The author demonstrates novel attacks on multi-user AR frameworks, focusing on shared vulnerabilities and proposing mitigation strategies.