<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.17 (Ruby 3.1.2) -->
<?rfc tocindent="yes"?>
<?rfc strict="yes"?>
<?rfc compact="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-nottingham-avoiding-internet-centralization-06" category="info" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.15.3 -->
  <front>
    <title abbrev="Internet Consolidation and Standards">Internet Consolidation: What can Standards Efforts Do?</title>
    <seriesInfo name="Internet-Draft" value="draft-nottingham-avoiding-internet-centralization-06"/>
    <author initials="M." surname="Nottingham" fullname="Mark Nottingham">
      <organization/>
      <address>
        <postal>
          <postalLine>Prahran</postalLine>
          <postalLine>Australia</postalLine>
        </postal>
        <email>mnot@mnot.net</email>
        <uri>https://www.mnot.net/</uri>
      </address>
    </author>
    <date/>
    <area>General</area>
    <keyword>governance</keyword>
    <abstract>
      <t>Despite the Internet being designed and operated as a decentralized network-of-networks, forces continuously emerge to encourage and sometimes enforce consolidation of power into few hands.</t>
      <t>This document offers a definition of consolidation and relates it to centralization, explains why they are undesirable, identifies forces that contribute to them, catalogues limitations of common approaches to decentralization, and explores what Internet standards efforts can do.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-nottingham-avoiding-internet-centralization/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/mnot/avoiding-internet-centralization"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>The Internet has succeeded in no small part because of its purposeful avoidance of any single controlling entity. Originating in a desire to prevent a single technical failure from having a wide impact <xref target="RAND"/>, this stance has also enabled the Internet's rapid adoption and broad spread. The Internet can accommodate a spectrum of requirements and is now positioned as a global public good because joining, deploying an application on, or using the Internet does not require permission from or ceding control to a single entity.</t>
      <t>While avoiding consolidation of power on the Internet remains a widely shared goal, achieving it consistently has proven difficult. Today, many successful protocols and applications on the Internet operate in a centralized fashion -- to the point where some proprietary services have become so well-known that they are commonly mistaken for the Internet itself. Even when protocols incorporate techniques intended to prevent consolidation, economic and social factors can drive users to prefer solutions built with or on top of supposedly decentralized technology.</t>
      <t>These difficulties call into question what role architectural design -- in particular, that performed by open standards bodies such as the IETF -- should play in preventing, mitigating, and controlling consolidation of power on the Internet. This document discusses aspects that relate to Internet standards efforts, and argues that while the IETF may not be able to prevent consolidation, there are still meaningful steps we can take to counteract it.</t>
      <t><xref target="centralization"/> defines consolidation and centralization, explains why and when they are undesirable, and surveys contributors to consolidation seen on the Internet. <xref target="decentralization"/> explores decentralization and highlights some relevant techniques, along with their limitations. Finally, <xref target="considerations"/> considers the role that Internet standards play in avoiding consolidation and mitigating its effects.</t>
      <t>The primary audience for this document is the engineers who design and standardize Internet protocols. However, designers of proprietary protocols can benefit from considering these issues, especially if they intend their protocol to be considered for eventual standardization. Likewise, policymakers can use this document to help identify and remedy inappropriately consolidated protocols and applications.</t>
    </section>
    <section anchor="centralization">
      <name>Consolidation and Centralization</name>
      <t>This document defines "consolidation" as the ability of a single entity or a small group of them to exclusively observe, capture, control, or extract rent from the operation or use of an Internet function.</t>
      <t>Here, "entity" could be a single person, a corporation, or a government. It does not include an organization that operates in a manner that effectively mitigates consolidation (see, e.g., <xref target="multi"/>).</t>
      <t>"Internet function" is defined broadly. It might be an enabling protocol already defined by standards, such as IP <xref target="RFC791"/>, BGP <xref target="RFC4271"/>, TCP <xref target="RFC793"/>, or HTTP <xref target="HTTP"/>. It might also be a proposal for a new enabling protocol, or an extension to an existing one.</t>
      <t>However, the Internet's functions are not limited to standards-defined protocols. User-visible applications built on top of standard protocols are also vulnerable to consolidation -- for example, social networking, file sharing, financial services, and news dissemination. Likewise,  networking equipment, hardware, operating systems, and software act as enabling technologies that can exhibit consolidation. The supply of Internet connectivity to end users in a particular area or situation can also be subject to the forces of consolidation, as can supply of transit between networks (so called "Tier 1" networks).</t>
      <t>"Centralization" measures the contribution of a function's technical design to consolidation. As such, it is a primarily architectural phenomenon. For example, many consider the social networking market to be highly consolidated around a few providers; the technologies that they use are proprietarily centralized (see <xref target="direct"/>) and thus contribute to that consolidation.</t>
      <t>Centralization is not a binary condition; a function's design might contribute to or be vulnerable to consolidation in multiple ways and various degrees. Even when decentralization techniques are purposefully used to avoid it, centralization often appears in other aspects of the function's design -- for example, in its governance, implementation, deployment, or in ancillary functions. As Schneider says, "decentralized technology alone does not guarantee decentralized outcomes." <xref target="SCHNEIDER"/></t>
      <t>Therefore, this document considers the amount of "consolidation risk" associated with a function's design, depending on the scale, scope, and nature of those contributions and vulnerabilities.</t>
      <section anchor="why">
        <name>Assessing Consolidation Risk</name>
        <t>By default, Internet protocol designers avoid centralized designs, because the Internet's very nature is incompatible with centralization. As a "large, heterogeneous collection of interconnected systems" <xref target="BCP95"/> the Internet is often characterised as a "network of networks". These networks relate as peers who agree to facilitate communication, rather than having a relationship of subservience to others' requirements or coercion by them. This focus on independence of action carries through the way the network is architected -- for example, in the concept of an "autonomous system".</t>
        <t>However, as discussed below in <xref target="necessary"/>, not all centralization is avoidable, and in some cases it is even desirable. <xref target="AMBITION"/> notes that "centralized structures can have virtues, such as enabling publics to focus their limited attention for oversight, or forming a power bloc capable of challenging less-accountable blocs that might emerge. Centralized structures that have earned widespread respect in recent centuries - including governments, corporations, and nonprofit organizations - have done so in no small part because of the intentional design that went into those structures."</t>
        <t>With that in mind, consolidation risk on the Internet is most concerning when it is not broadly held to be necessary, when it has no checks, balances, or other mechanisms of accountability, when it selects "favorites" which are difficult (or impossible) to displace, and when it threatens to diminish the success factors that enable the Internet to thrive -- scalability to meet the demands of new users, adaptability to encompass new applications, flexibility to enable deployment of new technologies, and resilience to shocks and changes <xref target="SUCCESS"/>.</t>
        <t>Most often, consolidation risk is indicated when a proposal has one or more of the following damaging effects (or the potential for them):</t>
        <ul spacing="normal">
          <li>
            <em>Power Imbalance</em>: When a third party has unavoidable access to communications, the informational and positional advantages gained allow observation of behavior (the "panopticon effect") and shaping or even denial of behavior (the "chokepoint effect") <xref target="INTERMEDIARY-INFLUENCE"/> -- capabilities that those parties (or the states that have authority over them) can use for coercive ends <xref target="INTERDEPENDENCE"/> or even to disrupt society itself. Just as good governance of states requires separation of powers <xref target="FEDERALIST-51"/>, so too does good governance of the Internet require that power not be concentrated in one place without appropriate checks and balances.</li>
          <li>
            <em>Limits on Innovation</em>: Consolidation can preclude the possibility of "permissionless innovation" -- the ability to deploy new, unforeseen applications without requiring coordination with parties other than those you are communicating with.</li>
          <li>
            <em>Constraints on Competition</em>: The Internet and its users benefit from robust competition when applications and services are available from many providers -- especially when those users can build their own applications and services based upon interoperable standards. When a consolidated service or platform must be used because no substitutes are suitable, it effectively becomes an essential facility, which encourages abuse of power.</li>
          <li>
            <em>Reduced Availability</em>: Availability of the Internet (and applications and services built upon it) improves when there are many ways to obtain access. While service availability can benefit from the focused attention of a large consolidated provider, that provider's failure can have a disproportionate impact on availability.</li>
          <li>
            <em>Monoculture</em>: The scale available to a consolidated provider can magnify minor flaws in features to a degree that can have broad consequences. For example, a single codebase for routers elevates the impact of a bug or vulnerability; a single recommendation algorithm for content can have severe social impact. Diversity in these functions' implementation leads to a more robust outcome when viewed systemically. <xref target="POLYCENTRIC"/></li>
          <li>
            <em>Self-Reinforcement</em>: As widely noted (see, e.g., <xref target="ACCESS"/>), a consolidated provider's access to data allows it the opportunity to make improvements to its offerings, while denying such access to others.</li>
        </ul>
        <t>However, these are only indicators, and need to be evaluated carefully on a case-by-case basis.</t>
        <t>For example, it is important to distinguish consolidation risk from anticompetitive concerns (also known as "antitrust"). While there are many interactions between these concepts and making the Internet more competitive may be a motivation for avoiding centralization, only courts (and in some cases, regulators) have the authority to define a relevant market and determine that behavior is anti-competitive. Furthermore, what might be considered undesirable consolidation by the technical community might not attract competition regulation, and conversely what might attract competition regulation might not be of great concern to the technical community if other mitigations are felt to be adequate.</t>
        <t>Likewise, while centralization interacts with availability, they are distinct and any relationship between them cannot be assumed without careful analysis of where and how centralization occurs. Centralized systems might be more available due to factors like the resources available to them, but also have greater impact when they encounter a fault; decentralized systems might be more resilient in the face of local failures, but less able to react to systemic issues. Furthermore, a failure due to a cut cable, power outage, or failed server is qualitatively different from the issues encountered when a core Internet function has a gatekeeper.</t>
        <t>For example, a large variety of Web sites might depend upon a cloud hosting provider or content delivery network; if it were to become unavailable (whether for technical or other reasons), many people's experience of the Internet might be disrupted. Likewise, a mobile Internet access provider might have an outage that affects hundreds, thousands, or more of its users. In both cases, consolidation is not indicated by the loss of availability or its scale, but it well might be if the parties relying on the function don't have reasonable options to switch to if they are unhappy with the availability of the service provided, or if friction against switching to an alternative is too great.</t>
      </section>
      <section anchor="kinds">
        <name>Contributors to Centralization</name>
