<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.39 (Ruby 3.2.2) -->
<?rfc tocindent="yes"?>
<?rfc strict="yes"?>
<?rfc compact="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-nottingham-avoiding-internet-centralization-12" category="info" submissionType="independent" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.17.4 -->
  <front>
    <title abbrev="Internet Centralization and Standards">Centralization, Decentralization, and Internet Standards</title>
    <seriesInfo name="Internet-Draft" value="draft-nottingham-avoiding-internet-centralization-12"/>
    <author initials="M." surname="Nottingham" fullname="Mark Nottingham">
      <organization/>
      <address>
        <postal>
          <postalLine>Prahran</postalLine>
          <postalLine>Australia</postalLine>
        </postal>
        <email>mnot@mnot.net</email>
        <uri>https://www.mnot.net/</uri>
      </address>
    </author>
    <date/>
    <area>General</area>
    <keyword>governance</keyword>
    <abstract>
      <?line 316?>

<t>This document discusses aspects of centralization that relate to Internet standards efforts. It argues that while standards bodies have little ability to prevent many forms of centralization, they can still make contributions that improve the Internet.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-nottingham-avoiding-internet-centralization/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/mnot/avoiding-internet-centralization"/>.</t>
    </note>
  </front>
  <middle>
    <?line 321?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>One of the Internet's defining features is its lack of any single point of technical, political, or economic control. Arguably, that property assisted the Internet's early adoption and broad reach: because permission is not required to connect to, deploy an application on, or use the Internet for a particular purpose, it can meet diverse needs and be deployed in many different environments.</t>
      <t>Although maintaining that state of affairs remains a widely espoused goal, consistently preserving it across the range of services and applications that people see as "the Internet" has proven elusive. Whereas early services like NNTP and e-mail had multiple, interoperable operators, many contemporary platforms for content and services are operated by single, commercial entities without any interoperable alternative -- to the point where some have become so well-known and important to people's experiences that they are commonly mistaken for the Internet itself.<xref target="FB-INTERNET"/></t>
      <t>These difficulties call into question what role architectural design -- in particular, that overseen by open standards bodies such as the IETF -- can and should play in controlling centralization on the Internet.</t>
      <t>This document argues that while decentralized technical standards may be necessary to avoid centralization of Internet functions, they are not sufficient to achieve that goal because centralization is often caused by non-technical factors outside their control. That said, there are still meaningful contributions that standards bodies can make, such as assisting those who have similar goals and greater ability to control those factors.</t>
      <t>Although this document has been discussed widely in the IETF community (see <xref target="acks"/>), it represents the views of the author, not community consensus. Its primary audience is the engineers who design and standardize Internet protocols. Designers of proprietary protocols and applications can benefit from considering these issues, especially if they intend their work to be considered for eventual standardization. Policymakers can use this document to help characterise abuses that involve centralized protocols and applications and evaluate proposed remedies for them.</t>
      <t><xref target="centralization"/> defines centralization, explains why it is often undesirable but sometimes beneficial, and surveys how it occurs on the Internet. <xref target="decentralization"/> explores decentralization and highlights some relevant strategies, along with their limitations. Then, <xref target="considerations"/> makes recommendations about the role that Internet standards can play in controlling centralization. <xref target="conclude"/> concludes by identifying areas for future work.</t>
    </section>
    <section anchor="centralization">
      <name>Centralization</name>
      <t>For the purposes of this document, "centralization" is the state of affairs where a single entity or a small group of them can observe, capture, control, or extract rent from the operation or use of an Internet function exclusively.</t>
      <t>Here, "entity" could be a person, group, or corporation. An organization might be subject to governance that mitigates centralization risk (see <xref target="multi"/>), but that organisation is still a centralizing entity.</t>
      <t>"Internet function" is used broadly in this document. Most directly, it might be an enabling protocol already defined by standards, such as IP <xref target="RFC791"/>, BGP <xref target="RFC4271"/>, TCP <xref target="RFC793"/>, or HTTP <xref target="HTTP"/>. It might also be a proposal for a new enabling protocol, or an extension to an existing one.</t>
      <t>Because people's experiences are not limited to standards-defined protocols and applications, this document also considers centralization in functions built on top of standards -- for example, social networking, file sharing, financial services, and news dissemination. Likewise, the networking equipment, hardware, operating systems, and software that act as enabling technologies can also impact centralization. The supply of Internet connectivity to end users in a particular area or situation can exhibit centralization, as can the supply of transit between networks (so called "Tier 1" networks).</t>
      <t>This definition does not capture all types of centralization. Notably, technical centralization (where, for example, a machine or network link is a single point of failure) is relatively well-understood by engineers, and can be mitigated, typically by distributing a function across multiple components. As we will see, these techniques might address that type of centralization while failing to prevent control of the function falling into few hands. A failure because of a cut cable, power outage, or failed server is well-understood by the technical community, but qualitatively different from the issues encountered when a core Internet function has a gatekeeper.</t>
      <t>Likewise, political centralization (where, for example, a country is able to control how a function is supplied across the whole Internet) is equally concerning, but not considered in depth here.</t>
      <t>Even when centralization is not currently present in a function, some conditions make it more likely that centralization will emerge in the future. This document uses "centralization risk" to characterise that possibility.</t>
      <section anchor="why">
        <name>Centralization Can Be Harmful</name>
        <t>Many engineers who participate in Internet standards efforts have an inclination to prevent and counteract centralization because they see the Internet's history and architecture as incompatible with it. As a "large, heterogeneous collection of interconnected systems" <xref target="BCP95"/> the Internet is often characterised as a "network of networks" whose operators relate as peers that agree to facilitate communication, rather than experiencing coercion or requiring subservience to others' requirements. This focus on independence of action is prevalent in the Internet's design -- for example, in the concept of an "autonomous system".</t>
        <t>This reluctance to countenance centralization is also rooted in the many potentially damaging effects that have been associated with centralization, including:</t>
        <ul spacing="normal">
          <li>
            <em>Power Imbalance</em>: When a third party has unavoidable access to communications, the informational and positional advantages gained allow observation of behavior (the "panopticon effect") and shaping or even denial of behavior (the "chokepoint effect") <xref target="INTERMEDIARY-INFLUENCE"/> -- capabilities that those parties (or the states that have authority over them) can use for coercive ends <xref target="INTERDEPENDENCE"/> or even to disrupt society itself. Just as good governance of states requires separation of powers <xref target="FEDERALIST-51"/>, so too does good governance of the Internet require that power (whether that be economic or political) not be consolidated in one place without appropriate checks and balances.</li>
          <li>
            <em>Limits on Innovation</em>: A party with the ability to control communication can preclude the possibility of "permissionless innovation" -- the ability to deploy new, unforeseen applications without requiring coordination with parties other than those you are communicating with.</li>
          <li>
            <em>Constraints on Competition</em>: The Internet and its users benefit from robust competition when applications and services are available from many providers -- especially when those users can build their own applications and services based upon interoperable standards. When a centralized service or platform must be used because no substitutes are suitable, it effectively becomes an essential facility, which facilitates abuse of power.</li>
          <li>
            <em>Reduced Availability</em>: Availability of the Internet (and applications and services built upon it) improves when there are many ways to obtain access. While service availability can benefit from the focused attention of a large centralized provider, that provider's failure can have a disproportionate impact on availability.</li>
          <li>
            <em>Monoculture</em>: The scale available to a centralized provider can magnify minor flaws in features to a degree that can have broad consequences. For example, a single codebase for routers elevates the impact of a bug or vulnerability; a single recommendation algorithm for content can have severe social impact. Diversity in functions' implementation leads to a more robust outcome when viewed systemically, because "progress is the outcome of a trial-and-error evolutionary process of many agents interacting freely." <xref target="POLYCENTRIC"/></li>
          <li>
            <em>Self-Reinforcement</em>: As widely noted (see, e.g., <xref target="ACCESS"/>), a centralized provider's access to data allows it the opportunity to make improvements to its offerings, while denying such access to others.</li>
        </ul>
        <t>The relationship between these harms and centralization is often complex; it is not always the case that centralization will lead to them, and when it does, there is not always a direct and simple tradeoff.</t>
        <t>For example, consider the relationship between centralization and availability. A centrally operated system might be more available because of the resources available to a larger operator, but their size creates greater impact when a fault is encountered. Decentralized systems can be more resilient in the face of some forms of failure, but less so in other ways; for example, they may be less able to react to systemic issues, and might be exposed to a larger collection of security vulnerabilities in total.</t>
        <t>This tension can be seen in areas like the cloud and mobile Internet access. If a popular cloud hosting provider were to become unavailable (whether for technical or other reasons), many people's experience of the Internet might be disrupted (especially due to the multiple dependencies that a modern Web site often has; see <xref target="DEPENDENCIES"/>). Likewise, a large mobile Internet access provider might have an outage that affects hundreds of thousands of its users, or more -- just as previous issues at large telephone companies precipitated widespread outages. <xref target="PHONE"/></t>
