<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.39 (Ruby 3.2.2) -->
<?rfc tocindent="yes"?>
<?rfc strict="yes"?>
<?rfc compact="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-nottingham-avoiding-internet-centralization-13" category="info" submissionType="independent" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.18.0 -->
  <front>
    <title abbrev="Internet Centralization and Standards">Centralization, Decentralization, and Internet Standards</title>
    <seriesInfo name="Internet-Draft" value="draft-nottingham-avoiding-internet-centralization-13"/>
    <author initials="M." surname="Nottingham" fullname="Mark Nottingham">
      <organization/>
      <address>
        <postal>
          <postalLine>Prahran</postalLine>
          <postalLine>Australia</postalLine>
        </postal>
        <email>mnot@mnot.net</email>
        <uri>https://www.mnot.net/</uri>
      </address>
    </author>
    <date/>
    <area>General</area>
    <keyword>governance</keyword>
    <abstract>
      <?line 316?>

<t>This document discusses aspects of centralization that relate to Internet standards efforts. It argues that while standards bodies have limited ability to prevent many forms of centralization, they can still make contributions that assist decentralization of the Internet.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-nottingham-avoiding-internet-centralization/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/mnot/avoiding-internet-centralization"/>.</t>
    </note>
  </front>
  <middle>
    <?line 321?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>One of the Internet's defining features is its lack of any single point of technical, political, or economic control. Arguably, that property assisted the Internet's early adoption and broad reach: because permission is not required to connect to, deploy an application on, or use the Internet for a particular purpose, it can meet diverse needs and be deployed in many different environments.</t>
      <t>Although maintaining that state of affairs remains a widely espoused goal, consistently preserving it across the range of services and applications that people see as "the Internet" has proven elusive. Whereas early services like NNTP and e-mail had multiple, interoperable providers, many contemporary platforms for content and services are operated by single, commercial entities without any interoperable alternative -- to the point where some have become so well-known and important to people's experiences that they are commonly mistaken for the Internet itself. <xref target="FB-INTERNET"/></t>
      <t>These difficulties call into question what role architectural design -- in particular, that overseen by open standards bodies such as the IETF -- can and should play in controlling centralization on the Internet.</t>
      <t>This document argues that while decentralized technical standards may be necessary to avoid centralization of Internet functions, they are not sufficient to achieve that goal because centralization is often caused by non-technical factors outside the control of standards bodies. As a result, standards bodies should not fixate on preventing all forms of centralization; instead, they should take steps to ensure that the specifications they produce enable decentralized operation.</t>
      <t>Although this document has been discussed widely in the IETF community (see <xref target="acks"/>), it represents the views of the author, not community consensus. Its primary audience is the engineers who design and standardize Internet protocols. Designers of proprietary protocols and applications can benefit from considering these issues, especially if they intend their work to be considered for eventual standardization. Policymakers can use this document to help characterise abuses that involve centralized protocols and applications and evaluate proposed remedies for them.</t>
      <t><xref target="centralization"/> defines centralization, explains why it is often undesirable but sometimes beneficial, and surveys how it occurs on the Internet. <xref target="decentralization"/> explores decentralization and highlights some relevant strategies, along with their limitations. Then, <xref target="considerations"/> makes recommendations about the role that Internet standards can play in controlling centralization. <xref target="conclude"/> concludes by identifying areas for future work.</t>
    </section>
    <section anchor="centralization">
      <name>Centralization</name>
      <t>In this document, "centralization" is the state of affairs where a single entity or a small group of them can observe, capture, control, or extract rent from the operation or use of an Internet function exclusively.</t>
      <t>Here, "entity" could be a person, group, or corporation. An organization might be subject to governance that mitigates centralization risk (see <xref target="multi"/>), but that organisation is still a centralizing entity.</t>
      <t>"Internet function" is used broadly in this document. Most directly, it might be an enabling protocol already defined by standards, such as IP <xref target="RFC791"/>, BGP <xref target="RFC4271"/>, TCP <xref target="RFC793"/>, or HTTP <xref target="HTTP"/>. It might also be a proposal for a new enabling protocol, or an extension to an existing one.</t>
      <t>Because people's experience of the Internet are not limited to standards-defined protocols and applications, this document also considers centralization in functions built on top of standards -- for example, social networking, file sharing, financial services, and news dissemination. Likewise, the networking equipment, hardware, operating systems, and software that act as enabling technologies for the Internet can also impact centralization. The supply of Internet connectivity to end users in a particular area or situation can exhibit centralization, as can the supply of transit between networks (so called "Tier 1" networks).</t>
      <t>This definition does not capture all types of centralization. Notably, technical centralization (where, for example, a machine or network link is a single point of failure) is relatively well-understood by engineers, and can be mitigated, typically by distributing a function across multiple components. As we will see, such techniques might address that type of centralization while failing to prevent control of the function falling into few hands. A failure because of a cut cable, power outage, or failed server is well-understood by the technical community, but qualitatively different from the issues encountered when a core Internet function has a gatekeeper.</t>
      <t>Likewise, political centralization (where, for example, a country is able to control how a function is supplied across the whole Internet) is equally concerning, but not considered in depth here.</t>
      <t>Even when centralization is not currently present in a function, some conditions make it more likely that centralization will emerge in the future. This document uses "centralization risk" to characterise that possibility.</t>
      <section anchor="why">
        <name>Centralization Can Be Harmful</name>
        <t>Many engineers who participate in Internet standards efforts have an inclination to prevent and counteract centralization because they see the Internet's history and architecture as incompatible with it. As a "large, heterogeneous collection of interconnected systems" <xref target="BCP95"/> the Internet is often characterised as a "network of networks" whose operators relate as peers that agree to facilitate communication, rather than experiencing coercion or requiring subservience to others' requirements. This focus on independence of action is prevalent in the Internet's design -- for example, in the concept of an "autonomous system".</t>
        <t>Reluctance to countenance centralization is also rooted in the many potentially damaging effects that have been associated with it, including:</t>
        <ul spacing="normal">
          <li>
            <em>Power Imbalance</em>: When a third party has unavoidable access to communications, they gain informational and positional advantages that allow observation of behavior (the "panopticon effect") and shaping or even denial of behavior (the "chokepoint effect") <xref target="INTERMEDIARY-INFLUENCE"/> -- capabilities that those parties (or the states that have authority over them) can use for coercive ends <xref target="INTERDEPENDENCE"/> or even to disrupt society itself. Just as good governance of states requires separation of powers <xref target="FEDERALIST-51"/>, so too does good governance of the Internet require that power not be consolidated in one place without appropriate checks and balances.</li>
          <li>
            <em>Limits on Innovation</em>: A party with the ability to control communication can preclude the possibility of "permissionless innovation" -- the ability to deploy new, unforeseen applications without requiring coordination with parties other than those you are communicating with.</li>
          <li>
            <em>Constraints on Competition</em>: The Internet and its users benefit from robust competition when applications and services are available from many providers -- especially when those users can build their own applications and services based upon interoperable standards. When a centralized service or platform must be used because no substitutes are suitable, it effectively becomes an essential facility, which facilitates abuse of power.</li>
          <li>
            <em>Reduced Availability</em>: Availability of the Internet (and applications and services built upon it) improves when there are many ways to obtain access. While service availability can benefit from the focused attention of a large centralized provider, that provider's failure can have a disproportionate impact on availability.</li>
          <li>
            <em>Monoculture</em>: The scale available to a centralized provider can magnify minor flaws in features to a degree that can have broad consequences. For example, a single codebase for routers elevates the impact of a bug or vulnerability; a single recommendation algorithm for content can have severe social impact. Diversity in functions’ implementation leads to a more robust outcome when viewed systemically, because "progress is the outcome of a trial-and-error evolutionary process of many agents interacting freely." <xref target="POLYCENTRIC"/></li>
          <li>
            <em>Self-Reinforcement</em>: As widely noted (see, e.g., <xref target="ACCESS"/>), a centralized provider's access to data allows it the opportunity to make improvements to its offerings, while denying such access to others.</li>
        </ul>
        <t>The relationship between these harms and centralization is often complex; it is not always the case that centralization will lead to them, and when it does, there is not always a direct and simple tradeoff.</t>
        <t>For example, consider the relationship between centralization and availability. A centrally operated system might be more available because of the resources available to a larger operator, but their size creates greater impact when a fault is encountered. Decentralized systems can be more resilient in the face of some forms of failure, but less so in other ways; for example, they may be less able to react to systemic issues, and might be exposed to a larger collection of security vulnerabilities in total. As such, it cannot be said that centralization reduces availability in all cases; nor does it improve it in all cases.</t>
        <t>This tension can be seen in areas like the cloud and mobile Internet access. If a popular cloud hosting provider were to become unavailable (whether for technical or other reasons), many people's experience of the Internet might be disrupted (especially due to the multiple dependencies that a modern Web site often has; see <xref target="DEPENDENCIES"/>). Likewise, a large mobile Internet access provider might have an outage that affects hundreds of thousands of its users, or more -- just as previous issues at large telephone companies precipitated widespread outages. <xref target="PHONE"/></t>
        <t>In both cases, the services are not technically centralized; these operators have strong incentives to have multiple redundancies in place and use various techniques to mitigate the risk of any one component failing. However, they generally do rely upon a single codebase, a limited selection of hardware, a unified control plane, and a uniform administrative practice -- each of which might precipitate a widespread failure.</t>
        <t>If there were only one provider for these services (like the telephone networks of old), they would easily be considered as centralized in a way that has significant impact upon availiability. However, many cloud providers offer similar services, and in most places there are multiple mobile operators available. That weakens the argument that there is a link between centralization and their availability, because the function's users can switch to other providers, or use more than one provider simultaneously; see <xref target="switch"/>.</t>
        <t>These circumstances suggest one area of inquiry when considering the relationship between centralization and availability of a given function: what barriers are there to switching to other providers (thereby making any disruptions temporary and manageable) or to using multiple providers simultaneously (to mask the failure of a single operator)?</t>