        <t>A function's design can exhibit centralization in a variety of ways. The subsections below describe different contributors to and expressions of centralization in Internet functions.</t>
        <section anchor="direct">
          <name>Proprietary Centralization</name>
          <t>Creating of a protocol or application with a fixed role for a specific party is the most obvious form of centralization. Many messaging, videoconferencing, chat, social networking, and similar applications currently operate in this fashion.</t>
          <t>Because they allow control by a single entity, proprietary protocols are often considered simpler to design, more amenable to evolution, and more likely to meet user needs <xref target="MOXIE"/>, compared to decentralized alternatives. However, they have corresponding consolidation risk -- if the function has no alternative providers, or switching to those providers is too difficult, its users are "locked in."</t>
          <t>Proprietary protocols and applications are not considered as being part of the Internet per se; instead, they are more properly characterized as being built on top of the Internet. The Internet architecture and associated standards do not control them, beyond the constraints that the underlying protocols (e.g., TCP, IP, HTTP) impose.</t>
        </section>
        <section anchor="necessary">
          <name>Beneficial Centralization</name>
          <t>Some protocols and applications have goals that require the introduction of a centralized function. In doing so, they are explicitly relying on centralization to deliver a particular benefit.</t>
          <t>For example, a function that needs a single, globally coordinated "source of truth" is by nature centralized -- such as in the Domain Name System (DNS), which allows human-friendly naming to be converted into network addresses in a globally consistent fashion.</t>
          <t>Another function exhibiting beneficial centralization is IP addresses allocation. Internet routing requires addresses to be allocated uniquely, but if a single government or company captured the addressing function, the entire Internet would be at risk of abuse by that entity. Similarly, the need for coordination in the Web's trust model brings consolidation risk, because of the Certificate Authority's role in communication between clients and servers.</t>
          <t>Protocols that need to solve the "rendezvous problem" to coordinate communication between two parties who are not in direct contact also exhibit beneficial centralization. For example, chat protocols need to coordinate communication between two parties that wish to talk; while the actual communication can be direct between them (so long as the protocol facilitates that), the endpoints' mutual discovery typically requires a third party at some point. From the perspective of those two users, the rendezvous function has consolidation risk.</t>
          <t>A centralized function's inherent power can also be used to beneficial ends. For example, when traffic from many users is mixed together in a way that can't be distinguished, censorship becomes more difficult. This "too big to block" phenomenon drives the design of many recent protocols (such as <xref target="ECH"/>), but they require a degree of consolidation to meet their goals.</t>
          <t>Likewise, when a function requires governance to realize common goals and protect minority interests, a "choke point" is naturally formed by the chosen governance mechanism, increasing consolidation risk. One commonly seen application of this kind of beneficial centralization is in content moderation functions.</t>
          <t>When beneficial centralization is present, Internet protocols often attempt to mitigate the associated risks using measures such as federation (see <xref target="federation"/>) and multi-stakeholder governance (see <xref target="multi"/>). Protocols that successfully mitigate the associated consolidation risks are often reused, to avoid the considerable cost and risk of re-implementing those mitigations. For example, if a protocol requires a coordinated, global naming function, reusing the Domain Name System is usually preferable to establishing a new system.</t>
          <t>Ultimately, deciding what is beneficial is a judgment call. Some protocols cannot function without a centralized function; others might be significantly enhanced for certain use cases if a function is centralized, or might merely be more efficient. Such judgments should be made in light of established architectural principles and how benefits accrue to end users.</t>
        </section>
        <section anchor="indirect">
          <name>Concentration</name>
          <t>Even when a function avoids proprietary centralization and mitigates any beneficial centralization present, it might become consolidated in practice when external factors influence its deployment, so that few or even just one entity provides the function. This document refers to this phenomenon as "concentration." Economic, legal, and social factors that encourage use of a central function despite the absence of such a requirement in the protocol itself can cause concentration.</t>
          <t>Often, the factors driving concentration are related to the network effects that are so often seen on the Internet. While in theory every node on the Internet is equal, in practice some nodes are much more connected than others: for example, just a few sites drive much of the traffic on the Web. While expected and observed in many kinds of networks, network effects award asymmetric power to nodes that act as intermediaries to communication. <xref target="SCALE-FREE"/></t>
          <t>There may be legitimate qualitative reasons for some nodes being favoured over others. However, when it happens because friction against using an alternative prevents switching, benefits are accrued to services rather than users. If choosing an alternate provider requires a significant amount of time, resources, expertise, coordination, loss of functionality, or effort, consolidation risk is indicated. Conversely, a function based on a well-defined, open specification designed to minimize switching costs might be considered to have less consolidation risk even when there are only a few large providers.</t>
          <t>For example, social networking is an application that is currently supplied by a few proprietary platforms despite standardization efforts (see, e.g., <xref target="ACTIVITYSTREAMS"/>), because of the powerful network effects associated. While there has been some competition in social networking, a group of people who wish to communicate are often locked in by the choices that their peers make, because of the coordination required to move to a new service.</t>
          <t>See <xref target="ISOC"/> for a deeper exploration of concentration.</t>
          <t>Concentration is difficult to avoid in protocol design, and federated protocols are particularly vulnerable to it (see <xref target="federation"/>).</t>
        </section>
        <section anchor="network">
          <name>Inherited Centralization</name>
          <t>Most Internet protocols and applications depend on other, "lower-layer" protocols and their implementations. The features, deployment, and operation of these dependencies can surface centralization into functions and applications built "on top" of them.</t>
          <t>For example, the network between endpoints can introduce consolidation risk to application-layer protocols, because it is necessary for communication and therefore has power over it. A network might block access to, slow down, or change the content of various application protocols or specific services for financial, political, operational, or criminal reasons, thereby creating a disincentive (or even inability) to use them. By selectively hindering the use of some services but not others, network interventions can be composed to aid concentration in those other services -- intentionally or not.</t>
          <t>Likewise, having only a single implementation of a protocol is an inherited consolidation risk, because applications that use it are vulnerable to the control it has over their operation. Even Open Source projects can exhibit this risk if there are factors that make forking difficult (for example, the cost of maintaining that fork).</t>
          <t>Inherited centralization is often present when network effects restrict choices, but can also be created by legal mandates and incentives that restrict the options for a function (such as Internet access), its provision, or the range of implementations available.</t>
          <t>Some kinds of inherited centralization can be prevented by enforcing layer boundaries through use of techniques like encryption. When the number of parties who have access to content of communication are limited, parties at lower layers can be prevented from interfering with and observing it. Although those lower-layer parties might still prevent communication, encryption also makes it more difficult to discriminate a target from other traffic.</t>
          <t>Note that the prohibitive effect of encryption on inherited centralization is most pronounced when most (if not all) traffic is encrypted. See also <xref target="RFC7258"/>.</t>
        </section>
        <section anchor="platform">
          <name>Platform Centralization</name>
          <t>The complement to inherited centralization is platform centralization -- where a function does not directly define a central role, but could facilitate consolidation in the applications it supports.</t>
          <t>For example, HTTP <xref target="HTTP"/> is not considered a centralized protocol; interoperable servers are  easy to instantiate, and multiple clients are available. It can be used without central coordination beyond that provided by DNS, as discussed above. However, applications built on top of HTTP (as well as the rest of the "Web Platform") often exhibit consolidation (for example, social networking). HTTP is therefore an example of platform centralization -- while the protocol itself is not centralized, it facilitates the creation of consolidated services and applications.</t>
          <t>Like concentration, platform centralization is difficult to prevent with protocol design. Because of the layered nature of the Internet, most protocols allow considerable flexibility in how they are used, often in a way that it becomes attractive to form a dependency on one party's operation.</t>
        </section>
      </section>
    </section>
    <section anchor="decentralization">
      <name>Decentralization</name>
      <t>While the term "decentralization" has a long history of use in economics, politics, religion, and international development, Baran gave one of the first definitions relevant to computer networking, as a condition when "complete reliance upon a single point is not always required." <xref target="RAND"/></t>
      <t>This seemingly straightforward technical definition hides several issues.</t>
      <t>First, identifying which aspects of a function to decentralize and how to do so can be difficult, both because there are often many ways a function might be centralized, and because consolidation sometimes only becomes evident after the function is deployed at scale.</t>
      <t>For example, a cloud storage function might be implemented using a distributed consensus protocol, assuring that the failure of any single node will not affect the system's operation or availability. In that sense, it is decentralized. However, if it is operated by a single legal entity, that brings a very different kind of consolidation risk, especially if there are few other options available, or if there is friction against choosing other options.</t>
      <t>Another example is the Web, which was envisioned and widely held to be a decentralizing force in its early life. Its inherent platform centralization only became apparent when large sites successfully leveraged network effects for dominance of social networking, marketplaces, and similar functions.</t>
      <t>Second, different parties might have good-faith differences on what "sufficiently decentralized" means based upon their beliefs, perceptions and goals. Just as consolidation is a continuum, so is decentralization, and not everyone agrees one what the "right" level or type is, how to weigh different forms of consolidation against each other, or how to weigh consolidation against other architectural goals (such as security or privacy).</t>
      <t>These tensions can be seen, for example, in the DNS. While much of the system is decentralized through the distribution of the lookup function to local servers that users have the option to override, the DNS is also a name space -- a single, global "source of truth" with inherent (if beneficial) centralization of its management. The associated risk is mitigated through multi-stakeholder governance by ICANN (see <xref target="multi"/>). While many believe that this arrangement is sufficient and might even have desirable qualities (such as the ability to impose community standards over the operation of the name space), others reject ICANN's oversight of the DNS as illegitimate, favoring decentralization based upon distributed consensus protocols rather than multistakeholderism. <xref target="MUSIANI"/></t>