        <t>In both cases, the services are not technically centralized; these operators have strong incentives to have multiple redundancies in place and use various techniques to mitigate the risk of any one component failing. However, they generally do rely upon a single codebase, a limited selection of hardware, a unified control plane, and a uniform administrative practice -- each of which might precipitate a widespread failure.</t>
        <t>If there were only one provider for these services (like the telephone networks of old), they would easily be considered as centralized. However, many cloud providers offer similar services, and in most places there are multiple mobile operators available. That weakens the argument that there is a link between centralization and their availability, because the function's users can switch to other providers, or use more than one provider simultaneously; see <xref target="switch"/>.</t>
        <t>These circumstances suggest one area of inquiry when considering the relationship between centralization and availability of a given function: what barriers are there to switching to other providers (thereby making any disruptions temporary and manageable) or to using multiple providers simultaneously (to mask the failure of a single operator)?</t>
        <t>Another example of the need for nuance can be seen when evaluating competitive constraints. While making the Internet more competitive may be a motivation for many engineers, only courts (and sometimes, regulators) have the authority to define a relevant market and determine that a behavior is anti-competitive. What might be considered undesirable centralization by the technical community might not attract competition regulation. Conversely, what might attract competition regulation might not be of great concern to the technical community if other mitigations are felt to be adequate.</t>
      </section>
      <section anchor="necessary">
        <name>Centralization Can Be Helpful</name>
        <t>The potential harms of centralization listed above are widely appreciated. Less widely explored is the reliance on centralization by some protocols and applications to deliver their functionality.</t>
        <t>Often, centralization is present due to technical necessity. For example, a single, globally coordinated “source of truth” is by nature centralized -- such as in the root zone of the Domain Name System (DNS), which allows human-friendly naming to be converted into network addresses in a globally consistent fashion.</t>
        <t>Or, consider IP address allocation. Internet routing requires addresses to be allocated uniquely, but if a single government or company were to capture the addressing function, the entire Internet would be at risk of abuse by that entity. Similarly, the Web's trust model requires a Certificate Authority to serve as the root of trust for communication between browsers and servers, bringing centralization risk that needs to be considered in the design of that system.</t>
        <t>Protocols that need to solve the "rendezvous problem" to coordinate communication between two parties who are not in direct contact also require centralization. For example, chat protocols need to coordinate communication between two parties that wish to talk; while the actual communication can be direct between them (so long as the protocol facilitates that), the endpoints' mutual discovery typically requires a third party at some point. From the perspective of those two users, the rendezvous function is centralized.</t>
        <t>Even when not strictly necessary, centralization can create benefits for a function's users and for society.</t>
        <t>For example, it has long been recognised that the efficiencies that come with economies of scale can lead to concentration (and thus centralization). <xref target="SCALE"/> These efficiences can be passed on to users as higher quality products and lower costs.</t>
        <t>Complex and risky functions like financial services (e.g., credit card processing) are often centralized into relatively few, specialized organizations, where they can receive the focused attention and expertise that they require.</t>
        <t>Centralization can also provide an opportunity for beneficial controls to be imposed. <xref target="AMBITION"/> notes that "centralized structures can have virtues, such as enabling publics to focus their limited attention for oversight, or forming a power bloc capable of challenging less-accountable blocs that might emerge. Centralized structures that have earned widespread respect in recent centuries – including governments, corporations, and nonprofit organizations – have done so in no small part because of the intentional design that went into those structures."</t>
        <t>This can be seen when a function requires governance to realize common goals and protect minority interests. For example, content moderation functions impose community values that many see as a benefit. Of course, they can also be viewed as a choke point where inappropriate controls are able to be imposed.</t>
        <t>When centralization is purposefully allowed in an Internet function, protocol designers often attempt to mitigate the associated risks using technical measures such as federation (see <xref target="federation"/>) and operational governance structures (see <xref target="multi"/>). Protocols that successfully do so are often reused to avoid the considerable cost and risk of re-implementing those mitigations. For example, if a protocol requires a coordinated, global naming function, incorporating the Domain Name System is usually preferable to establishing a new system.</t>
        <t>Ultimately, deciding when centralization is beneficial is a judgment call. Some protocols cannot function without a centralized function; others might be significantly enhanced for certain use cases if a function is centralized, or might merely be more efficient. In general, though, centralization is most concerning when it is not broadly held to be necessary or beneficial, when it has no checks, balances, or other mechanisms of accountability, when it selects "favorites" which are difficult (or impossible) to displace, and when it threatens the architectural features that make the Internet successful.</t>
      </section>
    </section>
    <section anchor="decentralization">
      <name>Decentralization</name>
      <t>While the term "decentralization" has a long history of use in economics, politics, religion, and international development, Baran gave one of the first definitions relevant to computer networking, as a condition when "complete reliance upon a single point is not always required." <xref target="RAND"/></t>
      <t>Avoiding technical centralization -- while not a trivial topic -- is relatively well understood. Avoiding all forms of centralization using only technical tools (like protocol design) is considerably more difficult. Several issues are encountered.</t>
      <t>First and most critically, technical decentralization measures have at best limited effects on non-technical forms of centralization. As explored below in <xref target="techniques"/>, technical measures are better characterised as necessary but insufficient to achieve full decentralization of a function.</t>
      <t>Second, decentralizing a function requires overcoming challenges that centralized ones do not face. A decentralized function can be more difficult to adapt to user needs (for example, introducing new features, or experimenting with user interface) because doing so often requires coordination between many different actors. <xref target="MOXIE"/> Economies of scale are more available to centralized functions, as is data that can be used to refine a function's design. All of these factors make centralized solutions more attractive to service providers, and in some cases can make a decentralized solution uneconomic.</t>
      <t>Third, identifying which aspects of a function to decentralize can be difficult, both because there are often many interactions between different types and sources of centralization, and because centralization sometimes only becomes clear after the function is deployed at scale.</t>
      <t>Indeed, efforts to decentralize often have the effect of merely shifting centralization to a different place -- for example, in its governance, implementation, deployment, or in ancillary functions. In other words, "decentralized technology alone does not guarantee decentralized outcomes." <xref target="SCHNEIDER"/></t>
      <t>For example, the Web was envisioned and widely held to be a decentralizing force in its early life. Its potential as an enabler of centralization only became apparent when large sites successfully leveraged network effects for dominance of social networking, marketplaces, and similar functions.</t>
      <t>Fourth, different parties might have good-faith differences on what "sufficiently decentralized" means based upon their beliefs, perceptions and goals. Just as centralization is a continuum, so is decentralization, and not everyone agrees what the "right" level or type is, how to weigh different forms of centralization against each other, or how to weigh potential centralization against other architectural goals (such as security or privacy).</t>
      <t>These tensions can be seen, for example, in the DNS. While some aspects of the system are decentralized -- for example, the distribution of the lookup function to local servers that users have the option to override -- an essentially centralized aspect of the DNS is its operation as a name space: a single, global "source of truth" with inherent (if beneficial) centralization in its management. ICANN mitigates the associated risk through multi-stakeholder governance (see <xref target="multi"/>). While many believe that this arrangement is sufficient and might even have desirable qualities (such as the ability to impose community standards over the operation of the name space), others reject ICANN's oversight of the DNS as illegitimate, favoring decentralization based upon distributed consensus protocols rather than human governance. <xref target="MUSIANI"/></t>
      <t>Fifth, decentralization unavoidably involves adjustments to the power relationships between protocol participants, especially when it opens up the possibility of centralization elsewhere. As Schneider notes in <xref target="AMBITION"/>, decentralization "appears to operate as a rhetorical strategy that directs attention toward some aspects of a proposed social order and away from others", so "we cannot accept technology as a substitute for taking social, cultural, and political considerations seriously." Or, more bluntly, "without governance mechanisms in place, nodes may collude, people may lie to each other, markets can be rigged, and there can be significant cost to people entering and exiting markets." <xref target="PERSPECTIVE"/></t>
      <t>For example, while blockchain-based cryptocurrencies purport to address the centralization inherent in traditional currencies through technical means, many exhibit considerable concentration of power due to voting/mining power, distribution of funds, and diversity of codebase. <xref target="BITCOIN"/> Over-reliance on technical measures also brings an opportunity for latent, informal power structures that have their own risks -- including centralization. <xref target="STRUCTURELESS"/></t>
      <t>Overall, decentralizing a function requires considerable work, is inherently political, and involves a large degree of uncertainty about the outcome. If one considers decentralization as a larger social goal (in the spirit of how the term is used in other, non-computing contexts), merely rearranging technical functions may lead to frustration. "A distributed network does not automatically yield an egalitarian, equitable or just social, economic, political landscape." <xref target="PERSPECTIVE"/></t>
      <section anchor="techniques">
        <name>Decentralization Strategies</name>
        <t>Despite the inherent issues in achieving decentralization through solely technical means, a few technical strategies are sometimes promoted as addressing other forms of centralization. This section examines some, along with their limitations.</t>