        <t>Another example of the need for nuance can be seen when evaluating competitive constraints. While making provision of various Internet functions more competitive may be a motivation for many engineers, only courts (and sometimes, regulators) have the authority to define a relevant market and determine that a behavior is anti-competitive. In particular, market concentration does not always indicate competition issues, so what might be considered undesirable centralization by the technical community might not attract competition regulation.</t>
      </section>
      <section anchor="necessary">
        <name>Centralization Can Be Helpful</name>
        <t>The potential harms of centralization listed above are widely appreciated. Less widely explored is the reliance on centralization by some protocols and applications to deliver their functionality.</t>
        <t>Often, centralization is present due to technical necessity. For example, a single, globally coordinated “source of truth” is by nature centralized -- such as in the root zone of the Domain Name System (DNS), which allows human-friendly naming to be converted into network addresses in a globally consistent fashion.</t>
        <t>Or, consider IP address allocation. Internet routing requires addresses to be allocated uniquely, but if a single government or company were to capture the addressing function, the entire Internet would be at risk of abuse by that entity. Similarly, the Web's trust model requires a Certificate Authority to serve as the root of trust for communication between browsers and servers, bringing centralization risk that needs to be considered in the design of that system.</t>
        <t>Protocols that need to solve the "rendezvous problem" to coordinate communication between two parties who are not in direct contact also require centralization. For example, chat protocols need to coordinate communication between two parties that wish to talk; while the actual communication can be direct between them (so long as the protocol facilitates that), the endpoints' mutual discovery typically requires a third party at some point. From the perspective of those two users, the rendezvous function has centralization risk.</t>
        <t>Even when not strictly necessary, centralization can create benefits for a function's users and for society.</t>
        <t>For example, it has long been recognised that the efficiencies that come with economies of scale can lead to concentration. <xref target="SCALE"/> Those efficiences can be passed on to users as higher quality products and lower costs, and might even enable provision of a function that was not viable at smaller scale.</t>
        <t>Complex and risky functions like financial services (e.g., credit card processing) are often concentrated into a few specialized organizations, where they can receive the focused attention and expertise that they require.</t>
        <t>Centralization can also provide an opportunity for beneficial controls to be imposed. <xref target="AMBITION"/> notes that "centralized structures can have virtues, such as enabling publics to focus their limited attention for oversight, or forming a power bloc capable of challenging less-accountable blocs that might emerge. Centralized structures that have earned widespread respect in recent centuries – including governments, corporations, and nonprofit organizations – have done so in no small part because of the intentional design that went into those structures."</t>
        <t>This can be seen when a function requires governance to realize common goals and protect minority interests. For example, content moderation functions impose community values that many see as a benefit. Of course, they can also be viewed as a choke point where inappropriate controls are able to be imposed, if that governance mechanism has inadequate oversight, transparency, or accountability.</t>
        <t>Ultimately, deciding when centralization is beneficial is a judgment call. Some protocols cannot function without a centralized function; others might be significantly enhanced for certain use cases if a function is centralized, or might merely be more efficient. In general, though, centralization is most concerning when it is not broadly held to be necessary or beneficial, when it has no checks, balances, or other mechanisms of accountability, when it selects "favorites" which are difficult (or impossible) to displace, and when it threatens the architectural features that make the Internet successful.</t>
      </section>
    </section>
    <section anchor="decentralization">
      <name>Decentralization</name>
      <t>While the term "decentralization" has a long history of use in economics, politics, religion, and international development, <xref target="RAND"/> gave one of the first definitions relevant to computer networking, as a condition when "complete reliance upon a single point is not always required."</t>
      <t>Such technical centralization (while not a trivial topic) is relatively well understood. Avoiding all forms of centralization -- including non-technical ones -- using only technical tools (like protocol design) is considerably more difficult. Several issues are encountered.</t>
      <t>First and most critically, technical decentralization measures have at best limited effects on non-technical forms of centralization. Or, per <xref target="SCHNEIDER"/>, "decentralized technology alone does not guarantee decentralized outcomes." As explored below in <xref target="techniques"/>, technical measures are better characterised as necessary but insufficient to achieve full decentralization of a function.</t>
      <t>Second, decentralizing a function requires overcoming challenges that centralized ones do not face. A decentralized function can be more difficult to adapt to user needs (for example, introducing new features, or experimenting with user interface) because doing so often requires coordination between many different actors. <xref target="MOXIE"/> Economies of scale are more available to centralized functions, as is data that can be used to refine a function's design. All of these factors make centralized solutions more attractive to service providers, and in some cases can make a decentralized solution uneconomic.</t>
      <t>Third, identifying which aspects of a function to decentralize can be difficult, both because there are often many interactions between different types and sources of centralization, and because centralization sometimes only becomes clear after the function is deployed at scale. Efforts to decentralize often have the effect of merely shifting centralization to a different place -- for example, in its governance, implementation, deployment, or in ancillary functions.</t>
      <t>For example, the Web was envisioned and widely held to be a decentralizing force in its early life. Its potential as an enabler of centralization only became apparent when large sites successfully leveraged network effects for dominance of social networking, marketplaces, and similar functions.</t>
      <t>Fourth, different parties might have good-faith differences on what "sufficiently decentralized" means based upon their beliefs, perceptions and goals. Just as centralization is a continuum, so is decentralization, and not everyone agrees what the "right" level or type is, how to weigh different forms of centralization against each other, or how to weigh potential centralization against other architectural goals (such as security or privacy).</t>
      <t>These tensions can be seen, for example, in the DNS. While some aspects of the system are decentralized -- for example, the distribution of the lookup function to local servers that users have the option to override -- an essentially centralized aspect of the DNS is its operation as a name space: a single, global "source of truth" with inherent (if beneficial) centralization in its management. ICANN mitigates the associated risk through multi-stakeholder governance (see <xref target="multi"/>). While many believe that this arrangement is sufficient and might even have desirable qualities (such as the ability to impose community standards over the operation of the name space), others reject ICANN's oversight of the DNS as illegitimate, favoring decentralization based upon distributed consensus protocols rather than human governance. <xref target="MUSIANI"/></t>
      <t>Fifth, decentralization unavoidably involves adjustments to the power relationships between protocol participants, especially when it opens up the possibility of centralization elsewhere. As Schneider notes in <xref target="AMBITION"/>, decentralization "appears to operate as a rhetorical strategy that directs attention toward some aspects of a proposed social order and away from others", so "we cannot accept technology as a substitute for taking social, cultural, and political considerations seriously." Or, more bluntly, "without governance mechanisms in place, nodes may collude, people may lie to each other, markets can be rigged, and there can be significant cost to people entering and exiting markets." <xref target="PERSPECTIVE"/></t>
      <t>For example, while blockchain-based cryptocurrencies purport to address the centralization inherent in traditional currencies through technical means, many exhibit considerable concentration of power due to voting/mining power, distribution of funds, and diversity of codebase. <xref target="BITCOIN"/> Over-reliance on technical measures also brings an opportunity for latent, informal power structures that have their own risks -- including centralization. <xref target="STRUCTURELESS"/></t>
      <t>Overall, decentralizing a function requires considerable work, is inherently political, and involves a large degree of uncertainty about the outcome. If one considers decentralization as a larger social goal (in the spirit of how the term is used in other, non-computing contexts), merely rearranging technical functions may lead to frustration. "A distributed network does not automatically yield an egalitarian, equitable or just social, economic, political landscape." <xref target="PERSPECTIVE"/></t>
      <section anchor="techniques">
        <name>Decentralization Strategies</name>
        <t>This section examines some common strategies that are employed to decentralize Internet functions, along with their limitations.</t>
        <section anchor="federation">
          <name>Federation</name>
          <t>Protocol designers often attempt to address centralization through federation: designing a function in a way that uses independent instances who maintain connectivity and interoperability to provide a single, cohesive service. Federation promises to allow users to choose the instance they associate with and accommodates substitution of one instance for another, lowering switching costs.</t>
          <t>However, federation alone is insufficient to prevent or mitigate centralization of a function, because non-technical factors can create pressure to use a central solution.</t>
          <t>For example, the e-mail suite of protocols needs to route messages to a user even when that user changes network locations or becomes disconnected for a long period. To facilitate this, SMTP <xref target="RFC5321"/> defines a specific role for routing users' messages, the Message Transfer Agent (MTA). By allowing anyone to deploy an MTA and defining rules for interconnecting them, the protocol avoids a requirement for a single, central server in that role; users can (and often do) choose to delegate it to someone else, or can run their own MTA.</t>
          <t>Running one's own MTA has become considerably more onerous over the years, due in part to the increasingly complex mechanisms introduced to fight unwanted commercial e-mail.  These costs create an incentive to delegate one's MTA to a third party who has the appropriate expertise and resources, contributing to market concentration. <xref target="DELIVERABILITY"/></t>
          <t>Additionally, the measures that MTAs use to identify unwanted commercial e-mail are often site-specific. Because large MTAs handle so many more addresses, there is a power imbalance with smaller ones; if a large MTA decides that e-mail from a small one is unwanted, there is significant impact on its ability to function, and little recourse.</t>
          <t>XMPP <xref target="RFC6120"/> is a chat protocol that demonstrates another issue with federation: the voluntary nature of technical standards.</t>
          <t>Like e-mail, XMPP is federated to facilitate rendezvous of users from different systems - if they allow it. While some XMPP deployments do support truly federated messaging (i.e., a person using service A can interoperably chat with someone using service B), many of the largest do not. Because federation is voluntary, some operators captured their users into a single service, deliberately denying them the benefits of global interoperability.</t>
          <t>The examples above illustrate that, while federation can create the conditions necessary for a function to be decentralized, it does not guarantee that outcome.</t>
        </section>
        <section anchor="distributed">
          <name>Distributed Consensus</name>
          <t>Increasingly, distributed consensus technologies (such as the blockchain) are touted as a solution to centralization. A complete survey of this rapidly changing area is beyond the scope of this document, but we can generalize about its properties.</t>