      <t>Third, decentralization unavoidably involves adjustments to the power relationships between protocol participants, especially when decentralizing a function opens up the possibility of consolidation elsewhere. As Schneider notes in <xref target="AMBITION"/>, decentralization "appears to operate as a rhetorical strategy that directs attention toward some aspects of a proposed social order and away from others", so "we cannot accept technology as a substitute for taking social, cultural, and political considerations seriously." Or, as more bluntly stated in <xref target="PERSPECTIVE"/>, "without governance mechanisms in place, nodes may collude, people may lie to each other, markets can be rigged, and there can be significant cost to people entering and exiting markets."</t>
      <t>For example, while blockchain-based cryptocurrencies might address the consolidation inherent in traditional currencies through technical means, the concentration of power that many exhibit in terms of voting/mining power, distribution of funds, and diversity of codebase causes some to question how decentralized they actually are. <xref target="AREWEDECENTRALIZEDYET"/> The lack of formal structures brings an opportunity for latent, informal power structures that have their own risks -- including consolidation. <xref target="STRUCTURELESS"/></t>
      <t>In practice, this means that decentralizing a function requires considerable work, is inherently political, and involves a large degree of uncertainty about the outcome. In particular, if one considers decentralization as a larger social goal (in the spirit of how the term is used in other, non-computing contexts), merely rearranging technical functions may lead to frustration. "A distributed network does not automatically yield an egalitarian, equitable or just social, economic, political landscape." <xref target="PERSPECTIVE"/></t>
      <section anchor="techniques">
        <name>Decentralization Techniques</name>
        <t>In the context of Internet standardization, decentralization is implemented as a two-step process: assessing the nature of consolidation risk, followed by the application of techniques to reduce or mitigate it. The subsections below examine some of these techniques.</t>
        <t>Choosing the appropriate techniques for decentralization requires balancing the specific goals of the function against consolidation risk, because completely precluding all forms of consolidation through technical means is rarely achievable. When performed properly, decentralization might produce an outcome that still has consolidation risk, but that risk should be understood, acceptable, and, where possible and appropriate, mitigated.</t>
        <t>Notably, decentralization does not require that provision of a function need be distributed in a particular fashion, or to a particular degree. For example, the Domain Name System <xref target="RFC1035"/> is widely agreed to have acceptable consolidation risk, despite it being provided by a limited set of entities.</t>
        <section anchor="federation">
          <name>Federation</name>
          <t>A widely known technique for managing consolidation in Internet protocols is federation -- designing them in such a way that new instances of a function are easy to create and can maintain interoperability and connectivity with other instances.</t>
          <t>For example, SMTP <xref target="RFC5321"/> is the basis of the e-mail suite of protocols, which has two functions that have consolidation risk:</t>
          <ol spacing="normal" type="1"><li>Giving each user a globally unique address, and</li>
            <li>Routing messages to the user, even when they change network locations or become disconnected for long periods of time.</li>
          </ol>
          <t>E-mail reuses DNS to help mitigate the first risk. To mitigate the second, it defines a specific role for routing users' messages, the Message Transfer Agent (MTA). By allowing anyone to deploy an MTA and defining rules for interconnecting them, the protocol's users avoid a requirement for a single central router.</t>
          <t>Users can (and often do) choose to delegate that role to someone else, or run their own MTA. However, running your own mail server has become difficult, because of the likelihood of a small MTA being classified as a spam source. Because large MTA operators are widely known and have greater impact if their operation is affected, they are less likely to be classified as such, concentrating the protocol's operation (see <xref target="indirect"/>).</t>
          <t>Another example of a federated Internet protocol is XMPP <xref target="RFC6120"/>, supporting "instant messaging" and similar functionality. Like e-mail, it reuses DNS for naming and requires federation to facilitate rendezvous of users from different systems.</t>
          <t>While some deployments of XMPP do support truly federated messaging (i.e., a person using service A can interoperably chat with someone using service B), many of the largest do not. Because federation is voluntary, some operators captured their users into a single service, denying them the benefits of global interoperability.</t>
          <t>The examples above illustrate that, while federation can be a useful technique to avoid proprietary centralization and manage beneficial centralization, it does not prevent concentration or platform centralization. If a single entity can capture the value provided by a protocol, it may use the protocol as a platform to get a "winner take all" outcome -- a significant risk with many Internet protocols, since network effects often promote such outcomes. Likewise, external factors (such as spam control) might naturally "tilt the table" towards a few operators.</t>
        </section>
        <section anchor="multi">
          <name>Multi-Stakeholder Governance</name>
          <t>Protocol designers sometime mitigate the consolidation risks associated with a beneficial centralized function (see <xref target="necessary"/>) by delegating that function's governance to a multi-stakeholder body -- an institution that includes representatives of the different kinds of parties that are affected by the system's operation ("stakeholders") in an attempt to make well-reasoned, legitimate, and authoritative decisions.</t>
          <t>The most widely studied example of this technique is the governance of the DNS name space, which as a "single source of truth" exhibits beneficial centralization. The associated risk is mitigated through administration by <eref target="https://www.icann.org/resources/pages/governance/governance-en">the Internet Corporation for Assigned Names and Numbers (ICANN)</eref>, a global multi-stakeholder body with representation from end users, governments, operators, and others.</t>
          <t>Another example is the governance of the Web's trust model, implemented by Web browsers as relying parties and Certificate Authorities as trust anchors. To ensure that all parties meet the operational and security requirements necessary to provide the desired properties, the <eref target="https://cabforum.org">CA/Browser Forum</eref> was established as an oversight body that involves both parties as stakeholders.</t>
          <t>Yet another example of multi-stakeholderism is the standardization of Internet protocols themselves. Because a specification controls implementation behavior, the standardization process can be seen as a single point of control. As a result, Internet standards bodies like the IETF allow open participation and contribution, make decisions in an open and accountable way, have a well-defined process for making (and when necessary, appealing) decisions, considering the views of different stakeholder groups <xref target="RFC8890"/>.</t>
          <t>A major downside of this approach is that setup and ongoing operation of multi-stakeholder bodies is not trivial. Additionally, their legitimacy cannot be assumed, and may be difficult to establish and maintain (see, e.g., <xref target="MULTISTAKEHOLDER"/>). This concern is especially relevant if the function being coordinated is broad, complex, and/or contentious.</t>
        </section>
        <section anchor="distributed">
          <name>Distributed Consensus</name>
          <t>Increasingly, distributed consensus technologies (such as the blockchain) are touted as a solution to consolidation issues. A complete survey of this rapidly changing area is beyond the scope of this document, but we can generalize about its properties.</t>
          <t>These techniques attempt to avoid consolidation risk by distributing functions to members of a sometimes large pool of protocol participants. They typically guarantee proper performance of a function using cryptographic techniques (often, an append-only transaction ledger). A particular task's assignment to a node for handling usually cannot be predicted or controlled.</t>
          <t>Sybil attacks (where a party or coordinated parties cheaply create enough protocol participants to affect how consensus is judged) are a major concern for these protocols. They encourage diversity in the pool of participants using indirect techniques, such as proof-of-work (where each participant has to show significant consumption of resources) or proof-of-stake (where each participant has some other incentive to execute correctly).</t>
          <t>Use of these techniques can create barriers to proprietary and inherited centralization. However, depending upon the application in question, both concentration and platform centralization are still possible.</t>
          <t>It is also important to recognize that a protocol or an application can use distributed consensus for some functions, but still have consolidation risk elsewhere -- either because those functions cannot be decentralized (most commonly, rendezvous and global naming; see <xref target="necessary"/>) or because the designer has chosen not to because of the associated costs and lost opportunities.</t>
          <t>Even when distributed consensus is used for all technical functions of a service, some coordination is still necessary -- whether that be through governance of the function itself, creation of shared implementations, or documentation of shared wire protocols. That represents consolidation risk, just at a different layer (inherited or platform).</t>
          <t>These potential shortcomings do not rule out the use of distributed consensus technologies in every instance. They do, however, caution against uncritically relying upon these technologies to avoid consolidation.</t>
        </section>
      </section>
    </section>
    <section anchor="considerations">
      <name>What Should Internet Standards Do?</name>
      <t>Centralization is driven by powerful forces -- both economic and social -- as well as the network effects that come with Internet scale. Because permissionless innovation is a core value for the Internet, and yet much of the consolidation seen on the Internet is performed by proprietary platforms that take advantage of this nature, the controls available to standards efforts are very limited.</t>
      <t>While standards bodies on their own cannot prevent consolidation, the subsections below suggest meaningful steps that can be taken.</t>
      <section anchor="target">
        <name>Engage with Centralization Risk Thoroughly but Realistically</name>
        <t>Some consolidation risks are easy to manage in standards efforts. For example, if a proprietary protocol were to be proposed to the IETF, it would be rejected out of hand. There is a growing body of knowledge and experience in managing the risk of beneficial centralization, and a strong inclination to reuse existing infrastructure where possible. As discussed above, encryption is often a way to manage inherited centralization, and has become the norm in standard protocols. These responses are appropriate ways for Internet standards to manage consolidation risk.</t>
        <t>However, mitigating concentration and platform centralization is much more difficult in standards efforts. Because the IETF has no "protocol police", it's not possible to demand that someone stop building a proprietary service using a federated protocol (for example). The standards process also cannot stop someone from building services "on top" of standard protocols without abandoning architectural goals like permissionless innovation. While the imprimatur of an Internet Standard is not without value, merely withholding it cannot prevent these sources of consolidation.</t>
        <t>Therefore, committing significant resources to scrutinizing protocols for latent consolidation risk -- especially for concentration and platform risks -- is unlikely to be effective in preventing Internet consolidation. Almost all existing Internet protocols -- including IP, TCP, HTTP, and DNS -- exhibit concentration or platform centralization. Refusing to standardize a newer protocol because it faces similar risks would not be equitable, proportionate, or effective.</t>
        <t>When claims are made that a given proposal is "centralized" or "decentralized", the context of those statements should be examined for presuppositions, assumptions, and omissions. <xref target="BACCHI"/> offers one framework for such critical interrogations. <xref target="SCHNEIDER"/> implores that proposals to decentralize be "really, really clear about what particular features of a system a given design seeks to decentralize" and promotes borrowing remedies from more traditional governance systems, such as separation of powers and accountability.</t>
        <t>When consolidation risk is found, standards efforts should consider its relationship with other architectural goals as they consider how to address it. In particular, attention should be paid to how effective standards (as a form of architectural control) is in achieving each goal.</t>