        <section anchor="federation">
          <name>Federation</name>
          <t>Protocol designers often attempt to address centralization through federation: designing a function in a way that uses independent instances who maintain connectivity and interoperability to provide a single, cohesive service. Federation promises to allow users to choose the instance they associate with and accommodates substitution of one instance for another, lowering switching costs.</t>
          <t>However, federation alone is insufficient to prevent or mitigate centralization of a function, because non-technical factors can create pressure to use a central solution.</t>
          <t>For example, the e-mail suite of protocols needs to route messages to a user even when that user changes network locations or becomes disconnected for a long period. To facilitate this, SMTP <xref target="RFC5321"/> defines a specific role for routing users' messages, the Message Transfer Agent (MTA). By allowing anyone to deploy an MTA and defining rules for interconnecting them, the protocol avoids a requirement for a single, central server in that role; users can (and often do) choose to delegate it to someone else, or can run their own MTA.</t>
          <t>Running one's own MTA has become considerably more onerous over the years, due in part to the increasingly complex mechanisms introduced to fight unwanted commercial e-mail.  These costs create an incentive to delegate one's MTA to a third party who has the appropriate expertise and resources, contributing to market concentration. <xref target="DELIVERABILITY"/></t>
          <t>Additionally, the measures that MTAs use to identify unwanted commercial e-mail are often site-specific. Because large MTAs handle so many more addresses, there is a power imbalance with smaller ones; if a large MTA decides that e-mail from a small one is unwanted, there is significant impact on its ability to function, and little recourse.</t>
          <t>XMPP <xref target="RFC6120"/> is a chat protocol that demonstrates another issue with federation: the voluntary nature of technical standards. Like e-mail, XMPP is federated to facilitate rendezvous of users from different systems - if they allow it.</t>
          <t>While some XMPP deployments do support truly federated messaging (i.e., a person using service A can interoperably chat with someone using service B), many of the largest do not. Because federation is voluntary, some operators captured their users into a single service, deliberately denying them the benefits of global interoperability.</t>
          <t>The examples above illustrate that, while federation can create the conditions necessary for a function to be decentralized, it does not guarantee that outcome.</t>
        </section>
        <section anchor="distributed">
          <name>Distributed Consensus</name>
          <t>Increasingly, distributed consensus technologies (such as the blockchain) are touted as a solution to centralization. A complete survey of this rapidly changing area is beyond the scope of this document, but we can generalize about its properties.</t>
          <t>These techniques attempt to avoid centralization by distributing functions to members of a sometimes large pool of protocol participants. They typically guarantee proper performance of a function using cryptographic techniques (often, an append-only transaction ledger). A particular task's assignment to a node for handling usually cannot be predicted or controlled.</t>
          <t>Sybil attacks (where a party or coordinated parties cheaply create enough protocol participants to affect how consensus is judged) are a major concern for these protocols. They encourage diversity in the pool of participants using indirect techniques, such as proof-of-work (where each participant has to show a significant consumption of resources) or proof-of-stake (where each participant has some other incentive to execute correctly).</t>
          <t>Even when distributed consensus is used for all technical functions of a service, some coordination is still necessary -- whether that is through governance of the function itself, creation of shared implementations, or documentation of shared wire protocols. That suggests a path for centralization, just of an indirect nature. For example, the Ethereum "merge" demonstrated that the blockchain could address environmental concerns, but only through coordinated community effort and governance. <xref target="ETHEREUM"/></t>
          <t>Furthermore, a protocol or an application can use distributed consensus for some functions, but still be centralized elsewhere -- either because those functions cannot be decentralized (most commonly, rendezvous and global naming; see <xref target="necessary"/>) or because the designer has chosen not to because of the associated costs and lost opportunities.</t>
          <t>These potential shortcomings do not rule out the use of distributed consensus technologies in every instance, but they do merit caution against uncritically relying upon these technologies to avoid or mitigate centralization.</t>
        </section>
        <section anchor="multi">
          <name>Operational Governance</name>
          <t>Sometimes technologists attempt to mitigate centralization by incorporating a governance mechanism into a protocol's operation. Often, this is through the establishment of a multi-stakeholder body: an institution that includes representatives of the different kinds of parties that are affected by the system's operation ("stakeholders") in an attempt to make well-reasoned, legitimate, and authoritative decisions.</t>
          <t>The most widely studied example of this technique is the governance of the DNS name space, which as a “single source of truth” exhibits centralization. The associated risk is managed through administration by <eref target="https://www.icann.org/resources/pages/governance/governance-en">the Internet Corporation for Assigned Names and Numbers (ICANN)</eref>, a global multi-stakeholder body with representation from end users, governments, operators, and others.</t>
          <t>Another example is the governance of the Web's trust model, implemented by Web browsers as relying parties and Certificate Authorities as trust anchors. To promote the operational and security requirements necessary to provide the desired properties, the <eref target="https://cabforum.org">CA/Browser Forum</eref> was established as an oversight body that involves both parties as stakeholders.</t>
          <t>These examples are notable in that the governance mechanism is not specified in the protocol documents directly; rather, they are layered on operationally, but in a manner that takes advantage of protocol features that enable the imposition of governance.</t>
          <t>Governance in this manner is suited to very limited functions like the examples above. Even then, setup and ongoing operation of a governance mechanism is not trivial, and their legitimacy may be difficult to establish and maintain (see, e.g., <xref target="MULTISTAKEHOLDER"/>); by their nature, they are vulnerable to capture by the interests that are being governed.</t>
        </section>
      </section>
    </section>
    <section anchor="considerations">
      <name>What Can Internet Standards Do?</name>
      <t>Given the limits of decentralization techniques like federation and distributed consensus, the voluntary nature of standards compliance, and the powerful forces that can drive centralization, it is reasonable to ask what standards efforts like those at the IETF can do to accommodate helpful centralization while avoiding the associated harms -- while acknowledging that the distinction itself is a judgment call, and inherently political.</t>
      <t>The subsections below suggest a few concrete, meaningful steps that standards bodies can take.</t>
      <section anchor="legitimate">
        <name>Bolster Legitimacy</name>
        <t>Where technical standards have only limited ability to control centralization of the Internet, legal standards (whether regulation, legislation, or case law) show more promise, and are actively being considered and implemented in various jurisdictions. However, regulating the Internet is risky without a firm grounding in the effects on the architecture, informed by a technical viewpoint.</t>
        <t>That viewpoint can and should be provided by the Internet standards community. To effectively do so, its institutions must be seen as legitimate by the relevant parties -- for example, competition regulators. If the IETF is perceived as representing or being controlled by "big tech" concerns or only US-based companies, its ability to guide decisions that affect the Internet will be diminished considerably.</t>
        <t>The IETF already has features that arguably provide considerable legitimacy; for example, open participation and representation by individuals rather than companies both enhance input legitimacy; a well-defined process with multiple layers of appeals and transparency contributes to throughput legitimacy, and a long history of successful Internet standards provides perhaps the strongest source of legitimacy for the IETF -- its output.</t>
        <t>However, it is also widely recognized the considerable costs (not just financial) involved in successfully participating in the IETF have a tendency to favour larger companies over smaller concerns. Additionally, the specialised and highly technical nature of the work creates barriers to entry for non-technical stakeholders. These factors have the potential to reduce the legitimacy of the IETF's decisions, at least in some eyes.</t>
        <t>Efforts to address these shortcomings are ongoing; see, for example, <xref target="RFC8890"/>. Overall, bolstering the legitimacy of the organization should be seen as a continuous effort.</t>
        <t>When engaging in external efforts, the IETF community (especially, its leadership) should keep firmly in mind that its voice is most authoritative when focused on technical and architectural impact.</t>
      </section>
      <section anchor="target">
        <name>Focus Discussion of Centralization</name>
        <t>Centralization and decentralization are increasingly being raised in technical standards discussions. Any claim needs to be critically evaluated: as discussed in <xref target="centralization"/>, not all centralization is automatically harmful, and per <xref target="decentralization"/>, decentralization techniques do not automatically address all centralization harms -- and they may bring their own risks.</t>
        <t>However, standards participants rarely have the expertise or information available to completely evaluate those claims, because the analysis involves not only technical factors, but also economic, social, commercial, and legal aspects. For example, economies of scale can cause concentration due to the associated efficiencies <xref target="SCALE"/>, and so determining whether that concentration is appropriate requires a detailed economic analysis that is not in scope for a technical standards body. Furthermore, claims of centralization may have other motivations; in particular, they can be proxies for power struggles between actors with competing interests, and a claim of centralization might be used to deny market participants and (perhaps more importantly) users the benefits of standardization.</t>
        <t>Therefore, approaches like requiring a "Centralization Considerations" section in drafts, gatekeeping publication on a centralization review, or committing significant resources to searching for centralization in protocols are unlikely to improve the Internet.</t>
        <t>Similarly, refusing to standardize a protocol because it does not actively prevent all forms of centralization ignores the very limited power that standards efforts have to do so. Almost all existing Internet protocols -- including IP, TCP, HTTP, and DNS -- fail to prevent all forms of centralization. While the imprimatur of an Internet Standard is not without value, merely withholding it cannot prevent these sources of centralization.</t>