          <t>These techniques attempt to avoid centralization by distributing the operation of a function to members of a sometimes large pool of protocol participants. Usually, the participants are unknown and untrusted, and a particular task's assignment to a node for handling cannot be predicted or controlled. They typically guarantee proper performance of a function using cryptographic techniques (often, an append-only transaction ledger).</t>
          <t>Sybil attacks (where a party or coordinated parties cheaply create enough protocol participants to affect how consensus is judged) are a major concern for these protocols, because it would have the effect of concentrating power into the hands of the attacker. Therefore, they encourage diversity in the pool of participants using indirect techniques, such as proof-of-work (where each participant has to show a significant consumption of resources) or proof-of-stake (where each participant has some other incentive to execute correctly).</t>
          <t>While these measures can be effective in decentralizing a function's operation, other aspects of its provision can still be centralized; for example, governance of its design, creation of shared implementations, and documentation of wire protocols. That need for coordination is an avenue for centralization even when the function's operation remains decentralized. For example, the Ethereum "merge" demonstrated that the blockchain could address environmental concerns, but only through coordinated community effort and governance -- coordination that was benign in most eyes, but nevertheless centralized. <xref target="ETHEREUM"/></t>
          <t>Furthermore, a protocol or an application composed of many functions can use distributed consensus for some, but still be centralized elsewhere -- either because those other functions cannot be decentralized (most commonly, rendezvous and global naming; see <xref target="necessary"/>) or because the designer has chosen not to because of the associated costs and lost opportunities.</t>
          <t>These potential shortcomings do not rule out the use of distributed consensus technologies in every instance, but they do merit caution against uncritically relying upon these technologies to avoid or mitigate centralization. Too often, the use of distributed consensus is perceived as imbuing all parts of a project with "decentralization."</t>
        </section>
        <section anchor="multi">
          <name>Operational Governance</name>
          <t>Federation and distributed consensus can both create the conditions for the provision of a function by multiple providers, but cannot guarantee it. However, when providers require access to a resource or cooperation of others to provide that service, that choke point can itself be used to influence provider behaviour -- including in ways that can counteract centralization.</t>
          <t>In these circumstances, some form of governance over that choke point is necessary to assure the desired outcome. Often, this is through the establishment of a multi-stakeholder body: an institution that includes representatives of the different kinds of parties that are affected by the system's operation ("stakeholders") in an attempt to make well-reasoned, legitimate, and authoritative decisions.</t>
          <t>The most widely studied example of this technique is the governance of the DNS name space, which as a “single source of truth” exhibits centralization. That source of truth is overseen by <eref target="https://www.icann.org/resources/pages/governance/governance-en">the Internet Corporation for Assigned Names and Numbers (ICANN)</eref>, a global multi-stakeholder body with representation from end users, governments, operators, and others.</t>
          <t>Another example is the governance of the Web's trust model, implemented by Web browsers as relying parties that have strong incentives to protect user privacy and security, and Certificate Authorities (CAs) as trust anchors that have a strong incentive to be included in browser trust stores. To promote the operational and security requirements necessary to provide the desired properties, the <eref target="https://cabforum.org">CA/Browser Forum</eref> was established as an oversight body that involves both parties as stakeholders.</t>
          <t>These examples are notable in that the governance mechanism is not specified in the protocol documents directly; rather, they are layered on operationally, but in a manner that takes advantage of protocol features that enable the imposition of governance.</t>
          <t>Governance in this manner is suited to very limited functions like the examples above. Even then, setup and ongoing operation of a governance mechanism is not trivial, and their legitimacy may be difficult to establish and maintain (see, e.g., <xref target="MULTISTAKEHOLDER"/>); by their nature, they are vulnerable to capture by the interests that are being governed.</t>
        </section>
      </section>
    </section>
    <section anchor="considerations">
      <name>What Can Internet Standards Do?</name>
      <t>Given the limits of decentralization techniques like federation and distributed consensus, the voluntary nature of standards compliance, and the powerful forces that can drive centralization, it is reasonable to ask what standards efforts like those at the IETF can do to accommodate helpful centralization while avoiding the associated harms -- while acknowledging that the distinction itself is a judgment call, and inherently political.</t>
      <t>The subsections below suggest a few concrete, meaningful steps that standards bodies can take.</t>
      <section anchor="legitimate">
        <name>Bolster Legitimacy</name>
        <t>Where technical standards have only limited ability to control centralization of the Internet, legal standards (whether regulation, legislation, or case law) show more promise, and are actively being considered and implemented in various jurisdictions. However, regulating the Internet is risky without a firm grounding in the effects on the architecture, informed by a technical viewpoint.</t>
        <t>That viewpoint can and should be provided by the Internet standards community. To effectively do so, its institutions must be seen as legitimate by the relevant parties -- for example, competition regulators. If the IETF is perceived as representing or being controlled by "big tech" concerns or only US-based companies, its ability to guide decisions that affect the Internet will be diminished considerably.</t>
        <t>The IETF already has features that arguably provide considerable legitimacy; for example, open participation and representation by individuals rather than companies both enhance input legitimacy; a well-defined process with multiple layers of appeals and transparency contributes to throughput legitimacy, and a long history of successful Internet standards provides perhaps the strongest source of legitimacy for the IETF -- its output.</t>
        <t>However, it is also widely recognized the considerable costs (not just financial) involved in successfully participating in the IETF have a tendency to favour larger companies over smaller concerns. Additionally, the specialised and highly technical nature of the work creates barriers to entry for non-technical stakeholders. These factors have the potential to reduce the legitimacy of the IETF's decisions, at least in some eyes.</t>
        <t>Efforts to address these shortcomings are ongoing; see, for example, <xref target="RFC8890"/>. Overall, bolstering the legitimacy of the organization should be seen as a continuous effort.</t>
        <t>When engaging in external efforts, the IETF community (especially, its leadership) should keep firmly in mind that its voice is most authoritative when focused on technical and architectural impact.</t>
      </section>
      <section anchor="target">
        <name>Focus Discussion of Centralization</name>
        <t>Centralization and decentralization are increasingly being raised in technical standards discussions. Any claim needs to be critically evaluated: as discussed in <xref target="centralization"/>, not all centralization is automatically harmful, and per <xref target="decentralization"/>, decentralization techniques do not automatically address all centralization harms -- and they may bring their own risks.</t>
        <t>However, standards participants rarely have the expertise or information available to completely evaluate those claims, because the analysis involves not only technical factors, but also economic, social, commercial, and legal aspects. For example, economies of scale can cause concentration due to the associated efficiencies <xref target="SCALE"/>, and so determining whether that concentration is appropriate requires a detailed economic analysis that is not in scope for a technical standards body. Furthermore, claims of centralization may have other motivations; in particular, they can be proxies for power struggles between actors with competing interests, and a claim of centralization might be used to deny market participants and (perhaps more importantly) users the benefits of standardization.</t>
        <t>Therefore, approaches like requiring a "Centralization Considerations" section in drafts, gatekeeping publication on a centralization review, or committing significant resources to searching for centralization in protocols are unlikely to improve the Internet.</t>
        <t>Similarly, refusing to standardize a protocol because it does not actively prevent all forms of centralization ignores the very limited power that standards efforts have to do so. Almost all existing Internet protocols -- including IP, TCP, HTTP, and DNS -- fail to prevent centralized applications from using them. While the imprimatur of an Internet Standard is not without value, merely withholding it cannot prevent centralization.</t>
        <t>Discussions should thus be very focused and limited, and any proposals for decentralization should be detailed, so their full effects can be evaluated. <xref target="SCHNEIDER"/> implores that proposals to decentralize be "really, really clear about what particular features of a system a given design seeks to decentralize" and promotes borrowing remedies from more traditional governance systems, such as separation of powers and accountability.</t>
        <t>When evaluating claims that a given proposal is centralized, the context of those statements should be examined for presuppositions, assumptions, and omissions. One framework for critical interrogations is offered by <xref target="BACCHI"/>, which can be adapted for centralization-related discussions:</t>
        <ol spacing="normal" type="1"><li>What is the nature of the centralization that is represented as being problematic?</li>
          <li>What deep-seated presuppositions or assumptions (conceptual logics) underlie this representation of the "problem"?</li>
          <li>How has this representation of the problem come about?</li>
          <li>What is left unproblematic in this problem representation? Where are the silences? Can the "problem" be conceptualized differently?</li>
          <li>What effects are produced by this representation of the “problem”?</li>
          <li>How and where has this representation of the “problem” been produced, disseminated, and defended? How has it been and/or how can it be disrupted and replaced?</li>
        </ol>
      </section>
      <section anchor="up">
        <name>Target Proprietary Functions</name>
        <t>Functions that are widely used but lacking in interoperability are ripe for standardisation efforts. Targeting prominent and proprietary functions (e.g., chat) is appropriate, but so are smaller efforts to improve interoperability and portability of specific features that are often used to lock users into a platform; for example, a format for lists of contacts in a social network.</t>
        <t>A common objection to this approach is that adoption is voluntary; there are no "standards police" to mandate their use or enforce correct implementation. For example, specifications like <xref target="ACTIVITYSTREAMS"/>) were available for some time without being used in a federated manner by commercial social networking providers.</t>
        <t>That objection ignores that while standards aren't mandatory, legal regulation is. Legal mandates for interoperability are increasingly proposed by policymakers as a remedy for competition issues (see, e.g., <xref target="DMA"/>). This appetite for regulation presents an opportunity for new specifications to decentralize these functions, backed by a legal mandate in combination with changing norms and the resulting market forces <xref target="NEW-CHICAGO"/>.</t>
        <t>That opportunity also presents a risk, if the resulting legal regulation is at odds with the Internet architecture. Successfully creating standards that work in concert with legal regulation presents many potential pitfalls, and will require improved and new capabilities (especially liaison), and considerable effort. If the Internet community does not make that effort, it is likely that regulators will turn to other sources for interoperability specifications.</t>
      </section>
      <section anchor="switch">
        <name>Enable Switching</name>