        <t>For example, privacy is often more effectively ensured by ex ante technical constraints, as compared to ex post legal regulation. Conversely (as discussed) some consolidation risks may be more effectively addressed through legal regulation. Thus, as a first order concern, a standards effort balancing these concerns might focus primarily on privacy. However, often these are not completely separable goals -- concentration can result in one or a few entities having greater volume and variety of data available exclusively to them, raising significant privacy and security concerns.</t>
      </section>
      <section anchor="up">
        <name>Decentralize Proprietary Functions</name>
        <t>It is worthwhile to create specifications for functions that are currently only satisfied by proprietary providers. By building open specifications on top of already established standards, an alternative to a consolidated function can be created.</t>
        <t>A common objection to such efforts is that adoption is voluntary, not mandatory; there are no "standards police" to mandate their use or enforce correct implementation. For example, specifications like <xref target="ACTIVITYSTREAMS"/>) have been available for some time without broad adoption by social networking providers.</t>
        <t>However, while standards aren't mandatory, legal regulation is, and regulators around the globe are focusing specific efforts on some aspects of the Internet. In particular, legal mandates for interoperability are increasingly discussed as a remedy for competition issues (see, e.g., <xref target="OECD"/>).</t>
        <t>As such, appetite for Internet regulation presents not just a risk to the Internet; it also constitutes an opportunity for new specifications to decentralize these functions, backed by a legal mandate in combination with changing norms and the resulting market forces <xref target="NEW-CHICAGO"/>. That opportunity also presents a risk, however, if the resulting legal regulation is at odds with the Internet architecture.</t>
        <t>Successfully creating standards that work in concert with legal regulation is new ground for the IETF, presents many potential pitfalls, and will require new capabilities (especially liaison, likely originating in the IAB) and considerable effort. If the Internet community does not make that effort, it is likely that regulators will turn to other sources of interoperability specifications -- most likely, with less transparency, more narrow input, limited experience, and without reference to the Internet's architectural goals.</t>
      </section>
      <section anchor="new">
        <name>Evaluate New Decentralization Techniques</name>
        <t>The decentralization techniques listed in <xref target="techniques"/> are not a closed set; wide interest has spurred development of new approaches, both in general and as solutions to specific problems.</t>
        <t>For example, secure multi-party computation techniques (see, e.g., <xref target="YAO"/>) can be composed to allow parties to compute over private inputs without revealing them. Protocols like <xref target="ENPA"/> and <xref target="PRIO"/> use them to limit the information available to participants in protocols to realize privacy goals; as discussed in <xref target="intermediation"/> doing so might also counteract some sources of centralization. However, as in other cases these techniques do not automatically preclude all consolidation; such systems often still require trust, even if it is limited, and that might result in other forms of consolidation emerging.</t>
        <t>Whether use of these techniques (or others) can meaningfully counteract consolidation is still uncertain. Standards bodies (including the IETF) can serve an important function by incubating them, applying (and, where necessary, developing) architectural guidelines for privacy, security, operability, and other goals, and assuring interoperability. When appropriate, publication on the standards track or as experimental can signal implementers, users, and regulators about their fitness.</t>
      </section>
      <section anchor="balance">
        <name>Build Robust Ecosystems</name>
        <t>To minimize inherited consolidation risk, standards-defined functions should have an explicit goal of broad, diverse implementation and deployment so that users have as many choices as possible.</t>
        <t><xref section="2.1" sectionFormat="of" target="RFC5218"/> explores some factors in protocol design that encourage this outcome.</t>
        <t>This goal can also be furthered by ensuring that the cost of switching to a different implementation or deployment is as low as possible to facilitate subsequent substitution. This implies that the standard is functionally complete and specified precisely enough to result in meaningful interoperability.</t>
        <t>The goals of completeness and diversity are sometimes in tension. If a standard is extremely complex, it may discourage implementation diversity because the cost of a complete implementation is too high (consider: Web browsers). On the other hand, if the specification is too simple, it may not offer enough functionality to be complete, and the resulting proprietary extensions may make switching difficult (see <xref target="evolution"/>).</t>
        <t>Also worthy of attention are the underlying incentives for implementation. While a completely commoditized protocol might not allow implementations to differentiate themselves, they provide opportunities for specialization and improvement elsewhere in the value chain <xref target="ATTRACTIVE-PROFITS"/>. Well-timed standards efforts leverage these forces to focus proprietary interests on top of open technology, rather than as a replacement for it.</t>
        <t>Balancing these factors to build robust ecosystems is difficult, but is often helped by community building and good design -- in particular, appropriate use of layering. It also requires continuing maintenance and evolution of protocols, to assure that they are still relevant and appropriate to their use.</t>
      </section>
      <section anchor="intermediation">
        <name>Control Delegation of Power</name>
        <t>Some functions might see substantial benefits if they are performed by a third party in communication. When used well, adding a new party to communication can improve:</t>
        <ul spacing="normal">
          <li>
            <em>Efficiency</em>: Many functions on the Internet are more efficient when performed at a higher scale. For example, a content delivery network can offer services at a fraction of the financial and environmental cost that someone serving content themselves would otherwise pay, because of the scale they operate at. Likewise, a two-sided market platform can introduce sizeable efficiencies over pair-wise buyer/seller trading <xref target="CIRCULAR-CONUNDRUM"/>.</li>
          <li>
            <em>Simplicity</em>: Completely disintermediating communication can shift the burden of functions onto endpoints. This can cause increased cognitive load for users; for example, compare commercial social networking platforms with self-hosted efforts.</li>
          <li>
            <em>Specialization</em>: Having a function concentrated into a few hands can improve outcomes because of the resulting specialization. For example, services overseen by professional administrators are often seen to have a better security posture and improved availability.</li>
          <li>
            <em>Privacy</em>: For some functions, user privacy can be improved by concentrating their activity to prevent individual behaviors from being discriminated from each other.<xref target="MIX"/> Introduction of a third party can also enforce functional boundaries -- for example, to reduce the need for users to trust potentially malicious endpoints, as seen in the so-called "oblivious" protocols (e.g., <xref target="RFC9230"/>) that allow end users to hide their identity from services, while still accessing them.</li>
        </ul>
        <t>However, introducing a new party to communication adds concentration and platform centralization risk to Internet functions, because it brings opportunities for control and observation. While (as discussed above) standards efforts have a very limited capability to prevent or control the resulting consolidation, designing functions with thoughtful constraints on third party functions can prevent at least the most egregious outcomes.</t>
        <t>Most often, third parties are added to functions as "intermediaries" or in designated "agent" roles. In general, they should only be interposed because of the positive action of at least one of the primary parties, and should have their ability to observe or control communication limited to what is necessary to perform their intended function.</t>
        <t>For example, early deployments of HTTP allowed intermediaries to be interposed by the network without knowledge of the endpoints, and those intermediaries could see and change the full content of traffic by default -- even when they are only intended to perform basic functions such as caching. Because of the introduction of HTTPS and the CONNECT method (see <xref section="9.3.6" sectionFormat="of" target="HTTP"/>), combined with efforts to encourage its adoption, those intermediaries are now required to be explicitly interposed by one endpoint.</t>
        <t>See <xref target="I-D.thomson-tmi"/> for more guidance on protocol intermediation.</t>
        <t>The term "intermediary" is also used (often in legal and regulatory contexts) more broadly than it has been in protocol design; for example, an auction Web site intermediates between buyers and sellers is considered an intermediary, even though it is not formally an intermediary in HTTP (see <xref section="3.7" sectionFormat="of" target="HTTP"/>). Protocol designers can address the consolidation risk associated with this kind of intermediation by standardising the function, rather than restricting the capabilities of the underlying protocols; see <xref target="up"/>.</t>
      </section>
      <section anchor="evolution">
        <name>Consider Extensibility and Modularity Carefully</name>
        <t>An important feature of the Internet is its ability to evolve, so that it can meet new requirements and adapt to new conditions without requiring a "flag day" to upgrade implementations. Typically, functions accommodate evolution by defining extension interfaces, which allow optional features to be added or change over time in an interoperable fashion.</t>
        <t>However, these interfaces can also be a basis for platform centralization if a powerful entity can change the target for meaningful interoperability by adding proprietary extensions to a standard. This is especially true when the core standard does not itself provide sufficient utility on its own.</t>
        <t>For example, the SOAP protocol's <xref target="SOAP"/> extreme flexibility and failure to provide significant standalone value allowed vendors to require use of their preferred extensions, favoring those who had more market power.</t>
        <t>Therefore, standards efforts should focus on providing concrete utility to the majority of their users as published, rather than being a "framework" where interoperability is not immediately available. Internet functions should not make every aspect of their operation extensible; boundaries between modules should be designed in a way that allows evolution and discourages consolidation, while still offering meaningful functionality.</t>
        <t>Beyond allowing evolution, well-considered interfaces can also aid decentralization efforts. The structural boundaries that emerge between the sub-modules of the function -- as well as those with adjacent functions -- provide touchpoints for interoperability and an opportunity for substitution of providers.</t>
        <t>In particular, if the interfaces of a function are well-defined and stable, there is an opportunity to use different providers for that function. When those interfaces are open standards, change control resides with the Internet community instead of remaining in proprietary hands, further enhancing stability and enabling (but not ensuring) decentralization.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document does not have a direct security impact on Internet protocols. However, failure to consider consolidation risks might cause a myriad of security issues.</t>
    </section>
  </middle>
  <back>
    <displayreference target="RAND" to="BARAN"/>
    <displayreference target="SCALE-FREE" to="BARABASI"/>
    <displayreference target="INTERMEDIARY-INFLUENCE" to="JUDGE"/>
    <displayreference target="INTERDEPENDENCE" to="FARRELL"/>
    <displayreference target="MULTISTAKEHOLDER" to="PALLADINO"/>
    <displayreference target="NEW-CHICAGO" to="LESSIG"/>
    <displayreference target="POLYCENTRIC" to="ALIGIA"/>
    <displayreference target="PIR" to="OLUMOFIN"/>
    <displayreference target="ACCESS" to="VESTAGER"/>
    <displayreference target="SUCCESS" to="KENDE"/>
    <displayreference target="MIX" to="CHAUM"/>
    <displayreference target="FEDERALIST-51" to="MADISON"/>
    <displayreference target="ATTRACTIVE-PROFITS" to="CHRISTENSEN"/>
    <displayreference target="CIRCULAR-CONUNDRUM" to="SPULBER"/>
    <displayreference target="AMBITION" to="SCHNEIDERa"/>
    <displayreference target="PERSPECTIVE" to="BODO"/>
    <displayreference target="STRUCTURELESS" to="FREEMAN"/>
    <displayreference target="SCHNEIDER" to="SCHNEIDERb"/>
    <references>
      <name>Informative References</name>
      <reference anchor="RAND" target="https://www.rand.org/pubs/research_memoranda/RM3420.html">
        <front>
          <title>On Distributed Communications: Introduction to Distributed Communications Networks</title>
          <author initials="P." surname="Baran" fullname="Paul Baran">