        <t>Discussions should thus be very focused and limited, and any proposals for decentralization should be detailed, so their full effects can be evaluated. <xref target="SCHNEIDER"/> implores that proposals to decentralize be "really, really clear about what particular features of a system a given design seeks to decentralize" and promotes borrowing remedies from more traditional governance systems, such as separation of powers and accountability.</t>
        <t>When evaluating claims that a given proposal is centralized, the context of those statements should be examined for presuppositions, assumptions, and omissions. One framework for critical interrogations is offered by <xref target="BACCHI"/>, which can be adapted for centralization-related discussions:</t>
        <ol spacing="normal" type="1"><li>What is the nature of the centralization that is represented as being problematic?</li>
          <li>What deep-seated presuppositions or assumptions (conceptual logics) underlie this representation of the "problem"?</li>
          <li>How has this representation of the problem come about?</li>
          <li>What is left unproblematic in this problem representation? Where are the silences? Can the "problem" be conceptualized differently?</li>
          <li>What effects are produced by this representation of the "problem"?</li>
          <li>How and where has this representation of the "problem" been produced, disseminated, and defended? How has it been and/or how can it be disrupted and replaced?</li>
        </ol>
      </section>
      <section anchor="up">
        <name>Target Proprietary Functions</name>
        <t>Functions that are currently only available from proprietary providers are ripe for standardisation efforts. That might include large-scale protocols for existing proprietary functions (e.g., chat) as well as smaller efforts to improve interoperability and portability of specific features that are often used to lock users into a platform; for example, a format for lists of contacts in a social network.</t>
        <t>A common objection to this approach is that adoption is voluntary; there are no "standards police" to mandate their use or enforce correct implementation. For example, specifications like <xref target="ACTIVITYSTREAMS"/>) were available for some time without being used in a federated manner by commercial social networking providers.</t>
        <t>That objection ignores that while standards aren't mandatory, legal regulation is. Legal mandates for interoperability are increasingly proposed by policymakers as a remedy for competition issues (see, e.g., <xref target="DMA"/>). This appetite for regulation presents an opportunity for new specifications to decentralize these functions, backed by a legal mandate in combination with changing norms and the resulting market forces <xref target="NEW-CHICAGO"/>.</t>
        <t>That opportunity also presents a risk, if the resulting legal regulation is at odds with the Internet architecture. Successfully creating standards that work in concert with legal regulation presents many potential pitfalls, and will require improved and new capabilities (especially liaison), and considerable effort. If the Internet community does not make that effort, it is likely that regulators will turn to other sources for interoperability specifications.</t>
      </section>
      <section anchor="switch">
        <name>Enable Switching</name>
        <t>The ability to switch between different function providers is a core mechanism to control centralization. If users are unable to switch, they cannot exercise choice or fully realize the value of their efforts; for example, "learning to use a vendor's product takes time, and the skill may not be fully transferrable to a competitor's product if there is inadequate standardization."<xref target="SWITCHING"/></t>
        <t>Therefore, standards should have an explicit goal of facilitating users' switching between implementations and deployments of the functions they define or enable.</t>
        <t>One necessary condition for switching is the availability of alternatives; breadth and diversity of implementation and deployment are required. For example, if there is only a single implementation of a protocol, applications that use it are vulnerable to the control it has over their operation. Even Open Source projects can be an issue in this regard if there are factors that make forking difficult (for example, the cost of maintaining that fork). <xref section="2.1" sectionFormat="of" target="RFC5218"/> explores some factors in protocol design that encourage diversity of implementation.</t>
        <t>The cost of substituting an alternative implementation or deployment by users is another important factor to consider. This includes minimizing the amount of time, resources, expertise, coordination, loss of functionality, and effort required to use a different provider or implementation -- with the implication that the standard needs to be functionally complete and specified precisely enough to allow substitution.</t>
        <t>These goals of completeness and diversity are sometimes in tension. If a standard becomes extremely complex, it may discourage implementation diversity because the cost of a complete implementation is too high (consider: Web browsers). On the other hand, if the specification is too simple, it may not enable easy switching, especially if proprietary extensions are necessary to complete it (see <xref target="evolution"/>).</t>
        <t>One objection to protocols that enable easy switching is that they reduce the incentives for implementation by commercial vendors. While a completely commoditized protocol might not allow implementations to differentiate themselves, they provide opportunities for specialization and improvement elsewhere in the value chain <xref target="ATTRACTIVE-PROFITS"/>. Well-timed standards efforts leverage these forces to focus proprietary interests on top of open technology, rather than as a replacement for it.</t>
      </section>
      <section anchor="intermediation">
        <name>Control Delegation of Power</name>
        <t>Some functions might see substantial benefits if they are provided by a third party in communication. Adding a new party to communication can improve:</t>
        <ul spacing="normal">
          <li>
            <em>Efficiency</em>: Many functions on the Internet are more efficient when performed at a higher scale. For example, a content delivery network can offer services at a fraction of the financial and environmental cost that someone serving content themselves would otherwise pay, because of the scale they operate at. Likewise, a two-sided market platform can introduce sizeable efficiencies over pair-wise buyer/seller trading <xref target="CIRCULAR-CONUNDRUM"/>.</li>
          <li>
            <em>Simplicity</em>: Completely disintermediating communication can shift the burden of functions onto endpoints. This can cause increased cognitive load for users; for example, compare commercial social networking platforms with self-hosted efforts.</li>
          <li>
            <em>Specialization</em>: Having a function consolidated into a few hands can improve outcomes because of the resulting specialization. For example, services overseen by professional administrators are often seen to have a better security posture and improved availability.</li>
          <li>
            <em>Privacy</em>: For some functions, user privacy can be improved by consolidating their activity to prevent individual behaviors from being discriminated from each other.<xref target="MIX"/> Introduction of a third party can also enforce functional boundaries -- for example, to reduce the need for users to trust potentially malicious endpoints, as seen in the so-called "oblivious" protocols (e.g., <xref target="RFC9230"/>) that allow end users to hide their identity from services, while still accessing them.</li>
        </ul>
        <t>However, if that new party is able to make their participation "sticky" -- for example, by leveraging their position in the network to require use of an intermediary, by exploiting their access to data, or by making it difficult to switch to another provider of the function -- there is a risk of centralization.</t>
        <t>Most often, third parties are added to functions as "intermediaries" or in designated "agent" roles. Designing such functions with thoughtful constraints on these roles can prevent at least the most egregious abuses of such power.</t>
        <t>When adding new parties to communication into a protocol, two guidelines have proven useful: first, third parties should only be interposed into communication when at least one of the primary parties takes a positive action to do so. Second, these parties should have their ability to observe or control communication limited to what is necessary to perform their intended function.</t>
        <t>For example, early deployments of HTTP allowed intermediaries to be interposed by the network without knowledge of the endpoints, and those intermediaries could see and change the full content of traffic by default -- even when they are only intended to perform basic functions such as caching. Because of the introduction of HTTPS and the CONNECT method (see <xref section="9.3.6" sectionFormat="of" target="HTTP"/>), combined with efforts to encourage its adoption, those intermediaries are now required to be explicitly interposed by one endpoint, and they only have access to basic routing information.</t>
        <t>See <xref target="I-D.thomson-tmi"/> for more guidance on protocol intermediation.</t>
        <t>The term "intermediary" is also used (often in legal and regulatory contexts) more broadly than it has been in protocol design; for example, an auction Web site intermediates between buyers and sellers is considered an intermediary, even though it is not formally an intermediary in HTTP (see <xref section="3.7" sectionFormat="of" target="HTTP"/>). Protocol designers can address the centralization associated with this kind of intermediation by standardising the function, rather than restricting the capabilities of the underlying protocols; see <xref target="up"/>.</t>
      </section>
      <section anchor="network">
        <name>Enforce Boundaries</name>
        <t>Most Internet protocols and applications depend on other, "lower-layer" functions and their implementations. The features, deployment, and operation of these dependencies can surface centralization into functions and applications built "on top" of them.</t>
        <t>For example, application protocols require a network to function, and therefore a degree of power over communication is available to the network provider. They might block access to, slow down, or change the content of a specific service for financial, political, operational, or criminal reasons, creating a disincentive (or even removing the ability) to use a specific provider of a function. By selectively hindering the use of some services but not others, network interventions can be composed to create pressure to use those other services -- intentionally or not.</t>
        <t>Techniques like encryption can discourage such centralization by enforcing such boundaries. When the number of parties who have access to the content of communication is limited, other parties who handle it but are not party to it can be prevented from interfering with and observing it. Although those parties might still prevent communication, encryption also makes it more difficult to discriminate a target from other users' traffic.</t>
      </section>
      <section anchor="evolution">
        <name>Consider Extensibility Carefully</name>
        <t>The Internet's ability to evolve is critical, allowing it to meet new requirements and adapt to new conditions without requiring a “flag day” to upgrade implementations. Typically, functions accommodate evolution by defining extension interfaces, which allow optional features to be added or change over time in an interoperable fashion.</t>
