<?xml version="1.0" encoding="UTF-8"?>
<reference anchor="I-D.irtf-hrpc-ipvc" target="https://datatracker.ietf.org/doc/html/draft-irtf-hrpc-ipvc-02">
   <front>
      <title>Intimate Partner Violence Digital Considerations</title>
      <author initials="S." surname="Celi" fullname="Sofia Celi">
         <organization>Brave</organization>
      </author>
      <author initials="J." surname="Guerra" fullname="Juliana Guerra">
         </author>
      <author initials="M." surname="Knodel" fullname="Mallory Knodel">
         <organization>CDT</organization>
      </author>
      <date month="November" day="3" year="2025" />
      <abstract>
	 <t>   This document aims to inform how Internet protocols and their
   implementations might better mitigate technical attacks at the user
   endpoint by describing technology-based practices to perpetrate
   intimate partner violence (IPV).  IPV is a pervasive reality that is
   not limited to, but can be exacerbated with, the usage of technology.
   The IPV context enables the attacker to access one, some or all of:
   devices, local networks, authentication mechanisms, identity
   information, and accounts.  These security compromises go beyond
   active and passive on-path attacks [RFC7624].  With a focus on
   protocols, the document describes tactics of the IPV attacker and
   potential counter-measures.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-irtf-hrpc-ipvc-02" />
   
</reference>