            <organization>RAND Corporation</organization>
          </author>
          <date year="1964"/>
        </front>
      </reference>
      <reference anchor="HTTP">
        <front>
          <title>HTTP Semantics</title>
          <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding">
            <organization/>
          </author>
          <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham">
            <organization/>
          </author>
          <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke">
            <organization/>
          </author>
          <date month="June" year="2022"/>
          <abstract>
            <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes. </t>
            <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="97"/>
        <seriesInfo name="RFC" value="9110"/>
        <seriesInfo name="DOI" value="10.17487/RFC9110"/>
      </reference>
      <reference anchor="SOAP" target="https://www.w3.org/TR/2007/REC-soap12-part0-20070427/">
        <front>
          <title>SOAP Version 1.2 Part 0: Primer (Second Edition)</title>
          <author fullname="Nilo Mitra" role="editor"/>
          <author fullname="Yves Lafon" role="editor"/>
          <date day="27" month="April" year="2007"/>
        </front>
        <seriesInfo name="W3C REC" value="REC-soap12-part0-20070427"/>
        <seriesInfo name="W3C" value="REC-soap12-part0-20070427"/>
      </reference>
      <reference anchor="SCALE-FREE" target="https://barabasi.com/f/67.pdf">
        <front>
          <title>Emergence of Scaling in Random Networks</title>
          <author initials="R." surname="Albert" fullname="Réka Albert">
            <organization>University of Notre Dame</organization>
          </author>
          <date year="1999" month="October"/>
        </front>
        <refcontent>SCIENCE, Vol. 286, No. 15, p. 509</refcontent>
      </reference>
      <reference anchor="INTERMEDIARY-INFLUENCE" target="https://scholarship.law.columbia.edu/faculty_scholarship/1856">
        <front>
          <title>Intermediary Influence</title>
          <author initials="K." surname="Judge" fullname="Kathryn Judge">
            <organization>Columbia Law School</organization>
          </author>
          <date year="2014"/>
        </front>
        <refcontent>University of Chicago Law Review, Vol. 82, p. 573</refcontent>
      </reference>
      <reference anchor="INTERDEPENDENCE" target="https://doi.org/10.1162/ISEC_a_00351">
        <front>
          <title>Weaponized Interdependence: How Global Economic Networks Shape State Coercion</title>
          <author initials="H." surname="Farrell" fullname="Henry Farrell">
            <organization>George Washington University</organization>
          </author>
          <author initials="A. L." surname="Newman" fullname="Abraham L. Newman">
            <organization>Georgetown University</organization>
          </author>
          <date year="2019"/>
        </front>
        <refcontent>International Security, Vol. 44, No. 1, p. 42</refcontent>
      </reference>
      <reference anchor="MOXIE" target="https://signal.org/blog/the-ecosystem-is-moving/">
        <front>
          <title>Reflections: The ecosystem is moving</title>
          <author initials="M." surname="Marlinspike" fullname="Moxie Marlinspike">
            <organization>Signal</organization>
          </author>
          <date year="2016" month="May"/>
        </front>
      </reference>
      <reference anchor="MULTISTAKEHOLDER" target="https://link.springer.com/book/10.1007/978-3-030-56131-4">
        <front>
          <title>Legitimacy, Power, and Inequalities in the Multistakeholder Internet Governance</title>
          <author initials="N." surname="Palladino" fullname="Nicola Palladino">
            <organization/>
          </author>
          <author initials="N." surname="Santaniello" fullname="Nauro Santaniello">
            <organization/>
          </author>
          <date year="2020"/>
        </front>
      </reference>
      <reference anchor="NEW-CHICAGO" target="https://www.journals.uchicago.edu/doi/10.1086/468039">
        <front>
          <title>The New Chicago School</title>
          <author initials="L." surname="Lessig" fullname="Laurence Lessig">
            <organization/>
          </author>
          <date year="1998" month="June"/>
        </front>
        <refcontent>Journal of Legal Studies, Vol. 27</refcontent>
      </reference>
      <reference anchor="POLYCENTRIC" target="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2149165">
        <front>
          <title>Polycentricity: From Polanyi to Ostrom, and Beyond</title>
          <author initials="P. D." surname="Aligia" fullname="Paul D. Aligia">
            <organization/>
          </author>
          <author initials="V." surname="Tarko" fullname="Vlad Tarko">
            <organization/>
          </author>
          <date year="2012" month="April"/>
        </front>
        <refcontent>Governance: An International Journal of Policy, Administration, and Institutions, Vol. 25, No. 2, p. 237</refcontent>
      </reference>
      <reference anchor="PIR" target="https://link.springer.com/chapter/10.1007/978-3-642-27576-0_13">
        <front>
          <title>Revisiting the Computational Practicality of Private Information Retrieval</title>
          <author initials="F." surname="Olumofin" fullname="Femi Olumofin">
            <organization/>
          </author>
          <author initials="I." surname="Goldberg" fullname="Ian Goldberg">
            <organization/>
          </author>
          <date year="2010"/>
        </front>
      </reference>
      <reference anchor="ACCESS" target="https://wayback.archive-it.org/12090/20191129202059/https://ec.europa.eu/commission/commissioners/2014-2019/vestager/announcements/defending-competition-digitised-world_en">
        <front>
          <title>Defending Competition in a Digitised World, Address at the European Consumer and Competition Day</title>
          <author initials="M." surname="Vestager" fullname="Margrethe Vestager">
            <organization/>
          </author>
          <date year="2019" month="April"/>
        </front>
      </reference>
      <reference anchor="SUCCESS" target="https://blog.apnic.net/wp-content/uploads/2021/12/MKGRA669-Report-for-APNIC-LACNIC-V3.pdf">
        <front>
          <title>Study on the Internet's Technical Success Factors</title>
          <author initials="M." surname="Kende" fullname="Michael Kende">
            <organization/>
          </author>
          <author initials="A." surname="Kvalbein" fullname="Amund Kvalbein">
            <organization/>
          </author>
          <author initials="J." surname="Allford" fullname="Julia Allford">
            <organization/>
          </author>
          <author initials="D." surname="Abecassis" fullname="David Abecassis">
            <organization/>
          </author>
          <date year="2021" month="December"/>
        </front>
      </reference>
      <reference anchor="OECD" target="https://www.oecd.org/daf/competition/data-portability-interoperability-and-digital-platform-competition-2021.pdf">
        <front>
          <title>Data portability, interoperability and digital platform competition</title>
          <author>
            <organization>OECD</organization>
          </author>
          <date year="2021" month="June"/>
        </front>
      </reference>
      <reference anchor="MIX" target="https://dl.acm.org/doi/10.1145/358549.358563">
        <front>
          <title>Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms</title>
          <author initials="D. L." surname="Chaum" fullname="David L. Chaum">
            <organization/>
          </author>
          <date year="1981" month="February"/>
        </front>
        <refcontent>Communications of the ACM, Vol. 24, No. 2</refcontent>
      </reference>
      <reference anchor="FEDERALIST-51">
        <front>
          <title>The Structure of the Government Must Furnish the Proper Checks and Balances Between the Different Departments</title>
          <author initials="J." surname="Madison" fullname="James Madison">
            <organization/>
          </author>
          <date year="1788" month="February"/>
        </front>
        <refcontent>The Federalist Papers, No. 51</refcontent>
      </reference>
      <reference anchor="ATTRACTIVE-PROFITS">
        <front>
          <title>The Law of Conservation of Attractive Profits</title>
          <author initials="C." surname="Christensen" fullname="Clayton Christensen">
            <organization/>
          </author>
          <date year="2004" month="February"/>
        </front>
        <refcontent>Harvard Business Review, "Breakthrough Ideas for 2004"</refcontent>
      </reference>
      <reference anchor="ACTIVITYSTREAMS" target="https://www.w3.org/TR/2016/CR-activitystreams-core-20161215/">
        <front>
          <title>Activity Streams 2.0</title>
          <author fullname="Evan Prodromou" role="editor"/>
          <author fullname="James Snell" role="editor"/>
          <date day="15" month="December" year="2016"/>
        </front>
        <seriesInfo name="W3C CR" value="CR-activitystreams-core-20161215"/>
        <seriesInfo name="W3C" value="CR-activitystreams-core-20161215"/>
      </reference>
      <reference anchor="CIRCULAR-CONUNDRUM" target="https://wwws.law.northwestern.edu/research-faculty/clbe/workingpapers/documents/spulber_circularconundrum.pdf">
        <front>
          <title>Solving The Circular Conundrum: Communication And Coordination In Internet Markets</title>
          <author initials="D. F." surname="Spulber" fullname="Daniel F. Spulber">
            <organization/>
          </author>
          <date year="2010"/>
        </front>
        <refcontent>Northwestern University Law Review, Vol. 104, No. 2</refcontent>
      </reference>
      <reference anchor="YAO" target="https://dl.acm.org/doi/10.5555/1382436.1382751">
        <front>
          <title>Protocols for secure computations</title>
          <author initials="A. C." surname="Yao" fullname="Andrew C. Yao">
            <organization/>
          </author>
          <date year="1982" month="November"/>
        </front>
        <refcontent>SFCS '82</refcontent>
      </reference>
      <reference anchor="ENPA" target="https://covid19-static.cdn-apple.com/applications/covid19/current/static/contact-tracing/pdf/ENPA_White_Paper.pdf">
        <front>
          <title>Exposure Notification Privacy-preserving Analytics (ENPA) White Paper</title>
          <author>
            <organization>Apple</organization>
          </author>
          <author>
            <organization>Google</organization>
          </author>
          <date year="2021" month="April"/>
        </front>
      </reference>
      <reference anchor="PRIO" target="https://crypto.stanford.edu/prio/paper.pdf">
        <front>
          <title>Prio: Private, Robust, and Scalable Computation of Aggregate Statistics</title>
          <author initials="H." surname="Corrigan-Gibbs" fullname="Henry Corrigan-Gibbs">
            <organization/>
          </author>
          <author initials="D." surname="Boneh" fullname="Dan Boneh">
            <organization/>
          </author>
          <date year="2017" month="March"/>
        </front>
      </reference>
      <reference anchor="AMBITION" target="https://osf.io/m7wyj/">
        <front>
          <title>Decentralization: an incomplete ambition</title>
          <author initials="N." surname="Schneider" fullname="Nathan Schneider">
            <organization/>
          </author>
          <date year="2019"/>
        </front>
        <refcontent>Journal of Cultural Economy, Vol. 12, No. 4</refcontent>
      </reference>
      <reference anchor="AREWEDECENTRALIZEDYET" target="https://bitcoinera.app/arewedecentralizedyet/">
        <front>
          <title>Are We Decentralized Yet?</title>
          <author>
            <organization>bitcoinera</organization>
          </author>
          <date year="2022"/>
        </front>
      </reference>
      <reference anchor="PERSPECTIVE" target="https://doi.org/10.14763/2021.2.1563">
        <front>
          <title>Decentralization: a multidisciplinary perspective</title>
          <author initials="B." surname="Bodó" fullname="Balázs Bodó">
            <organization>University of Amsterdam</organization>
          </author>
          <author initials="J. K." surname="Brekke" fullname="Jaya Klara Brekke">
            <organization>Durham University</organization>
          </author>
          <author initials="J.-H." surname="Hoepman" fullname="Jaap-Henk Hoepman">
            <organization>Radboud University</organization>
          </author>
          <date year="2021" month="June"/>
        </front>
        <refcontent>Internet Policy Review, Vol. 10, No. 2</refcontent>
      </reference>
      <reference anchor="MUSIANI" target="https://link.springer.com/chapter/10.1057/9781137483591_4">
        <front>
          <title>Alternative Technologies as Alternative Institutions: The Case of the Domain Name System</title>
          <author initials="F." surname="Musiani" fullname="Francesca Musiani">
            <organization/>
          </author>
          <date year="2016"/>
        </front>
        <refcontent>The Turn to Infrastructure in Internet Governance</refcontent>
      </reference>
      <reference anchor="STRUCTURELESS" target="https://www.jstor.org/stable/41035187">
        <front>
          <title>The Tyranny of Structurelessness</title>
          <author initials="J." surname="Freeman" fullname="Jo Freeman">
            <organization/>
          </author>
          <date year="1972"/>
        </front>