        <t>However, these interfaces can also be leveraged by a powerful entity if they can change the target for meaningful interoperability by adding proprietary extensions to a standard. This is especially true when the core standard does not itself provide sufficient utility on its own.</t>
        <t>For example, the SOAP protocol's <xref target="SOAP"/> extreme flexibility and failure to provide significant standalone value allowed vendors to require use of their preferred extensions, favoring those who had more market power.</t>
        <t>Therefore, standards efforts should focus on providing concrete utility to the majority of their users as published, rather than being a “framework” where interoperability is not immediately available. Internet functions should not make every aspect of their operation extensible; boundaries between modules should be designed in a way that allows evolution, while still offering meaningful functionality.</t>
        <t>Beyond allowing evolution, well-considered interfaces can also aid decentralization efforts. The structural boundaries that emerge between the sub-modules of the function -- as well as those with adjacent functions -- provide touchpoints for interoperability and an opportunity for substitution of providers.</t>
        <t>In particular, if the interfaces of a function are well-defined and stable, there is an opportunity to use different providers for that function. When those interfaces are open standards, change control resides with the Internet community instead of remaining in proprietary hands, further enhancing stability and enabling (but not ensuring) decentralization.</t>
      </section>
    </section>
    <section anchor="conclude">
      <name>Future Work</name>
      <t>This document has argued that while standards bodies have little means of effectively controlling or preventing centralization on the Internet through protocol design, there are still concrete and useful steps they can take to improve the Internet.</t>
      <t>Those steps might be elaborated upon and extended in future work; doubtless there is more that can be done. New decentralization techniques might be identified and examined; what we learn from relationships with other, more effective regulators in this space can be documented.</t>
      <t>Some have suggested creating a how-to guide or checklist for dealing with centralization. Because centralization is so contextual and so varied in how it manifests, this might best be attempted within very limited areas; for example, for a particular type of function, or a function at a particular layer.</t>
      <t>The nature of centralization also deserves further study; in particular, its causes. While there is much commentary on factors like network effects and switching costs, other aspects such as behavioural, cognitive, and social and economic factors have received comparatively little attention, although that is changing (e.g., <xref target="BEHAVIOUR"/>).</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document does not have a direct security impact on Internet protocols. That said, failure to consider centralization might cause a myriad of security issues; see <xref target="why"/> for a preliminary discussion.</t>
    </section>
  </middle>
  <back>
    <displayreference target="RAND" to="Baran"/>
    <displayreference target="INTERMEDIARY-INFLUENCE" to="Judge"/>
    <displayreference target="INTERDEPENDENCE" to="FarrellH"/>
    <displayreference target="MOXIE" to="Marlinspike"/>
    <displayreference target="MULTISTAKEHOLDER" to="Palladino"/>
    <displayreference target="NEW-CHICAGO" to="Lessig"/>
    <displayreference target="POLYCENTRIC" to="Aligia"/>
    <displayreference target="ACCESS" to="Abrahamson"/>
    <displayreference target="MIX" to="Chaum"/>
    <displayreference target="FEDERALIST-51" to="Madison"/>
    <displayreference target="ATTRACTIVE-PROFITS" to="Christensen"/>
    <displayreference target="CIRCULAR-CONUNDRUM" to="Spulber"/>
    <displayreference target="AMBITION" to="Schneider2"/>
    <displayreference target="BITCOIN" to="Makarov"/>
    <displayreference target="PERSPECTIVE" to="Bodo"/>
    <displayreference target="MUSIANI" to="Musiani"/>
    <displayreference target="STRUCTURELESS" to="Freeman"/>
    <displayreference target="SCHNEIDER" to="Schneider1"/>
    <displayreference target="BACCHI" to="Bacchi"/>
    <displayreference target="FB-INTERNET" to="Komaitis"/>
    <displayreference target="DEPENDENCIES" to="Kashaf"/>
    <displayreference target="BEHAVIOUR" to="Fletcher"/>
    <displayreference target="DELIVERABILITY" to="Holzbauer"/>
    <displayreference target="SWITCHING" to="FarrellJ"/>
    <displayreference target="SCALE" to="Demsetz"/>
    <references>
      <name>Informative References</name>
      <reference anchor="RAND" target="https://www.rand.org/pubs/research_memoranda/RM3420.html">
        <front>
          <title>On Distributed Communications: Introduction to Distributed Communications Networks</title>
          <author initials="P." surname="Baran" fullname="Paul Baran">
            <organization>RAND Corporation</organization>
          </author>
          <date year="1964"/>
        </front>
      </reference>
      <reference anchor="HTTP">
        <front>
          <title>HTTP Semantics</title>
          <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
          <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
          <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
          <date month="June" year="2022"/>
          <abstract>
            <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
            <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="97"/>
        <seriesInfo name="RFC" value="9110"/>
        <seriesInfo name="DOI" value="10.17487/RFC9110"/>
      </reference>
      <reference anchor="SOAP" target="https://www.w3.org/TR/2007/REC-soap12-part0-20070427/">
        <front>
          <title>SOAP Version 1.2 Part 0: Primer (Second Edition)</title>
          <author fullname="Nilo Mitra" role="editor"/>
          <author fullname="Yves Lafon" role="editor"/>
          <date day="27" month="April" year="2007"/>
        </front>
        <seriesInfo name="W3C REC" value="REC-soap12-part0-20070427"/>
        <seriesInfo name="W3C" value="REC-soap12-part0-20070427"/>
      </reference>
      <reference anchor="INTERMEDIARY-INFLUENCE" target="https://scholarship.law.columbia.edu/faculty_scholarship/1856">
        <front>
          <title>Intermediary Influence</title>
          <author initials="K." surname="Judge" fullname="Kathryn Judge">
            <organization>Columbia Law School</organization>
          </author>
          <date year="2014"/>
        </front>
        <refcontent>University of Chicago Law Review, Vol. 82, p. 573</refcontent>
      </reference>
      <reference anchor="INTERDEPENDENCE" target="https://doi.org/10.1162/ISEC_a_00351">
        <front>
          <title>Weaponized Interdependence: How Global Economic Networks Shape State Coercion</title>
          <author initials="H." surname="Farrell" fullname="Henry Farrell">
            <organization>George Washington University</organization>
          </author>
          <author initials="A. L." surname="Newman" fullname="Abraham L. Newman">
            <organization>Georgetown University</organization>
          </author>
          <date year="2019"/>
        </front>
        <refcontent>International Security, Vol. 44, No. 1, p. 42</refcontent>
      </reference>
      <reference anchor="MOXIE" target="https://signal.org/blog/the-ecosystem-is-moving/">
        <front>
          <title>Reflections: The ecosystem is moving</title>
          <author initials="M." surname="Marlinspike" fullname="Moxie Marlinspike">
            <organization>Signal</organization>
          </author>
          <date year="2016" month="May"/>
        </front>
      </reference>
      <reference anchor="MULTISTAKEHOLDER" target="https://link.springer.com/book/10.1007/978-3-030-56131-4">
        <front>
          <title>Legitimacy, Power, and Inequalities in the Multistakeholder Internet Governance</title>
          <author initials="N." surname="Palladino" fullname="Nicola Palladino">
            <organization/>
          </author>
          <author initials="N." surname="Santaniello" fullname="Nauro Santaniello">
            <organization/>
          </author>
          <date year="2020"/>
        </front>
      </reference>
      <reference anchor="NEW-CHICAGO" target="https://www.journals.uchicago.edu/doi/10.1086/468039">
        <front>
          <title>The New Chicago School</title>
          <author initials="L." surname="Lessig" fullname="Laurence Lessig">
            <organization/>
          </author>
          <date year="1998" month="June"/>
        </front>
        <refcontent>Journal of Legal Studies, Vol. 27</refcontent>
      </reference>
      <reference anchor="POLYCENTRIC" target="https://onlinelibrary.wiley.com/doi/abs/10.1111/j.1468-0491.2011.01550.x">
        <front>
          <title>Polycentricity: From Polanyi to Ostrom, and Beyond</title>
          <author initials="P. D." surname="Aligia" fullname="Paul D. Aligia">
            <organization/>
          </author>
          <author initials="V." surname="Tarko" fullname="Vlad Tarko">
            <organization/>
          </author>
          <date year="2012" month="April"/>
        </front>
        <refcontent>Governance: An International Journal of Policy, Administration, and Institutions, Vol. 25, No. 2, p. 237</refcontent>
      </reference>
      <reference anchor="ACCESS" target="https://www.yalelawjournal.org/comment/essential-data">
        <front>
          <title>Essential Data</title>
          <author initials="Z." surname="Abrahamson" fullname="Zachary Abrahamson">
            <organization/>
          </author>
          <date year="2014"/>
        </front>
        <refcontent>Yale Law Journal, Vol. 124, No. 3</refcontent>
      </reference>
      <reference anchor="DMA" target="https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A32022R1925">
        <front>
          <title>Regulation (EU) 2022/1925 of the European Parliament and of the Council of 14 September 2022 on contestable and fair markets in the digital sector and amending Directives (EU) 2019/1937 and (EU) 2020/1828 (Digital Markets Act)</title>
          <author>
            <organization>The European Parliament and the Council of the European Union</organization>
          </author>
          <date year="2022" month="September"/>
        </front>
        <refcontent>OJ L 265/1, 12.10.2022</refcontent>
      </reference>
      <reference anchor="MIX" target="https://dl.acm.org/doi/10.1145/358549.358563">
        <front>
          <title>Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms</title>
          <author initials="D. L." surname="Chaum" fullname="David L. Chaum">
            <organization/>
          </author>
          <date year="1981" month="February"/>
        </front>
        <refcontent>Communications of the ACM, Vol. 24, No. 2</refcontent>
      </reference>
      <reference anchor="FEDERALIST-51">
        <front>
          <title>The Structure of the Government Must Furnish the Proper Checks and Balances Between the Different Departments</title>
          <author initials="J." surname="Madison" fullname="James Madison">
            <organization/>
          </author>
          <date year="1788" month="February"/>
        </front>
        <refcontent>The Federalist Papers, No. 51</refcontent>
      </reference>
      <reference anchor="ATTRACTIVE-PROFITS">
        <front>
          <title>The Law of Conservation of Attractive Profits</title>
          <author initials="C." surname="Christensen" fullname="Clayton Christensen">
            <organization/>
          </author>
          <date year="2004" month="February"/>
        </front>
        <refcontent>Harvard Business Review, "Breakthrough Ideas for 2004"</refcontent>
      </reference>
      <reference anchor="ACTIVITYSTREAMS" target="https://www.w3.org/TR/2016/CR-activitystreams-core-20161215/">
        <front>
          <title>Activity Streams 2.0</title>
          <author fullname="Evan Prodromou" role="editor"/>
          <author fullname="James Snell" role="editor"/>
