“…The collected studies discussing or proposing threat models consider application developers [27,29,30,32,45,59,60,70,72,74,92,126,130,139,161], servers [7,30,92,123], content creators [40,92], device manufacturers [92,131], other users [69,105,125,150], and hackers 1 [40,62,139] as the attackers in VR, or rely on general privacy threat models like Lindunn [31,34,64,70]. Based on these studies and their system decomposition, we adopt a more comprehensive and pervasive privacy-centered attacker classification for VR that encompasses the privacy repercussions of the above threat models.…”