        <refcontent>Berkeley Journal of Sociology, Vol. 17</refcontent>
      </reference>
      <reference anchor="ISOC" target="https://future.internetsociety.org/2019/">
        <front>
          <title>Consolidation in the Internet Economy</title>
          <author>
            <organization>Internet Society</organization>
          </author>
          <date year="2019"/>
        </front>
        <refcontent>Internet Society Global Internet Report</refcontent>
      </reference>
      <reference anchor="ECH">
        <front>
          <title>TLS Encrypted Client Hello</title>
          <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
            <organization>RTFM, Inc.</organization>
          </author>
          <author fullname="Kazuho Oku" initials="K." surname="Oku">
            <organization>Fastly</organization>
          </author>
          <author fullname="Nick Sullivan" initials="N." surname="Sullivan">
            <organization>Cloudflare</organization>
          </author>
          <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
            <organization>Cloudflare</organization>
          </author>
          <date day="3" month="October" year="2022"/>
          <abstract>
            <t>   This document describes a mechanism in Transport Layer Security (TLS)
   for encrypting a ClientHello message under a server public key.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Source for this draft and an issue tracker can be found at
   https://github.com/tlswg/draft-ietf-tls-esni
   (https://github.com/tlswg/draft-ietf-tls-esni).

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-tls-esni-15"/>
      </reference>
      <reference anchor="SCHNEIDER" target="https://nathanschneider.info/articles/DecentralHacker.html">
        <front>
          <title>What to do once you admit that decentralizing everything never seems to work</title>
          <author initials="N." surname="Schneider" fullname="Nathan Schneider">
            <organization/>
          </author>
          <date year="2022" month="October"/>
        </front>
        <refcontent>Hacker Noon</refcontent>
      </reference>
      <reference anchor="BACCHI" target="https://library.oapen.org/bitstream/handle/20.500.12657/33181/560097.pdf?sequence=1#page=34">
        <front>
          <title>Introducing the ‘What’s the Problem Represented to be?’ approach</title>
          <author initials="C." surname="Bacchi" fullname="Carol Bacchi">
            <organization/>
          </author>
          <date year="2012"/>
        </front>
        <refcontent>Chapter 2, Engaging with Carol Bacchi</refcontent>
      </reference>
      <reference anchor="RFC791">
        <front>
          <title>Internet Protocol</title>
          <author fullname="J. Postel" initials="J." surname="Postel">
            <organization/>
          </author>
          <date month="September" year="1981"/>
        </front>
        <seriesInfo name="STD" value="5"/>
        <seriesInfo name="RFC" value="791"/>
        <seriesInfo name="DOI" value="10.17487/RFC0791"/>
      </reference>
      <reference anchor="RFC4271">
        <front>
          <title>A Border Gateway Protocol 4 (BGP-4)</title>
          <author fullname="Y. Rekhter" initials="Y." role="editor" surname="Rekhter">
            <organization/>
          </author>
          <author fullname="T. Li" initials="T." role="editor" surname="Li">
            <organization/>
          </author>
          <author fullname="S. Hares" initials="S." role="editor" surname="Hares">
            <organization/>
          </author>
          <date month="January" year="2006"/>
          <abstract>
            <t>This document discusses the Border Gateway Protocol (BGP), which is an inter-Autonomous System routing protocol.</t>
            <t>The primary function of a BGP speaking system is to exchange network reachability information with other BGP systems.  This network reachability information includes information on the list of Autonomous Systems (ASes) that reachability information traverses. This information is sufficient for constructing a graph of AS connectivity for this reachability from which routing loops may be pruned, and, at the AS level, some policy decisions may be enforced.</t>
            <t>BGP-4 provides a set of mechanisms for supporting Classless Inter-Domain Routing (CIDR).  These mechanisms include support for advertising a set of destinations as an IP prefix, and eliminating the concept of network "class" within BGP.  BGP-4 also introduces mechanisms that allow aggregation of routes, including aggregation of AS paths.</t>
            <t>This document obsoletes RFC 1771.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="4271"/>
        <seriesInfo name="DOI" value="10.17487/RFC4271"/>
      </reference>
      <reference anchor="RFC793">
        <front>
          <title>Transmission Control Protocol</title>
          <author fullname="J. Postel" initials="J." surname="Postel">
            <organization/>
          </author>
          <date month="September" year="1981"/>
        </front>
        <seriesInfo name="RFC" value="793"/>
        <seriesInfo name="DOI" value="10.17487/RFC0793"/>
      </reference>
      <referencegroup anchor="BCP95" target="https://www.rfc-editor.org/info/bcp95">
        <reference anchor="RFC3935" target="https://www.rfc-editor.org/info/rfc3935">
          <front>
            <title>A Mission Statement for the IETF</title>
            <author fullname="H. Alvestrand" initials="H." surname="Alvestrand"/>
            <date month="October" year="2004"/>
            <abstract>
              <t>This memo gives a mission statement for the IETF, tries to define the terms used in the statement sufficiently to make the mission statement understandable and useful, argues why the IETF needs a mission statement, and tries to capture some of the debate that led to this point.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="95"/>
          <seriesInfo name="RFC" value="3935"/>
          <seriesInfo name="DOI" value="10.17487/RFC3935"/>
        </reference>
      </referencegroup>
      <reference anchor="RFC7258">
        <front>
          <title>Pervasive Monitoring Is an Attack</title>
          <author fullname="S. Farrell" initials="S." surname="Farrell">
            <organization/>
          </author>
          <author fullname="H. Tschofenig" initials="H." surname="Tschofenig">
            <organization/>
          </author>
          <date month="May" year="2014"/>
          <abstract>
            <t>Pervasive monitoring is a technical attack that should be mitigated in the design of IETF protocols, where possible.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="188"/>
        <seriesInfo name="RFC" value="7258"/>
        <seriesInfo name="DOI" value="10.17487/RFC7258"/>
      </reference>
      <reference anchor="RFC1035">
        <front>
          <title>Domain names - implementation and specification</title>
          <author fullname="P. Mockapetris" initials="P." surname="Mockapetris">
            <organization/>
          </author>
          <date month="November" year="1987"/>
          <abstract>
            <t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System.  It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="13"/>
        <seriesInfo name="RFC" value="1035"/>
        <seriesInfo name="DOI" value="10.17487/RFC1035"/>
      </reference>
      <reference anchor="RFC5321">
        <front>
          <title>Simple Mail Transfer Protocol</title>
          <author fullname="J. Klensin" initials="J." surname="Klensin">
            <organization/>
          </author>
          <date month="October" year="2008"/>
          <abstract>
            <t>This document is a specification of the basic protocol for Internet electronic mail transport.  It consolidates, updates, and clarifies several previous documents, making all or parts of most of them obsolete.  It covers the SMTP extension mechanisms and best practices for the contemporary Internet, but does not provide details about particular extensions.  Although SMTP was designed as a mail transport and delivery protocol, this specification also contains information that is important to its use as a "mail submission" protocol for "split-UA" (User Agent) mail reading systems and mobile environments.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5321"/>
        <seriesInfo name="DOI" value="10.17487/RFC5321"/>
      </reference>
      <reference anchor="RFC6120">
        <front>
          <title>Extensible Messaging and Presence Protocol (XMPP): Core</title>
          <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre">
            <organization/>
          </author>
          <date month="March" year="2011"/>
          <abstract>
            <t>The Extensible Messaging and Presence Protocol (XMPP) is an application profile of the Extensible Markup Language (XML) that enables the near-real-time exchange of structured yet extensible data between any two or more network entities.  This document defines XMPP's core protocol methods: setup and teardown of XML streams, channel encryption, authentication, error handling, and communication primitives for messaging, network availability ("presence"), and request-response interactions.  This document obsoletes RFC 3920.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6120"/>
        <seriesInfo name="DOI" value="10.17487/RFC6120"/>
      </reference>
      <reference anchor="RFC8890">
        <front>
          <title>The Internet is for End Users</title>
          <author fullname="M. Nottingham" initials="M." surname="Nottingham">
            <organization/>
          </author>
          <date month="August" year="2020"/>
          <abstract>
            <t>This document explains why the IAB believes that, when there is a conflict between the interests of end users of the Internet and other parties, IETF decisions should favor end users. It also explores how the IETF can more effectively achieve this.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8890"/>
        <seriesInfo name="DOI" value="10.17487/RFC8890"/>
      </reference>
      <reference anchor="RFC5218">
        <front>
          <title>What Makes for a Successful Protocol?</title>
          <author fullname="D. Thaler" initials="D." surname="Thaler">
            <organization/>
          </author>
          <author fullname="B. Aboba" initials="B." surname="Aboba">
            <organization/>
          </author>
          <date month="July" year="2008"/>
          <abstract>
            <t>The Internet community has specified a large number of protocols to date, and these protocols have achieved varying degrees of success. Based on case studies, this document attempts to ascertain factors that contribute to or hinder a protocol's success.  It is hoped that these observations can serve as guidance for future protocol work.  This memo  provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5218"/>
        <seriesInfo name="DOI" value="10.17487/RFC5218"/>
      </reference>
      <reference anchor="RFC9230">
        <front>
          <title>Oblivious DNS over HTTPS</title>
          <author fullname="E. Kinnear" initials="E." surname="Kinnear">
            <organization/>
          </author>
          <author fullname="P. McManus" initials="P." surname="McManus">
            <organization/>
          </author>
          <author fullname="T. Pauly" initials="T." surname="Pauly">
            <organization/>
          </author>
          <author fullname="T. Verma" initials="T." surname="Verma">
            <organization/>
          </author>
          <author fullname="C.A. Wood" initials="C.A." surname="Wood">
            <organization/>
          </author>
          <date month="June" year="2022"/>
          <abstract>
            <t>This document describes a protocol that allows clients to hide their IP addresses from DNS resolvers via proxying encrypted DNS over HTTPS (DoH) messages. This improves privacy of DNS operations by not allowing any one server entity to be aware of both the client IP address and the content of DNS queries and answers.</t>
            <t>This experimental protocol has been developed outside the IETF and is published here to guide implementation, ensure interoperability among implementations, and enable wide-scale experimentation.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9230"/>
        <seriesInfo name="DOI" value="10.17487/RFC9230"/>
      </reference>
      <reference anchor="I-D.thomson-tmi">
        <front>
          <title>Principles for the Involvement of Intermediaries in Internet Protocols</title>
          <author fullname="Martin Thomson" initials="M." surname="Thomson">
            <organization>Mozilla</organization>
          </author>
          <date day="8" month="September" year="2022"/>
          <abstract>
            <t>   This document proposes a set of principles for designing protocols
   with rules for intermediaries.  The goal of these principles is to
   limit the ways in which intermediaries can produce undesirable
   effects and to protect the useful functions that intermediaries
   legitimately provide.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-thomson-tmi-04"/>
      </reference>
    </references>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>This document benefits from discussions with Brian Trammell during our shared time on the Internet Architecture Board.</t>
      <t>Thanks to Jari Arkko, Kristin Berdan, Christian Huitema, Mallory Knodel, Eliot Lear, Tommy Pauly, and Martin Thomson for their comments and suggestions.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA519y3LbyJrmXk+BYC3K6iApS77b0VFDU7KtKusSknx8ajo6
HEkiKaIMAjwAKJlH4YjqZ5jNTET3YpaznkfobT9FPcn817wAkF1nJqZPWRIJ