          <date day="15" month="December" year="2016"/>
        </front>
        <seriesInfo name="W3C CR" value="CR-activitystreams-core-20161215"/>
        <seriesInfo name="W3C" value="CR-activitystreams-core-20161215"/>
      </reference>
      <reference anchor="CIRCULAR-CONUNDRUM" target="https://wwws.law.northwestern.edu/research-faculty/clbe/workingpapers/documents/spulber_circularconundrum.pdf">
        <front>
          <title>Solving The Circular Conundrum: Communication And Coordination In Internet Markets</title>
          <author initials="D. F." surname="Spulber" fullname="Daniel F. Spulber">
            <organization/>
          </author>
          <date year="2010"/>
        </front>
        <refcontent>Northwestern University Law Review, Vol. 104, No. 2</refcontent>
      </reference>
      <reference anchor="AMBITION" target="https://osf.io/m7wyj/">
        <front>
          <title>Decentralization: an incomplete ambition</title>
          <author initials="N." surname="Schneider" fullname="Nathan Schneider">
            <organization/>
          </author>
          <date year="2019"/>
        </front>
        <refcontent>Journal of Cultural Economy, Vol. 12, No. 4</refcontent>
      </reference>
      <reference anchor="BITCOIN" target="https://www.nber.org/papers/w29396">
        <front>
          <title>Blockchain Analysis of the Bitcoin Market</title>
          <author initials="I." surname="Makarov" fullname="Igor Makarov">
            <organization>London School of Economics</organization>
          </author>
          <author initials="A." surname="Schoar" fullname="Antoinette Schoar">
            <organization>MIT Sloan School of Management</organization>
          </author>
          <date year="2021" month="October"/>
        </front>
        <refcontent>National Bureau of Economic Research, Working Paper 29396</refcontent>
      </reference>
      <reference anchor="PERSPECTIVE" target="https://doi.org/10.14763/2021.2.1563">
        <front>
          <title>Decentralization: a multidisciplinary perspective</title>
          <author initials="B." surname="Bodó" fullname="Balázs Bodó">
            <organization>University of Amsterdam</organization>
          </author>
          <author initials="J. K." surname="Brekke" fullname="Jaya Klara Brekke">
            <organization>Durham University</organization>
          </author>
          <author initials="J.-H." surname="Hoepman" fullname="Jaap-Henk Hoepman">
            <organization>Radboud University</organization>
          </author>
          <date year="2021" month="June"/>
        </front>
        <refcontent>Internet Policy Review, Vol. 10, No. 2</refcontent>
      </reference>
      <reference anchor="MUSIANI" target="https://link.springer.com/chapter/10.1057/9781137483591_4">
        <front>
          <title>Alternative Technologies as Alternative Institutions: The Case of the Domain Name System</title>
          <author initials="F." surname="Musiani" fullname="Francesca Musiani">
            <organization/>
          </author>
          <date year="2016"/>
        </front>
        <refcontent>The Turn to Infrastructure in Internet Governance</refcontent>
      </reference>
      <reference anchor="STRUCTURELESS" target="https://www.jstor.org/stable/41035187">
        <front>
          <title>The Tyranny of Structurelessness</title>
          <author initials="J." surname="Freeman" fullname="Jo Freeman">
            <organization/>
          </author>
          <date year="1972"/>
        </front>
        <refcontent>Berkeley Journal of Sociology, Vol. 17</refcontent>
      </reference>
      <reference anchor="SCHNEIDER" target="https://nathanschneider.info/articles/DecentralHacker.html">
        <front>
          <title>What to do once you admit that decentralizing everything never seems to work</title>
          <author initials="N." surname="Schneider" fullname="Nathan Schneider">
            <organization/>
          </author>
          <date year="2022" month="October"/>
        </front>
        <refcontent>Hacker Noon</refcontent>
      </reference>
      <reference anchor="BACCHI" target="https://library.oapen.org/bitstream/handle/20.500.12657/33181/560097.pdf?sequence=1#page=34">
        <front>
          <title>Introducing the ‘What’s the Problem Represented to be?’ approach</title>
          <author initials="C." surname="Bacchi" fullname="Carol Bacchi">
            <organization/>
          </author>
          <date year="2012"/>
        </front>
        <refcontent>Chapter 2, Engaging with Carol Bacchi</refcontent>
      </reference>
      <reference anchor="ETHEREUM" target="https://ethereum.org/en/upgrades/merge/">
        <front>
          <title>The Merge</title>
          <author>
            <organization>Ethereum</organization>
          </author>
          <date year="2023" month="February"/>
        </front>
      </reference>
      <reference anchor="FB-INTERNET" target="https://slate.com/technology/2021/08/facebook-internet-regulation.html">
        <front>
          <title>Regulators Seem to Think That Facebook Is the Internet</title>
          <author initials="K." surname="Komaitis" fullname="Konstantinos Komaitis">
            <organization/>
          </author>
          <date year="2021" month="August"/>
        </front>
      </reference>
      <reference anchor="DEPENDENCIES" target="https://dl.acm.org/doi/pdf/10.1145/3419394.3423664">
        <front>
          <title>Analyzing Third Party Service Dependencies in Modern Web Services: Have We Learned from the Mirai-Dyn Incident?</title>
          <author initials="A." surname="Kashaf" fullname="Aqsa Kashaf">
            <organization>Carnegie Mellon University</organization>
          </author>
          <author initials="V." surname="Sekar" fullname="Vyas Sekar">
            <organization>Carnegie Mellon University</organization>
          </author>
          <author initials="Y." surname="Agarwal" fullname="Yuvraj Agarwal">
            <organization>Carnegie Mellon University</organization>
          </author>
          <date year="2020" month="October"/>
        </front>
      </reference>
      <reference anchor="PHONE" target="https://www.washingtonpost.com/archive/politics/1991/06/27/computer-failure-paralyzes-regions-phone-service/0db94ac7-89f0-446e-ba33-c126c751b251/">
        <front>
          <title>Computer Failure Paralyzes Region's Phone Service</title>
          <author>
            <organization/>
          </author>
          <date year="1991" month="June"/>
        </front>
      </reference>
      <reference anchor="BEHAVIOUR" target="http://dx.doi.org/10.2139/ssrn.4389681">
        <front>
          <title>The Role of Behavioural Economics in Competition Policy</title>
          <author initials="A." surname="Fletcher" fullname="Amelia Fletcher">
            <organization/>
          </author>
          <date year="2023" month="March"/>
        </front>
      </reference>
      <reference anchor="DELIVERABILITY" target="https://www.usenix.org/system/files/atc22-holzbauer.pdf">
        <front>
          <title>Not that Simple: Email Delivery in the 21st Century</title>
          <author initials="F." surname="Holzbauer" fullname="Florian Holzbauer">
            <organization/>
          </author>
          <author initials="J." surname="Ullrich" fullname="Johanna Ullrich">
            <organization/>
          </author>
          <author initials="M." surname="Lindorfer" fullname="Martina Lindorfer">
            <organization/>
          </author>
          <author initials="T." surname="Fiebig" fullname="Tobias Fiebig">
            <organization/>
          </author>
          <date year="2022" month="July"/>
        </front>
      </reference>
      <reference anchor="SWITCHING" target="http://dx.doi.org/10.2307/2555402">
        <front>
          <title>Dynamic Competition with Switching Costs</title>
          <author initials="J." surname="Farrell" fullname="Joseph Farrell">
            <organization/>
          </author>
          <author initials="C." surname="Shapiro" fullname="Carl Shapiro">
            <organization/>
          </author>
          <date year="1988" month="January"/>
        </front>
        <refcontent>UC Berkeley Department of Economics Working Paper 8865</refcontent>
      </reference>
      <reference anchor="SCALE" target="https://www.jstor.org/stable/724822">
        <front>
          <title>Industry Structure, Market Rivalry, and Public Policy</title>
          <author initials="H." surname="Demsetz" fullname="Harold Demsetz">
            <organization/>
          </author>
          <date year="1973" month="April"/>
        </front>
        <refcontent>Journal of Law and Economics, Vol. 16, No. 1</refcontent>
      </reference>
      <reference anchor="RFC791">
        <front>
          <title>Internet Protocol</title>
          <author fullname="J. Postel" initials="J." surname="Postel"/>
          <date month="September" year="1981"/>
        </front>
        <seriesInfo name="STD" value="5"/>
        <seriesInfo name="RFC" value="791"/>
        <seriesInfo name="DOI" value="10.17487/RFC0791"/>
      </reference>
      <reference anchor="RFC4271">
        <front>
          <title>A Border Gateway Protocol 4 (BGP-4)</title>
          <author fullname="Y. Rekhter" initials="Y." role="editor" surname="Rekhter"/>
          <author fullname="T. Li" initials="T." role="editor" surname="Li"/>
          <author fullname="S. Hares" initials="S." role="editor" surname="Hares"/>
          <date month="January" year="2006"/>
          <abstract>
            <t>This document discusses the Border Gateway Protocol (BGP), which is an inter-Autonomous System routing protocol.</t>
            <t>The primary function of a BGP speaking system is to exchange network reachability information with other BGP systems. This network reachability information includes information on the list of Autonomous Systems (ASes) that reachability information traverses. This information is sufficient for constructing a graph of AS connectivity for this reachability from which routing loops may be pruned, and, at the AS level, some policy decisions may be enforced.</t>
            <t>BGP-4 provides a set of mechanisms for supporting Classless Inter-Domain Routing (CIDR). These mechanisms include support for advertising a set of destinations as an IP prefix, and eliminating the concept of network "class" within BGP. BGP-4 also introduces mechanisms that allow aggregation of routes, including aggregation of AS paths.</t>
            <t>This document obsoletes RFC 1771. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="4271"/>
        <seriesInfo name="DOI" value="10.17487/RFC4271"/>
      </reference>
      <reference anchor="RFC793">
        <front>
          <title>Transmission Control Protocol</title>
          <author fullname="J. Postel" initials="J." surname="Postel"/>
          <date month="September" year="1981"/>
        </front>
        <seriesInfo name="RFC" value="793"/>
        <seriesInfo name="DOI" value="10.17487/RFC0793"/>
      </reference>
      <referencegroup anchor="BCP95">
        <reference anchor="RFC3935" target="https://www.rfc-editor.org/info/rfc3935">
          <front>
            <title>A Mission Statement for the IETF</title>
            <author fullname="H. Alvestrand" initials="H." surname="Alvestrand"/>
            <date month="October" year="2004"/>
            <abstract>
              <t>This memo gives a mission statement for the IETF, tries to define the terms used in the statement sufficiently to make the mission statement understandable and useful, argues why the IETF needs a mission statement, and tries to capture some of the debate that led to this point. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="95"/>
          <seriesInfo name="RFC" value="3935"/>
          <seriesInfo name="DOI" value="10.17487/RFC3935"/>
        </reference>
      </referencegroup>
      <reference anchor="RFC5321">
        <front>
          <title>Simple Mail Transfer Protocol</title>
          <author fullname="J. Klensin" initials="J." surname="Klensin"/>
          <date month="October" year="2008"/>
          <abstract>