        <t>The ability to switch between different function providers is a core mechanism to control centralization. If users are unable to switch they cannot exercise choice or fully realize the value of their efforts, because, for example, "learning to use a vendor's product takes time, and the skill may not be fully transferrable to a competitor's product if there is inadequate standardization." <xref target="SWITCHING"/></t>
        <t>Therefore, standards should have an explicit goal of facilitating users' switching between implementations and deployments of the functions they define or enable.</t>
        <t>One necessary condition for switching is the availability of alternatives; breadth and diversity of implementation and deployment are required. For example, if there is only a single implementation of a protocol, applications that use it are vulnerable to the control it has over their operation. Even Open Source projects can be an issue in this regard if there are factors that make forking difficult (for example, the cost of maintaining that fork). <xref section="2.1" sectionFormat="of" target="RFC5218"/> explores some factors in protocol design that encourage diversity of implementation.</t>
        <t>The cost of substituting an alternative implementation or deployment by users is another important factor to consider. This includes minimizing the amount of time, resources, expertise, coordination, loss of functionality, and effort required to use a different provider or implementation -- with the implication that the standard needs to be functionally complete and specified precisely enough to allow substitution.</t>
        <t>These goals of completeness and diversity are sometimes in tension. If a standard becomes extremely complex, it may discourage implementation diversity because the cost of a complete implementation is too high (consider: Web browsers). On the other hand, if the specification is too simple, it may not enable easy switching, especially if proprietary extensions are necessary to complete it (see <xref target="evolution"/>).</t>
        <t>One objection to protocols that enable easy switching is that they reduce the incentives for implementation by commercial vendors. While a completely commoditized protocol might not allow implementations to differentiate themselves, they provide opportunities for specialization and improvement elsewhere in the value chain <xref target="ATTRACTIVE-PROFITS"/>. Well-timed standards efforts leverage these forces to focus proprietary interests on top of open technology, rather than as a replacement for it.</t>
      </section>
      <section anchor="intermediation">
        <name>Control Delegation of Power</name>
        <t>The users of some functions might realize substantial benefits if they are provided by a third party in communication. Adding a new party to communication can improve:</t>
        <ul spacing="normal">
          <li>
            <em>Efficiency</em>: Many functions on the Internet are more efficient when performed at a higher scale. For example, a content delivery network can offer services at a fraction of the financial and environmental cost that someone serving content themselves would otherwise pay, because of the scale they operate at. Likewise, a two-sided market platform can introduce sizeable efficiencies over pair-wise buyer/seller trading <xref target="CIRCULAR-CONUNDRUM"/>.</li>
          <li>
            <em>Simplicity</em>: Completely disintermediating communication can shift the burden of functions onto endpoints. This can cause increased cognitive load for users; for example, compare commercial social networking platforms with self-hosted efforts.</li>
          <li>
            <em>Specialization</em>: Having a function consolidated into a few hands can improve outcomes because of the resulting specialization. For example, services overseen by professional administrators are often seen to have a better security posture and improved availability.</li>
          <li>
            <em>Privacy</em>: For some functions, user privacy can be improved by consolidating their activity to prevent individual behaviors from being discriminated from each other.<xref target="MIX"/> Introduction of a third party can also enforce functional boundaries -- for example, to reduce the need for users to trust potentially malicious endpoints, as seen in the so-called “oblivious” protocols (e.g., <xref target="RFC9230"/>) that allow end users to hide their identity from services, while still accessing them.</li>
        </ul>
        <t>However, if that new party is able to make their participation "sticky" -- for example, by leveraging their position in the network to require use of an intermediary, by exploiting their access to data, or because it is difficult to switch to another provider of the function -- there is a risk of centralization.</t>
        <t>Most often, third parties are added to functions as "intermediaries" or in designated "agent" roles. Designing such functions with thoughtful constraints on these roles can prevent at least the most egregious abuses of such power.</t>
        <t>When adding new parties to a function, two guidelines have proven useful: first, third parties should only be interposed into communication when at least one of the primary parties takes a positive action to do so. Second, third parties should have their ability to observe or control communication limited to what is necessary to perform their intended function.</t>
        <t>For example, early deployments of HTTP allowed intermediaries to be interposed by the network without knowledge of the endpoints, and those intermediaries could see and change the full content of traffic by default -- even when they are only intended to perform basic functions such as caching. Because of the introduction of HTTPS and the CONNECT method (see <xref section="9.3.6" sectionFormat="of" target="HTTP"/>), combined with efforts to encourage its adoption, those intermediaries are now required to be explicitly interposed by one endpoint, and they only have access to basic routing information.</t>
        <t>See <xref target="I-D.thomson-tmi"/> for more guidance on protocol intermediation.</t>
        <t>The term "intermediary" is also used (often in legal and regulatory contexts) more broadly than it has been in protocol design; for example, an auction Web site intermediates between buyers and sellers is considered an intermediary, even though it is not formally an intermediary in HTTP (see <xref section="3.7" sectionFormat="of" target="HTTP"/>). Protocol designers can address the centralization associated with this kind of intermediation by standardising the function, rather than restricting the capabilities of the underlying protocols; see <xref target="up"/>.</t>
      </section>
      <section anchor="network">
        <name>Enforce Boundaries</name>
        <t>Most Internet protocols and applications depend on other, "lower-layer" functions and their implementations. The features, deployment, and operation of these dependencies can surface centralization into functions and applications built "on top" of them.</t>
        <t>For example, application protocols require a network to function, and therefore a degree of power over communication is available to the network provider. They might block access to, slow down, or change the content of a specific service for financial, political, operational, or criminal reasons, creating a disincentive (or even removing the ability) to use a specific provider of a function. By selectively hindering the use of some services but not others, network interventions can be composed to create pressure to use those other services -- intentionally or not.</t>
        <t>Techniques like encryption can discourage such centralization by enforcing such boundaries. When the number of parties who have access to the content of communication is limited, other parties who handle it but are not party to it can be prevented from interfering with and observing it. Although those parties might still prevent communication, encryption also makes it more difficult to discriminate a target from other users' traffic.</t>
      </section>
      <section anchor="evolution">
        <name>Consider Extensibility Carefully</name>
        <t>The Internet's ability to evolve is critical, allowing it to meet new requirements and adapt to new conditions without requiring a “flag day” to upgrade implementations. Typically, functions accommodate evolution by defining extension interfaces, which allow optional features to be added or change over time in an interoperable fashion.</t>
        <t>However, these interfaces can also be leveraged by a powerful entity if they can change the target for meaningful interoperability by adding proprietary extensions to a standard. This is especially true when the core standard does not itself provide sufficient utility on its own.</t>
        <t>For example, the SOAP protocol's <xref target="SOAP"/> extreme flexibility and failure to provide significant standalone value allowed vendors to require use of their preferred extensions, favoring those who had more market power.</t>
        <t>Therefore, standards efforts should focus on providing concrete utility to the majority of their users as published, rather than being a “framework” where interoperability is not immediately available. Internet functions should not make every aspect of their operation extensible; boundaries between modules should be designed in a way that allows evolution, while still offering meaningful functionality.</t>
        <t>Beyond allowing evolution, well-considered interfaces can also aid decentralization efforts. The structural boundaries that emerge between the sub-modules of the function -- as well as those with adjacent functions -- provide touchpoints for interoperability and an opportunity for substitution of providers.</t>
        <t>In particular, if the interfaces of a function are well-defined and stable, there is an opportunity to use different providers for that function. When those interfaces are open standards, change control resides with the Internet community instead of remaining in proprietary hands, further enhancing stability and enabling (but not ensuring) decentralization.</t>
      </section>
      <section anchor="reuse">
        <name>Reuse What Works</name>
        <t>When centralization is purposefully allowed in an Internet function, protocol designers often attempt to mitigate the associated risks using technical measures such as federation (see <xref target="federation"/>) and operational governance structures (see <xref target="multi"/>).</t>
        <t>Protocols that successfully do so are often reused to avoid the considerable cost and risk of re-implementing those mitigations. For example, if a protocol requires a coordinated, global naming function, incorporating the Domain Name System is usually preferable to establishing a new system.</t>
      </section>
    </section>
    <section anchor="conclude">
      <name>Future Work</name>
      <t>This document has argued that while standards bodies have little means of effectively controlling or preventing centralization on the Internet through protocol design, there are still concrete and useful steps they can take to improve the Internet.</t>
      <t>Those steps might be elaborated upon and extended in future work; doubtless there is more that can be done. New decentralization techniques might be identified and examined; what we learn from relationships with other, more effective regulators in this space can be documented.</t>
      <t>Some have suggested creating a how-to guide or checklist for dealing with centralization. Because centralization is so contextual and so varied in how it manifests, this might best be attempted within very limited areas; for example, for a particular type of function, or a function at a particular layer.</t>
      <t>The nature of centralization also deserves further study; in particular, its causes. While there is much commentary on factors like network effects and switching costs, other aspects such as behavioural, cognitive, and social and economic factors have received comparatively little attention, although that is changing (e.g., <xref target="BEHAVIOUR"/>).</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document does not have a direct security impact on Internet protocols. That said, failure to consider centralization might cause a myriad of security issues; see <xref target="why"/> for a preliminary discussion.</t>
    </section>
  </middle>
  <back>
    <displayreference target="RAND" to="Baran"/>
    <displayreference target="INTERMEDIARY-INFLUENCE" to="Judge"/>
    <displayreference target="INTERDEPENDENCE" to="FarrellH"/>
    <displayreference target="MOXIE" to="Marlinspike"/>
    <displayreference target="MULTISTAKEHOLDER" to="Palladino"/>
    <displayreference target="NEW-CHICAGO" to="Lessig"/>
    <displayreference target="POLYCENTRIC" to="Aligia"/>
    <displayreference target="ACCESS" to="Abrahamson"/>
    <displayreference target="MIX" to="Chaum"/>
    <displayreference target="FEDERALIST-51" to="Madison"/>
    <displayreference target="ATTRACTIVE-PROFITS" to="Christensen"/>
    <displayreference target="CIRCULAR-CONUNDRUM" to="Spulber"/>
    <displayreference target="AMBITION" to="Schneider2"/>
    <displayreference target="BITCOIN" to="Makarov"/>
    <displayreference target="PERSPECTIVE" to="Bodo"/>
    <displayreference target="MUSIANI" to="Musiani"/>
    <displayreference target="STRUCTURELESS" to="Freeman"/>
    <displayreference target="SCHNEIDER" to="Schneider1"/>
    <displayreference target="BACCHI" to="Bacchi"/>
    <displayreference target="FB-INTERNET" to="Komaitis"/>