ZP7553/5/ttoNNppsia3L5PBcdHYqrBNMi2Lusyz1DRZWbxMPi5Nk8xNkVw2
pkhNldbJ0WJRVk2dHJY/DXbMbFbZm5dJ//cT+I7/5k5azguzgtellVk0o6Js
mqy4XprVyNyUWQr/HmXynNHcFk1l8uzv9KDRw6c78Ej46t3h5Oro684cfrgu
q+3LJCsW5c5Otq5eJk21qZuDhw9fPDzYMZU1L5O3trDwlJ3bsvp8XZWb9cud
z3YLP6Uvk/gN/vepve8v87LgP3V+7bfsf13Z603e+t11eQPbM/CYnZ0a6fLJ
5GUB29raeqdemar59LdN2dj6ZVKUO+vsZfIvTTkfJvA/WZHCu4dJDcSv7KKG
f21X8o+myubwp3m5Whv5xwo+DH/Kijwr7L/u7NzYYmNf7iTJddYsN7OXyQrI
v/c9uu/smE2zLCv44gi+m8DzYGkn4+TUnR39mo/1xFSf238pq2tTyNNe0m/W
Jew8538nySg5r8yyMgX9PC838Ho41QmcJC7D0K/tymQ5L/m/4f+MYaX0h00F
JFo2zbp+ubd3e3s71r/u7ewUZbWC197ArneQSdxPSXIxOT3kBaRZvc4NvPD1
BH5Jv2pMdW2b+LGwvnQMW9lbb2b1XmVra6r58tPKrkr8k9m7OHn0+ODheNms
cn6I3KuzIjnM8Hxmm8amcDtWq02RzYkcNV2bqkw3c7osTfmNzyantkEurge8
broM+y+ePqYf3SkRSYW0cirnZpMnr42SuH0mRAx4WbUuhbGT5N3V1Tn84c30
xf7+Q/j58mwCP398NB1fHE1HdWnW+wejNXDrwxFct2cPHx88w09NJ++PRm8u
jo56aPt6cnncS94ZrGxm6mwMTLu32Hv6bLxOFyENj1YWvgFXJikXyeUcmKK4
Bj5MLoDw5crRJSDL2bwpZ7YC8rx48Q3yEC9PxkSb2X/+7zqL6TbJ4RnN6D38
5e/5f/7f7sdiMn4ogLmqOmu2uE64BZVNDuFB+mnhYZPP/hvwkk0331vZxViW
EC/r4j//z2fT+ss/sBKQGCCvGrjlL+HAjo9Op0fD5C9lPk4Onj8dwqfHyf6T
YbIeJ08eIvGOT6+OLk6ODo8nF7+Ojk/fvP+AX2kd8M8fDt8e9Z5uPV+Wuanq
ZbYe5+YWDjnfrGaZQQLsLcx8kzfbT8GH9vafP3kanj4plpVNM1Nt4YdFvkFW
CA774OH+t+4A0/KXcfLzJr12hyG0/MU0y2pbtP4WU3MqK07em1tgv2VZ5h1C
xhSfLuHSXpf0hQt7k9lbofDzAybss0dK2MOj86PTwx6KvplcXBy9f99L07TM
SBbtPxzv7z892Du+PJp+Mp8ePnz0ZD8SPh+tWZewExAmRMbUri1qkTn88V15
m7zNy5nJkyPYR7nK5u4qJZdLs7aouBsL+7fVHCgxiGn+rYvFNH83Tt6YqrJ5
3qL6O1vAWbb/FlP9rYWfbfLRAFMU1w1IR0/j3rfBPX4Pasnerryc04s8Aw1j
Vj1/73tnU952XhaeNVs69BWg3aWdgw5qtnLCjx/LFaKDfnwA3z45++uxnG7n
cmTX8Aw6y1leXu81Szuy87Le1o1djbJ6tCpvYPd70aFe2EVu56I/rpY2cd9I
sjrhb0Q64iHo5S0e2dPvSRzQ66DCQb7W6+yzuw+i28svme37c0zDS9oSbvvD
+6vjy6vJL0fvzt4fHl20+Pt88v795PD49Cza23sL1km2MnOg53l5a6shWZDH
hf3bBuR+k9kaJT/QKTkByQHK0ny2IDtSEPbOAn3rbKyYZQ8efldVnmYgnwxo
zDw3YBaV/R8ym6pMLk0B9lsGHFz2ni2Q6fO4XldwGrYi3TYry890Z0Fj7r14
9nz0aPTw0cPRk6f7j/ZHKMJOjz6Opu+Op5O3Zy1qvT+6vDx+G5EKTx642Qkb
lkzhjn/eFBZV4PPvbvs97IgU7HtbA092WH7wc7mpkNtBuMERIds3mxQOQzXH
s8G9ltNv/NV6vJnzSknygwhjUjx/uvf46fOHj1CcnJ+9/3V6dHp1cTxt7X/y
/vjt8STa/3mZb8lWzeZw/UBgVmALwC9Nsc3QkjoDQ6pcMf+8ttuySEPaTOBg
crwTB3/OfDpEXZxdizna/shfgFuSKzB++1lhDcK0qsd1XRXECOAsPNJfzher
n8wMbd158ylL//lg//GL/adPukfguRpWX7SkUHA+QIIMr88kXWUFWpP0Gb1H
NZBvQ7JDj+4JCyzWTAeP6CTPj9vX9ez9h5OzN8en4RGgagMJidYYXkgwV9eb
Rld0jhvK0FhjnXheZTeoTY7VEAeJfmHh9OyNyWPN8o1ryuR+Y1dZcgZauVxk
Rd8HjsFffQtSAUyk6z95Oeeg8YCirfv59PHB6ODZk2dPRw8/7aPSnkyncBVb
xPnLEci5t0cXIXEO7QJULdIG6WLht7hjkF0GbHwUcjUo5Y9llad4VCl4FHUC
njYS8gjEy9rCFtCV3oDxS2cXPubQbAOSPfbc/KL/GprtzMw/j9FlAbU2yho2
Hw7AUd7Db+3vH7xA+fjkxZ5+x87HFtcBhtpmD93JDCRDWQT/BO7FLz8e4RP2
bizIYiDmnikK8OHmlvzPvVTJMJr79Y9SpcDoFinwyRbfO3LQO9eVRer8RV6E
/saHvtP4BQ2q8ChQVgEPstpQLfFjnVzZ+RLdK5Bmm/kcD+AN8GxZhZ7EoYWd
oCsB5Nnvd19AcY/NGh5EbufteiR3dm+zzkuTIpEO9oHYeye/vL2YPH36YnRh
wdVqRnARRpPz0+Pp6P1kiv/5yyPn+nxLIJ1kwKw2T35BW673ExPwG9PkF7hZ
M9u+IfKRnzfgW4NMy2EVae8nDs1NloLtZOcGzhuJcnY0Fa9Zmdw0JsG9mFmW
kxFEMAJwbyW/Idal4wYyw/k0ePuTgBcCWr9gjXUvpVGblHbOfnhqFnvBY+Dn
xoyCpYzaKxnBSkaykpGuJOJKfPG3DyA2dZAcaOgc/7XFgdN3kw8nIZ0+IKQy
t2aWw+1G460Cq3wOTJ3lQ5SCILxVCKBORZodCs3Oa7tJy2K7CrlyH0TgrNqg
R7T/4nk/tdJ8bOYrppUo2/3HT/YePXn+5PGLMf7n6aPv3TpmATCbp0uzWXV0
UgugACmPN2wyPVHdIsYw6tg3R2ADghq/vBo92W/R6wQMwcuzSLegdXPZVJs5
0Mbqk1kFomAB669ukjdAt6xe0t/O6axhoXYO/gspfZOjtqxB+ze31vL1P8wW
C1vhEw4t4hckpQLKPg8o++z59y2nn+F/azhI2Ivwckgg3MUbmyICCZoYLAlU
+UwT8tQmV1cXk+nV8V+ORucXoF6v2rJs+u4CKHZ0ennUoQ46l+hrAuVtdcMK
FX6eNGRKgJhHkiyyaHdubwcPH34fN5rCEtDxmi4rWL2F93R3+M7Auysg9qbO
ChSh6u8OXlfWfAbvutxcL5Pj1Jo6gRtHbx6QIoVtH1/9enl1cTQ5uWRwaXox
orXDdQXDxZpVDRe0sqhhnu4f7KNVND2+mH54P7kYTc9OP5weXnw4aZHs8vzD
+9exLh5cljl6RUS3aVbNN7mpkHIgJavNqsXIYF2htgWxmLF9BTrDOxcIcdqm
bjnD3zVZDslVSN6Mk8v1BqGbroF3CsJreQvaDV4UAgodFGH/od6re63umrCW
IngiWd2KW44EeNmbw1L20OUH6rBBCsJivmHdXfNKP82FYnMlmAjJXydnkTYA
fmtK8J/4oGt0jC2JerEKQ048hau8Yoju+TdMcFFn8Fb0dMbJr6bfwu4Kuyfw
//b2Hz0/ePzo6Rj/+0ywkQj/ejO9TH6kBRydnk+i3Rx9WZc17uC0bLKF8gaZ
sfPtaI2krIipJmDubsHUrZMH+JDd5OMyA0OXLnuPxyHK7U/ol8l6ndtvfeBt
WV7LJ9oEmZcgufdfjGok/Xw8T4uRwceRrYv/Uqmtn9yD00K5uMff2EMawV0c
oTRBCAKOfA+394l294l2J3xwfnEcM8IAqFS+VJMfNFw5A3HNeg3xW9KDgbtA
cusa7Ltr9BAQdQJ5AwQNL9kJ8i1etWff4xZGl6ZlVWVArNHbbDar77mSyWsw
Y5f9BKy266YcY4wGLSS6PnCCJfttsvPJyevjq+Oz07YImr47PToGfWciqhy2
4kovgSBgMOENyS1s3KxmZIj8eaBN8YhmiQE6sGZtlgrTtfdT1osxrH717Hb7
2943HfwpSIZN5WBBRbb2D1josPS+OPoICp2cdVDq//3o8Nejq5gHJnB1Ptok
2DQ4PL/a5qcWKNNz+70iivkdyDMvMwzo9Vvi7s9gj6/3DMgMm4av32JYCPj1
6OLy/IjUbjtOcXZ49r0jS1YIPMFX5hncogK06Q7KzbUlpRsBb09bBu03zhCN
lf/6t7+DsVKm5X/9W+91j0HmyQrleipRttbjfjZbk/wCMtskoIc/O7AufuDh
pkJY9D5gVR9l1iO4U5+Td6Vde/C0FUMy6azcpO1nfQu5fvzs6SPyjcYH4301
RiOmdEqXMY22FgyU4MmHy+PJ6XGLA3OBSMAWIl+vBFcNEUQwRcK/hagI21ZT
Uzuj87BcGXDbT4EYySXBrK372YOqJiNFKioyQecGDdYM6PX/g0Y8ITRif//R
s8fPHz15sf/pcZdUuOordCOaEiGWytTOeM6K+6BRsL0+TK8+XBy973rRGMU7
mXSszqst7KggBnTmeQ52H9p+Ieu/ePZdrf5zCeSxVjmqFzuswR0nhgE5DEpj
7/E+xjieP+sQ4LUFsyy32xAJuyznGR65k2D4NXA0phGbxPkKWYwSqAz8rkS+
T2S5B+Fi7D23YrFBMo41BF/zR2nfhK10dtt+qgZy3O8ZYUCzZvoOPj46HMPH
FqMmr0e2Ji50Ouo+3TULiURZIMBaaZlgCkSyLTeJSVcZAlbwl0DKokVkgcm2
DcZtkgL/DbagXdX4fTQ1QzZ55kK192mCf0THFfShWj8zxqA/qAEwJYBF95ws
f2fmn+GvLlQf+zP4NxAs5M29nkyn71pSRSP2Cnv+8fv/ROr88fv/qtURBU5d
4RGgjVhgJB92PrM/wUcSUExVaebLlgz51tanpioxfj+fL+8TH7MK1NC4BMuk
4GASuH3kP+0BPVK4NwdgED8EWXLwFITJo0f7z/f3njx9+PAFxdp/qu3fKKj6
z/s/rM21/edHXQEzZYGEMPFRcW2ucfe3WbOMV7czGo0SRbN3dg5tvUZTOLpR
iEhdA8dg7AtIgzYhoTRIJxDMJolUNjAQhSRH5WIk/wQHGiwydOxxdVmxKTd1
vk0sZQkgqWErIARgI/TwulzZJkMv3Rb0vThdBwXFGiNNCF2VyQL8DKRZPd7Z
uVpmdaLuEHxuAYqN1rfIiky/O++kO4FAhM3USUY3JrYfhon9AvcsK+rkdrlF
wmwTsFMS8KuAIBXKuGGSYZ4PuBy21o3SJcPdcmoIPhe+uhomYMQbkHAb+Eye
wXX0SAzitLgg4TdL16+d2cQmOS4JvGxcErzGHVTtEr6sJHxhGlhajvmYV1kK
nLWz80OUw4JUCw57CSdaI7gKhliKwrUok3pl8jxB8CVBbHHDqhY4NllvKvC5
7GKTJ5SXZCTnw4DCqYFrcstEKHNKAUEqgZhMzsDQJ1ed00IMMVdFVIIreIOH
Z/T7jcN8FybLUT0uMG60NOTKGeDpFDQmZVEld3eYGfP16xCIDZyA9ID14JZM
XiOb4XGlEXeTFKjMOgNeTsu144kZHAKwIizHpOMkIhESFW4PHheKA1wq2pLg
ZuPWK7iasBdyyOlJsJCivMUcKmJBvTTXrADWmxlYSsl1WaaOuL+BTQybGwJZ
4Jy3tE9iDPUBE2QE8NgRwrmOL2taWnxfo+tI4KYK/M+Eg6/NLYU55GSQ6o7a
ckI7O+A0wo+abHbfDWxB9PDSFV0VPha44/USLksK2zM5sC5IHEvHltHlqAmk
auBjeETA9nDyoNcW4LuDxQ5UB/qCKbAibmLAHzlt7VALJG/oGnfWI3KKmSwU
UgvMUoBPw7XgqwkbAnECF8oCzVAC4WvAwLMNom+EHOC9BrazeE74AeCoW5vn
o88F5h/QjXfigS8z7GzFEe+CEJZobXB/bL4YJ0e4a3hvEWwMfUzO7tIL8LcN
BdIbjCCk4UWJTmaIqQWcGcKSdJ7RxaEgCUuDCg1o4LKqlqcsUN2XOVvTyWyT
5Q0ripLPt1zjedebNd70FLYUi/tG7fQtCWBQoP4IUSDOUXaQpMYtEPuQ1ALO
A/7C+BY8gd1XVjF4JnBeazIDEMUaMm3hKDEAAK+cbfFgi0DezUqMbSOTLPF2
EZ2Prt7go+pluclTjGRs6bFMNrpeIH6za8P/RnKFourPMTxKhlDloJO5wZAA
rAJlgigCVjBs6d8nq3kJYChsVH3c0hV0e1nBBvBiz4BsCMfczwMNMTGyIdAb
qL+yBuUJ3h24cGtQG5Z4ARmTNB6mcFq0AIAp4RTv7mKl8/Urq1BW4C3l+U11
iR8g1u7Xm8Sjm+rGbmuvLEvmzPhNNYYDOsS/u2vrR1iqU47tv9Hrltn1Mof/
g6OhW47O0I0BGvprBuvKS7WW4IVZFarqcfIGVFeeg2ACOqEQw2gB/Qlerr9g
HiQeb+7R0cqR98hYXKxnUNK2wCnIU3zP4PCzFcomg3kdqOdYwoTsmPEybAHa
1uKibpel3jKivSwGLrJfoZNCY8w4Q29gqMZfRYZKKBi9yEKGmtkC+KRhRaOk
EBUFcgHUEJHX4t3IkIZJtmDWYMkm1NaHshXuHoRiG7ZILL8xebB6otg4eZ99
trdZDYy1JvhhBfwtYg/VakwbePbS5mu13bZiCYJ8wdWQFQa7hGsLq/QnA2u4
X/3AwYBx1U2nn8ZsePdDi2fbhqtetkHEEQOVbBqoRTsr1tsoso2Ya5Q7L5DI
iozsL/McDIYb3FA5Q41m0Rxdoyc7VNlHZoX9Qu5AQlE3Okt8LetSkoZVIjag
CZCKxaYggxKo8M7iIwe8qAHKlzwluaXLRfyNjNlk7rOYh7z8axczHCfHgUED
OjHfpOgiRB473y9R9DVrerAYgFn5L3xpeNtynzpy7AGIF2DL8fUYLzXBhV+/
7sJGBp3dDfBS8QGJkZhvaZ0rFCq0yYINTeR7x8kmR0Ny67+59ZJg6PTW8Tm8
/qeLN9NnL/bRin39Vn/x+OAZ/eZq6j/yCH8BJMPUb/gl/ufr12AtZPMS1ZGX
yxotAaJwAS5TZ4lM/QIP3xa1JLfTzwjtwwfBdMWjVZHQSs1Q+tQk5fG8SGay
reK2OtL9B0LmA7DiCPOSUKlF1hzbIoENIo8JryAqOtznzSZHHFkUY3y8YAWQ
4PhiELcfqlkk3imp/wWqWjRW5SdE3PAzavixrgLC1ajja7uSSGModIIHJmh8
r1dU/QEPTW8NXgi5QfBnzv6Up9blormljcCdM7U/miaEQBst67Ffltksayl9
dlHQSMtJMHhnpYSrIBFadrVTsf7opngrC0lpkAfATdkw3cjRESaqN7Pf4Dlq
LYub23anh7h+/JpfCYgSYCe8GRzTV0wALl1JxiFww+Aqw8DiwP2R7l4sNgdo
xmB4j4WgMxfEPDOOA4EZvc8oyq7NEuNkwtbiEF2RrKY7guo0y7cto3QN5gsY
CgV+6U3IReSWqG6iNXX4Cj6DsWfRY2R6tJSJASmNWoRgDPSAyHh4RY/rHj+p
ShS9yC1eDeOiQ5McxRnaRuD+zRsQZMRlzXJTdxAJ02ajnZ2WsspY+JpkRpET
/HhKfuyrmORCaJY88WuAaLD7b11QYEUSukDX5NZsWbPewMbKDT75urK2Dh2l
jmUX+EhEGgdL5EQvEkJkZ8FxD1smK3APSDyUPNbwtSjRgHYWvEQVunttixX4
JlppvmBsiLhETlCA3A526FkulBVdQZAzeY6UdRKUmNPhpkkNBAFlep/XRcaq
9WryeoN1Qw1wQPyNctOg11qPB8AaDjP+SsYHqGvYiR22TKTYmDUrdBOQHLFd
klRZ/RmNE2J/ZGoynHu4g/YvOZZiy9dwSVEiz0E2iow1PoEIzjC66MIYwkkZ
p5eT1fUD0KzGVGhK3wxXdwGrA5MLvBHY6mvSwAZ4bdg1eAMrl3klJB//DQ5C
QZqW/kMAXdee1RIkhhUgvxM9YqajMzbJIEdkGHSExdS3azCfS7qludQLEM6G
LxExDgsR1YGn+NPr6fmLJ+B1xLhCLRw9B80DKgUs8FpBp4HIJnyuytoB6Q7Y
kZPM4q4iJuO8BoOXEK/RwsyR8PiBeZiEM0xAty3Z6io8PEfPwqNbZoIjkOnJ
HgsKB/xO/WMMmyFGJTUsaCmhBSue9gJ4k2AerK3U0hiS/3NRWVXF4pLTmJAy
IFHov7p3FPcq4oEwPddYFMzcrhuxcgcGHFPQA3g8fAKD0BgytXP90dDNy1t8
zN0dnBkwJdxuNNVIjoJlPu9IWMZOnUsMXyXfdG5qRqXhI5awMXWd0fXVVAY4
/wLrT1mcD0KmdSFFVsoEXt1kVUNemBqd3hIkKJKcbyZz4PsiAzUI1hGOiMgQ
BY1B2JMgQ2CGz5thklleztG3IHGPRsISFX1BQQgMPo4QPwVpQn/HD8vqWX1w
YGDs/aZ4K/RJ2gsI7ILkDRCGkFpgI5LaSMKKxB9Re0M88cfv/0OcCFyGdzPq
YeiFqKlXFmvKxoucDX4IvTtFqQsmzLcgcuQj8mwlxV6tEUJ3yEEvSA2jnPMb
HA92dj4y9mBoJ0DadJh0hW4H7qRqorph3q0KCvmgvmQWIvCIPRZ0fSXIlTge
HboPIxwLm5pTaiaIPMnLpKNm5bgC/QNUqVc1Xz45Tckp1ufUNicVOlgAh1fA
RSC2bpcZ8l0VwITJA9SFK1DZ5ATsUuCDwptzuRH6QLjW1qB/wh+hegm+5IIP
O6yTfb+C7Y2QRkRwAkERHKTcJnan4Q8razmhP8Ugd1qzmLxlgxlWkoK3HHzc
spCHt+KHQtcFXIgcHKfwo7QSr//10aGRNxQMooavqXysl6WmxyLFr4GPQX1z
Gj14ezs7J3jgJPB7WYR0UYrrskLGwB3Ec0Y2BvKvSp+1uwD9U95S0M+sOHIo
0BOdFKPlxNXiUqKA3n25s/NPySeqAUuOV8IznzASTS8F0wI9N7ghDPdvCif1
kH/w7MguDBOUh3KDXAEKvA8pobEU/DFF9M4gXa4NuZYGFy8Ih0NvZxY1Eiz1
AT5xsDYFxnqAXrKzARvJ4AGuyTqpVOAWGacmtB4wX5afLYcM3APu7vorb0FA
A6uRNBSTRa15vPfkgVlPWczmi4Qcx5gJ3bmxQmuHaS2cqkRxiCwrq/BlqvB6
3Q7fq2oDak1SFlwU4mdMzzY1B6K8CStuN65INDToP8zDjnFxfG2UL476DoRj
U5ZsmfY8thU44mgVI/3EQ4J1+w4OHI9EfiXJQGYVWLVJgNWJyOIInkitMfHl
e9RiZDkcF0XJjPGpnUuCVAU9wjgTszmKJAe3DXwwDbUYLEcfNaBIUgDOUewW
Lzve8iFwOxrYhGJHEIfugffPKHCQx0yWo3JI6c0rZh3K6agiO0xga94zbg4I
lxW88aAe6dPLOKRJVgd8ipGBCMatKBU0LAARMRJug+6OxsgIyrgxGWeN0kPI
V3buLdIqwIAlQIA74vcTlLzJcsWDMbx2/+tmBo2uzZqMQldBkluPOo1VBkWu
tzwAL4crc1nhVmeWfUZV5KjewWqljDPZXr3JGgn9xwgjhwZrAs7qWkUkm8yk
GFH5uXQH+NxMTAXieT62C5tu5vD+CdOQvgoHFv7YuT8POqHQmEaEpDGNml3U
tRhsrV1sRsJFdEzkgKNlPmswjY5lM5KQIDIhmgkX04H+WYnMiYrebCSUhhye
DqBOfKFxPvkRQUWJ+Dvj1ZBdgOqrIvnfuNA/Qu3BmpiSJ2Cyzyk51grHk78Z
cCfFvntXQy8F7VdgbAAMDbRyc3NLAMHCGjFFS0peYN9IATqOEVP+AD5ZUnXq
FnxkfIJEapGHSZaD19LgFaCoVCNYl24R6TfbkHYKfeDtK/+wynIjGY0+5Neo
OpYrURRki/pF1ui9ONyKXzNODl3SKrtCtQc/asyIikENsOdNKpQgI0IEhuAN
zGKYBep8VwTmEDS/uwvKhxGIgBO7BGU0urAZJ/7gS5Dza00nQEcnbcH1E7GF
dof3HSVwkrcwsOyMbQRO+KHIBvITSFCxAjEsKleE/VH4JSkPTCgCOtdDic2C
eUDZGexKuVewT9sCywW1o6QAscjKyuHKmnKWYHHthlYPrqwgWCXJLmCR0Ww7
wv+izMvwBRFHsZWPdnTVGI5wpYzdb9BK7jEO6bLCRzMn3W+sOg9gkRD2y9kN
YBkM8IPUr2mwq+KgJToyCSMzeu+LuGrnTrNcAgp3EleId8J1YLyboherssnE
kqP4hYuXtiLPRFqUrGindvzooXZ3AqrvMvuTvnbWFWlsjE4wasFRYQFwqSYS
MZoV/p1uujMI0X8HyoyCtY+x0A1psyJU7da7tnE4MwiGt46HUY8AyBYd32zl
QQQmcOVYpJt9CyuX04C32ZKedcv49jeDV8xIOV2j16WMoSGAvrVlC/UPJXKt
AaGFzRUGNym2hmgwmORjJ3yf2siIsFMtiGIg34c+o4B5fM6HhFwYQU4BF65Q
8GkGRY112qmzv+SywfdNvq0JQpNcIEoaAIeiDRrP5xu44zFGwdCcP2riaa9s
0o0iaOSi5tln5kHQJMC1ZDqFiokTBmcbieQRy9JJ2EpVgs+tIJsC6YXAKwKc
r1r4b//i1NlsFPZaGLbO8zJIuat5GWTz6upgIRwOUqEu4f0W7xunxGX3IMmI
3mQ9SVLNBh04BpLgw2KbWbpa3EXEiHmVumJQZ2fwW/3+vZuLhYjd8DSnAyYY
Bv5s7ZqMrpZiZhsF4w+WTa2PdoZhMavUY+iR7Sl4T451FGC/NhJPZfshULig
uzIGiBmCfIUXJUMMiJMeJaEMXWI9/wewCbpJ5F+7q+YAGCB/DSy+K3GotS1h
8aDo7BfYUmb7fCx38uID2jSMXqKcneEl9E4BKzS3If4+22GFHBrLQiPowBKr
DW1Kfnu5qRFCGYbggnMxxlihOSsRFmfZ3IoHacRfgQsRhzm4Y2QGRaZwRc+V
SALyKVEW8550w5xl4hwpEBDbIAbhOCMtix9lg0xehi/XLMaQ1UFcgKZHc2AR
pjQtwfLeunyh1vL43Wo4CzVTjv8sgI8zfrlB+ALsJn4HqUeKv5ug7gXzecCj
JiEgYY9pK22qk2sCmjatwbia9ESwonByW/YCRwRXAL0CDTLPaut0PGIt8LQ5
rMEG17OdzSVZy1gv7/KdOy/s3FWJ7fxAteKactTZocQ5d3amSBc62AWjXBzW
QZshyJ3V6FT2BRiLMrQ4K4Ic0gXIMcaoJHeK8NRydkOhSPIRO0vHFkxwBVeI
ol5T/gCeMLy6IGLM6VdzuCe9mQfkp2WrjELwoQMn5Z35NsxipQCdJK8CcV77
YNRWgC/N6oUr08oOGt6TuUVmKUeMvGlSk5VfsVXEwTvWZisFVUuwVSVtlHdB
f0ellnswFW87mbeIEFFfLUSGCDat2OaNtVTA7WH+Ge2PLiYIdcT4y6InZY5s
WswejSO2CmeHN8lhEXQPozsnsJwDK+TSObR6GCAlSLoBqMrPhE0hcH/eT+KO
dy5JMgHFTS2VFhRFaAvvNRXlvMKuXw04XIH9Q2RfE+yB9q8L+v09fGY7laad
xBqKfZ/+wNZPENn12YtpqevnHHK2Vahrk4bPHPakuQtk71Ysez1tHrAjdzU9
HybH8H+Yx7TL4QCr9/81oQt0dzrX38fYdnYuJXH7PrKzDVWCPaWJuQo7UqDG
N/YkCRIljGt2G2qutCSvrwxOAbNOsa9Vvg3VSztNoVRTIE69EfCka4k4FqbV
8j3SWz2UEgJyegQzhIX+8fu/szXJyTfg3vzx+38gE89cfDrcFwZBJBAoFmC3
fDJ5cHh6uavolfjOyw0YHqMF2hoYUCrMSu4PuziwRwZs4TcaeDXaMIW1S7B8
LQUIRNukYEPHkUAUFXGzZ4duMPX4PHgRLnZu9OAUbAbbBR/jEG3/eXFR+Fvk
oWFWCSb7kmERZFz6+CFbeiDRMB+I8yn5Dshj8VW6i6Ek5DZZaJveugTJRgJ7
C0EGyfChSBZXzlyypsjZAWLggKGdADWWgwSrFXOh0GMHIQGMl8wIveiRmj6t
QWTDFI6PeyjYZKIuMjyN9GVWxHEa52TNyZXw2COjIL7LhONiMqbKXHzwQYWB
/L/foIpdczHegINBytb3vA/Yyhl1lKQgUjXDMhI0ChJpiiD1P2Lq3Ms+LYhu
LnCkrF4X/g8ti2O9FKUE1WJysP19Xj+sbOP957kPQpAtRRuI/FdMmaPUdMkE
diaOT8rgN+4qn6UUo6p/TFYbehVmKZTkijTbNQNxwTWIgnSmkToYfMKYu/XR
S33tvM/SwS1LlJQ9WnegkRbuch7e9F5B+yNKiSVbk+wmhumImtQVHCVGv1oH
yO5xZVBzB4EIyX9Eb+4LPeaaXS2SSpwtwlDuj+ouKYiGdjssti4rARcY7ScV
HBYuoZU2QKthlrFMRBthEOQSch1OLcFmMsaBliuGLyhvIVCQKqDv7o6m7wjo
RGFEqkcVmEOhOwWOQVg7q1j3tZAXcpbdMTluCKJ17O7j+WiVIutQisXCOpFR
CSJn0Bi98JoqWiRQyjxEqdOkgojtfDEP2QvIRkX4UpdigCk5c3TI+i2+cXJW
BAVX7Rgb8yi8GR0hjuR+Q3mQaGOnHUWmhDlDf4RCSd98hlQR92SYaWYWxkRW
a0JPNCWd5YG3tHBntRT4ucRXZYSFdUuTXE//G833pITKUdhuNaCtfMtluict
Ge2r7YKs+fYSu0cR+hKVxTs69JmXahVSvQwjnjWDdqryKjtysQXGh1G0BFBi
63pnkZsXiLHAHlIrSQ0Ur4hxgYpC99g8GVJ/Q5zKRXLO66HOBhl1OZZkeobA
gDk+5NgLtyGDARwbxqkJd83qkGko4/i3TXrNeZbwFlDtse0qWKW7ly7a3Sst
X0nQwWMeKFNIg5MLaYslHrwYC6Dccbuo7yXHLEygxtUF72AEhx67shUHOVni
WRR4GRVqXCJn6oZqLbrDD5qUDAaqucJDduSj7Oco0xqsE2zRYmsHuophTPGb
amOjBHb1DabhiAfwBxA1EkDAZwwHuyNurCNfuKdOzJeKoEy+/767y555gI3A
vCgSRYWH1F5VAmJYZUFdLxQMzrRPOnmXYZ5wLYnamCGuiRy/UYStcHU/4q3W
kd/bLk4kLq7ZxUUx5ZWR4VojT8bxwLUYHyY59g/WUoWooFRMUy3e16IgpVGA
rAV9BcysVniS5VmY+6m2q7vVnJ9Cup8N1HidOztnnPok2DUtC3Wr6IqAMwzB
3bmRmpQwI1SzmxjMpIioSLH+ukMOfvFSS+Afy+AuKIy+lDzqhD2MeIAMK/w8
S8wV0kECYJrnS3kefKlfxgmqdPhcMcCgNNf00kPEfFebp3SegC4a8WF6PrVx
4DIw4k+yPQgsDJODhx0amVuswDH1drXCZsBzMc7QzStTNXilkiXzkwAy283v
GlMmuk6gcKnoGvnLpbU48E0QBVDkm1vWeToyzoGJhuR/Ua6UBGI9juQTHNdr
