Human Rights Protocol Considerations (hrpc) Internet Drafts


      
 Guidelines for Human Rights Protocol and Architecture Considerations
 
 draft-irtf-hrpc-guidelines-21.txt
 Date: 12/02/2024
 Authors: Gurshabad Grover, Niels ten Oever
 Working Group: Human Rights Protocol Considerations (hrpc)
This document sets guidelines for human rights considerations for developers working on network protocols and architectures, similar to the work done on the guidelines for privacy considerations [RFC6973]. This is an updated version of the guidelines for human rights considerations in [RFC8280]. This document is not an Internet Standards Track specification; it is published for informational purposes. This informational document has consensus for publication from the Internet Research Task Force (IRTF) Human Right Protocol Considerations Research (HRPC) Group. It has been reviewed, tried, and tested by both by the research group as well as by researchers and practitioners from outside the research group. The research group acknowledges that the understanding of the impact of Internet protocols and architecture on society is a developing practice and is a body of research that is still in development.
 Intimate Partner Violence Digital Considerations
 
 draft-irtf-hrpc-ipvc-00.txt
 Date: 18/10/2023
 Authors: Sofia Celi, Juliana Guerra, Mallory Knodel
 Working Group: Human Rights Protocol Considerations (hrpc)
This document aims to inform how Internet protocols and their implementations might better mitigate technical attacks at the user endpoint by describing technology-based practices to perpetrate intimate partner violence (IPV). IPV is a pervasive reality that is not limited to, but can be exacerbated with, the usage of technology. The IPV context enables the attacker to access one, some or all of: devices, local networks, authentication mechanisms, identity information, and accounts. These kinds of technical compromise exist in addition to on-path attacks, both active and passive [RFC7624]. In this document we describe the tactics the IPV attacker uses and what kind of counter-measures can be designed in IETF protocols.