which may include: Internet service providers; other network operators; local institutions providing
a network connection including schools, libraries, or universities; government intelligence services;
malicious hackers who have gained access to the network or the systems of any of the other actors.
-High-level threats including surveillance may be pursued by these actors. Pervasive monitoring,
+High-level threats including surveillance may be pursued by these actors ([RFC6973]). Pervasive monitoring,
a form of large-scale, indiscriminate surveillance, is a known attack on the privacy of users of the
internet and the web [RFC7258].
Information flows may also involve other people — for example, other users of a site —
which could include friends, family members, teachers, strangers, or government officials. Some
-threats to privacy, including both disclosure and harassment, may be particular to the other
-people involved in the information flow.
+threats to privacy, including both disclosure and harassment, may be particular to the other
+people involved in the information flow ([RFC6973]).
1.1 Individual Autonomy
A person's autonomy is their ability to make decisions of their own personal will,
without undue influence from other actors. People have limited intellectual resources and
time with which to weigh decisions, and they have to rely on shortcuts when making decisions. This makes it possible
@@ -1369,7 +1369,7 @@
Privacy Principles
trick other people into thinking a belief has more support than it really has. This
violates the other people's rights to be free from manipulation.
On the other hand, identifying everyone with enough detail to detect these cases tends to
-violate their rights to be free from surveillance and correlation.
+violate their rights to be free from surveillance and correlation. ([RFC6973])