S/glM1UHhWXV0IJfpdy29njRMJBQVMCDUoq9G029CLOiFfvGhNiybL/Cg06h
LgvkeJCCj/0xhj5wNGTcvyGLLvQFhw4z17toOHyGDEWFx9/NGhyjhJUYYoRJ
cOINhUCoDl5qu4ZSnC1wqlEBwN1DyOQpwIsFW9LDbmgK1L0h0kYCXxR76lmp
dSLex6LJDuQLwqEcB+a1EZZuxQ5FcyP7sRH17fFYKm7K2HZ1lTse9ZNkotpJ
vVahquvO0c5jiPprsp0fe+V01TBM2bmUziqLI/NLAgCtxsHjvtZ9YLQvG+WI
ErnV6r76y2sDQ8/Bn4Epn7keKOx2cB0BJlZ09hQhF8L3zCbljQQMycTi+wQH
eEmmK3aF+vpVoPuUAnlS+e2s/ramiA0F1IwuAdmXB/kuDA73Rkkp9rVt1x56
EA/4Ii5xAjHTZ5yr2XKMzi0l1vcgmnQiXyW5t8eN6ACbEpEsRWUMEZUGXhnl
ZmurQeubfCZxGo8EdzSzKS5V8i1/nENFfR60AiOzWvVXUfy4G8cvwwLR9uIZ
nB4wOj3QmuX2XQ0VtqIiDuCg1yuC206mIEGBR+xfyoTxdPFsKbnyCioLuhYC
NEJCrpni1iUcxqaQNZgHE7dOkWh4RXx+EIgdipqVt1zyzHnd6h81khyu5W+h
KAr8yMrHq5yqwaW60lUugqeG/kN/eIbrfOcV5s6bXJWp9IyACzzXGBql2mV0
Y1D3PVDTE77GkU1K05fg02qcvN5Kuj9H6pdYoKO1/2oZkhQKkhI5x4S1tLc0
yGq44aRB7StAsqvUSr4sbdl2mSaQMmbsXkGtRFz9RU7BYhw3FgIgUqokSkPQ
3VaOWxxQZB2RuQv8LTw1YnSSiMJkKD1igaEMUJHZy8n5kvGNSbB6hFIIeYZK
9pKRfljZb6QHwoAuGfmszReBcoxsd0p1W4jqC+oxFu2LN+cqgwTdZPQd+WDR
K4Evo0zz4qwLiLCeEE+JlXVbgSFghDaYKg+GuELEjxiTdS45JGiwpuKgodwW
RnWBHXke5/cx+VlZOPvF4WqtjIddjvCR0VBn0peAUE26p5jHEItOn7YzlhCU
s6Oz+8gibC0mJe+L251RjRRJpxnWBpuonk0Vp693pSwikMHY/Za446MYQ0mx
oX7NqMsDjJzzN4KCCydxWlKOgrlU+jV0DwDKkl7hBdbdXRDISheYUyUl2u58
DW5lgqNZEM2gAj28toGycu9i2ckdbHyjm6ji0G+b2QTZmbI6Y0BWMiFF6FHH
Lu7IJx2x2EBnlwlO8LRsrI9ZAhtw3OnGCrcSiuHfXBb3n7IWZMFDeMaGJCfR
Lx/AvZSawF3nsWW1PhttObR1aGfS8+HgyXMq+uGkCM1a7xgQaoKyR5Vwv2Lt
evKtxfp5D/GfQI5KNlyYLSMVxwy35FufPqn+P0aL5CYTHhTVjvY08YyEJdaP
bSgzt2O2Rx0vNFsoDKVHGJnK7Vft+gCOUBGnJ6AHt0wdtNabjNpgOxwVLWEX
3Apz+qjdhtwCikm4hEIhQWTeuvi4T3Oni394etmqITWzEtNIfYHpt/piEDke
mJqzniQ2hBJQbew/fv93TGFThvnj9//YFaHc20yiJf87fsLumF/JKTJiB5Hm
oW+QxPkWI2n4qw3y6EGG2COWFETBLdEE3sbvVHT0NuZBfR8bDcN7F9l2DVT6
cDVO7B6A4RP7MyTEbFzH7vGgoZMHao9r0o7HxcPSQbgYiIP6XDPC1Pns4nBV
1rhwlPETJaiWF3ZovLFO+eRURYVhPup/6G0L6mDU7qGNOVbtPlvaIZAzgeEN
g/ZHBpJpSQFLsEUaRMqAHGT/FK5RXe0MVUrRxpFdmlCURROzUjiEvJSmKjQc
NblGXUYFjJLxk1V1E7T7rIP2XuS+rrG6IvZ4OV4gTS1YOg9cg3dcDwVMJNVT
2xdR4Z+2xsipYkZdV+qvwG0opa8T9tLF72HLn8qgVoMjIRQt7FPiWpQuCcil
0gyKFFBSLQhA3JtrNbrlwALlY/g+FWHCSJxZ5RB1bglMrVckzOzSmigfM2hv
UIVevi8NCl7iAZvwylLxnXVobdjFzXV2JWtb+dXe0K4Ss2ikk0oYimBHlCqJ
OMmzmybDGbjIYQhDd5fn7DXM6Kidd+Pm9lKZTlFz+oF0Q8IM8cqZuQwvcyJz
3N+UUN9bNFKIGdhCoIxPCgr9WMeNs6IiJcwl4ngbzmrRCo4oIy7QAZwznNW+
+26Y48dGsWb6cYkCp3sYbk7hkzM1Etrnt3R6s6nbgNEHMpTUmnY6UFNZ+cOY
n9hGUx3aGT0hSPJRzSFJl6CsNNvoljoUsCEuqLXUAgUl7FELYoKBqW2wNGSx
BM7k2YK0dZhWcI/8V+bEaCCoEVM5t4XhREbdoxhpTtf12rc/dp4NqtK0XGW+
nLYLu3GVCVW11nFGaBh5vkSRCffLH2RsKktyW5mOgFPhKuvnqFGTdN0c1BsN
2rU7eVKDpSKqp2TPcwZCkIaWA9thDY8DcTiZwJUOd3K4SbBiv+fNisJYWbcn
ozZbaDiGgrKcOo1wXfqtXr1BhTscEJkpobfZrpFbhirTbi18ICwPIAC22+1Z
GNIajJUwUgZPix7S/w3pCRQFLDkJwrmRtQyWpYpSnjqz63qiSlM15zJhYGnY
23gEjEEFccOQjh8Y2+oEFHQ6cTLNw3SgfsvPm3WkGLi2Q81fBSWq2ldFSSNk
rGWDz1Rw4Ya6NjpYdEkMdTtP6jUifthFvJWXCLwW5yEO2IBy1w/9Hx9Y3e22
ZaLbC4oH7hW3A7zq5khwGg/Haj0xvpn8AFLzeDo5Pe1mQQjVOeILTH/j/EDq
GUP+vzbW9BdJ4sXUuQSRGW4P4gq7/BzcB2F/2qBQnHNdgzIqn2arAFAHfg2I
vzvU4H9lqUcb7e7H2vdocZMx4PgwLJf70Now4d4c1OG9dQKBJPi2toyjXKvW
nN+sXmGkTyZ+iFlUpcPuC31PCLR8bzBBEJMzMeDpCjFdHCSq8/Llhs4+Z2g+
Wxvq8NKuN28pjMCoKSkyCFem6TYAiGWDzWtLbnGrYxe346EGQL5JT892B9pz
DO+Z5PiTPVotLdgyZBjSOFh7LUY+u9p1UFTdlGRJErIaWYLc5MO6mD24oTKX
1KDP4JGPekDCecBNgcmImVPno7DHGEUiXRE8FyVxESc/fpjMZQjRUDp0CPbs
XRvWGyBnMmr/D3byGXdOIrBmlm84ttZowsTdXTD2B+k3UN+6L0mM6C0dYzgg
jFFk7KS1QeEl0Sz8HdxryiMJVADrXyebQdlcqyHLRo0K7SAWS4goOof8ZDQu
Kw7oYqUL5ynLc7EuoJWXmEnfo8+w/KwY8U3jCVYcZ5x7vS5pxC6BKoRNRJRm
lOaYalOU4BFOPThXg7S8orohiO6aXAs0DFJQ4QF8vhWNelPi3vZWDAKveeZ3
W/PAbUrFlEnDGUiu2J3cA+nBHPYGX1I9Uazg0PelTFlqzsjNr/rGWX39ShoC
mIDSyahrTB52jlKDuIhKvpGZMS2EsngK+RZTorfrVOOaUnDOGwUZtK1Uq83k
3V00sgeF37HPA5GGe2x39c1l6cvLjLACNCGHHK5nVsB0NR/3YS9aBamYrz5T
FBFJSgXDdN9ZuRG4nCv3yTsJu7BjcW/hg/N9DbbdSyoVO2gjgaaXbn/rrMpI
GwmowdABpdpJdxe+kEVZjNhd10EF9ktDxY6cgVZZ1sauSyoPiHAhRrrn2A8M
8Q9MgNfQyWASqTI11h2WiW3esNUQZ0ZvM/QxENm6pvyTKjOIOv9Nun+goUfJ
OCoDFdMIYm9ADrgJc7O2BAxEIo0r+Dpoy5UH9+9+8Eg/s46LEn5poj6vrRyD
Hm3DvQGcH0xnBbsfYUt41BbozLxE80pKFtjIUBCrz1fkPlE+h7eddev3QQnE
FJktK59PmjX3VRSipMwKyZNy8Wb/QIzmq08pb3YtgILXku/VpoO7SNwgSB/h
wqls1be6fnpX9huxPoWNOGVUJQI2hrvHHblHOONRVYYYnUdmMNJMgR0/BUFL
vnqOmvXGWoLhXKxLSYkMNlBIpT8dX1PLtRDFJ3JS7VbdgHs5FAPBNSwcSnBA
G7gp/qpHMvQWOodX0MDrWXZndokHymsXhXUnQuUYMxvd53ZPYykn4gheGf+N
xWArpfieZGAOv+AoM443CARBrqrPUfJk6aWspgNlOlIpDAEY12exthJhaoL2
pj/IVGKBY4OMEqyfkOXIIBLlf2J/cp+6ifNhtW0wdiRKLQe9xhi3XJEVJQ1x
yqaDnTE3h2Mm0g86zLTFHGGJq3D4lltSUGMdjiP3jx+PmlbzLBIp0JAXtSHA
y5Mr7Yv+5NHBPh8SniU1StHLbEfw2pyaN3GQwmd/MNiEdwIrWbwi8Vq/e6Iv
d3b2x8lbzjUlc5KqXYPCNq4eUwOO7srOwTi5kPozrhi2zq3Brw/jjLatZoeo
ptJytprbKtOtpqIezRslawYhd+wDUHIUGjFXINkR758y82tyBnUIQpTizyg6
l1ZctSoUasGgMj+lIKicdtXUWmFHsMKPbqN8v074p+QKO4Pj9JnJNcEBJ1eT
XcojMdp+EExQtDh8LzXgHPiUtGNZsAVabXIR9WGnXOXZYRRp+tEV7lK2V5x6
LGXg0pXJhTAxZICp/a41GfWWYVQ8LXcZ3JRF5lYopQNuqM5tZSlVO68ZKq02
RWBDwn4CjBf+Rpvalhv+M3Mst8PgbD45cg/bt+JPWICdLbHfHg+IoM6kSDUW
OvMcVDzOKhMToF6bVcJIjY9lsaGIX2K/tJQwaSRoKKTQ05SEoeAwZYUwI8JD
bVi5TDmdvmAc4wjR4rhBe+CkiKrW04xjVwrnuPx/yrVrI8wsoVw2X7cJNCz1
ryfnKk2e7h88pF6GHInGFQwkROwL/ge9kK1hiJ8Cjyx56NoEtw8ZTspSuPGn
GCaBDI4bLgdldRxIq2p25D3wKW1e3AQvsqB8Lh99kfaHUSDeFKJzWI/liOI2
Bob72I4xwsIDOyR4or0sJpp154LqW66ZJJGtfB9/57V2LHHhUuA0DNpRPbnn
wIAGcCLYaKBoqEctm4SOK8OC26xyow2aYKaZvHro2nWRLiPtoMnb2OOIQcu2
PpJhO8I+NQfmEUFjp4Lvunr0waIFMTC4IszY9VrZ5Zp+rwKFgM/7S09YCKvJ
FIyCCl366r4gB2Wht8fHcJUFEZTog73IbMtM8REyzLMxW00BDGad0DgFfS1s
FzNtDCYhgFCnuSyYdQZSCQvT1TIVANnjK2R+EiMRu3StlWFC6YmdgItmm5Ur
zOMhe8X1vg/63XQqcDyOjxJREvF2tReWK1uEbTSYfkHeK9p6uAtG4WrJBnfc
qbbbCcHRlwEc7cf6gjXHALQvlA4a0WvENNbCvZV3nf77fZwTlIypvAx6lO/i
EYsW8xl+viA3Lgk1PTD7rEy3dJYFGWsypFkyFHiAD8LUkgtoOGNPREEcoKzD
xDVXmKNaRF3OniDrg0GwoHqwy1MWoppL5D8qWeD0V1RKISJO7osUvXPlB9by
1RKGu9KuMDrisMEBXGmoYQjV8TdebNFu+1tUAh7Hdw0War4tKr663RwElqvv
Fw7/QKwEpwIXmUIkSNh/CTNWkqnvjU4aa1JLKQc6SBwIPKVMQ7hCFHnY/dcH
4UhovM485NaVq+zh0Np6zxMk+OfIFtTJUeTxPSxGLB7yUSnjLV154DDu8O7u
pGSzN9Ki8Z4IdPesOt0UhhGcAmTDFKtZVd6ygenbTLnkSRoF1u2rIAPO+dHw
yiVKDrS8MciiXrC2lydYWNuUB2nd0nNBIpDRNAWfy065TCTM+cLR1FVFEppM
DfR/mU72XvNG0DverPyBzs1sgb/B89zl4HxYz8nYqgs70VHJ3RcQkpJMHEVo
Rqu7q3Acv1KzxY7J1uGCrF7pUbWra0JUbB2UNYNVZHNqK6Q2hmkVKYnMr9vZ
39rqcdj7PoHOwsCuWNZhshBjP/h4Gf0BnBuPIelMs3T9AWn8o7Q1x6xvF9ly
tkI4JGXI8s2JLJF/9E2SbMHohVucryqddcMaLrcphhAo0PPANeIPJgZQBAun
R+z6Fw4dRKwGO7Z/JXke2KlhbBZrjmqxuJ8/f/GQclwn8OLfKHnilp7mBKtO
SGYGoOyZZrPma11cU2ueKFraK0KQwJLA1WC5qMFzSTWCIv1VcPqF6IX5tts9
UhJEuVoxyhh0l0I+IWBHXPB18uH91fHl1eSXo3dn72kWz66U7GqnTUwG9nFL
l8vW7m8ljl3QBAirzbEB8VAwyS+01D3fkhBjcGqdHAYA2tTFdrGvmvs9QtXH
rgkDgXe9AeFoZFUU7vbBrl1S5E25cSi0Tp/tGQwlLSUnDluVeaGOGWh0cy4w
CXlSOMaMqu1dLyqaLuS+ofXQDHXKKFQcvaOZchQIkQoAkYtBGocfNOUNChkX
1C06QnPKRcaC7gM1t+VgrcluukuNk5LFssxDjCoKZ5N2D1u4+KFPvGaFid08
bs8s7I5xqPEaqAcmR7irBzJKgosgQZuOKBuKprjJjJ3cpte22sVTCeDUxtSf
fyQzFKwDzTU3nB6HUoTm2jMmxJE8f51Ai6cZWXXCoDiEl7Diyy14YUhpg139
H2gOOjeoCdse2dQplfnSGpw9J4ijLcjK6aUjLZEz9paShct8DGyCzQxsysxq
RBTpvZSZF3XQr0GOxBfDp60u2v5EwwXwaShkEQ2h1dsDrygXI/j/5OUIDQhu
DJ7E0CWNC7lthalhQ6u1ykJngu1ylpI8moTjN5/NbregsFoUhpLuC9gcjfTl
wyqAXcbK+qI27F/yscxoUJMOofaOMEcs+ysUooG0OkhME9Wi6BOQXCPKktfa
6gVQpPdm//m5yRrPwPKmxuU9RQ22sd86EPvvaqXFXSfjQmKd2dEvOl05u5MR
LKA0WtMLQfsUFJqpkNH5+BTeMmzdHly4OMD+QGYGcQOdYYgyUZZf2D/lVdLj
NJbhO63zXjnExH19SM+WbawyaiZTS+OwnErNXHyepW8w+6+XehpCJgw3z3uD
wixnFQySiuiwbVotxPYGM9e9aGoT0U7dpq6H4JOWqZxhGBUq4GxRVMxx5Rjh
waqQ2p+9zaqWgKHCNvF5+qN33BuiofxmNbW4rOqBv1UBKuQTFP1EH5AhFeIl
lCshfR4RZE80QUBO8E+YAJjnT8nHGrkRMZmWlLnJdxlYIgqxAhmrTEPw6kTp
NVeB4uZi9mpfrmP4iAS75AimM7MvnZl9WP6Es5ij/KSvfQMwqb8GecauAF/m
nwJ/kHTRwH/YJAVRkLgkp7fdCA9JQHfWewKU5e7clHuHzmiObaVIneiloNoE
17PF3s9BJmkrJ7+nwwmVgrlA82x7T38Dzo0kME+nMDkrizMHXJoR+1VRe3Pv
72g/BCqJRW6RUKgHsduuURlGUESuBQhoOJC26U0wqDfXBDtjvB3YC48U8yCC
Mbt41WFrhfRZPiqucXt0UC0OoQmTV3BpUC5g5jhckwv0impl4rsfuN5QO5Te
1zlLg6UC/WK4tU2ke1pgdXrOBr3FfSqgxBnRnyT41vWd5MRRS1NCKT0H3kpX
lRP6qS0EReTIo4cPYASI7EDt7KxNx7mTDEcP8F3a2+sbMDY5pZhqVZIpNM9V
IJN+xRvgZlBnxaIyLimrlXZAjnWrhC6qEXWlyBK/Dgjdb3AMJcblwm50i9Fm
CI6mZQPWVHq3RnkotYJBbgoV0OAt7fH6/XJ6uyQ600f7oXUbHH3DqEHkzzUZ
8q5qP4e9DkecIvYgDZT/+P3fvRkNC5wj9o2MRIE4uoOaAULR0JXRYkeNBdVY
sUijnTi7LeRcjRBpgU635UZUl7gruUNu+QpZkJEmMoHepy8nfNC93BULwq64
lJLCEb1Txl3vtRn8qSzYzexWAhBgc6+0Djqz0HQZBJs3FVcTddWTghP6ahLw
Lv8Nf4tYBpdTtyUgq0mdKdHOOhpHE3/R7MsaHkoeRl/cSAqU1PMK3VdOSfRU
8XmTfZZpPONrod5TP7f6REocDBiFhN10Le7NQjvEdYQTzqPB3jmZs2gEOrHR
gwdGSZvYdpr6T2NZK196hOZxC74+9k+G1S7sQvoKlgFUaLmNTdByJGw4gk1T
ahdAZmKwbBaD3aUccg93N/1K+zgxhbQ75Tw32Uo6i5nUuSbXZMW44Y/YojQq
/4FHxVOmB159S7qhjiqFV7cb/UnKHpvgaKNicJnHNNZcTcdeqALwcklqzJF9
PZlO3x3joMIFtajj22pWlswl8oxQeKlZyEHaqnRdIaOB1mRjly5lV/dbd0oi
Z9R5mME+/i9QzmIbfkKAqPgozCXToV/sR3BimFJVeriCMfW586KB9kldUV3A
DDxlVqYI0JM5w61pUTSHWdyBhyFRfQ8K9M5gjNBdjV4zR/S2+Fpgf4lhjyEm
p6qmMYFh0VSdICerTxCyvbv1D5ACK81kx8TPVnKxr2jwLLXGRi+YooQZoU4M
+OU+IPRQhzLEC3HxW27qynmULlELl9nOIZOSLW8laI9L19OG4zHcquMLDn2K
hyC5hvdDrobzMw7g02sUSlyj6Qctha3VaDfOetlV/7RrKAre3FmdNjH3kb3u
666Wm1pqnjnLi6tCBNeioXQtZoizZLX/Io4H48A4T4ombVZlPKtMCBmgNUzP
xg1B43YNLlmWmXmWa2t+nJYayVu0xzleohNAuZOLvXVpktrGR3ORMGNkxdZp
MMWEh785L8R+AQ1QM/ncwCU4w7qtDpU3oiCbUgI9hFYit40mlrxxEMTdD5v1
V0WTQLg1S+mG4BIko4iUtHSKsxFp4qefDUI9j+HT9SLr8dVc4zvMq3O2T7dB
Xx20kzA5jtLeRpE9xxbDdlPEpjNB0eEg2rqJO/dwp29uH13OfrOuHJFkmooe
jemYtHRGe5D9g5zDjX/KavtKqnOYpZJBYAuSdToQmzqVvAnODyKVyfMFFbVs
wTItH6tFKLLy+tr1yeBHiv/58acK61EWh1pzPB3S7RFOrduJMGxaGDSwjP1h
rE3+MSDJsHPpqUqW08t0/B18CyU/B7rzciYV3niTifE1nVPPRCr3w/qyEC3o
yPJWfyaXmhml+aJnGUSUQseNw6OgG133Nd+2kKd9xYG0s6PpoWT7adIgxi6a
TCrVginDjioORUOOko6q2icu3Nwr6tVFLkVZ+Bmw3QoialIYc0rb4GjiWZo4
WJ1aJ3L6d0g0GbEwi+YAuxBXQeiLVKeJYPTlZopN3d2dHn0cgV01nbw9+/pV
8MNw2bQtRwgjEOIy6DcQP7+HtRBrLNO09sOveufIYCgnLJd3XeYC95cSB7n/
m4hWSSTsey1S+5q52IFehGq47fBYNAdqrrNmASae3AXq16BVBvisaDr3g8Bx
yTNQB9RHlZ2Sssqu6VQIjeAXT17vahTeV2bx5aE0u4gsvsrX5e5RvJ57KUtL
Vu7zoH4Q477u9tLigapcn01GWODrdW5aiylBuZKDxA8fKomxvhBjfNTtYL6V
aU+FQVsVnrneNENXoeDhHqWmDrGWfgPtS0T4QI+hqNiazDxNTuEkvl0OBWcl
Ta061SNRT7TaFZEGBVRfnfFBLUNqLrZ4RYlcbmwBR7vWqGDTsOcMd0W+ddkH
1KOupHp2jR7LtCQXz2bn2Y0V48km3R60aE9YyVLgyCaXvnW2FUu9XydnqHT6
+iNSqojLnXOdb7ianGwZEjHwu3AC+Q1ncpAZFE4EEIV3dHo+QRLCHu/uzi+O
4e2u/SN1FUDuYHSDiyjZzQ8h3yj0mYX9LIMJE2prEYe8itti0Yn6rtJUAPPV
jWPSelmW1huZHipdJwM05L6gIs9A4hvFffE7EUwJh8Rlgm5kPIIOkcn+io0b
nb0pPcWbUPpQ2pdUfbgOL67xnkPQeGuBEdzIcMi+ujLQnRVqCnb/6JObe0Ky
D3SiZM2s5AFxHqarROw09+BduArScRBYEZD+gQdYVD7zO6icgVJEXSjV57Jg
rGi+mZmgggODqFtNQdJisyAJSW4pZSG1pMwGczSpTGXhu3IMnQ0veYE6U9Zl
BjLzDXX8GTcC6qSGy1j5sNBtvZn5EsgiyhcjAYuVyRUyGstQMjlzJgq4GzyE
W3IKMVVRMhnb5puW6mbY77UpcD47S9LXaOEnFzyB+2heKuPd/cBunEXhGXTg
/nYPU7dylxbmXRHx0nUaqI4/43pfxPs5/YizIDr9VLmAR4sS3IiDoAuJEQ2u
zaSpy64Lx9/dXYr/cDDex9dR5dfB/nOQBtwFWmvL/XyFdue2pDW9gMJWWvss
rbtoN2EX0gXPttV+ne0WUdomNR7iGcRi231lq5AMGW0TZXew21YJCIWycKJ8
4/sxZG7WAz7e5UuHzEdwjytMybc+n4pcWtZRBLVjFh+DHVyaWgZCJ4iW3VMn
4Ypn9fkFQfJRGwAesKDpTtRagHrjaElCsGT7pUFHwK33i6s6oJo3PrgWTf2L
wqQEPRnjd976nsx5XGIPoAdqyr2Msnp3cdYQZ96SlFiSPBI7Oc4llafxGE23
amp3jLyg5I2Khdz0PF7gsMfED517rGCQpkL4bLIiPeMF3Xw5ZcNN6xRXCTma
IAhCRjz+ZqT4IxjWGHTXJWeu5S1zXMOEkA75+Yhkhg04w9HlZKK0++g2pb8q
mTjtkrUrZWOavhzlh7CTzSZ7WEGDURYweehu+UQZsdo5Yk4ZiejNX11dkEd/
NDq/OHtzfHWJHtNHTIlFNk17QFJt+aVuXanhEoXE/Em5kVgBykIYjG+xMoxa
6IgLTP1MXG0iDYh83YLjXDvnkuGdpGLhb73wD9tZyhxDNUWw+JNlmXdLfHiO
WnyVqcpLCpnEoG0Q2hQDg5JN0PTAxqgkNcPGFdgMjD1VastN2DYFkJU3W2W5
KD1rnwTvKgfVhJKE2Fa9ubgfDPeEc5KBBQ+luoVfdU5dPnBmUGRSSpg+6CfB
vYgty19uEJv78rFwGnSUNxFP1GvPTRQDgvvGAqsNEcPN3FQp/lJ7aArX3DFn
v9zZ+afk05E0oppvP73kUcRBzlMrscMNjHWzmziryq+aQkUoBNGt5ESUdrfF
e6aa08pYuvlOrDSppjJuqiolSmmPej774iarykJNIWqrE8WMpW20vtbLBImR
kSzGoi6g2LZTD0t74ONxPZaaePA5dcGgCjdBUHxwL5oqUIM0U9+eKU65KORU
mawa0RpmG7gAe7DAnJtK04He3U2PL6Yf3k8uRtOz0w+nhxcfTijJHY7vkpQ2
2E54fFMvQqn9vmdLokCbD+pltmBFP9tUqdXWO+7weV4Wj0jQ3HI3SUngNzL+
rgvucJ0jLonChkyxV3GDOglp0DpsRQfYA1u69CCuArX5YrQsyR/XBAPediSv
YevvGMAPUpV9EMCmWtOJmD+q3Tq8B67Ar334XnHG6qGN8Cq7UumKlVyvqlzw
uHJkVF8kpbXQwYAo1wACu5A1xP8SI8Cwj85RlsWmcQ9QIsY5OyZAhTc9aaDU
VkDdYvH33cNm226FNEg+o+0Tgv7FmGYM2nNDootLWiT2yBUEYY90aeXuu2SN
7+5Ojv8K9vVxZ05yKOOcsawQu7dwwn72oEviGQOuQQwnytmAC0mcU3GUg/Nw
KqHBS4NJqo7DhxwZta6feF2O0EO3NBW5BM+Mxrhjnkdn/DQXn7w4ePQQQRUt
ucLAoxaU0SlL6RSOT0mlaJbopBzkEXpUUNxm32EqAY6vQuW70t4guPrn83wU
wnYCP0SbfcKBNMLqWlE6f8J37I9svChGyRlWuz2mkVyGMJfPI6wRSwavjO9r
K4vPNyLx4k0gZ7SjG3RJgggs6z3PlVEStHs5TjMAAcgClEBRbAlzTUzlSoZl
CE+pY+b0oZmmd6Upo27BgJsamwSEo88ouSLTNAG6XgODXS8G1CaiphCKoIhi
6YqDLb1o2YRkhK8zFKpm2e2VrNtY0BubQ7RbXbu0mQ28eJEb/oxkOlx4RjFv
6tFi61QZkhXXGrJRoRcG1XcagAhtIJT79LZ6FVCjeSN9prrz5FqU2UZ5tgpt
+mRFbQQTSAxyscrath/OEwvQ5CNo38/oQWjMGSNUlcuTG6h0emHQ48LEobiL
ixtL5qgQ0Aeb1MxDbEWSPOaGXLlOi/n2pHqk0aVzFsHAOD2aXoGzDvtK1ftT
vOTF+NH4qX6JZoxxnEnLxvUKk+XgPGwMD0mwcthPLkbWb6MJXpQVxLaN7Nyf
Ew+v5GNwQ71+Oh4djuHxq7osRs0qkwFfZLAilMfZ9gGSE9vtgkFwO/pgfduB
K94gW/uB65/PoaUIXtv6dnPSmRKRLA7DFDqXZyZKpgUptewlVIVySogi1NT8
ya/Y+qalZDTq3HS0HMlrCydaFCHBt4IXywyVzPWi5+aF+bb9eVwrT4mIueHR
+FnACx70DzoQkEK/twMl6Zt264Fo3HJ8RBTq1qw4174tGMobOME6w0c/FcXo
5CoEIIVT6VqjslnrrBQqa6REpCPGTIJeUydwk8CZxR+nwMQMfN/94NESrBEP
kWrbO9iB8ozwmnj5aank2Q9w5URNrt5GjR8VaZMLmxquJ6SIpM4kCEM0+AU2
GcCgWeQGbDaz5QYUyWZ9XdGw3c5cNy0THIY6as4QDZXIOe97tvV9lRy8JPN8
jJo3KJykGFkMO5caJ+3YSSX6yWbcxBjzH7gUOR7DIj3aQuuIoQ3/2giCNdLU
a3F/FqakxWuxRtjdxMtxHQGEAuZ+XJO8ePbK78HeuNWM8LTisFHhboOji1UX
cL2GAzldEFhmoCjAFbSXhqPh/sPczr687WhOfOzl2eQ87HMFlxx+Q3g4YajR
WBHkNh1nEDQFCFOeeIU5ymmGylQJg+BJBXHSGJbXTRnlfi4sRU89kYIu06w9
eBJVyhJWvW48rzg7+d7URMbYWBXcZNp5FfxZRKIadwXJsMPSTWk/2wRNghBj
30h+Uyx42BviO6ZZqHjJFD9scYjI3mwlYh3FbzAfqGOJ6x5c6J9LpDi7xq/S
17ALHeFxr0IfSpXHCiWYDXNx3bTVeEQMnWAdXHfG5RVIr9tGd+jKEK7DTevc
XYk7Xe3svOaSa9e+zb1oyM0FAn3Wd7cx27MT1XdFCZzsz5UfsS/JcRwMeVpH
E6n6GSlt2iV67eIs4klqm5P+Zua2CI8LPuu6ZpRgmsnEyf60piLtSw4KQzUC
cbrcrm6XXbHxlEDdpopRqwYyGiQ5vHEVO/EaZFJjMDlCFyDpM0GfHzdBroxl
MJmwlDjocwFFnKp7ACqAhtd0k4E8vIwlftiZl4qRVzJKkE0pJ10J4BlqsE2G
10u6UEBoW2B+IsaFdZSkRuR2O4zEFYGXisuoQcA6UqJ9blK6E8riyEp1tkN1
pNFd2ddEM8gnCCSsy4TuzegldFl7kqy2Vcb08e/TIUA7I6w4NPPPtJvJ3Hk2
ZES0t+HwaekRR367d51fYztj7MIIggvuQcqxTGw8KAWopLLbCPIkSOtKXpeo
8/C9puDE95/hTsJnPn8uh8kvFdVfgPtSpdg4ebqkX8BL32ELzpUZJicoLODE
fym4pc5RngHZ31u8CVfAM9vkHDwqCc2f4DUpsNQOHQRN/Mp4PquzoqS0j2yf
nf8HmS+vpTHjAAA=

-->

</rfc>