            <t>This document is a specification of the basic protocol for Internet electronic mail transport. It consolidates, updates, and clarifies several previous documents, making all or parts of most of them obsolete. It covers the SMTP extension mechanisms and best practices for the contemporary Internet, but does not provide details about particular extensions. Although SMTP was designed as a mail transport and delivery protocol, this specification also contains information that is important to its use as a "mail submission" protocol for "split-UA" (User Agent) mail reading systems and mobile environments. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5321"/>
        <seriesInfo name="DOI" value="10.17487/RFC5321"/>
      </reference>
      <reference anchor="RFC6120">
        <front>
          <title>Extensible Messaging and Presence Protocol (XMPP): Core</title>
          <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
          <date month="March" year="2011"/>
          <abstract>
            <t>The Extensible Messaging and Presence Protocol (XMPP) is an application profile of the Extensible Markup Language (XML) that enables the near-real-time exchange of structured yet extensible data between any two or more network entities. This document defines XMPP's core protocol methods: setup and teardown of XML streams, channel encryption, authentication, error handling, and communication primitives for messaging, network availability ("presence"), and request-response interactions. This document obsoletes RFC 3920. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6120"/>
        <seriesInfo name="DOI" value="10.17487/RFC6120"/>
      </reference>
      <reference anchor="RFC8890">
        <front>
          <title>The Internet is for End Users</title>
          <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
          <date month="August" year="2020"/>
          <abstract>
            <t>This document explains why the IAB believes that, when there is a conflict between the interests of end users of the Internet and other parties, IETF decisions should favor end users. It also explores how the IETF can more effectively achieve this.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8890"/>
        <seriesInfo name="DOI" value="10.17487/RFC8890"/>
      </reference>
      <reference anchor="RFC5218">
        <front>
          <title>What Makes for a Successful Protocol?</title>
          <author fullname="D. Thaler" initials="D." surname="Thaler"/>
          <author fullname="B. Aboba" initials="B." surname="Aboba"/>
          <date month="July" year="2008"/>
          <abstract>
            <t>The Internet community has specified a large number of protocols to date, and these protocols have achieved varying degrees of success. Based on case studies, this document attempts to ascertain factors that contribute to or hinder a protocol's success. It is hoped that these observations can serve as guidance for future protocol work. This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5218"/>
        <seriesInfo name="DOI" value="10.17487/RFC5218"/>
      </reference>
      <reference anchor="RFC9230">
        <front>
          <title>Oblivious DNS over HTTPS</title>
          <author fullname="E. Kinnear" initials="E." surname="Kinnear"/>
          <author fullname="P. McManus" initials="P." surname="McManus"/>
          <author fullname="T. Pauly" initials="T." surname="Pauly"/>
          <author fullname="T. Verma" initials="T." surname="Verma"/>
          <author fullname="C.A. Wood" initials="C.A." surname="Wood"/>
          <date month="June" year="2022"/>
          <abstract>
            <t>This document describes a protocol that allows clients to hide their IP addresses from DNS resolvers via proxying encrypted DNS over HTTPS (DoH) messages. This improves privacy of DNS operations by not allowing any one server entity to be aware of both the client IP address and the content of DNS queries and answers.</t>
            <t>This experimental protocol has been developed outside the IETF and is published here to guide implementation, ensure interoperability among implementations, and enable wide-scale experimentation.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9230"/>
        <seriesInfo name="DOI" value="10.17487/RFC9230"/>
      </reference>
      <reference anchor="I-D.thomson-tmi">
        <front>
          <title>Principles for the Involvement of Intermediaries in Internet Protocols</title>
          <author fullname="Martin Thomson" initials="M." surname="Thomson">
            <organization>Mozilla</organization>
          </author>
          <date day="8" month="September" year="2022"/>
          <abstract>
            <t>   This document proposes a set of principles for designing protocols
   with rules for intermediaries.  The goal of these principles is to
   limit the ways in which intermediaries can produce undesirable
   effects and to protect the useful functions that intermediaries
   legitimately provide.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-thomson-tmi-04"/>
      </reference>
    </references>
    <?line 628?>

<section anchor="acks">
      <name>Acknowledgements</name>
      <t>This document was born out of early discussions with Brian Trammell during our shared time on the Internet Architecture Board.</t>
      <t>Special thanks to Geoff Huston and Milton Mueller for their well-considered, thoughtful, and helpful comments.</t>
      <t>Thanks to Jari Arkko, Kristin Berdan, Richard Clayton, Christian Huitema, Mallory Knodel, Eliot Lear, John Levine, Tommy Pauly, and Martin Thomson for their comments and suggestions. Likewise, the arch-discuss@ietf.org mailing list and Decentralized Internet Infrastructure Research Group provided valuable discussion and feedback.</t>
      <t>No large language models were used in the production of this document.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA6V9624bSZbmfz1FgsairAVJ3XwvDDyyJJdVZcmGJLe7dzAo
BJlBMkvJTHZeJLMMAz3PsH92gZk3mqfoJ9lzjUtmytUzC8xUWxKZGXHixLl+
55zJZLLTZE1uXyWjE1s0lcmz302TlcU4ObXzzm9MkSbnRWOrwjbJdQM/miqt
RztmNqvs3Sv/t/hR9D338Z20nBdmDW9MK7NoJkXZNFmxXJn1xNyVWQr/nmTy
oEm8gsnB4U5qGvjq19Pjm7NvO3P4YVlW21dJVizKnZ1sU71Kmqqtm8P9/Zf7
hzumsuZV8pMtLDxl576sbpdV2W5e7dQN/GWN30vtxsJ/imbn1m7hE+mrJH6r
/31qH/rLvCzqMs/Szq8ru2zzzu+W5R3szRRzuwOrAKL8avKygD1tbb1Tr03V
/PrXtmxs/Sopyp1N9ir5l6acjxP4T0brHCd1WcHyFzX8a7uWfzRVNoc/zcv1
xsg/1vBh+FNW5Flh/3Vn584WrX21kyTLrFm1s1fJGmi/90dE39kxbbMqK/ji
BL6bwPNgaRfT5NIdHP2az/TCVLfdv5TV0hTytFf0m00JO8/530kyST5WZlWZ
gn6ely28Ho70GI4Rl2Ho13ZtspyX/M/4nymslP7QVkCiVdNs6ld7e/f391P9
697OTlFWa3jtHex6BznE/ZQkV8eXp7yANKs3uYEXvjG6hsZUS9vEj4W/pVPY
yt6mndV7la2tqearX9d2XeKfzN7VxdGTw/3pqlnn/BC5Vx+K5DTD85m1jU2T
EziYtsjmRI6aLk1Vpu2cbkpTfuezyaVtkIXhxtG66SYcvHz2hH50p0QkFdLK
qXw0bR5sr3smRAx4WbWBrdCZJ8m7m5uP8Ie3Jy8PDvbh5+sPx/Dz56OT6dXZ
yaQuzebgcLIBbt2fwF17vv/k8Dl86vzy5uzq4uz0/PjqL5Pzy7fvP51dnpx1
6Pxzmy7tIJ3r+arMTVWvss00N/fTeZm361lmpjZt9xZm3ubN9tfgQ3sHL54+
C4lNEmht08xUW/hhkbcWL5on1+H+wffIxcz9yzRYo6fiL6ZZVdui87eYkiey
4uS9uU+uYaUlMwPcUpARDdysV8mnAniwqrNmm5SL5GQF57ss6QtX9i6z9+Pk
T2U+TV4cjpPNNHn6/EgJe3r28ezydICib01V2Tx/N0jUtMyIbw/2pwcHzw73
zq/PTn41v+7vHz09iBj1szWbErZiRcqrZJzDH9+V98lPeTkzeXIGGynX2dyx
Y3K9MhuLEr6xQABbzYEUo5joL/+Q6O+muo0O2d/ZAg6z+7eY7D9Z+Nkmnw1w
RbFs4CZ5Ig++7XiavAcRZu/X/k7I+45nII3MeuDvQ+9syvvey8LDZp1IXwHa
Xds5yKtmK0f85MkYhOU0OaCTfnII37748OdzOd7e7ciW8Aw6y1leLvealZ3Y
eVlv68auJ1k9WZd3sPu96FCv7CK3c5E1NyubuG8kWZ3wN0YxN4EMB41Rb7Lb
8OYc7MMftniWz75zlqocus9w1L0ov2R26M8xca9pr0iPT+9vzq9vjn85e/fh
/enZVYfzP5o8N6C+ymjT7y2ouGxt5kDoj+W9rdR2sX9tQaM0ma1hpQkQMLkA
mQIS19xakCqprbwR85NT1DEvH+7/oby9zEBymc7ieh8ybVUm16YAIyAD1i4H
Dx3IdDutNxUck61AIK73ZmV5S5cZxO7ey+cvJkeT/aP9ydNnB0cHExRul2ef
Jyfvzk+Of/rQodZ7WwMTRaRClgA2d2KIZVa445/bwoKaefniD7f9HnaE4iJ8
T3gXRj+XbYXXAMQeHBHeh6ZN4TDkOhw+Hz2ofn/jr9bTds4rJZ0Aso1J8eLZ
3pNnL/aPUM58/PD+LydnlzdX5yed/R/n2VLsCd3/xzLfksGTzeFegiityjXw
TG6KbYbq+ANo43LN/PPGbssiDWlzDAeT4504/Md08Ok0XEP3I38CbkluwIIa
ZoWSDLk8A/lUbaf3WW63xBBIBAM2CQn4g4O936YHQIvJ/pOXB1NY2sF0/+Dp
0/3pl/55eBaHrRQdWRUcFtAjw7t0nK6zAu2TyCGogZYtSRg9x6cs1liBHR7R
sR6fnJxdX3cPhGVtXRbhoZzVNawvg3efmsYMae8hDtma3ILRIIxCYlKM4D2r
D5yk+sDBo+Jj+F9mvkL7obO4kHJ/gXeRxhYiycYPDkWgo8o+vTh+Fe7qyjkD
yeOzT7soSQ73Dl4ePkUKoyg6A3mwsaYAVgHpaHDlRGH58wkYxvOMzuPgCWiS
DcjwGQgsfE4CD6XFgSSbwdLwawuTVQn4E7e2cdIuBd4DyzupQSWUFX0M34P2
PxieFSqKO5CNsr6Dl7C+o+f0MV3yPthchy+Sx6fypAt5wfG82Q21RXeFg8dm
22qS2y9TizsHK6/dy1EsTITOe2eXezd/vtl7DTrzn07O3p/9+X8cHR/h066Q
br1T+fBz8j45fPZ0D/TpwSFIhal78+Bxxyrn5jtH0KF/dFqg/IlDLs7/3OHu
k5Vp1yELfELHam7piM5QLVdgb82Bhhlw0JVtgJfgjqUV8mvN10vp/LG2bVoW
23UdUjl5a2dVi8x68PLFwbD5l0/NfE3XQaXlwZOne0dPXzx98nKK//Ps6I9u
xKm5y1I0iPyOQrp33BQh0PHJhcoDuRV4FG/PQIkfvweVPnl60KHXBSjLjijA
Q7kGj34OtLH6ZBZbdDgX4CQmb4FuWb2iv33EU6lgoXYOlilJbZOjhKtBfDf3
1vJFOM0WC1vhE04tejHkKweUfRFQ9vmLP1Z9P8N/62gDIYFwF29tikEIkJ7A
XLDEmmlCNvjxzc3V8cnN+Z/OJh+vPrw9v+nKyZNVBV+0BYixLnVQCqEbAZS3
1R3LF/j5uEFWw+uMJFlk0e7c3sB1+2Pv8QSWgCZ1dxHhDt8ZeHcFxG5r0FF1
7VyZ0ZvKmltwnMp2uUrOU2vqBBxxejOrBdj2+c1frm+uzo4vrtnFPLma0NpB
I3OgpgaRUNkJGp8Hhwd480/Or04+vT++mpx8uPx0eXr16aJDsutNm4PwiZT9
dZmjvUt0O8kq8CdNhZRri7Rq1x1GBo2IHnhZgXTkX5wX3joUuddxc75jGupN
QlsveTuN1hcp5cuyalb3IMnhRaGv2HMQD/b1Xj1oNtXkRhfBE8ls0ujFRHzq
vTksZQ+dOaDOhrgThMW8pVuxV/NKf50LxeZKsOkmXeARXrw5vzn/cNk9gPmq
sBkw/WF0Bt2w4iu4pKCeMHCVW3AgDbjPzX/JgVRzulnBk9xbh02oejHNyr31
8/vtb3vftU9PgC5t5dzdrdPwTHLiXdj2yYfzy0jLj97k5fwWDIgMGcjk2zpz
EvFN1sxL+D3zTs/rujVVeRfs+gPoaFGfB/3dd2/p+RJuVfiQnoJ7D8ZrWYiF
j2tST74efuJx0cBqbQOHgt8x1fBjL85vkuu8NOGTL0xhlhbZ50FzrYCtcTyN
+e3+8OXRy2cD10Ht0TegAUwbrhuuA/PxOPnMvMuiNaFHIX0/nl1dfzwjydoN
9pVp+Ud8mazROYSvzLMNmN4gMHdwqRs2k6Io3DN2k4aPKmZU1Ef/+W+/17SE
//y3QVskDhEdr/HqphJO7TzuZ7M1yS9wLU0CovbWOdTxA0/bCmMaD0VF9FFm
M3lni9vkXWk3PvLRCRaadFa2afdZ3ws7PXn+7GgPaTMFq0ztjeiUnVxlV6Mr
6AI5d/Hp+vz48jy+dMe5eC6g7m4siIAyL5fo5YO2Cf8WOiusPk9M7eyK03KN
1/YSiJFcU4yke0dBuwElYsk0EA5JJkLRtxWZHnMTffWPfXyQH2A8V+zbPiU3
/+Dg6PmTF0dPXx78+qRPP9zKDZqP4LKeF4vK1M5oyoqHYhqgcz+d3Hy6Asu6
55m9raxVDgisjZst7KggrnRmWQ76HnV+eB9ePv+O3S3cVsYvGXL6a/BSiIvY
r9l7coBRyxfPewR4Y0GkgkMceq3X5TxDPnCyG792ffLu8uy8H0hyeiOKiX5e
mQZJmpbgYc1tsi3bxIATDL/EvwQJIRQ+Foi7bTACmRT4b3Cz7LrG76NqDcnz
PBTuA5RyDPQPabWCPlTrZ6aY6tgDozabw9HsOcH2zsxv4a8uQRHbb/g3uGVk
vb4BZ/1d54ppngJ3h5fl73/7P0idv//t/9ZqeMMJreHmbtC8KDB/ATuf2dfw
kcRsNlUJfnXnQr0x8/mqc5++R44T0G55+K3+VeLoSAl6oOBQKZi+ZEPuAY1S
4KHD/enTfbhX4Cg+3zs6OnhxsPf02f7+y+dozryu7V8pZ/BPB482oML+6ah/
2U74cmJ446xYmiVS5D5rVt3Vnd28O7s6U8M0DLhdWFj16Hs6PRa5Z0Dgyorn
xYR6Ehrxh0fD7rV8jehgi712s6xMCiyxxvej/fP2zYQyC5dnN/EqJVhRVjX4
8XCqcJI3wNi38F/g+7fgxGIYMjnns1f50jndX1CeNlkoGJ4lx+0SfbYHNKWm
WkA+N6ZosqKs48f0guKwSksys1G5vyVVs7f/AlNGtE6f2/QZWb0HLqlyfnbd
USpovv3O/kIGvs1HuFJbIEd1l4EoONXsiASTL8oUDfbPdqYfwaSGAaXzGQOi
Bl6fJguMLlLYOatMNjndomyeZ5jWfd0lnqlXZvFHQvT4r7UJP9rLR+F7lxhx
xwjzw2kRCUBuDZ73rTP1/n8e9pf2rjK/JcdLU92b/L/zwJ4ZvD9sacQRDrjF
Psrx5ABMwSfToyeHR88oUfrx3YfLs/icwevbtHih35osR40JB40nb9GLXcJC
f6iTj6sSzDs52Mg1ee4C5MPxF9Rj9y4vhZlv4lY0W2Gze5sS8xHzeg8fsLf/
bO/wOYYtaUHgntGCMM/KC0L+RdtlssH1TGpez95+Onv5xMyfT168XOxPnjx5
Ziczc3Q0mYOQmz9/ejA7fHqA1/3N2bvjP51/+HQVEQAl0lWZkxn0xq7MXVYG
ng+sDdkbiWQb8szERguIcIG78XLoe/y6tnlmkrfg6s1XA+oMj/PLNLAdDw+O
Xu7VNTiuT45evHwmQS5vpvgHnZ69BzP/6vjN+fvzm7/ER3xZisa+ztDNBImK
cAK4wzky3FbDo4cHNYNX2mobp0Dy7QOaOt7e27yswMwD+zn/fWZa2WDP8AFN
VJjkU55X2Xw19JEL1N7wkfcZuGzVYvg5N+Usg/v6NrMzTeoM8F4Lujj7wkYU
2bR7iwzNAtPMDw8nK12o+PIBacM9XH8GV/fd+eVPEVlBfBl0w0LeIEV4Df+d
kx10Avxed46MM7k/h/Q1BYfaMHD78nvhNqVgbTerOCccfwIkS0556azqJ1P6
THa0/3zv8OnTp0/2D3vq/tOJty59sDDynzvu54sXz56SqXn8PhY150WKoJat
t53HEgxIrrI7k1dbDvp+bGdww6J7ptQ7BYvSNr8HxOMcFFjcf3j53qF9kkaP
+Ies7ueHT14c9gkTZvPMPS3cUURN7meS4N7ZmUwmiZnVFJXc2QGNWicaYsLd
zVuMeYO/ht41RUxid5yvLxw3ggzIyRGXplZgWWIXi7Jq6mly3iSwrdbW/KX7
FTB88LlZiTnHZIW6GYRvg/mSWZajsw0PBuv1DtcEfskWI5XrgcWMUVpskznc
dPAn8xw+fGspAUPIHYqC06tB2lTgckVG0nSHibHOUjBHd3YeRRCgnZ0PhXNI
9SuggFK7yApksYU1yDg1pu/BtE1ysNzx87jcGj4Au9mUGTMomUTZHPNTomfw
n2WFIACOoNCa8aSOgWBw2NsxL3xDYXSgiKlrDPqm3fWAQQMy0aTlxkH8ZmDh
p3BEYOa/Art/bkD0JPCUdQbPgM/AgosSz/CvbVaxdwCvL+C84Z9j2OEmL7cY
DQRnIdcgLBIbFoyPCldAMWSTbMjLoTDupq1AucKFAucMD2ZtLTIW2hMW3DGb
cjZgZuVFsACQ+nTKqUsG2OIOBAalFmo4p+Mc7hLGrTEu0Bg+AKJPTWAXJPsC
82w17Ao/A+8ACZhaII2tNyWsOk2WJRIdEYIUPW/gb+QhVRSKhtWaeVXWbEiD
c72kx4pm5zUH9BC+2thygzxtLUY4RpENDoxdJ8R2RWLztgYSTMGRhQ0aPTb3
9DwDvr28vPlI77ET0oorOEWKfMErED4Iz0VmoKwV/QPdgjGTjoTBGnFjINVA
QjV8Y/B0RE7Qk/12Kn0GUGamHCtwxWqOOV/M1BJCA1VJ2TbE2fEqTBDSgZsE
