%% You should probably cite draft-irtf-hrpc-ipvc instead of this I-D. @techreport{celi-irtf-hrpc-ipvc-01, number = {draft-celi-irtf-hrpc-ipvc-01}, type = {Internet-Draft}, institution = {Internet Engineering Task Force}, publisher = {Internet Engineering Task Force}, note = {Work in Progress}, url = {https://datatracker.ietf.org/doc/draft-celi-irtf-hrpc-ipvc/01/}, author = {Sofia Celi and Juliana Guerra and Mallory Knodel}, title = {{Intimate Partner Violence Digital Considerations}}, pagetotal = 14, year = 2023, month = sep, day = 1, abstract = {This document aims to inform how Internet protocols and their implementations might better mitigate technical attacks at the user endpoint by describing technology-based practices to perpetrate intimate partner violence (IPV). IPV is a pervasive reality that is not limited to, but can be exacerbated with, the usage of technology. The IPV context enables the attacker to access one, some or all of: devices, local networks, authentication mechanisms, identity information, and accounts. These kinds of technical compromise exist in addition to on-path attacks, both active and passive {[}RFC7624{]}. In this document we describe the tactics the IPV attacker uses and what kind of counter-measures can be designed in IETF protocols.}, }