    <displayreference target="DEPENDENCIES" to="Kashaf"/>
    <displayreference target="BEHAVIOUR" to="Fletcher"/>
    <displayreference target="DELIVERABILITY" to="Holzbauer"/>
    <displayreference target="SWITCHING" to="FarrellJ"/>
    <displayreference target="SCALE" to="Demsetz"/>
    <references>
      <name>Informative References</name>
      <reference anchor="RAND" target="https://www.rand.org/pubs/research_memoranda/RM3420.html">
        <front>
          <title>On Distributed Communications: Introduction to Distributed Communications Networks</title>
          <author initials="P." surname="Baran" fullname="Paul Baran">
            <organization>RAND Corporation</organization>
          </author>
          <date year="1964"/>
        </front>
      </reference>
      <reference anchor="HTTP">
        <front>
          <title>HTTP Semantics</title>
          <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
          <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
          <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
          <date month="June" year="2022"/>
          <abstract>
            <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
            <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="97"/>
        <seriesInfo name="RFC" value="9110"/>
        <seriesInfo name="DOI" value="10.17487/RFC9110"/>
      </reference>
      <reference anchor="SOAP" target="https://www.w3.org/TR/2007/REC-soap12-part0-20070427/">
        <front>
          <title>SOAP Version 1.2 Part 0: Primer (Second Edition)</title>
          <author fullname="Nilo Mitra" role="editor"/>
          <author fullname="Yves Lafon" role="editor"/>
          <date day="27" month="April" year="2007"/>
        </front>
        <seriesInfo name="W3C REC" value="REC-soap12-part0-20070427"/>
        <seriesInfo name="W3C" value="REC-soap12-part0-20070427"/>
      </reference>
      <reference anchor="INTERMEDIARY-INFLUENCE" target="https://scholarship.law.columbia.edu/faculty_scholarship/1856">
        <front>
          <title>Intermediary Influence</title>
          <author initials="K." surname="Judge" fullname="Kathryn Judge">
            <organization>Columbia Law School</organization>
          </author>
          <date year="2014"/>
        </front>
        <refcontent>University of Chicago Law Review, Vol. 82, p. 573</refcontent>
      </reference>
      <reference anchor="INTERDEPENDENCE" target="https://doi.org/10.1162/ISEC_a_00351">
        <front>
          <title>Weaponized Interdependence: How Global Economic Networks Shape State Coercion</title>
          <author initials="H." surname="Farrell" fullname="Henry Farrell">
            <organization>George Washington University</organization>
          </author>
          <author initials="A. L." surname="Newman" fullname="Abraham L. Newman">
            <organization>Georgetown University</organization>
          </author>
          <date year="2019"/>
        </front>
        <refcontent>International Security, Vol. 44, No. 1, p. 42</refcontent>
      </reference>
      <reference anchor="MOXIE" target="https://signal.org/blog/the-ecosystem-is-moving/">
        <front>
          <title>Reflections: The ecosystem is moving</title>
          <author initials="M." surname="Marlinspike" fullname="Moxie Marlinspike">
            <organization>Signal</organization>
          </author>
          <date year="2016" month="May"/>
        </front>
      </reference>
      <reference anchor="MULTISTAKEHOLDER" target="https://link.springer.com/book/10.1007/978-3-030-56131-4">
        <front>
          <title>Legitimacy, Power, and Inequalities in the Multistakeholder Internet Governance</title>
          <author initials="N." surname="Palladino" fullname="Nicola Palladino">
            <organization/>
          </author>
          <author initials="N." surname="Santaniello" fullname="Nauro Santaniello">
            <organization/>
          </author>
          <date year="2020"/>
        </front>
      </reference>
      <reference anchor="NEW-CHICAGO" target="https://www.journals.uchicago.edu/doi/10.1086/468039">
        <front>
          <title>The New Chicago School</title>
          <author initials="L." surname="Lessig" fullname="Laurence Lessig">
            <organization/>
          </author>
          <date year="1998" month="June"/>
        </front>
        <refcontent>Journal of Legal Studies, Vol. 27</refcontent>
      </reference>
      <reference anchor="POLYCENTRIC" target="https://onlinelibrary.wiley.com/doi/abs/10.1111/j.1468-0491.2011.01550.x">
        <front>
          <title>Polycentricity: From Polanyi to Ostrom, and Beyond</title>
          <author initials="P. D." surname="Aligia" fullname="Paul D. Aligia">
            <organization/>
          </author>
          <author initials="V." surname="Tarko" fullname="Vlad Tarko">
            <organization/>
          </author>
          <date year="2012" month="April"/>
        </front>
        <refcontent>Governance: An International Journal of Policy, Administration, and Institutions, Vol. 25, No. 2, p. 237</refcontent>
      </reference>
      <reference anchor="ACCESS" target="https://www.yalelawjournal.org/comment/essential-data">
        <front>
          <title>Essential Data</title>
          <author initials="Z." surname="Abrahamson" fullname="Zachary Abrahamson">
            <organization/>
          </author>
          <date year="2014"/>
        </front>
        <refcontent>Yale Law Journal, Vol. 124, No. 3</refcontent>
      </reference>
      <reference anchor="DMA" target="https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A32022R1925">
        <front>
          <title>Regulation (EU) 2022/1925 of the European Parliament and of the Council of 14 September 2022 on contestable and fair markets in the digital sector and amending Directives (EU) 2019/1937 and (EU) 2020/1828 (Digital Markets Act)</title>
          <author>
            <organization>The European Parliament and the Council of the European Union</organization>
          </author>
          <date year="2022" month="September"/>
        </front>
        <refcontent>OJ L 265/1, 12.10.2022</refcontent>
      </reference>
      <reference anchor="MIX" target="https://dl.acm.org/doi/10.1145/358549.358563">
        <front>
          <title>Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms</title>
          <author initials="D. L." surname="Chaum" fullname="David L. Chaum">
            <organization/>
          </author>
          <date year="1981" month="February"/>
        </front>
        <refcontent>Communications of the ACM, Vol. 24, No. 2</refcontent>
      </reference>
      <reference anchor="FEDERALIST-51">
        <front>
          <title>The Structure of the Government Must Furnish the Proper Checks and Balances Between the Different Departments</title>
          <author initials="J." surname="Madison" fullname="James Madison">
            <organization/>
          </author>
          <date year="1788" month="February"/>
        </front>
        <refcontent>The Federalist Papers, No. 51</refcontent>
      </reference>
      <reference anchor="ATTRACTIVE-PROFITS">
        <front>
          <title>The Law of Conservation of Attractive Profits</title>
          <author initials="C." surname="Christensen" fullname="Clayton Christensen">
            <organization/>
          </author>
          <date year="2004" month="February"/>
        </front>
        <refcontent>Harvard Business Review, "Breakthrough Ideas for 2004"</refcontent>
      </reference>
      <reference anchor="ACTIVITYSTREAMS" target="https://www.w3.org/TR/2016/CR-activitystreams-core-20161215/">
        <front>
          <title>Activity Streams 2.0</title>
          <author fullname="Evan Prodromou" role="editor"/>
          <author fullname="James Snell" role="editor"/>
          <date day="15" month="December" year="2016"/>
        </front>
        <seriesInfo name="W3C CR" value="CR-activitystreams-core-20161215"/>
        <seriesInfo name="W3C" value="CR-activitystreams-core-20161215"/>
      </reference>
      <reference anchor="CIRCULAR-CONUNDRUM" target="https://wwws.law.northwestern.edu/research-faculty/clbe/workingpapers/documents/spulber_circularconundrum.pdf">
        <front>
          <title>Solving The Circular Conundrum: Communication And Coordination In Internet Markets</title>
          <author initials="D. F." surname="Spulber" fullname="Daniel F. Spulber">
            <organization/>
          </author>
          <date year="2010"/>
        </front>
        <refcontent>Northwestern University Law Review, Vol. 104, No. 2</refcontent>
      </reference>
      <reference anchor="AMBITION" target="https://osf.io/m7wyj/">
        <front>
          <title>Decentralization: an incomplete ambition</title>
          <author initials="N." surname="Schneider" fullname="Nathan Schneider">
            <organization/>
          </author>
          <date year="2019"/>
        </front>
        <refcontent>Journal of Cultural Economy, Vol. 12, No. 4</refcontent>
      </reference>
      <reference anchor="BITCOIN" target="https://www.nber.org/papers/w29396">
        <front>
          <title>Blockchain Analysis of the Bitcoin Market</title>
          <author initials="I." surname="Makarov" fullname="Igor Makarov">
            <organization>London School of Economics</organization>
          </author>
          <author initials="A." surname="Schoar" fullname="Antoinette Schoar">
            <organization>MIT Sloan School of Management</organization>
          </author>
          <date year="2021" month="October"/>
        </front>
        <refcontent>National Bureau of Economic Research, Working Paper 29396</refcontent>
      </reference>
      <reference anchor="PERSPECTIVE" target="https://doi.org/10.14763/2021.2.1563">
        <front>
          <title>Decentralization: a multidisciplinary perspective</title>
          <author initials="B." surname="Bodó" fullname="Balázs Bodó">
            <organization>University of Amsterdam</organization>
          </author>
          <author initials="J. K." surname="Brekke" fullname="Jaya Klara Brekke">
            <organization>Durham University</organization>
          </author>
          <author initials="J.-H." surname="Hoepman" fullname="Jaap-Henk Hoepman">
            <organization>Radboud University</organization>
          </author>
          <date year="2021" month="June"/>
        </front>
        <refcontent>Internet Policy Review, Vol. 10, No. 2</refcontent>
      </reference>
      <reference anchor="MUSIANI" target="https://link.springer.com/chapter/10.1057/9781137483591_4">
        <front>
          <title>Alternative Technologies as Alternative Institutions: The Case of the Domain Name System</title>
          <author initials="F." surname="Musiani" fullname="Francesca Musiani">
            <organization/>
          </author>
          <date year="2016"/>
        </front>
        <refcontent>The Turn to Infrastructure in Internet Governance</refcontent>
      </reference>
      <reference anchor="STRUCTURELESS" target="https://www.jstor.org/stable/41035187">
        <front>
          <title>The Tyranny of Structurelessness</title>
          <author initials="J." surname="Freeman" fullname="Jo Freeman">
            <organization/>
          </author>
          <date year="1972"/>
        </front>
        <refcontent>Berkeley Journal of Sociology, Vol. 17</refcontent>
      </reference>
      <reference anchor="SCHNEIDER" target="https://nathanschneider.info/articles/DecentralHacker.html">
        <front>
          <title>What to do once you admit that decentralizing everything never seems to work</title>
          <author initials="N." surname="Schneider" fullname="Nathan Schneider">
            <organization/>
          </author>
          <date year="2022" month="October"/>
        </front>
        <refcontent>Hacker Noon</refcontent>
      </reference>
      <reference anchor="BACCHI" target="https://library.oapen.org/bitstream/handle/20.500.12657/33181/560097.pdf?sequence=1#page=34">
        <front>
          <title>Introducing the ‘What’s the Problem Represented to be?’ approach</title>
          <author initials="C." surname="Bacchi" fullname="Carol Bacchi">
            <organization/>
          </author>
          <date year="2012"/>
        </front>
        <refcontent>Chapter 2, Engaging with Carol Bacchi</refcontent>
      </reference>
      <reference anchor="ETHEREUM" target="https://ethereum.org/en/upgrades/merge/">
        <front>
          <title>The Merge</title>
          <author>
            <organization>Ethereum</organization>
          </author>
          <date year="2023" month="February"/>
        </front>
      </reference>
      <reference anchor="FB-INTERNET" target="https://slate.com/technology/2021/08/facebook-internet-regulation.html">
        <front>
          <title>Regulators Seem to Think That Facebook Is the Internet</title>
          <author initials="K." surname="Komaitis" fullname="Konstantinos Komaitis">
            <organization/>
          </author>
          <date year="2021" month="August"/>
        </front>
      </reference>
      <reference anchor="DEPENDENCIES" target="https://dl.acm.org/doi/pdf/10.1145/3419394.3423664">
        <front>
          <title>Analyzing Third Party Service Dependencies in Modern Web Services: Have We Learned from the Mirai-Dyn Incident?</title>
          <author initials="A." surname="Kashaf" fullname="Aqsa Kashaf">
            <organization>Carnegie Mellon University</organization>
