competitor.geocomply.dev/updates/2026/04/07/radar-saracen-resigned-ios-detected</guid>
            <pubDate>Tue, 07 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Saracen AR testing confirmed Radar flagged a resigned iOS app with appropriate error messaging, preventing betting activity while ensuring the account was not blocked. This contradicts our FD WV result. Follow-up validation scheduled pending the next iOS app release.]]></description>
            <content:encoded><![CDATA[<p><strong>Source.</strong> April 7, 2026 weekly sync.</p>
<p><strong>What we tested.</strong> Re-signed iOS app on <strong>Bet Saracen Arkansas</strong>.</p>
<p><strong>What happened.</strong> Radar <strong>successfully detected</strong> the resigned app and
displayed appropriate error messaging — betting activity was prevented,
and the account was not auto-blocked. Clean result.</p>
<p><strong>Cross-reference.</strong> <strong>Contradicts the FD WV result</strong> from March 31,
where the same attack class went undetected and bets were placed from
TN. Two operators, two different outcomes for the same exploitation
method — points to inconsistent / operator-specific detector behaviour
in Radar's SDK. Follow-up validation scheduled pending the next iOS
app release.</p>
<p><a href="https://competitor.geocomply.dev/competitors/radar">Radar profile →</a> ·
<a href="https://competitor.geocomply.dev/updates/2026/03/31/radar-resigned-ios-fd-wv">March 31 FD WV failure →</a> ·
<a href="https://competitor.geocomply.dev/weekly/2026-04-07">April 7 weekly sync →</a></p>]]></content:encoded>
            <category>radar</category>
            <category>saracen</category>
            <category>resigned-ios</category>
            <category>positive</category>
        </item>
    </channel>
</rss>