Skip to main content

Intimate Partner Violence Digital Considerations
draft-irtf-hrpc-ipvc-01

Document Type Expired Internet-Draft (hrpc RG)
Expired & archived
Authors Sofia Celi , Juliana Guerra , Mallory Knodel
Last updated 2025-05-12 (Latest revision 2024-11-08)
Replaces draft-celi-irtf-hrpc-ipvc
RFC stream Internet Research Task Force (IRTF)
Intended RFC status (None)
Formats
Additional resources GitHub Repository
Mailing list discussion
Stream IRTF state (None)
Consensus boilerplate Unknown
Document shepherd (None)
IESG IESG state Expired
Telechat date (None)
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:

Abstract

This document aims to inform how Internet protocols and their implementations might better mitigate technical attacks at the user endpoint by describing technology-based practices to perpetrate intimate partner violence (IPV). IPV is a pervasive reality that is not limited to, but can be exacerbated with, the usage of technology. The IPV context enables the attacker to access one, some or all of: devices, local networks, authentication mechanisms, identity information, and accounts. These security compromises go beyond active and passive on-path attacks [RFC7624]. With a focus on protocols, the document describes tactics of the IPV attacker and potential counter-measures.

Authors

Sofia Celi
Juliana Guerra
Mallory Knodel

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)