          </author>
          <author initials="V." surname="Sekar" fullname="Vyas Sekar">
            <organization>Carnegie Mellon University</organization>
          </author>
          <author initials="Y." surname="Agarwal" fullname="Yuvraj Agarwal">
            <organization>Carnegie Mellon University</organization>
          </author>
          <date year="2020" month="October"/>
        </front>
      </reference>
      <reference anchor="PHONE" target="https://www.washingtonpost.com/archive/politics/1991/06/27/computer-failure-paralyzes-regions-phone-service/0db94ac7-89f0-446e-ba33-c126c751b251/">
        <front>
          <title>Computer Failure Paralyzes Region's Phone Service</title>
          <author>
            <organization/>
          </author>
          <date year="1991" month="June"/>
        </front>
      </reference>
      <reference anchor="BEHAVIOUR" target="http://dx.doi.org/10.2139/ssrn.4389681">
        <front>
          <title>The Role of Behavioural Economics in Competition Policy</title>
          <author initials="A." surname="Fletcher" fullname="Amelia Fletcher">
            <organization/>
          </author>
          <date year="2023" month="March"/>
        </front>
      </reference>
      <reference anchor="DELIVERABILITY" target="https://www.usenix.org/system/files/atc22-holzbauer.pdf">
        <front>
          <title>Not that Simple: Email Delivery in the 21st Century</title>
          <author initials="F." surname="Holzbauer" fullname="Florian Holzbauer">
            <organization/>
          </author>
          <author initials="J." surname="Ullrich" fullname="Johanna Ullrich">
            <organization/>
          </author>
          <author initials="M." surname="Lindorfer" fullname="Martina Lindorfer">
            <organization/>
          </author>
          <author initials="T." surname="Fiebig" fullname="Tobias Fiebig">
            <organization/>
          </author>
          <date year="2022" month="July"/>
        </front>
      </reference>
      <reference anchor="SWITCHING" target="http://dx.doi.org/10.2307/2555402">
        <front>
          <title>Dynamic Competition with Switching Costs</title>
          <author initials="J." surname="Farrell" fullname="Joseph Farrell">
            <organization/>
          </author>
          <author initials="C." surname="Shapiro" fullname="Carl Shapiro">
            <organization/>
          </author>
          <date year="1988" month="January"/>
        </front>
        <refcontent>UC Berkeley Department of Economics Working Paper 8865</refcontent>
      </reference>
      <reference anchor="SCALE" target="https://www.jstor.org/stable/724822">
        <front>
          <title>Industry Structure, Market Rivalry, and Public Policy</title>
          <author initials="H." surname="Demsetz" fullname="Harold Demsetz">
            <organization/>
          </author>
          <date year="1973" month="April"/>
        </front>
        <refcontent>Journal of Law and Economics, Vol. 16, No. 1</refcontent>
      </reference>
      <reference anchor="RFC791">
        <front>
          <title>Internet Protocol</title>
          <author fullname="J. Postel" initials="J." surname="Postel"/>
          <date month="September" year="1981"/>
        </front>
        <seriesInfo name="STD" value="5"/>
        <seriesInfo name="RFC" value="791"/>
        <seriesInfo name="DOI" value="10.17487/RFC0791"/>
      </reference>
      <reference anchor="RFC4271">
        <front>
          <title>A Border Gateway Protocol 4 (BGP-4)</title>
          <author fullname="Y. Rekhter" initials="Y." role="editor" surname="Rekhter"/>
          <author fullname="T. Li" initials="T." role="editor" surname="Li"/>
          <author fullname="S. Hares" initials="S." role="editor" surname="Hares"/>
          <date month="January" year="2006"/>
          <abstract>
            <t>This document discusses the Border Gateway Protocol (BGP), which is an inter-Autonomous System routing protocol.</t>
            <t>The primary function of a BGP speaking system is to exchange network reachability information with other BGP systems. This network reachability information includes information on the list of Autonomous Systems (ASes) that reachability information traverses. This information is sufficient for constructing a graph of AS connectivity for this reachability from which routing loops may be pruned, and, at the AS level, some policy decisions may be enforced.</t>
            <t>BGP-4 provides a set of mechanisms for supporting Classless Inter-Domain Routing (CIDR). These mechanisms include support for advertising a set of destinations as an IP prefix, and eliminating the concept of network "class" within BGP. BGP-4 also introduces mechanisms that allow aggregation of routes, including aggregation of AS paths.</t>
            <t>This document obsoletes RFC 1771. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="4271"/>
        <seriesInfo name="DOI" value="10.17487/RFC4271"/>
      </reference>
      <reference anchor="RFC793">
        <front>
          <title>Transmission Control Protocol</title>
          <author fullname="J. Postel" initials="J." surname="Postel"/>
          <date month="September" year="1981"/>
        </front>
        <seriesInfo name="RFC" value="793"/>
        <seriesInfo name="DOI" value="10.17487/RFC0793"/>
      </reference>
      <referencegroup anchor="BCP95">
        <reference anchor="RFC3935" target="https://www.rfc-editor.org/info/rfc3935">
          <front>
            <title>A Mission Statement for the IETF</title>
            <author fullname="H. Alvestrand" initials="H." surname="Alvestrand"/>
            <date month="October" year="2004"/>
            <abstract>
              <t>This memo gives a mission statement for the IETF, tries to define the terms used in the statement sufficiently to make the mission statement understandable and useful, argues why the IETF needs a mission statement, and tries to capture some of the debate that led to this point. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="95"/>
          <seriesInfo name="RFC" value="3935"/>
          <seriesInfo name="DOI" value="10.17487/RFC3935"/>
        </reference>
      </referencegroup>
      <reference anchor="RFC5321">
        <front>
          <title>Simple Mail Transfer Protocol</title>
          <author fullname="J. Klensin" initials="J." surname="Klensin"/>
          <date month="October" year="2008"/>
          <abstract>
            <t>This document is a specification of the basic protocol for Internet electronic mail transport. It consolidates, updates, and clarifies several previous documents, making all or parts of most of them obsolete. It covers the SMTP extension mechanisms and best practices for the contemporary Internet, but does not provide details about particular extensions. Although SMTP was designed as a mail transport and delivery protocol, this specification also contains information that is important to its use as a "mail submission" protocol for "split-UA" (User Agent) mail reading systems and mobile environments. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5321"/>
        <seriesInfo name="DOI" value="10.17487/RFC5321"/>
      </reference>
      <reference anchor="RFC6120">
        <front>
          <title>Extensible Messaging and Presence Protocol (XMPP): Core</title>
          <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
          <date month="March" year="2011"/>
          <abstract>
            <t>The Extensible Messaging and Presence Protocol (XMPP) is an application profile of the Extensible Markup Language (XML) that enables the near-real-time exchange of structured yet extensible data between any two or more network entities. This document defines XMPP's core protocol methods: setup and teardown of XML streams, channel encryption, authentication, error handling, and communication primitives for messaging, network availability ("presence"), and request-response interactions. This document obsoletes RFC 3920. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6120"/>
        <seriesInfo name="DOI" value="10.17487/RFC6120"/>
      </reference>
      <reference anchor="RFC8890">
        <front>
          <title>The Internet is for End Users</title>
          <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
          <date month="August" year="2020"/>
          <abstract>
            <t>This document explains why the IAB believes that, when there is a conflict between the interests of end users of the Internet and other parties, IETF decisions should favor end users. It also explores how the IETF can more effectively achieve this.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8890"/>
        <seriesInfo name="DOI" value="10.17487/RFC8890"/>
      </reference>
      <reference anchor="RFC5218">
        <front>
          <title>What Makes for a Successful Protocol?</title>
          <author fullname="D. Thaler" initials="D." surname="Thaler"/>
          <author fullname="B. Aboba" initials="B." surname="Aboba"/>
          <date month="July" year="2008"/>
          <abstract>
            <t>The Internet community has specified a large number of protocols to date, and these protocols have achieved varying degrees of success. Based on case studies, this document attempts to ascertain factors that contribute to or hinder a protocol's success. It is hoped that these observations can serve as guidance for future protocol work. This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5218"/>
        <seriesInfo name="DOI" value="10.17487/RFC5218"/>
      </reference>
      <reference anchor="RFC9230">
        <front>
          <title>Oblivious DNS over HTTPS</title>
          <author fullname="E. Kinnear" initials="E." surname="Kinnear"/>
          <author fullname="P. McManus" initials="P." surname="McManus"/>
          <author fullname="T. Pauly" initials="T." surname="Pauly"/>
          <author fullname="T. Verma" initials="T." surname="Verma"/>
          <author fullname="C.A. Wood" initials="C.A." surname="Wood"/>
          <date month="June" year="2022"/>
          <abstract>
            <t>This document describes a protocol that allows clients to hide their IP addresses from DNS resolvers via proxying encrypted DNS over HTTPS (DoH) messages. This improves privacy of DNS operations by not allowing any one server entity to be aware of both the client IP address and the content of DNS queries and answers.</t>
            <t>This experimental protocol has been developed outside the IETF and is published here to guide implementation, ensure interoperability among implementations, and enable wide-scale experimentation.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9230"/>
        <seriesInfo name="DOI" value="10.17487/RFC9230"/>
      </reference>
      <reference anchor="I-D.thomson-tmi">
        <front>
          <title>Principles for the Involvement of Intermediaries in Internet Protocols</title>
          <author fullname="Martin Thomson" initials="M." surname="Thomson">
            <organization>Mozilla</organization>
          </author>
          <date day="8" month="September" year="2022"/>
          <abstract>
            <t>   This document proposes a set of principles for designing protocols
   with rules for intermediaries.  The goal of these principles is to
   limit the ways in which intermediaries can produce undesirable
   effects and to protect the useful functions that intermediaries
   legitimately provide.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-thomson-tmi-04"/>
      </reference>
    </references>
    <?line 631?>

<section anchor="acks">
      <name>Acknowledgements</name>
      <t>This document was born out of early discussions with Brian Trammell during our shared time on the Internet Architecture Board.</t>
      <t>Special thanks to Geoff Huston and Milton Mueller for their well-considered, thoughtful, and helpful comments.</t>
      <t>Thanks to Jari Arkko, Kristin Berdan, Richard Clayton, Christian Huitema, Mallory Knodel, Eliot Lear, John Levine, Tommy Pauly, and Martin Thomson for their comments and suggestions. Likewise, the arch-discuss@ietf.org mailing list and Decentralized Internet Infrastructure Research Group provided valuable discussion and feedback.</t>
      <t>No large language models were used in the production of this document.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA6W9624bWbYm+F9PEVBikNaApG6+Jw7csiynlWXJhiRXVs1B
IxEkN8VIBSNYEUHJLMNA9TPMnxmg+436KepJZn3rsi9B2pndA5yTZUlkxN5r
r72u31prOBzudEVXupfZ7qmruiYvi3/mXVFXg+yNm/R+k1fT7LzqXFO5Lrvu
6Me8mba7O/l43Lj7l+Fv6aP4e/7jO9N6UuULeuO0yWfdsKq7rqhu5/limN/X
xZT+PSz0QcN0BcPD451p3tFXv7w5uTn7ujOhH27rZv0yK6pZvbNTLJuXWdes
2u7o4ODFwdFO3rj8Zfazqxw9Zeehbu5um3q1fLnTdvSXBb43dUtH/6m6nTu3
pk9MX2bpW8Pvp+5bf5nUVVuXxbT368bdrsre727re9pbXk3cDq2CiPJbXtYV
7Wnt2p12kTfdb/9Y1Z1rX2ZVvbMsXmb/2dWTQUb/KXidg6ytG1r+rKV/rRf6
j64pJvSnSb1Y5vqPBX2Y/lRUZVG5/7qzc++qlXu5k2W3RTdfjV9mC6L9/h8R
fWcnX3XzuqEvDum7GT2PlnYxyi79wfGv5Uwv8uau/5e6uc0rfdpL/s2ypp2X
8u8sG2Yfm3ze5BX/PKlX9Ho60hM6Riwj51+7RV6UsuT/gv+MaKX8h1VDJJp3
3bJ9ub//8PAwsr/u7+xUdbOg197TrnfAIf6nLLs6uXwjC5gW7bLM6YWvc1tD
lze3rksfS3+bjmgr+8vVuN1vXOvyZjL/beEWNf6U719dHD8+OhjNu0UpD9F7
9aHK3hQ4n/Gqc9PslA5mVRUTJkfLl6app6sJ35Su/s5ns0vXgYXpxvG6+SYc
vnj6mH/0p8QkVdLqqXzMV2W0vf6ZMDHoZc2StsJnnmXvbm4+0h/enr44PDyg
n68/nNDPvx6fjq7OTodtnS8Pj4ZL4taDId21ZwePj57Rp84vb86uLs7enJ9c
/X14fvn2/aezy9OzHp1/WU1v3VY6t5N5XeZNOy+WozJ/GE3qcrUYF/nITVf7
s3yyKrv1b9GH9g+fP3kaE5sl0MJNi7xZ0w+zcuVw0QK5jg4Ov0cuYe6/jKI1
Bir+Je/mzbrq/S2l5KmuOHufP2TXtNJamIFuKcmIjm7Wy+xTRTzYtEW3zupZ
