frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Open in hackernews

Dismantling dark patterns using TDD via discovery and injunctions

4•marc_litchfield•3h ago
I am proposing to use TDD to get a set of tests to pass in a system I do not control or have any internal knowledge of. The system contains "dark patterns" that must be dismantled.

To run the tests, I'm planning to move for a Technical Special Master in my active federal lawsuit against the company, which prays for permanent injunctions to compel the code changes required to get the tests passing. I've proposed ESI Protocols for discovery that will give the special master access to the code and data needed to evaluate the proposed "tests" (stipulated binary interrogatories):

‣ 1) Login Verification Email Delivery: Will login verification emails be delivered to input email addresses that do not have a prior user identity when the login form is submitted? (YES|NO).

‣ 2) Account Completion Form Presentation: Upon submission of a valid code from the login verification email for an input email address that did not have a prior user identity, will a login account completion form be presented? (YES|NO).

‣ 3) User Identity Registration: Upon valid submission of the login account completion form when no prior user identity existed, will a user identity associated with the input email address be registered? (YES|NO).

‣ 4) HomeAdvisor "Welcome Back" Banner Display: Upon valid submission of the login account completion form and subsequent initial login when no prior user identity existed, will a message banner containing the phrase "Welcome Back" be displayed at homeadvisor.com? (YES|NO).

‣ 5) Payment Method Deletion Presentation: Do the payment method controls at angi.com lack, omit, or hide an interface element to remove or delete an existing payment method? (YES|NO).

‣ 6) Payment Method Deletion Capability: Does the functionality for managing payment methods lack a capability to delete the payment method associated with a registered user without requiring a replacement? (YES|NO).

‣ 7) Payment Token Storage: Does the system store a payment token associated with the user's payment method after cancellation of the service? (YES|NO).

All would fail now with "YES" answers. If the judge grants the injunctions and the company were compelled to remediate, all 7 tests would pass (NO=GREEN). This would result in the verifiable dismantling of two "dark patterns" (UTPA violations) that are currently capable of harming consumers.

■ Pattern 1: The deceptive login registration funnel at homeadvisor.com will be replaced with a non-deceptive login experience (bits 1-4).

■ Pattern 2: Forced financial data retention at angi.com will be curbed by the addition of payment method deletion functionality (bits 5-7).

This is the model I'm proposing for TDD via electronic discovery. The defendant will resist, but I believe I am proposing a reasonable model, and I'd like to see this approach used in FTC and SEC litigation as we begin dismantling the dark patterns around us.

For more background, see my federal lawsuit, Litchfield v. Angi Inc. (3:25-cv-02394-SI). Please be aware that I have a financial incentive here, a transparently disclosed active bearish position on ANGI stock. My investment thesis followed my discoveries of deceptive practices at Angi Inc.. My position is a measure of my conviction to the truth of my evidence, and is in no way investment advice for others.

The full case and all evidence is available to the public via the RECAP archives: https://www.courtlistener.com/docket/72074717/litchfield-v-angi-inc/

Comments

marc_litchfield•3h ago
Here are a couple of (nasally) narrated demonstrations of the dark patterns I am having Angi dismantle:

‣ RECORDING N - The Deceptive Registration Funnel at homeadvisor.com: https://drive.google.com/file/d/1xV-vfiv0mqe7iKpqY2EdTHeDlw0...

‣ RECORDING O - Forced Data Retention at angi.com: https://drive.google.com/file/d/1qJL5Bc8b5hQDacc-WdbPiRXsiST...

Ask HN: What's the current best local/open speech-to-speech setup?

18•dsrtslnd23•12h ago•3 comments

Ask HN: Seeeking help to reverse engineer a PCB

8•Dlg001•16h ago•5 comments

Ask HN: Do you "micro-manage" your agents?

6•xinbenlv•3h ago•4 comments

Ask HN: Why don't winter gloves have mechanical fingers?

2•amichail•1h ago•7 comments

Ask HN: Where is society heading, is there a plan for a jobless future?

4•evo_9•6h ago•4 comments

Dismantling dark patterns using TDD via discovery and injunctions

4•marc_litchfield•3h ago•1 comments

Ask HN: Do B2B deals stall more from "org blindness" than product fit?

5•Tanjim•4h ago•4 comments

Ask HN: What's a good format to submit CSV data for LLMs?

2•JimsonYang•3h ago•3 comments

Tell HN: 2 years building a kids audio app as a solo dev – lessons learned

135•oliverjanssen•2d ago•75 comments

The Cognitive Cockpit: Why I moved my data to a 1-bit e-ink display

3•jerr12939•57m ago•1 comments

Ask HN: Will agentic AI grow to handle technology leadership responsibilities?

4•gengstrand•4h ago•0 comments

Ask HN: Do you have any evidence that agentic coding works?

446•terabytest•3d ago•449 comments

Ask HN: LLMs for new job categories?

4•aavci•6h ago•2 comments

AI hallucinate. Do you ever double check the output?

7•jackota•7h ago•11 comments

Locked out of my GCP account for 3 days, still charged, can't redirect domain

8•lifeoflee•11h ago•2 comments

Working on reducing wasted distribution effort before publishing posts

2•ryujii•5h ago•0 comments

Tell HN: Cloudflare's D1 service degraded since 2 days

3•iowahansen•6h ago•2 comments

Ask HN: Does DDG no longer honor "site:" prefix?

19•everybodyknows•21h ago•6 comments

Ask HN: Room left for the "industrial" systems engineer in a post-cloud world?

2•infraphysics•7h ago•0 comments

Ask HN: Have you seen your Palantir file?

13•roschdal•1h ago•4 comments

Ask HN: How are you handling non-probabilistic security for LLM agents?

2•amjadfatmi1•8h ago•4 comments

Ask HN: Why are so many rolling out their own AI/LLM agent sandboxing solution?

30•ATechGuy•2d ago•13 comments

Ask HN: Best practice securing secrets on local machines working with agents?

8•xinbenlv•1d ago•11 comments

Ask HN: COBOL devs, how are AI coding affecting your work?

168•zkid18•4d ago•183 comments

Ask HN: How realistically far are we from AGI?

2•HipstaJules•9h ago•5 comments

What software businesses worked in the early Internet? Can they work again?

2•tsingy•9h ago•0 comments

Ask HN: Has the macOS design become too iOS-like?

4•Austin_Conlon•3h ago•3 comments

Tell HN: Cursor agent force-pushed despite explicit "ask for permission" rules

6•xinbenlv•17h ago•7 comments

Ask HN: Is Claude Down for You?

26•philip1209•1d ago•19 comments

Ask HN: How do you authorize AI agent actions in production?

5•naolbeyene•1d ago•4 comments