djqn872t+QtX7r5wD4Psr3U5yp4fDbLlKHvy7NgI++bs49nlmy0UfZs3jSvL
d1uJOq0L5tvDg9Hh4dOj/fPrs9Pf8t8ODo6fHCaM+qvLlzVtxamUN8k4oT++
qx+yn8t6nJfZGW2kXhQTz47Z9TxfOkj4zhEBXDMhUuymRH/xh0R/N7Jt9Mj+
zlV0mP2/pWT/2dHPLvs1J66obju6SYHIW992MsrekwhzD4twJ/R9J2OSRvli
y9+3vbOrHzZeFh+26ET+CtHu2k1IXnVrPeLHjwckLEfZIZ/04yP69sWHv53r
8W7cjuKWnsFnOS7r2/1u7oZuUrfrtnOLYdEOF/U97X4/OdQrNyvdRGXNzdxl
/htZ0Wbyjd2Um0iGk8Zol8VdfHMOD+gPa5zl0++cpSmH/jM8dS/qz4Xb9ueU
uNe8V9Dj0/ub8+ubk7+cvfvw/s3ZVY/zP+ZlmZP6qpNNv3ek4opFPiFCf6wf
XGO2i/vHijRKV7iWVpoRAbMLkikkcfM7R1Jl6ppgxPzsFXXKy0cHfyhvLwuS
XHlvcRsfyldNnV3nFRkBBbF2vfXQiUx3o3bZ0DG5hgTiYn9c13d8mUns7r94
9nx4PDw4Phg+eXp4fDiEcLs8+3V4+u789OTnDz1qvXctMVFCKrAEsbkXQyKz
4h3/sqocqZkXz/9w2+9pRxAX8Xviu7D7S71qcA1I7NER4T50qykdhl6Ho2e7
31S/v8tX29FqIitlnUCyTUjx/On+46fPD44hZz5+eP/307PLm6vz097+T8ri
Vu0J2//HulyzwVNM6F6SKG3qBfFMmVfrAur4A2njeiH889qt62oa0+aEDqbE
nTj6czr4zSheQ/8jfyVuyW7IgtrOCjUbcmVB8qlZjx6K0q2ZIUCEnGwSFvCH
h/u/jw6JFsODxy8OR7S0w9HB4ZMnB6PPm+cRWJy2UvVkVXRYRI8Cd+lkuigq
2CeJQ9ASLVcsYewcn4hYEwV2dMzHenJ6enZ93T8QkbVtXcWHcta2tL6C3v0m
7/Jt2nsbh6zz0pHRoIzCYlKN4H1nDxxO7YFbj0qO4f/KJ3PYD73FxZT7O72L
NbYSSTd+eKQCHSr7zcXJy3hXV94ZyB6dfdqDJDnaP3xx9AQUhig6I3mwdHlF
rELSMcfKmcL651MyjCcFn8fhY9IkS5LhYxJYeE5GD+XFkSQb09LwtVleNBn5
E3eu89JuSrxHlnfWkkqoG/4Y3gP7nwzPBorinmSjru/wBa3v+Bl/zJZ8QDbX
0fPs0Rt90oW+4GTS7cXaor/CrcfmVs2wdJ9HDjsnK2+1X0IsDJXO+2eX+zd/
u9l/RTrzP07P3p/97f84PjnG065At41T+fBL9j47evpkn/Tp4RFJhZF/89bj
TlXOzXeOoEf/5LRI+TOHXJz/rcfdp/N8tYhZ4BMcq4njIzqDWm7I3poQDQvi
oCvXES/RHZs24NdWrpfR+WPrVtO6Wi/amMrZWzduVmDWwxfPD7ebf+Uonyz4
Opi0PHz8ZP/4yfMnj1+M8D9Pj//oRrzJ74spDKKwo5juPTdFCXRyemHyQG8F
juLtGSnxk/ek0odPDnv0uiBl2RMFOJRr8ugnRBtnTxaxxYdzQU5i9pboVrRz
/ttHnEpDC3UTskxZauclJFxL4rt7cE4uwptiNnMNnvDGwYthXzmi7POIss+e
/7Hq+4X+2yYbiAmEXbx1UwQhSHoSc9ESW6EJ2+AnNzdXJ6c35389G368+vD2
/KYvJ0/nDX3RVSTG+tSBFIIbQZR3zb3IF/r5pAOr4TqDJLMi2Z3fG7luf+w9
ntISYFL3FxHv8F1O726I2KuWdFTbeldm93Xj8jtynOrV7Tw7n7q8zcgR5zeL
WqBtn9/8/frm6uzk4lpczNOrIa+dNLIEaloSCY0bwvg8PDrEzT89vzr99P7k
anj64fLT5ZurTxc9kl0vVyUJn0TZX9cl7F2m22nRkD+ZN6Dcqpo2q0WPkUkj
wgOvG5KO8ovzKliHKvd6bs53TEO7SbD1srejZH2JUr6sm27+QJKcXhT7ihsO
4uGB3atvmk0tu9FV9EQ2myx6MVSfen9CS9mHM0fUWTJ3krCYrPhW7Ley0t8m
SrGJEWy0nM5whBevz2/OP1z2D2Ayr1xBTH+UnEE/rPiSLimpJwSuSkcOZE7u
c/e/5ECaOd3N6Un+rdtNqHY2Kur9xbOH9e/737VPT4kuq8a7u2uv4YXkzLu0
7dMP55eJlt99XdaTOzIgCjBQXq7bwkvE10U3qen3wjsbXtdd3tT30a4/kI5W
9Xm4ufv+LT2/pVsVP2RDwb0n47Wu1MLHmsyTb7c/8aTqaLWuo0PBd/Jm+2Mv
zm+y67LO4ydf5FV+68A+3zTXKtqaxNOE3x6OXhy/eLrlOpg9+po0QL6K103X
Qfh4kP0qvCuiNeNHgb4fz66uP56xZO0H++pp/Ud8mS3gHNJXJsWSTG8SmDtY
6lLMpCQK91TcpO1HlTIq9NH//G//bHkJ//O/bbVF0hDRyQJXd6rh1N7jfsnX
efYXupZ5RqL2zjvU6QPfrBrENL4VFbFH5cvhO1fdZe9qtwyRj16wMJ+O69W0
/6zvhZ0eP3t6vA/ajMgqM3sjOWUvV8XV6Au6SM5dfLo+P7k8Ty/dSameC6m7
G0cioC7rW3j5pG3iv8XOiqjP07z1dsWbeoFre0nEyK45RtK/o6TdiBKpZNoS
DsmGStG3DZsekzz56h/7+CQ/yHhuxLd9wm7+4eHxs8fPj5+8OPzt8Sb9sJUb
mI/ksp5XsyZvvdFUVN+KaZDO/XR68+mKLOsNz+xt45xxQGRt3KxpRxVzpTfL
StL30PnxfXjx7Dt2t3Jbnb5km9PfkpfCXCR+zf7jQ0Qtnz/bIMBrRyKVHOLY
a72uJwX4wMtufO369N3l2flmIMnrjSQm+us870DSaU0e1sRl63qV5eQE0y/x
lyghBOHjiLjrDhHIrMK/yc1yixbfh2qNyfMsFu5bKOUZ6E9ptYo/1NpnRkh1
7JNRW0zoaPa9YHuXT+7orz5Bkdpv+BvdMrZeX5Oz/q53xSxPgd3hsvz7X/8P
qPPvf/2/rRnedEILurlLmBcV8he087F7RR/J8uWyqcmv7l2o1/lkMu/dp++R
45S0Wxl/a/MqSXSkJj1QSaiUTF+2IfeJRlPioaOD0ZMDulfkKD7bPz4+fH64
/+TpwcGLZzBnXrXuH5wz+I/DH5akwv7jePOyncrlRHjjrLrNb0GRh6Kb91d3
dvPu7OrMDNM44HbhaNW739Ppqcg9IwI3Tj0vIdTj2Ig/Ot7uXuvXmA6u2l8t
b5t8SiyxwPth/7x9PeTMwuXZTbpKDVbUTUt+PJ0qneQNMfYd/Zf4/i05sQhD
Zudy9iZfeqf7F8jTrogFw9PsZHULn+0bmtJSLSSfu7zqiqpu08dsBMVplY5l
Zmdyf82qZv/gOVJGvM6Q2wwZWbsHPqlyfnbdUyow3/4p/kJBvs1HulJrIkdz
X5AoeGPZEQ0mX9RTGOy/urF9BEmNnJTOrwiI5vT6aTZDdJHDzkWTF8M3a8jm
SYG07qs+8fJ2ns/+SIie/KPN449u5KPw3ltE3BFh/nZaRAOQ6xznfedNvf8/
D/v76r7Jf89ObvPmIS//dx64YQYfbLc00ggH3eIQ5Xh8SKbg49Hx46Pjp5wo
/fjuw+VZes7k9S1XuNBv86KExqSDxsk7eLG3tNAf2+zjvCbzTg82cU2e+QD5
9vgL9NiDz0sh883cCrOVNru/rJGPmLT7eMD+wdP9o2cIW/KCyD3jBSHPKgsC
/8J2GS6xnmEr69k/mI5fPM4nz4bPX8wOho8fP3XDcX58PJyQkJs8e3I4Pnpy
iOv++uzdyV/PP3y6SggAiXRVl2wGvXbz/L6oI8+H1gb2BpFcx56Z2mgRES6w
myCHvsevC1cWefaWXL3JfIs6w3F+HkW249Hh8Yv9tiXH9fHx8xdPNcgVzJTw
oDdn78nMvzp5ff7+/Obv6RFf1qqxrwu4mSRRASegO1yC4dYWHj06bAW8smrW
aQqkXH9DU6fbe1vWDZl5ZD+X/xznK93ghuFDmqjKs09l2RST+baPXEB700fe
F+SyNbPtz7mpxwXd17eFG1tSZwvvrUgXF5/FiGKbdn9WwCzIu8nR0XBuC1Vf
PiJtvIfrX8nVfXd++XNCVhJfOdywmDdYEV7TfydsB50Sv7e9I5NM7i8xffNK
Qm0I3L74XrjNKNi65TzNCaefIMlScl66aDaTKZtMdnzwbP/oyZMnjw+ONtT9
p9NgXYZgYeI/99zP58+fPmFT8+R9KmrOqylALetgOw80GJBdFfd52awl6Ptx
NaYbltwzo94bsihd98+IeJKDIov7Dy/fO9gn0+QRf8rqfnb0+PnRJmHibF7+
wAv3FDGT+6kmuHd2hsNhlo9bjkru7JBGbTMLMWF3kxVi3uSvwbvmiEnqjsv1
peMGyICdHHVpWgOWZW42q5uuHWXnXUbbWrlWvvQwJ4aPPjeukXPM5tDNZUHG
PCnmfFyU8LbpyWS+3mNR5JisEapcbFnNAOJinU3oqpNDWZb04TvHGRiG7nAY
nN+dty0ivn3kmHmctovRjhBoUUzJRN3Z+SGBBe3sfKhc/yuklKZuVlRgu5nL
wUwtUvpk7mYlWfP4PHbQ0gdo+8u6EKZlM6mYIGelugf/rBsAAySqwtvA6Z0Q
EYkB1gPZy5JD60Qk2ZSb9tdDRg7JyXxaLz3sb0xW/5SOjUz/l+QLTHISRxk9
ZVHQM+gztOCqxrn+Y1U04jHQ6yviAfrngHa4LOs1IoTkQJQWmAX9acF4VLwC
jivn2ZI9Hw7tLlcNKVy6ZOSw4awWzoHZYGM4ctHcVDIEY6cvogWQJuCDn/oE
gavuSYhwuqGlczop6X4hlo1YQZfLATB9WgbAgOwz5N5a2hU+Q+8gqTh1RBrX
Lmta9TS7rUF0oAY5ot7R39hrajg8TavNJ03dinFNDvctP1a1vaw5ooey2tLV
S/C5c4h67CZ2OTF7i/Mjxs5cuWqJBCNybmmDuR2bf3pZECtfXt585Pe4IWvK
OZ0iR8PoFYAU0nPBDJzJwnPhd9KlZ9KxgFgAS0aSjqRWJ5cIp6Oyg58ctoPM
Dh4GlhobxyqEsZkgD4zsLaM2oF7qVcecna4ij8I8dJOIkUABYfsH7DRr64WT
W0+MiH+35JiT/hjeVQDxYE0Flg3HgwUBExR8/ZleUjhOIjGp+fJj2VhiXRH1
FoIhqXiXCVPSfXTlbJR9+RI5W1+/QgTSgTOfgVt5d3QVS2yrzsgJbUWfstiD
dcYWI91eCUuTG1fcVtgpcWxgeb2qNbM4LYfISRSqNqVfuyKLLVf37ezmLZ6E
K8InQyQmPQGFg6erPCjBmn0xVvXFWCrYN8VwJAlx3U0YRQtc0FvHuJ5E7hYs
RORgkOrGy2fR1V9VE4Ug+MOBYGlXIG/h5ERJChUk3GU9uINeJPUezTF74tSM
/8pcWdXVMCyXPEt2jokXW+J9poLSia9qj9wkSyEG6IrTSQ+2nIZQHCueFZ9Z
jFSmiEB28MU3VNFPwFx1Lp/qzvVR4EZ6j1ty/MlVLRwbY94MWraYRfLDQQBB
3zj6LN+n9KDkfsJtjiRgl5w1RMwYPGfafGpiT61rZrOJpNhIizyCpPryhVRV
+/XrHsvoxmJHwpcIAfvkidg1A6ZReAhEKDbHWh8irliAZXLAihCwK+RJrrot
SN7TgT3Ma7s7zOp6ErTJwExEia6e1CU99A1/FF+kZUABkhzoWK7ZZzalMa7R
2FWknDtx+FnOk4DU0FmLZbUrZPgdHwSdLhFpJscAqSaIg6LhuKFE0fxDEEWA
tgZrrKKLo+wwUqsRBkkjaxE9GR8VPXHuymUGnAsxMq2MPpKPV63d1aK6r8v7
6FrQW7+zY1YUZL+uwLmgUo3TJ/XnmLtVJi6Id758Sbn361exYiD8ehYWSd2S
1efDfA3m8HdyVeEAReqTscVyvSuQfxeqg6BiRxPT37s1mXr1A55QTyYrnGRP
aBET9u0zWhZeX8Om2rDd8OR5cTsv6f+J51itIAp+D73B4CjENIDfKGsLDcpx
srUpNBvB7aZdEkH0YOX39GYcHYwHQS9NjcZj6D02CKAN+Ji2GME48D8W3CN5
76RcTR290f7ZQtBxNKqYrVnuNJavn604mQCGhLFKFmqvyOPLDz0S7uycVynf
DbLd9DO7dj83TCfR2LlZr6z/1xnbd+0C0pDrOFQ2LHjX9RgWBeyGfCmule5f
rNvP7HlkbNL5MJwXa2ZPstG8qVbo6xMxm8o1bf+dw+N3ZVW7KFko2YrMYdq2
YF5eHr94EmD1I4Ds4ggYmQ3EQvhmuxr/LkZvVCAih0wsU9wSefo3JKNbe2dS
lG0zFqPjlYY65EWtV2jiqORZmrLgLdCWdjf2zIcj2g9GvMnx6DxH2UUN54aB
Y3ATii7siMjImgRvMdFBN4IYarrWOy/WnrHuwNsk5x9pR6+u3p4+e3H49esg
e/2z/eLx0TP+zc1p+MgxfkGERsUC/RL/8/UrO4Gylrxsaz0clkx5qY5C5R42
l8iPwto/A+miNRn8M1l4+GBdOSLXa+/KbNiIfUfN2yLma9ID/aaHRolvS9dB
T3jzfkxobDAFnZG3hYgXirJjeVcvU7OErD3WIp/zBVv0bc12diWQftrnIJux
10waQn8CSxaMHRS7XURsBRVNGr91C4XJjLL35EE8FPC7QIfwzAxe3lIkAT13
+pDjGukdpD9LfEof3JKwxwfUj57Alw7H1cVJ3g2bmw1ZkKngaqgN4YeIZ7si
Gq8TI1I9T8YdidU0xQVoOACaOJaQi2CUtiAdzHSfMI/Mi3HRf90AC8efu+St
9Ak6QlwVQaVVVk3xCMdLIo6YYvemcE12uOv/uOctbHb9+c3T2okTrXKPjcVu
vXRbjEWu2lKX3tuyPQ56xLJ3kPJHTloJET2HXetqMuStISTyjSCDBq738FeO
2bDkFG8L6rtpu7rm6+8tMzl1sZ28zINRu15ilfTtMbxyLY5i5RTEs7rL5qFy
GRxdVHjssLwfSHFB+JGsVCkju4eXZVJCYJdqIhP1toSgxIPB3pgFQ6gosvxx
yH5Zs1yUL7t0MxI3SEFiSUYg739A72STFQ5xDHovUbUA7yK/dSyS8AUnTjP9
oWi30RLvjo7VjGTRCVL5YCcRwhteF4pNSgfCFXhsaBIngPGBvduiE2Hw5xmO
6c45usTEm+Hm+9jSn2QvLftjdoJhJ4Egpiqst+isocpwiwqE7UKYhAz7MqyS
OY+rPUp2Eib0W5ZjIIW4EN6cpss9dUsy0rAw2sQZoiS89U2vkL+6apooZlN1
Ih5sgQOxCOkF00LEMAcHoRtBR4RXyrXwWZ+/wKOOk7PmM4nZBYkVqwA21He3
mAO7TLfYqpfQEBGpkAgnjLcfNoy3U7p2rx0CxIvZqiRbjmxuMuAuEGZJfScR
gsUS9lqMLNkIw0qkRbB9pSEoozvDt104bVNE+3shLq1LA32kbokc5H+vRVmG
wAiHvgRMSM8BH7H1XXTqgO+WiHeT9nEIHd2Su1CvSDiTjSw1UriHHFZSVYAb
J0ppF/bG69OPL56QvZwGeHysIKL7NOPLsWuikp5rMnwXdGzN9qyb1qLaCNEx
nUXj3TaOr8EsnxR8c51d6YnqFfo6sWzGCBFvf7Cxr0V4EBwSWmX1umILWYwU
enCNb7c/WvBVApzCaTPiNHaUQn20GDa5v4M4x7xU7t8ITFtwKrnl+kG+jstO
be1dcuwReMZBCK13iUevXLmadLmuVPhEbOLNO8mavqnrTu4yXsFxyGXdSdUH
5F2+EKAGcScnGJjGGgyEkGvZAuo4aMEcM2DGXaE04uXOzv+Z/caFZNn5Yix4
8t+ADmLx2DE6YMnoAMjEVcXhKolKTiasVer07CxMdQu8ma9MZpgjOJrua2E/
TuFWkhYwtihLEofi6/gw2Fiytk32CJvfXeYVQvAT+C283d09jevlSzZhJXxA
x1QVkr/pPWAyr++cKHP/gC9fthf30nXg0OFSUihFiJGCyVlcoKJETTR29GLq
S1iHnbt7J2GCPR+1kJAxePkePiAJF11FqISl19t2gNMq2ma17Nicdd3aB19/
AeSEjuYWmjJysMQm7tjd5ktAPIgUn6cs62G8NqlbgMdBPEd6V6yvLY9NRIQ+
3IQx+AiKRKM60jhAmBcoA3LfJy5EupcSduL7H6oalAuRkSDefA/Xgi/seVXV
whjEoCfKlRaCiNNcpl0TvpTwAblziAZoAN2rDmxrN+RuAPujJdvrdjnqnr5D
0zcVkJwrcLnjoHQSO7J9Bjk1iTH3vHTjojrIO2EvxuM1iWDUiIvQBVURJC2K
SogTJap/E9xDcNIQ/e9atfeT8F1Tj8E+kzjLPe9vYyOjkd+TxcYygB8iEsky
JaBVFPvjx8mO5P1sBpPzZnFAzk9883XjHApntWR5HedEvFIemayKA3r6fdwf
y9KQBd0yX4rfr0q4qll3MHJWd9euik4s1cJkhBiWklpp2WX2ZXyqwsgSJROa
rO+g0loJO/qrJsd25RCJnmYnQkP+Ltg5+nHjjj3aGpUMNGJXWGgE63DB2bDW
SM/RpkYVx0O+ZpFdj5HfUxkOErJHrFTL48VshHzZdoMShSXQsR4SgZJnbIL0
I6vMFiHPyj+SIjU3Ac8XcclIAMQxGlYQsMLEx4UXFC1JCHlBmnXClQxOGb6d
oHQxMCeiG1sXIwnT/LYqZkhvVfBByvyBfWGfb+ZvT52YKmzR2kIl8cvheQFU
EgHfpia/Oo2TeurAwSztmxrAJzIiEU4VTRF2COqNV6y/7lclerrIXn8KD0uj
pqQtb6Fc5osk++gX2QKl6yz4Ia8ZZW889j4OpgDFyuAh2Eny9NLlU6UBm/Yq
KGgLnF5k1kIOw1uR4sgO/MXaJWLfstupcVD7Km+VPN28HBIXD13TsJKrS8YW
aP6BLQv6JPMsWQgV13mKPc2oADqVcj2C5RqVRCP1SJxxTXpxeOXY9pjwnnDB
WkvZVGxNPWKH2Y1uRwhUSwUvBxm3swwxbLB3UGkr1gowCRptBdtK4oY+IW6R
XMSFJH1qlsE1fFPaQTvwScNqLRYsAoT+FWLAckjEaZiBDmpeLH1QRbItZJcv
RBx8M83H1Ueff9I8A5RzXooYgMGamyO1zWEDF2i6WevE+eDpSbANBipc0qfm
GjQVGcVshYDQ1NHWaT/JRTFPVWL/23a5JT+RiAKyA/Qj5Tpk2rULhA/YMgsH
wRBFJuTFbb1qWLmlsoPFWeO9GQtAQ2u1yKpNGscX+Zb/t7HLrKGFWU7SiX31
EHYYxa2nggfmY0N81cjDKIvI+wDUl805XB+fKlX5KYtigwVBwUoNCRzFT6mL
wla5ZqD587ZRQFg4PG832efwQG5PRHLDOPcVkyZ1L1ttAZKIMGtIUXd5ya4q
ON1gK2oqtnkx3cqFDWvLNtVI0FvEnGBd2iOkN1uq4G+5cfzP6EMWWbSwt1Kb
DTZ8jjNBjA3hK1GiBIi3Xo+LMjakVFueQ4Qt6yXHS+XjZOB0GmsXFfOAm8Hp
TZZ6cJyMtxAm4kPi4K4PatEPcnZYDl2DPcWc/Jk4vD8k9RIg4CIjbLpyhhrx
ccRpDPIW/4s27IHepCScShBy/H7KJBcTI8pJWsbxcNP+24kWCCNLtQiKhAH1
/eq/zlGCCQAT75KcZ0QWOXxhRiyHDfmykLH5uzpA8NoLuNoa7aMnyoo60rgM
KpYWYhU2DEegWLKdJrl8sjwg7GQ9LZKIDKf+Krm+MZ2M8JIE/hNzGEzsjxEx
uXDBf1IxHQIiopxRHY/YKT7KbQmQtsZf/PGA80nVewy+eE65hO2z+7zhrUax
XmgdDS2LVEMKTYFytneOG1uUd4TOR7ASzGGXVnJgF8gE+l82KTeMGT5qzfeQ
Cxquf8h75MTvxQxRTHPFaPmVE4Eif4RFnkc9N+6RXYd2n/ChAlWHZ4pRLTwT
nZnizvTQVBTSNT+fqU7i68fwJXY7jfk0ndJGJ/jIX/zAJz5hQSuoy+meUuiB
k6F0Owv2BuJAa94mZgNHTUkGWzSApF4Bc5M4pOpMTwh5IRYKr878kQjcjGVL
cK3YeoBSLSB50mwV0H1IWTKjtLHdbyylNzPwohdJI6l9eXDAeYlhAHiTACoU
WCOKPpfMyHfUs+jHWGAP4pCntzp/bCOHsGVUtTd8YtydZq/5trN7nBwo0YK2
l3Ows1ybmJLHff06Miga13cv2k66JbSrW7rjHT9J0l0IjcJHV3+1h2r53zJN
xNC9LRC+sT2/FMzbOG9IjjciPYS00L4eWb5JBg5eNW4MBc7pRsFxsqwXmJNH
JbLi4hplnOwe6EfPQ++C28AK4cEpAek9MF5JcojhIS4a70SlgHHP3qudnZNK
lqkmhmkloE/5plUrCWtG6pbJq3gaCYho5OFerpNGNMwj1d3yclsVMyb7NgFy
wiTxI9XcgWajn+WgsLJFEv0fiKQgKw3B/UeSolXgzcA6XdKF2RMZHSBbPhaE
RDeD4BQqI71p+CymiMcv8HdVsj4gietE4n8YLXiERgwx5FEfxHHlSpsThbSo
mtxFNUVkwCVxHLPhgAQVrIWaCJHUiuFG/SzFN3Nu+iR+v3TiSN4blaF9Lx3j
yqWkYzwYUnCjIbStvs1mrrIUhHY+hqmHK6SOHcKJTiLdI+7T5bHJgneamiva
oFCHzaiNWwzUBuy17yDC+MC5uEZlnfFfrsGJD7CaBlscMsupmTnmaSs0YAWw
NZAwyG65QSEzqUYQaTv//td/F89Fku7Ekv/+1//Ai4Dp5DBGopRIrRoMRT0L
ZBayf9YBgb9ZJp49enN5vWfRLXV65yu6QMMZjFGAZ1AqI2JL2ItIIzFf+o1l
iXLr/SO6MdqPAcVJ3JB8Zbb50ES+4flHn8HG6yea7Q8R6Fpy5j7MHV4lK9Jv
Mb/DVio1bVxEYu029N3haArsxLU34g1+wDdfns5RCJ8WFSBmV8TJ5AcPneqC
McYRwbHaBYpQQuUWFLpUI6CockzKkXv9skVeRluj60TCYSbX/SQWQpw+N9gz
H6wwRdtpgCiOhZsOGzd0nKyJKkvAk8gYQ/FtgUTzLnjlUmCwgd60VlySI2Oe
QvEAMxId60d/qfxDeOWMx+TsTAOX5J/3EO9LKbqWtK9n+m/sg3jMR9KRyjWz
HPlviUbAEGWkDWfUNGnRR5CkwQkNWOqSbbX/S2sRdDg3cKL7npd3P2nYhzlp
wijXzSwF+3G86ijYs2D0DMMu9ZA99CyOOeONe8aQU050tT+S4udXAb5cc1Vg
gJ5EvBVn+/JOBSGeMJLegfzS0CVE/TPYdQ+1OWYiX/0pJoiKLeyUYBIY1c7d
niFUTC9sSFKQSEIvFphuFfa2YVtysziAmSRp1o8/FWKbM1E5V4oYK9npHOYw
QLlTmH1wlCUEiuyNFhYJHkniz1idxc0StQ2fkuvmvn4lcxtk8092PgK0zBld
LngC3UPLkFyShIJzMTh7J9srOec2QTFiHLDhtKHi3RPzKYKbCHfmYkvcF5LV
7QSFCtsa+yGSnUoEkR+OM1tHFhc7T5sAuuyRRFbpmKYc6WmmFtYlubIndTEa
njQSmcbIGU6kwQtB6Ee4Ug6cukbhE6AanZkrVIBs5iUYv43ASechI/xNZXts
b5O7WEiojcxRiii6C3YKYGxzcE0Yosqmhf3x5Yv1jqLjRshZeWc3Cf9ZrWQb
Avf3Bb3JRZDRgOPk0kl+k4AYIuR1smcskctkwAkCsaqbheDKJEU7Jo0oiW0x
20nW0ZGL0EdscJhPOGYp4VL6cGuAXeYtxvGMgmmXbiVkwLU1QOSqNxyVYsHc
cCSUL/eqwRX697/+7wBMiDRyO4iRxgbOrKslN39LuYMfwu+ewqyRkCiSfIys
hmjrR3+5KEERCaq45F5IBJbDZrisYYOjXY0nbjg20d3yYjXGPHOsteTQMVdX
caGOXGMIcxCG01ES5UTEuO36ySXL9HCsTj0afx2F/SJbHZ6WHQk7PVpDl5vo
HGUfZuz5tC6q/DRgsaZ4+AuMnEiqzujaxxl8uwmcItbYcrgSAykD4eokT5EF
mcBAci9YDtPzpgC2IfIY2JfRpHRyJCfXAmE23rRs4KcSHZE7NuymJDaYf76B
couuLoczfl9NbxeSOStLMsVS419D1P5UPXIhMaztzz9p2ibCvoeoD/yQao5d
i0qakEiCrc0lWjkbxolwLpKIkkQ8+bF0+SQbLe6uKZGOfUcN4g0yqWPa5oVw
lCjgBn1KR9M4hoifu1K73ET1aonsG/ivzlmHKIZj4AEcgxDT9gfdCtQqPsHw
HAknttnuLL/HLXCMKGPHo4nqCRlyw2zVFhzjEHgMR77SNFU3ZzvBx7TiMsOQ
6ZXLcdcruSX5i22Tl8rAwo2hIeS7btTW7Oz86s07uP3Zbv8ju4otZZvDoH5E
ErABcYNVKrceZsoRCDRWtq7ERdLKeEqKvqwVef7lC8YdkMK5hQSM/LpZ0XCp
tiGr2xCqEPyWdAmJMfJy5w3pKRTd9a0MvQudxohFOqQJQSuAhti8DgDl7fhZ
EI+/ixTxPW5pV5Olug1tnQWE8Cg70VEf3ysnlIpS0y9p0WONMi36u8TJOBwU
/kivKC1Q7I1u0RW8MF/mNEa5bB2zKkkUxHNZ2khWAlc2SgiSRcpnI/km3MxG
wMUpkH2jUmvh8pa5VzIpkDZtqMMwKGBd9Ys7t5OGtAC53GjwABtV24gBCra7
paiVGxFxBZgLoajbFWZwdG6julLS/qQ0kfvzkZixA9aPGP7Ll5DDwAvDUv0O
cwaTd2DQDRxqEE3s0Vfbi2LpDm8hYWIM00Fc4/JNB/3WZ9uUOtQTbYt9ZDWd
vHMQbx5cNa2l+JWEE9LVKXn8o+MMcBB02MM0X3bmDajj/aiHPQ3ty1D4Y4JN
i8OQNFxosS07LfwgliJY0543iKY1AxFqtcz9ZhPQmnmkvU4CUjMMs5enPJAI
Ott0jTgbkabiIX22kKNl+QNcOKAWHn5j6C02pDTmGvl8ciXRh97qFVrny5ml
jUVssSrkRMPGeegqrNEUpKKiRIQmWQQBzwpbYER3DF1y2x5NIsoEuuSgG5hB
URGiKrfQGST2zurkqSEyoMwxkKxklFvRhI8c38L3EcitZEqPLpyalNJIvFsQ
EFvagUgbia215KE8lSWmAeQm5P+SmTbrFNkR2zS+GwUcTXYwszNF1fc3bNln
9e1EpjEqSCygdl7Mui1hKkFu+U1K5nQLYBtxg2CLDnoQKOvQIZoVBgecyUlR
lpA2nlH7IQUN4LFbjfYacLudwAk0Gh0ZVnlf1jBiydYmzSvKYua0AtxHxvPW
1yACn7Kh6Ow0EMYlEz1nOrAGl4w4kvttZODgNaymbt3UR2xNh8wYYLEoAqx4
s6BO0hSSehwY8oeTlCmhVk1HNml0Nhoni0ABAByjOxixtn2OGVP7RewGCY9M
dXztdqEyqgQzKh4yKZuCR4mRKAQ830Mo2f0KEOot+Hv2aopqtVpwJqXYrJk2
d7STHpmcUwRosJX1SlgT29tlGjPOg4uwCloQ6n/QQ9PRB+LCpW8YMDlA9bRW
yY7jxjNnJk8JXPKNL4tBntrC4oc+spCDB/IAP0t2WD5Z7/lcqqJoEvd3sLUa
4s3ltYeWQmpGco5BFJJgYNM+EZ/9u8oxZV8eF1oMlXV9t1omEhOR/tIi2aI4
JIrmxYh28EGOlT7TIMKD9k0RpjeFcOiqfYbk8tpaEYUKa7aV0YgqI0cVE0f6
iRti2zRRs6u1GNVcTvxRMYs8q70tpa9448L3niaJcHpyeRlVULODE0o9NFYv
vek57zuMRwFFPnivzDqkXqu13Jx7HzfDjWi4aQ+7zFyu5u2tXuxRgjA+vRim
Ez2K+7NEiPqN2EWou7L6ibioXXPNnuh7A/O+G8f15kygH9sQSoiPENYFmW0y
S6lDzR57nCSCN8zESJxMowF2vj1HFC6Iq5Y4RxbRmW0jafAMUNFb0l3zwebb
QoXN2lpVIKMFkJMHkkrxwgNDxQIwISh476P4ijYOovVR+YidLeEb0x3aUg/R
W5grW8dhHwbx+a69GttkSz5EPLdsbJcUEWk0QbcKUFPuTTN3ZKBppxzuMKHp
McmBtFFgs6sfEEnuCxMrf2fLi3UTGaxOZ8AAhcO4deGOXZbjuw/OYjvApy27
xLPhsl9fFSCgIQEiyOMH2URb6A+0pskXhCYNLyCHCsZVkPcDB4sNzXG5qril
wK5Fk7YFxALoC31h0L8CWAbgLVdT1KBKRyz8jm4oV3RHOsFG46iEJvVzixCS
wnOaAMmIQEnIIITWUMhNCv5FAugFG1r6XMFdh/7zzM+xwBY/fuzHBQzlDk2a
9ZIYk2tMOZvCTcwadXOsSHmzDs6EJNRKk0+tfix6kAm6xHusrGuXL14Pfrrr
QSqsSMNy8/c1Nry/kB5oSxm01tdBpHimau5M46b2hpTDlddBCuQQfaBPDGPo
wTZXl+OuDBDflndALWXF5XtcVlfqmrfG3kN1DVRBmwY/NlumJA3TcaAfOGxR
/il3OCEsjMIB60g9N1QTh3Z84kaZYFODVOssEAerNDCKHKTvC6NRBIbeCpjR
ekRstrDxT21MGnA7rEdqlLTLoilYF7DZZIE6awhiCOoBB04kMiZAJboQnztG
5Yr70TjRhb5ngwRYAhgJd1MTgbNmZaPFRtnuSaJIzN4OqJ5VV6NmUvKz6wL+
AuyTW65yRxPWAbebkOwMsQUjYE00mcMZ16mXQNBO8qXbdnMB0tmIbV77Xj/Z
lx+iCI1mPlpnvWMA/XCt1YVzUiP0CVLIE0JeC3X7+k7etjZn320uhPX+oCOH
NAw78z98DSADjQYIbBKOJNTIYpkIm40+nCJFwvNe6lN6jJ/CO1eCavHTlrlr
mSANgUWwZoppDw4fyZWKtqhFp2Ydo16BZHYX9x6yOoo3Tx9fFAp1kfpZMXe5
Vr6uFXNpC5IEj7cShcSsJSd8dtNc/MKxHyXBCNgqegIn2iu9Ipx7Zr3osYuc
iEYfIQOyBmJqyJAlQxqns8J5znEohvl7wbqAKN3eui5CCABzJQ3iOIIWMjc+
SLPNg9fWkCgFdNoeLYKBMHm5nItkQdtKBTOCDhxZcx7P4N0PBAk5Qujbi9R+
oljjwyaMzrDafAE08EVAAA8x7pukYB7W+CC7vrixdkFPjo8Oo55jue+EJ121
rAQNh8Q88qNfvOz5Qn7KbpBvA8745JY9k4ubE3IKXq+FvxR8ioMMVbBEbvqU
wh21cWuzKrV/Tdx1QBG1i0GKYGGbV9oI+oJ9JYG/BnZs2ibE2ubS3n6KkMSP
ZKwgLvy03vOXgDF7jhmrkFoXIjk2AbNWmlkBSrCqIr1JW0K5/qqqtDkSnAn5
vXYEnGg3jF70nz7aAPzi3ZY1DN8B2xba0tLMeFLJKPfAHtdWqpUagRLbFck5
YzdmVT3klbggoYsoM+woyxTvjFtoV0AaVUilQUIJ2RK2w9wbw38guObmo0VJ
3gClYDSIVU4NogbBggTcBlwdcQVJ3Moc+udkahadAeC8OcQnTOtrpdFf7WOn
36FBFAJFmGtot4BYWGWGmBz8WJmbAY+ADUUJBIcphRHsXSytwlokiOg0pAzi
/D9J/tY/XDLRtgldGzsi1udNhaFtJXrdlmKBWiIAkaYIwpBhQEXXaZEocvnE
uH+7+Gii4enh0QGJBgloxbA2dbTcQqDXXLSsoG7OV8k2Y32I80GxZsWtIhVl
GvdejiqzpWmO7n2Q8YLQgUMepywdJFoEG5OEKF1pJlgIjFm93ND3lBSlBxxD
FGjiN4XwLedg0FiHfY0GHe/DGkQIgmsfFSM3GvhOd5oLtEzACUuIuAh9LbQU
TlBxkn7ntdVwWcAKzIFELKeEAkdGOpLo48mr7XZCwYbiUK3Iwhp48e3VDKy+
esAY5THvkeOkUmXKOEKsxAPnaGUaoupbI1p8qnqxVbx1QQ6osArzjvl60Q4i
5dvNk2ZBIVmXwvU0Gp4EAQdWZdrLLkr/P3UHdsQYfBNZ06c+LPPlh8jK5jKu
IGoH3wjlJL3XkkBVcGYFvdbV/FWJFVi6J85mWVvEzOfMpWWn8ALS2fmymAoT
iRPBpSgMUcEsZnFWJvXS+W+EZpNIdkoIwxAfsKXFXyq4WSz3My+09lHCtr5U
LLaEt3Uf7ncj24i8pUe34FG4GokJKSGRhEsdm7c1JjXKPrWrIPfjPzGRV1Xo
X40eWqu2szhG0rOuy9s7VGhjNHdlbWBzjpswq7GYZ+vUl5wugUxkS0ur59FN
FMC9G0iVAI8NnCc0hXBg59u6BgVSyN2XIMctne6cTK+I6o9qqQuQju8k64YC
M4C5pb2HaAHktiLUfr0eQ5V1HXoIa2Mx3fNaVhzKACyJMpm7HB349PK5ip2Z
rYRn+kg+DV5wuADEZUBEualwOXrj/S4EAlwoqp/zFnGwxQvDvG9J2UV2gMVT
DFznpHWcb4bMe3YNn0Tj0FlFgWkMm0COKoq2qFPvuSzeo5wHimMYSx2OImAr
aRf1bEj/x1a5kpkjadGTxBCq0X76gQVtHDQjqi2Wdi+8PbQnmRN9OAfev/t0
kfOid2NTzX12kxVj6xppRAre8BCjNjKVNKLn+5VI67dvRG5+jJIXA0sIhXiq
ShDFDIdJEOMkgd4rL097BOER4joPhB+VQmi66aa9VKvF0FS8+Q8/AKMfday+
8VUDs/gKWK4OxZSuWmlvpV70OnLK3FY6+JEGiRrqgS/xZZtYlu0yDHY3Np8i
2HhQGNpE14IO0dAFiRjjZrUi00UiaBgivuMhKyI96DR96UmOPlUxPTy0mxQ9
IK1WHerWTl/FY/xooWUSCBHoso1348AucrauWdRS2OvFifSSjWdXcIUxo9e1
cUeIhVnXq+1aVxD6C+1lsI3XQvaBi4ML5tiAfOCec/y75JUq6tPk4iPFP8p0
g0FsdTJNxRiSkiarJw01al/31GP39awWZpIKByxFChmk9j9GGkfZOfHPBL6P
lKyP88YaO2RySfI0neCNPJ4I/nVm8VF9y58waopK8tQ+ouO7WnDdN7E04/VX
ScqYiOpRaVwazkEETbCbbWFv8FbFt6M5iGUozGjwx+tH5RwS9yTV2OAiJ2xl
UD8I0pAD4rwf2+MbuEugD9lY/GAXnugaZoaStSgJUGL4KGDFkf1ta2Jxy00B
tlq61rb3W5UXKOTdqMWVk1C+DXYHfBsfTWMRFqp3rZApNI7JvRJSMyG22zRB
GoUZpUDLfAYBWkU4b3Z5uNFcjL0qqlnJjY9CHfbYhquleQbiNm01owiub7bF
HGlP9Y1q7UHoe8LOSqRmJLzSW3LR9uZraPhPr2oTMImAvisHFtqmSLNIMF14
QFTRzm0iVr4liz6up2sd8h0ipjplQLvO+7kPuTR6UFkQXNq7Qo2fpGaMjS/W
5c73vxXnN9FZj3aj5bS7ewJSig18xqdxQ11pKwL7Oc57sy2tdYTShgFxi1ZD
7XAAWV4qdqntMH1imlZ8F1EfCiux3ewYiKx7yNb7glL4T6hjVe91s5xVk3f9
YL1aA70vcNujaEDMfyaI7tNQRcI39IT9BdoO6l1FHF+uxJd5xOiBvf/6KJ4e
BptPJq96Q28fk1Tb/bDd6J9DV3E/KVUp29lHxFXMJVgcoh6+RfcgrYXx4QA5
PN8pql+N/82T2KgvjaBvwm0AsIXS0NaL/IRFv93JxGpZOPSt+CGtMBVckax8
Wykr+92nJ2RA57ZEWvq8buKX5huvtVITuXWcxdP160OAs0dblxte3aLuDAwU
lEG8wKRxbCpPguQMAiW426LO/vP0ZP+1vp/sx9Ui8NEkH8/wG7DRnqAETdJo
OKGKECvMIfHYkla0jh0EXIdIAHjTIQRtpBCWM4UWMu9xRajBUdy+RkxDPW/A
vKuF3vrBCD8p5iWaTVTmay4GhsoJ5PVF1xU7lVVlsrvjkSC+F2wSK0hLNLSa
sZtrTVFhai0C2ezsRDrdhjro6xiuZGMK2AYyuHyvnrHbCHuNMq5S7XiuSeu6
1VLuXnXLmOlecOR7xNWyBg/GQHZTxfHEt+dKAOCeP7S1h2YT0wZ2F5/e35xf
35z85ezdh/eM3d/7SfUGvUHCtNEZWYOuMilvVz3jK8+CKhq7UJLHRQs7P8gA
8dN4pMi1B2y9qV9hako6/oXOplAqCuVZ7W0k8KOQiVSX/gl7bPDNuHQ0PgZx
uEJMXiW+BCLQh4KBt5GdMm2K+77VOtAqKVGkvk1ceydIz8024cpM8E702smc
KDy/lvoEn3blqUVYydbG/LmVt/T8CGmRQSaXfmyCeBmiSH5yn2EnC0tdizW3
WftmyIxNzIbaAdxj20PJEXW3PjpSsQtPtnGwKYC9oQVgNzqmK6WPTgbjwRF0
+7Vv+2vy8YEYfx+uw5cfgqnCtVVc+LtlsNpc6p3K9bapl74d8EZGObYO2CxK
Hur7tIWWJmI7tfYDpw05o/SwJ+EhziBpUl6NKzbPfQtZxZL4vlHVNFG+dLGt
v83vpIlaxCjZFgsugK1GuSFu1i7V2aFIcVaQ0Yx5PZVZ4yEq54dFxT3mDVok
ZkAe0RqVoNILANyQd+EX/dl6Y+8WeMt12zAnC2iwTo7b7CJXUw84ghSZ1a3v
3yt9ltvIirXX+Jo2U499IPGWPjVctXI+C7ez721600zbi/sj1IgxXr47LgQD
tOvjOVz6CIb8dG3oN2s+N+hn8m5XMCi83Z1F3fBS8j1oZGRacOO0uYpAyz7r
ReVt2DgiRCVSNZrr6FNvySToraCMevE9nrUYRiSYOO5ZrhiyRcxGz13lPUBs
aL7HJowWw9LHl9zAMrw2F38lGh80kWY+3Tx4zWxliOcPXKlWUce1wiEl7RQ1
y95d+jZLJvTLMUNtxDbmVcoxp8zzpQ36gk3q2tgpiVS7n+SjEylZ/a06Wk6M
lhENwzBAdbm0JcU/JevXxzBCSz+CXcEYMN+IYc/sRSlZigs9oiMMIoEXpbZ1
J20hJcdMimfVhG6fdoLselv221h+lG2m8q2NQ6uyjofLxbWVUQZ5LthB31bV
t0mDEcQTVLipWIL4SaxfBT8YCsinIUIgjQvHeBQkGyHhdOogAbiQTK/igLtI
kr7vfOkXIqjoWhKKliLoKvoExLE6xiKIkfiTjOhJ7pRk558/f3GAsV4ecTkW
TWgSfnOZyaC1IHZNMvqqFagRMUY4bcAdQW4l2V3IHDCecq32yiAyUcIoy4Aa
F7kFSCMRe14s9+zVmJHDukYGqdHWNQ6Oz5PlIsMqOY6Qhho4mmU9OxJEbG/4
SWhhLbbCW+5/8Uamcaoy3xjaJwPAv250+BCYUh822vTAOCLnm7xQVOg2s2Pq
FwDm54aNebFIuyOFwKmNkZy+xCGFUaKMne8Vkn8daAn1htkC8ZAAROcy2Uah
6FzCuznzcQsgP7KzNaScPjdqutVfgzc71Y5Wx8U4NsYdx8ItEqBxnq7JGU8b
soYeY8TgMT9BpFc2qmn1iLBqa/MhtGnXyZz4fN0y9FD9aGy4V+etgkMcVZbB
AUzrkf8eb6S4GzYaNXnWyxZ9ozuQllKmLf1Ch97IvE9aD/nuQTZEzrcW1C4O
pmr77QLBMRGEK2r4RA+Q2Vt+QLqnk9zf1rpoCRBBYBvbbgICFbT7OFckx7Cl
kgS8IgY7rzi0ZgSGqj/x2dkEAijdzzYSL+Deb2/hpFvli0p+NhXU2JMZZeLQ
mraXa7plZda3wyLdwM0YlC1FJ9BzHpn2Z6Pfz9cu13sGwu0BbfrzbNlcsxQ3
H1E+mZvbG4aG5Nluv4li4ljvejg2cr5NPsNGbXZZaBxkpaFx8xLLfMKY15Ge
C/KfZGRhlOcOLdK5Npols5SrbqlUi3onMobDxoLVvj93bNQC7BD63xE1JG3f
1RG5XJx4jOAGATJvzoMfwfWdNhC0r7rRirkkDCRc1W135kU81eKeoMZc9BnG
mtn8zM0py2k25Pwjj/cc8DxP4UVExeGlABwYAaGT+sO4+SRHhpVCGDuchX4j
IC7coVUjbZ834zJ2n81B5OZAvp4Bv4UlxTfG56E2VmSsG5Svn/HdzVctdw1y
bKtpKy4GJzKB9frJtBgeV6rVxX3VFEwak1AylEjbbZal92EN9mCqdZQ2sGDf
uvauT3htvwxhzM0HxcqR/7UqdsZUcYAnAhx5j0owT1rIqt1+tYsUWWN3Gy/a
tWZPCy6bG9dNI5jqMFGaR+pwt+Oo1ikKKfpRoqFad8tYJ0P1J42Sfu133xUR
rY1pZfV+kmy/AZF6H6iCCZ3/eMSUhITDoWlViMA04B4CeinhWm7sYJAZy2Do
1CVSnx8qzBTKF44dARYvaj+JEG/qW70IhXbDFgf8y5fXJ6en786hHCWxpIzB
3TN8x6WYyYYymm4aG3Evd3YORxLY1OxJ6p5s1IvkGhBUH1giBmI5av9KmFOv
do70qVOSyMPWCWwrJQwDKgJpskc6Sw59G5FZn7R70vGG6/3mRdt3vXWNu9Y4
89XOMUeNFMf9zS/o56WrIbP7q53HgQqlmwEAEG3Hx9Xtm+lzX2W/+lYU7ALS
/UUi9xUHi5MlavtQ3SZLO58YLdevdp7oMuy25xJcEzw8B32+uat//+u/61v+
/a//8WrnqZBCe0M17o+IknxdekPaiwfRTGCTaVM3g9c8feUJzuNvHTsb+1qi
L8n0dEqDhlBQ5zl9Jb7NDbst2Uc22ByHs9/6/MSXH1ZLBuXYL3yIXsMFMt0K
MY58cqeO3kadET7fFGrQeTWr87RV4Y10IcrLuNBa5L2MVhYyJ9bxEf1Heyan
4nqkLatFDVxwoP3Yjo11cnFt00Ut1X1RSz+oZaB/M90Av0oR0jYJrBfYyjPx
MKTCsmjFVtN+sdquOG15gWSrFbvVPNxckbBSIa+GXGZWdD7VngMxtpsnQ+gt
qepsN/KNalL3bleS99VU0SWFDnGnhctcI8ME9rB0PRfEyJVH6S2MO7o5/+v5
zd+vb67OTi4wyUNaHUeD3RSSlQHL6w0GkWxWJ5nHKHpJsY3XcUHGRqOQgFyx
KHIgX7DKgFwTLL+nCSJ6P3ZKjxrIePG7QmSeiIum3/ilUi0qPurzfuLo+9rx
seQ8JmtgJiTxnYteXlsL5V539V4S7s3FCTdQuFE2wIe18CqsU6XN1vreyhqf
hhPrGyoSZIqKJcdAy2q4voz3nzHycDFOxg16sHlV2+AoiZy3CKz6Em/Lh335
cnn265AU6+nJzx90nkLeJevWXqm2Kfb6tddj/Nwt54XYWj2dtmGGYzRXPuQk
Rtl1HL8UNCn8E88dwjKwGAptKNsoDGzjrX6h6RjVbFl0mGitFgnH2Q1bpdJJ
ZDVOKBkIGo/ZKYu8aGsGfVTTNFKrUTifaQhz2S3Q5n0Z7UQoao++ZEHheLpy
SF7IWolOVRgbYb7aVv5P+UvjaWeSzrz2ZZxfftAZGpJSiJIVOqpjs5mUB7cF
eJp20GniPPg3E3JMHG15zH6jRXpsOIjGArjVzmeIGERR5rXOeRTusP6q7NvB
vVGFXjQhyqkOZC8Wuwtzv1LXUypFyRye1hj9pg2XFasAkRhSyO0dDgAxDYWb
ykI6raL0Sfbcy4/kkYVNrCmS/qf9UAHqtq9/Pb+hq3j589evSeQgXAQ1wW24
ErrtFZOikwJ4nhmmxVZREWgo3bUj7YGz1cAJxVTWUzKyQQAelYZsrKB4pszO
zocq7h0aekmycvGvVUt7Y3ZKqW0u71FbN0Y2S4uVk14LvbmF6VrF0LH+k6lm
jAnPcUBfQtV7pIFL2aMf9GZBaIUvrugmrsI8JvC6dkm1ktCiCaARBZd8QILt
WlJHimX1/m2uGseb3iQA2KGfRWaE5T1CP9OZqt2oc+pGYyXu+8GIbQGWeOQA
vrzH/rRq6KPRIT7ItcZHh8/Ju9Z2jlq/YO+PQkBJR+Vt9RsbJ6g5TFtVqEXn
uuOYKzbOqYlPfrw24y8qabQQnS5VZRFLadXaHreJsOpC6iaYOxfwpJn1+fZH
la8+XD1IIPiojpchlsl8EBEcCuI31gwiJ2qNZtBa6XUb7xR4D1OZ+JPF9jzg
wyRCkokIy/Clxp2U8QbAFw9QaTmmLtVDvq1A3BTAw8ykbRhby/K4ihMGyR1l
m98XhXEihfuH6Rg9v1SrgnefO9hcoRya9R/kK9fHCwP1CBLeFsf8jYfysNve
9yB66pqTkuxvMye8TOCPewhKSNKNeQi1St68SXSpPU1mXvpVs7oSXUYm5zoI
vqQhUzFL3Cqk5rTLGjsIMQAxbKaz3l1+fCrMT5G7iV+yTAdvbF2Od1c6aY/v
s6QRtnO2yYupxS8a049vCpSX41zU0AA6V1UERDRMSCp5e8qHWzvrnSjUF1oQ
h947GzRvMIakiEJ0jM0QCLohmska1ZRoFlwMBqnZISfp5uaKHaWz4cerD2/P
b66RpP0V0ATw8nQb4EubKJqVXlvIXPr1xyccQHZ8REuG50MDhEZUgwQ+od4I
hwp8e4TCEqKnqmbeSG2/6q2PHND+8gO/DPFFa5JyM7dx3LXNFQ19a/hEzJDi
e5+LkexzGb74ukmxPmkPAfE/wmwTwQdwQgNmtHxIGLo3AEVP6SWP8z2zJBjm
ZF+kdUUKYYr8hn5XdK2YkKJNaTua2zwN7T/aG7lkDfZ1yNPaN+3AynQCnx//
yCgr7bAamm3bOAwW9b1yr1ZH6lnFOD/LGgzxvD3jb62mZLmDGZtEsWiWnjVR
5LQin4bvqtalczlp9cOWj8gyWTYSXSvaJbDFM23NWQlpR7ZYlnnRDHkN49Xa
Nfu0wJKx1Tkf6Jcvp+dXp5/en1wNTz9cfrp8c4XaMZnTfS0aSsacnwZxQNI8
ZkuZBdfjA+7wKmm0VTN1VaxNcfgMDNEhN6rAQ4JVnXzGSN1WMg+uxOTuWa2l
871AEMNbZIDcdyIYSjv1WgGmHGL4q5v6wJlsO5E9tPV3+X2vixAUTl0W0/7o
EymHje6Bb6K9ZXKxutepqOsHgYxd49IITM9wHPYGo4ZJnLX6X9pCg6cP1YYN
0jbcHia/pJ0jPh6J1umWWe0fpQaAqPDW4kpRBCMpE1CD1z9svI7oFPAFufVR
ipJmAXjmZ+xpOkXiVrAfmkLjtlpj4Zvmjb58uTj/G9m053ofgu0fyzQ/HMOi
cMGqysbAWebNNuBhijvyJay+V5MUKfhwBBrJ5Lg0DOAxDh9IskeGFvPdr4eA
ajieBFePSVzhCwhYB4X/yIJTMNtfHB0fINgnYUnWt77KhE9ZCxuIwNJppdPe
iWHUqEXm4PRK1ZnPRcYwNh31EeR8EeZN26iFounhCXfpsZO79e4G+ca+P3Hg
AF8AoMQwKd2F8V56U6xtB0saxA7HOhKwSBgqnu4+iKs8JfySYPLDvFLzLYK5
nnrH2Iv3M3M/CG4jnXohxqrVozWhrD+XnjTaLsVLP+KF3WhbBWZlSJdq8bmY
yXdz9HDa5S5JLYaPWzMzzh2Gh6k7AZO/YxB6GMWZ+SpPfgjfAJ9lN3BcZ3Vi
6ON3y2zLo+5axVLOJS1pKchc7ADjDqsajQfqPSgstuRmVix+WCJwgJ+W+FJm
WvSJpREQbYAt5y7RXRawqYqRmT22h2hcBifSm3VYnNSoKM/dC6BbTGuFA9js
gK2rifoxRoG0eiwj+0L/id7yDJbQ6QTPfmWjGjV2YSsGboZiln5fM2kn3gvk
AIkgksBNs5SdfE2VJ6HCrO2mWVbAag48+WKJxVGyunX9h0tNPE8jQqyU+6Pp
xSlLbwxxXV+Oi8dNSdwsxwVECXhcz79WnGW5DlSI6DPOW+SLPLNb3nySs+MT
2vCEiVCJBgCNrn28jwycy7PTm4w82nk9NQ/MYiQvRsejp/YlErUDDcG7qQ6M
C1mvEA5hOLgmiQbbySVpoockYsCZdrGtdOfhnLi1mR6Dj1WuhUaiy728E/JY
a7gIb8cjMbC5V+fDNyNa1qIF9nZRkJac2QB2XFJraOqdutTf0JCOzMOJJfGu
xzpzSkkapECCKaiOc6Ma6F6HDpzaRlfnFLFzpNG1sSrHXvipn/CjS6+n6yfd
RyuO4GRs7NpwTFi8bTzuhVMCPdXipMCJYydhppJ0ay3X/c9jrXwDe1x0PHoW
8dAo29LTkg2Rb/fMjUCEKttpKSg15ohbcjw889bngC3gFURx7ITCY8V8RvtU
kgrR6yMghbWm+8QMsUYKqyW7BZJyEAPqdbCaMAyYRctX1YdbAFV5fxyvtN3k
asOOCxF3uSvlkAsEdmOF6QvuejEGxo1HU1PiuQ+MT+k1HUcfC+31ObE6pnbF
w1Q20XCpzu4vfrwqSJ7tSghgV5+/6EvuuMlG1Gzcav9j0ydtCtdZkoCxntZi
V2Bu7NelCqdoU4htLOzNvtEGSYqU5CS7FyXkacCknNYPWhsVpHok0KPGlNYn
DdfTe82DuFtwVEEqjxQDvtQivHYQ8oG5uJRWEYwZYXwbG7eo730cV/TvXoi4
+sXEFlw0FwidL2UumSAM5+j06rH5qjbYpfFuFrdXqXXSAi3RaMj3DoZTEY1P
8F1TYJ5s71kaNzjxL2FkoR9dWHJXKDSVI2HbK6AkNkVPKnOqozAqa8LN5l/i
23gzMfg1iOtpAWfFhfJx3wJpGZmolt7Jb3CbxwWqDZ08iTszAi+z6vw8Xx8z
KroAC2Zb1Dw6mWskB+Tb24qpJcBGQDdVQAtd0xkk4tl41GO84kFMSVZbC7YL
EejdGNsUO5vwIQXUExrRW/pNzZsQxpOh12cSAFZr8TQHLhaH/OWHEOvVai+V
kT8mJWWOUe6srRrfedv6t0oH1IVz4qAlte4somzkVCVlndbVxAy+GJpMnues
zMm5ztdwPMGxy9smn/Zj7ZCy1lRtEIvEqATWb02NPUlG+Vh45mdWtck8ch3p
kYz0k/E67DUFQSTJNwBapE1G3MzRRePHvRsrwj68NpmNGSbmcOTTlxKr32wx
Ug5IBUFojAD7KZTJbmTpx2tzkr6RFpCej6q2LXnVximFrlm50PKKs/A+2eLB
BloObDH0qC0zHYSkYqXxKMn0bY2Srz+cfPQ66UcuUqDfcGqQ0zjZrHSfiwjO
BaSzijb/0ghoLivkPtESjTffRDMLW9x7DQfQDXFNw71JjEjRVA+56iJYpnJd
LRiqjunWhLqZ6+rISRjfQxw0bMtVz55eKva4b55mOLuoWyeazq203UNqW0mQ
Sm6UQWBxpSxF0eMQq81YqNUK69KU92hLW3Xbg4eYSBuoZLpNnJU2Oo7RXzkK
bfkBcOQila5NsNraTiVtj84n2IbLncaQOKDOwKNwG5KEKR3Na2mI6eVX/Cik
Y5IJ9Jt3NS+21HsFlOM8zPZNg3iSK+Mmb/EgdqREhrb7LdEeOmEeT8kAU+Y6
VkPT3/NJDJNhDe6bidSkaMVn/gZqjYHzG4Cxfqv2GF93npbSFGHcsRIobUnF
GNK47pa9Hu4cEjdCTtegBspm1tpaYOVdZEmp8VCnMpV9d2S+/LUbmMC0uAiJ
dC633QSKBfwUasUxbYHbMC4UyCC+oJefHFmH9uEyJS1BVixZRGg/cfuRWXJo
MgEu3dtgJFXcVw50YLDyr3Rv4cs0+NVXjXhtFvHx7JNW1XqIwCSFG8GaX/6J
qQa+2VqXVpHJ/A8tGtmcOWLhkKjPhrqj0VyFr3upK9QrSQgDSPrTpMJABmsD
EYP5OHoWpRuYZtPQQq7bVvEsgQENpDZu6A2NIOiVFGJ39GE/US1RVAsXdVsc
pF0Ao2Mg98J6SKkD8KYGr3EHqexa6kB4lAi3tVWtZP6U7+QSkqBSzCENVd6u
OJcC/pHmKQxFsZEb1ntH5gc3tytrNtnHymp3DTbFtSu4zMUjasV9FqyFgfY1
UJO32Jyn2E+yWpu0Hk+alGDAB8t2rxtzSTLEDUHUMuLOqN+uDLvRIhN8xxfn
OdJxtcCOZfpwpUpfOz/NhI7Qnz8R2VbjrtQoSaOFyI0CLG2kJpkbo+ySjuN7
RbL+/dqEvlAZadUuP0mU9gGWYd5oE690QBfLL5vRpGlqbdcaIToN48WN0sIa
5fi5+w5PKZf+W9KChYcreT94Xj8MfVsJNn/d5A7Idq22ykvvHfUhmK+3D/rE
amqLwK2sWVbNvUqE6HPuwg5YbTGTUktpvaREk9YdKqw0KIVeJ3H5Hfpf93Oy
UnEat3peS0PscCfTVuKckY8+z2EgjUCGYp5+tKzkalqOx7dePaDZ3XqjJJVb
0YFGbVR8p4zF7jSyx9KFCFBHxcSxI96frMlETCen9LvxmnD2/RWlBlnz2VYJ
HMAGVseb9EBonLYzkQx3rgJAhYMfrwYP0XvGkm/wcHGfRnx99u7kr+cfPl2J
cCexdW3J4LQqtS+2vMuhqWTtyuxTyWHOwWbUz5r9kSU3iD0IUw3b63iFk/Ns
sW4KMQzCyxi+b1HJh/laQ9pQDa5kt71ZR5Vh2OmQ7DWA7XnTJ77TkvrNX35A
p+4NYc0teGuSBvCbIYAlCRPVTvI1fI2pTpi8QryDUdVsbGRovaENk9lr7Qvi
kwgln72u4QiSbBAHkH0KqT/82ZGRnb1btZ0Ky4uixD8vVoLi0M4kZPz3rOlB
lBIUVvNNqoTJtYxD3/MLCQNa091dPcj+0nBNLMmTZop5VVcFRndPs1O6jx1Y
7XTOn6Bdv0NPtkU+yC5gBRHZ/1JJU8KzsiB2ee9w636p5xX9854E7SC7obev
s4/5qlQ45QXuJ9FPUhTRhmydck9EVopREAAynfZAGuqp/BcyFmdozwdILEtK
Fp1crZt0EvbncF6Rw+ZtILIFpUI6+5n05DIApLjuEqZAOH5xiZ2bgrGImJe1
ts0v6d6tEKLjBo2tlOdY4Y2kKOMUVTIeYLTz/wH/MWw0/OQAAA==

-->

</rfc>