jIQUYLa/x50mdbm2fMOBEfHfNTjhoCsmtwUCdnBNGS4bnQy69URQ5Osv8JLM
UsKISE03HZeNSywLoN6a8SIF7TJiSriPNl9Mv34N/Kpv31DawXkTmyGz0ubg
Jua4qzIBf7Nm1UkSDg0xMg7h8nIEGjy2bFngRoFhPcfLTS2Jw2E1QE0gUNEX
dHULxpkRT+3s5i0+CW8IHQxQGFQC6hZ8uoiDHDmzI3/LoivFYhnel7hBdARv
u8qiYIFreOsMbydQu0YOAnIQHrX38kVw89tiLmgDdzYoV+oWyZtZPlAQQpkl
yQvrwSvoJFLn0RSeB0ZN6K/ElEVZTPxywYkkPxhYsYarjS/NKi84ySGuTZbS
cipL6xGtYA1KjEWbD+mG3jmR1ALGGrsTY+HLQgdkG9C1ZKaus3WGQg83xjJi
CdcbfZhAk8kS5buyjVCqNdEBotiYISOpNk5VlIl1TLwz5xQZvOExSp+vX0H9
1N++7ZLcrTT2w8yGIVyX/GC7ZExH5R+CYtEWdUtaG8VWtkY+MAgLwoBbxk+y
xTIDGQ6ngCSQC0H8K0QEFvMcAsKvKedlDg89pY/iF2EZqNTgbjckq/QzfQmL
5zCzBSjchh12kt3g3Uvoq8Zl1S1m6C2aKyC0kEgLZkeUVIwYAC7BuB9HwdxD
MAqAGhiNjDa4DcKPU7H6kBEqXgvrvvCo4Ikrm28SxKnAscLKarRh2lovYFbc
lfldwOvw1u/smIQ/2J8tKjWkUomnDyrNEmOKnFsD73z9Gl+fb9/YMkH27ZhI
IElzUon3qy0yh7tobYEHyJIcbgTJ6ibD/DlTHQnKdnDdVnd2C6ZaeY9PKOfz
Fk+yI4mACbvIfFgWvr5EO6n7N3ryKluucvh/4DlSFRjFvkNdQOAmjEkg/iIv
NbTHx5nDtWuYZnjxLewSCCIHy7+HN+PRoUHA6KNUaTxDXUZKHkU8HdOAEYsH
/sfSeMrvnedtauGN+s8apRdFk7LFFr9lKs23L1pKBiBDogEKVmenSOProw4J
d3bein4T00qucsCI42QUf2mkF7ZnH7FaNmqikpLfJmTE1WvUhVSYIcJiTWQo
Z2g2oHFgNuwrCUHYhP1CrkRCdpuLq7FtQSqDjUayjPvKA74+Z9so3wI93ll8
/IhXNcIahJxMRYP2a43cTMujF889Tn6KqLkwpAW2AfAUfrNuZ7+xZRtUfPCp
Aw9lSyBP98okcI1vVaySAUZyddZK7IJfVDu1xUrGJHEOgrYAWxr19kyHwzoO
LXUV7MF5TpML8NdBASASDH2BrPE7AjLaAi4tvkVlCVwR4LB0K0KATTrlZa/H
zj/Cjl5fvT15/vLg27dx8uYn/cWTw+f0m5sT/5Ej/AUQGksQ4Jf4P9++kVfH
awGVV8rhkKhCHU2MVNj7/hLpUbj2LwhdkSIL+llUa1lYINcb568MGIJqYtD9
Z8/F7XKiW39Yvo474ps2oGKjxwVwKM7EgcPP8oYkXkmXwwsKMOJIj3wxa7LT
65Ks54JB+bCxcbIgvxd0hPyEPJgR+o+tcRayBSpp0Pm1XQvQZZq8B7/gPkNv
Ci+Vf2aCvtuGrz48N703eG/k0sGfOcIkD65B3OMHmHvxrqIDoufThGlaMkeR
KhmVL/WkHYYo6xZIuo1MQXEfCSiEh4KKFw6xoohl5B2iIERGqDNQukTmOfHA
Kptl3deNcZ345yZ6K3wCTgyvAsPICi1/eIynCSIMeGB0k4ENdjByf9x1djL5
7/TmtLTsCYtcS1D8NduNHYg0UJmV+OXOIu0wzGOSreOYHQyoIQzBWdy1rCbB
RDMKAdOLFEikeRf/SkEWkozsMqG+ruqmLOl6O1OMD5mNJSfT0ArebnCV8O0Z
utZSzUTayItf8XnVzaS6NbiI6HYnx6AtQFOhcANZOBaTi7ePzpKKAQZKipcG
5BsIGrEjgpsjlvPRHbWNxTh161oYVrfkmS1AnmDSENekFHJuBCqWZN7iKc6Q
4BusM0AnwSwtyRz8gmXXF/6Q1UPExHcH56pmMQt9rlXQo/BBCqfs2AqFE6Ga
OTItgRWQ8xEtN6D00MQ3CZ7TrbVwaYE5/U13EaJ/kL+kUI/4CU25wONAey04
bNRVeI0yWGAQ7ABTPverJNaj+oyc3II5/JbkFpKCnQZnQMPtTu0GzDJcGGzi
DGMdtPW+c0dfbasqiLwUDcsHXeCYbUB4QZqx2KV4Hio/pCMGSfIt81mXv5BJ
LaVT1UtiQwtFVijyyTQfDej7EdEttOM5wANEytiVQ3PtUc9cO4F798ZiSHeN
/uXXR2Blg8l2gcGS2FtiKZht0CALsSC9wCm7lozGyxXzGNwZuu7MaX0Z7e4F
OUFow3QChkAO8D+3rBx9fIMCWAz/g+cgH5G9nTUkB0wyyjFCDdrGYgBoCQ5C
2YJ0BquYq5rwHlJwSHQB3jhWQiM0KN6cfHz5FCzkOEzjXP6A7ik53MlIZSU8
V4X4COlYB8EvjUNjoI3ozBoOfHC6BuBqZ3RzrV7puSgW+DqwbEKYDmdgkHkv
ZXMoODhASuq0JROYXWF4cInfrn/QECqHKZnTFsBp5Br5iuY5Cyl3B/EcTS7c
3wsva4wpuuXyQbqOm0aM6RG48hg+xoNgWo9UywFd2nljZLnMLGz59i8m6fuq
LBu+0PgeCiluyoaLNVDomTXjK4BFKS9AhJa4Hkq6msyehmIVwDZdRZ6RXwQP
eLWz8z+TX6kWLDlfzxgS/isCfEheNpTg31CCH4VkW1AYioON8zmpmTI+TA4/
Ja6smDCKyNxwdTP9MUWfEhRCDUKXjETYFchG9mxcaGvGSdcqeYxPHG1MgVH1
OXoptO3RrsTqzIYMVo4ewJkVGadfOg+Yr8pby6rdPeDr1+HaXLgbFA7ccOAo
82FP5HiSHVgQIp4guXXhKXBUh1y5O8tRgl0XtOAoMDL2HXp8IGlkFb6QFV6v
20GYVVZX7aYhW9Y2W42nJj8jYgSOZYlqM3Cn2CBuyNumGwEMiRk6R1lSyvja
qOwA/QvgPVDCbIsNPDaSF/JwlczIQ6gT9SqTd+QyKrAdp0l3SftI8If7AzCz
I5gAvPy59UHuDUenSGj44gXhVAzbAf++R/+Dbvl5UZTMQMDEx8K5GqkYCgJG
vMtRBnDyMGggsXOnb3D7I5+2QXQfLFlfN6KAe/wOydwUCNhs8T5YCkhHISbd
pxdu8xBaT0tXbiu9kGQ2JNhdFUlTCcwwXbD4Ae59VjBxgnz0rwxvcEdJgf+m
Fi8hivJV5QzZbB4ms1fdbfSSGeYOzDySE/QQlmBVeceuHdAqCBHS43hH/H4y
nsHD03AhpSYefN3MoJZqNyTkw3SI0+RTlWdh3E++T4wpCRqwu2viS44GiOYu
SlI4BJCV3dVt1rB5m6ksYWuUsyo1OdKuWk/0HpivYHeD5+/1YM3RSXcl+diu
bNrOYQHHTEP6LrJz8GPvLj4eDF56GpG/zDRCk5Lzr7WSXuPzdEz3ZktivZxh
ak/kPJKQ3GahmgkX04sMk8GHmhdFe0N6iwWPSchu6QZgiS18ipV+BO2rvgU+
n8UqJfwxulGRKkHTjT1j9J2CJTEhL0D2zKlgwQrD13OsUPTMiTGPwcVI1mFZ
ZAvMbBXouOTmnjxol2qmb6eW7Rsyg3WhnPOlKD7jJoGAb2M/QVzNeZla5GDS
ClWJ+CawPDHqyhrF7xCpN2tJz921ObZu4b3+6B8WB1dBqy5RCa3WUeLRLbJG
MK7VCAm/ZpqcOoh9GHFBsCphhNC44qfn1qRCA/IHRFDAFiizSKyFqQ5nerL7
O3YXawTEXpKvKtFR/SptFfxjk0+Aiye2qkgZljnliSRNQdYHfJJ4FmyJgso5
2QgnQACcSr6dorkbVD5j2hE44xr05+TKkpUypz3hBas1s1OQ9fWY3Gw7XU4x
ns2FuhR6HGYZYFhvE2FBLVs1CEeQGCyyLed34BPsS/FFXHNuqCQZXKJDCzuo
xy5hWGzZ7MWwoXsFW71kYloJTsBBrbKNC8VwhACM+TWLgwdTfFRk9OVHSUeg
cjY5iwG0co16X0NeHnKBZJqlHJwOHp6ENoQm/+KnGgmlsowitsIwUmph61OO
r7uLou4tpwiGdjmQxohEAdgB8pF865Ps0uzBhXGJhb1gCMIZ/OK6bCtSbrHs
IHFWORdIw9KotWpMvs0p/1i7PKRcZolHLAxIJ3LwfaxiGnaY8m6biyjRVQO3
JM8ClwURvWT24fVx6ByRn7woMlgwlFiIIYFH8WPs15CTKtln+rxuFNErFLTX
m+xSfUhuR0Tw3ShFFpIm9klr6fQRiTDtO1E2JleXSaPSsm2ynFAbUeaG8BnE
mzmW3NAaylmWhxaNqK1zlCWbckPhTv44WBqNhMJZ1t8ji1I6ksQPejl6yM6g
pWSfC0nBD0xEXA7w467gPgbC5D1V7aglZj1KmsAaSluryA0XBkxDUDU71bBh
B6wGaW3lKoOX9mPCqZIQwQ1iK4xeqxoeJponDC9V4x8cxJP3i+O5wpJHBBHR
LsH1xbggBR/UmqSgH3EtWH2/iceCPneGjrLE6uCJvKIGVB+BeLllV4EbRos8
25DBxLl3MAFQ6vB6akz6EXwZZfs5cEuJHq+pRfrEdilKIXeMGFHzN+1HkZc+
nMFaEqvRMfKJH6U2AI2gDdzxAAGADMZh3tmFMRx1T+5MRVsNIrUo/iUyzOIF
M1wCVtO9U9hXY7RT7DSE6lru6JJbtyG74OWE/yXbrmdV0FFLdgZ8Rn8PfZbC
AL9nC4xBqk8Eyy8s32z+I5rGJuhxcYfZcFSzczpURLbhM9m6ZZ4JzkywX3Jo
IpPgmp8vRDnQ9SMIEfl/ynySXq+DE3zsLr7nE5dvgBWUeborFLqnXCXczozM
8jBMaurw2APSMnSLZIT3VUgdO2RJnCNCpBxmBunA69CQVtaQG+Z5yokWgcjc
W8RMsaZFrBADGQRhxZrTcILiO/qOFU6o9cZh4NGZcT/UgYdVExrZWRJ+yw5Z
SLeW/M3oYIAWsD1DIcd8q+KGH/ft21RxXVQXva4b7jJQt0u4qw09ibNOGKBE
p1ccwA6a5L+l69lyXGYYN9E9v2IA2cxUII8rlgJMWlRnDpHdJwNFjSo7Q41I
ST7GRJLMZriSQ/iRAqLaXjzZXaQfPA9r/peeFfyDYwLCe9AaBAnAmpx9HtqJ
3Gblnt3XOzvHBS9TdLZqF0Ry0o0pWo4rBmqTyCs4Fo4wiCt/x9dCQgTq4slu
Y51VcpjBfU+MBFRD8DOfBr5+HQXax3ytwbbBOPpjzn4KqmWsbSDhVuyyQPV4
KBdBwRwyvMXhULhxCxE8xdD3Gv8uGtGF+/DOgKyeBAuecs2i072BOAhxN93g
/YOpKHkSGbXcUiKKkAT1VNhIgbCIOQUA3CK+/7Xg+TM6ZDIgNQGkBsLQwrKF
MLJoGA4GwPEtbN4I6ApM7b8iqOn7ORSbbziH4oCIjNn0oWjxLfoJxpzB0WaG
KG98uThWGM6zHJmeUjssBwtmWFKqrmCF9TBkPfUuPWIp0Ez7DnCLWIdqWEQ0
qjAwEhz4gMbSeMAh0kSYWmGOwEwD8icGHflxsqQ+gMTuEsGD7fz9b//OngOn
yoG5//63/8AXIZ6SwgiRLwnaVMEhYtljJiD5vfTg9341dvL49PJ6V6NL4nSu
WriKkwXaoAhpwYoUlnLM/EAajrnCbzS1Y7TFDqcBg/0oRhukE4hjYGqgYBX4
ZucfXdoZXz8XzveR4pIz3S4c7V8lDMnfotuIJlIuud4skIJL396GohloHm6d
7a6gAZIh/HSKArhcJuMlmyzMAN87QFPjbTCKyM0ksSm4ISyQQv3PhQBYuzgD
XUotdckQz4OtwXWqGrCocD/JcSjOKOetkGM6WGaKupEATRiLVpU3q+A4SXEV
mjUH2TlDPTkAR6Zd0MoZ298DWWrHK05sEU8h6JYYCY71o7tU7iG0coJNUhal
Qk/k9zu0aDdc28y5Wsf0D+wDeMxFsjH/qtY4Jq05GoD2J8FhKAMmyYUu7iMO
DkjAUJasq/0vrYWR2dQnCe67yW9/lLALcdKcwKj9LAG5b7TqINiyJswLoSPl
kB0gLIz54ht3lSFTSkjVP4CdQK9ClHFJxXceMBLwVpiRM40IQnzClFv00Ut9
Mw5xy9AMvC/VH2P56k4xxCOEdnGIHyAgOfVSRlmi6qAnQJEyHPHQeHAtGLSe
BUqt2BB5xDmtbtgnY+A10ZJSmhjaXBaUkFbrGCPvhGz3bjFHHjFpIoknBg9x
2BdXp+EqUqSFdOxjy6RZtV3Q2S76llSv9u1bwlate6d1IZmNIVQ4owJkdzVB
aUE0MlqFIpZYysQbzylZNsciQNj4CYff6C94f7cB0I0cnj5ELXnMYUkgdkqF
PVWqMVEQCrtcT8KxvUC7kLQPYEwLzExJ5IE+EGI2KfxoK0Eu4FbhCGwmYqAf
3SewNEY9GofWoG8K8+I++8xCV10MYwoxBDFS5A6PfFbvVEUalqnUaEV8/aqN
luCMMHArrDCKgmhaWFj78PddBm+yARzTYySpzpDexPiBAOYc7RmXSIUmaKwx
uqms1ozp4oToDPQap5HZVgeJleeWRTdG2CZmTpE/DjrCh2sFw6L5xxCaqTfQ
4q34fLPU0Qd+dkUhJRKvFcUTiRPaCm/E3//2vz0EINCr9ThE8SoOsiw21Ckt
5g56CL07ReOEA4uYKiPUMgqobgyVKgAEASDqh2UvxzHJpEVJ5Tc4HUkwsOfN
BCgqJxxDPDFFLHMKwFJ5UlARgiIZCUNJHU5zYNwVr2LSjTyTzUOBNvFw3L1k
9gvMbnSv9EjICZIiNKOScJp8WJAnVNugTlJBu5IooS8QTiEq24L7H+bB9SZQ
olUitMGV2Nn5PIz5EsA6GPVoiqOdyAbBEBJ87HVXGhSLoEhB/l9vml4UK0Cd
oBirxQH2NvTampoYV2/cwjrSCr7b/+bbN4Z3OOg6PCA44uAadKDh06RjxMDb
UDDytlM0ZgL5WNlWI9ZUYSW4Hi5dIJcQAzwqmpGXKztxmTBfgxR4Wx0+IhvW
ETPQ5YGfoN6D2un+FBADJldSnPIBB4AA7AwRhNu/kJUj8pdKlTNqsyBIcGfq
fcqxF3RDtnYKOoCEwQNowUAOU0DqtzZdrjmZmOdgHcf+GDA2GgzuijowR6SN
9M8/SiYrKBLIMO8KLEPYRFus8MTZXADvl7LSVLFmyFdZdDCVwTs49kyPBUnK
CXqOZagab9BL0XDqOOEKsCHHkOJ8Hn/pslyS2dLSgZXNpb9PUL4XKbKx+yoa
OEUpsJaxw7SMfXZhDVcHaxvYx3aqwqEJ+Dkc2K2T0QJYGESaJWQe+YJVUF5J
aCWSEXVGUSpGFlHsMs7cNSuy4VxUMqy69MlvlnS3nQJkf9kouNAbl5J8fdSr
SkKBpRY3xnSSUfcjI8Hokj2okEkgCbIBcIOijGoH16XwEraU1n7MWdTEObVg
AJWC2KcJEMkSdVngZy+yCms+HD699kEoxrxxc5SwsIClt8JlmZwj18HRhTTi
UD3L+ThBqrXglL3GKRSY2jiWiSQPI94nE3Fd6FGYQb/DG9uU4EhQnWwPxJ54
3PU0cS9ADf5Aib/IdArr+XXA93ONznfUBuGXA4G65fvnuBKEBwbfSbBwKghv
Z5AOBceAToKTfHgJK0aRxeD/XjmbUzacvkLBUvtSFQVOlkW3rHV43wS7dUGq
mUW4IjDe168+q4PwuQFdZwgc3yCv9HC1XkRQsKMYrtVFxdXfXxnKPaDSNV6C
dNxtvjZkKaEWBbak8IHYo86BCgR0ieWLoC9JloOQwEx6XLzsHh0mp73AwT2k
hi0F9IskJvG4g6X1DdRQP6mAkWo2TKOqpiXHjh5EtxnXtOuszLQkjETp9Lps
NsLTqbPe6W8gNcBwnDRnAhyJs777SHmdGCWAgmCAHDWJAsS5IwrEIYMUWEbW
qQS2A7+Y7wt2wtf6C1+eLJ00QjdA0DC1rMn3NZZAEybngpSOpKsY0U+KU+uq
CcM09GgQDipYOStfAXuFZZSiZHxvkoDZKATrn+qDJsIcY87TBlkqSZ3x8a1d
dwOjJV9ydP7UuDaIkwoMzhjoSMLNLQZL3H2BLYkzxe7Nc4uVUYtGQCehbeF6
ZKBZiVyBeUwQoWhqaLlAd+eamBfPmSUPIZfYJAHjbNEMhPIYXeZ2y0nlASQ6
Blm8YTzuwLS0gQirOrQA0N6fZ3mOYsdxLJlBggspqUhxNNCngNrIUf2v9eVa
yxb1Z2O7nQ0EzVWTEnP9Jb9960R6JJya3JMHfpch6sMypkNyA4FNZbrijfBb
SgXu4pFnCytl8y5PYWpXp4lonZ5WUwZAmxpcLUMUJ/3NsAREWNSxI5GT2lra
1MXPVafgAaUoXh0Yu1+DyHkszhuPFQdFGWZ/JEiotmrAHA24QKKWATIDYdrY
Eg1uk36O7oJ0zhh5pYLuT3hEI2rFECFoOdIB+i2j+WkgfbHCwQFKyY32wPOB
6gXyTrOibdcEJs/6heYaVmi4MSglhBFCWfN6OciM2xsRjQlsQ3VsGSwIS6iw
caiFD4S1Xw9YKwbrC2CtDFFA9qY7ED3Fc8kDX+ZrEZvBHE94rI6sgzUhmhjM
LjPf7rpEuECZojDGeLCg5PTy2gFtUVAHopWQLOztkVUfXbWuVKAIvysxLAt9
QF6Wt+0mEtKYd8k1r8C6ikOYTmBJKyNMkMNnKozUYc+qAOEc42hk1S5fdXmt
PZl8FTpZyth9K6k3BsesdNNowLZx2mwkBVDFik/8cbYInKrdgWphfOPaNdwG
iXByfHkZVJkPhCwSbchPsYRJOP8oCD304g2aNy+2fHPuXPwTb0RF3YvIW6aK
P2fieegcFXpwMM2lov1Ipsdhp5qgvqAXg/Kla1p1Ehb+C1DAEX13rI53Zakm
nwj0Q+0jmuERokEDliIPkGqw7JGcTRDBPcs0ECdpMLXP9TQJIgVh4RdlLAM6
kznGXa1JaYCWXI37b/M1SVvt74H5RUSaOVgtl3LcE17Po0q8TeF8FlcUSMHQ
bo0CxkA36BbDHRqoDukszOa1pfAd+Q6uVbHEqMl58JHrgY2NQBGBRmOsL8NW
+d5UKws2ofQMorYckqzkjFQdBKib8h5TA11hoi0CyNgj3QQ638rgG/BAGcXP
3DEiOT66txrWQZDgpokMAiqddjUSjNxiFAk/fpzMZW7AWGrBXE1t1CUE5VBG
oBgwGjDDTLbtLG8Larsw0kBScBmDEIki77CZDjb9QIwKok/bFMt4uTUY/g5u
KMXGAp2g84BEQoP6WaJJJ9iqyuNpfGSKA4OuRxZmihm8xImQjEw6eS6j0H3T
/Z4RxG77zM1ImPAdmlfbDTAmlelSkosiuJV4Vlrn3a8iVCGJaqUyqdbdBQ9S
QRc5rIW2L3MNAOJAaJgy05IVRUrclbjhvTU3g9vwdLmuDgLFk4q5k4ad/BWu
iFdepkeAD/YBPjEJgSBD3jXFzwkuP5Q/wnJUtHulHDGXNQ/mUHytEUevqbGY
Jkn6fWaiLvF4oB8ojJH/Qx54RFg0CsekI+XcMIzr+xKy56aCTQxSqTrBEFgh
MVHMCLtmOmJ8E/6ZEaXaVqPf98c9tVJpQI3BHotRUm+yKiNdQGaTxui0aYri
yccUSOG4GKPM4EJ8aQgazY5OZVkXxjEsn1Ohuyn52UXV6jy1aTI6jhSJ2tvO
A8HCW6w15Wz5NkN/Ae2TJTUKwM6zY+rQwVk2YAuCIatoUh83LPXPEcY8Nxs7
dHMRMtULa167BknJ10dBUGhn5xTUSCYpEn8zOdhF9VUY5RlUpHpJwSG3UbxN
7qqhVgxhBzm3BiPN/ti/BWm/ppIWU4fgmFKR7cMRL0q91VYbA2FmwnJfqD/o
AUUkeiSjnSToGyR2PMrke6kllW8P0MQ/75U8pXPXCMOEukxt2jqcao3BNkGm
IhhFG1nGrVNc3JhLCoNeqJKwDvo0gqWf3Tmo8jTcPFI/E6wTFzqzhU0dDsqy
VtaopUKcuvepYco0JsU8p1xmatgVnbmRHYR8LoInEOSikFtJWANSxQ7rqsAD
B3wO8nDs3JMwiqOR2u6grHzW73shSY9AHu4bGGBFEHRXt4zjwi+4PJELRXXh
IRRI4bacWItppY1dgAMi8lI9HdyWuqZic4qoUPzQOmSL83gwFEpxUNcVpnST
2yoXHCJ4jnZUYGgL3QQMU2IM/SZqc4AOwDi5vrjRLk5Pjw4Pgt5whtEXQGXu
fqY1gHhIxCM/uMXzni/4p+QGm+4gLv14Sc7Qxc0x+CFvJKsrYGU8SF+GDOSG
TwlyVprmVm0ufezCXhGSaFyPYwgTmdlkf/o2C0ICdw302KS5i7Ynhr39GCDP
H/P4RrzwabnrLgGBNi0xVsbFRkBy3ARa0txjDFEobRGoatgS8MZVWxTSswr9
F/69dG6cSw+TTgICPloh+sl5Slu0tcdkzkg/UfUcwArAMh/c41Zr5WK7kyPY
HNpdkOfUFvemYK/Hd3Alhp0mgiSiW6hXgNuLcIVJRAneEm6HuDfEf3HbS3EL
A3yAR+FQ2lpL18ZBt02GggqYOjLsplQ5FLaMp9xTqkakIiCdBUYnDOuruSFj
6SLE36FBEOjFyNpEbwGwsMgMtnLosTyfBJ0Qsk053O2nQQZlEmzcZdrHgkUn
AVIw6AcX7kfOFruHc95bNyFrI99H2++JMNStBK8LXQFfhIxBh0BTeGFIsC/u
qo1QNoSBAOP++eKjioZnB4f7IBo4hhbiGsW3s2uG6lPVuBQBkBXB2wz1IZ4P
VssW1NJTYMZh3+uwNB6rwmTr44TWkzlghnC0F2gBbJCzr3CjiV4+FKf1ihPX
+pN1XtZMNc9L7ii9ysemKdOE7ZDIvalagqfpIlgIItc+zqZ2OnYNCCUdqfmO
Y5IQYReALdOSOUHESfydN1q7pzEyZA7M/FLiy3NkoCOBQI680iTJF/gIEFmL
crTvGt1eSfnKq8cEUp/RHik0y2W+BCTFlTgIJcL/OSrWtUak+lf0Yi2A+wx8
XmYV4h11L4MdBMpXAC/a4smnJGPgpgTgo7jjWMt8O3kAbssoHogYg6eBAX/i
IkFfHwWGPZXveVE7fiB6FHXIi2Jj3n9mBGRTtmr0+qRWmLPT1G7ikvTcWtV1
9KzMJkuZidhvodIlAsTgzGv2j+blxg70AMWULkdNFF+C2SB20TJq6ku95DNb
B5FiVyIYWsJDrZ+7TeS8G4WCnQYMS6jHuwEs9zYyjHAw6EU9BUPssT9VXi9e
PPKltY+S5xC+VxyzWALlVmDWBDt6XHLRBXeyB0EyYRQBmjLSjSm3KXihu1Np
3SJNChtT3/7AXZ+XhTb6NRTkISYlBcEmk7RJ40DVjCzLNCNbrXS9qXMCFVxv
Z6iHmgYbNUsvN+mNuOUP+yIOTbrMV9Zg10O5ObYgT2SQjrREzvSh1+y5F1gE
wVM2ZRbFfoS/8dqosMcXPQbdmulICBOBCacgdCIeujvRcAF8GuDyMEzdH4QH
vMIrysUE/o/sXaEBhcWCJ7GJUWJL9HsSYWEEDLa03qjt7yyNXU6DyMMpiv7d
p7MEZY0WGkH2i523BHisuPPqbgRKHxYPGpcg8YUdJAciDXwvVApLl7sAJuC6
yHppSNiaoLdR5mNo/RZJ3gmlTk1j5hghE3YetWknTctwBxUe3c/eYyVExBAE
a6SKSjJ8DFoABI+LM20U6OD2ZI4T2B7ogBRx1TpOLRkR7HgU2hwB6t5LWWkI
rJ56MCWCI7vI0TULQr7qQrDwbvnsBefPJc0YJgF0YBxFTTEhais0AschrJKb
2YYTMrTb1jCXcOnB2oaYDWq6Tcc+i7EWLpJP1c4ZMYEHLlAXecdaXvbEKbrH
AiDkYQnj0JKiHYfwTy2p9XV333bFCXUlvRo5oQs0x0VwlQa3MQhx10GOi10O
rkBAxnDR0lAJ+XwoXPmqYaCQAwKhy5holFHe8g/oaQTpyUgpDlK4ThkEyQWG
ozKGNkq8AlEd1ouq3EnIS5pa1aW+wSnKhwMUaot8CCDFfvQnGCOc0gPl4FSm
f0Xd1IPI575ejiG7ZjBboRahMvAPQXYUkeKkKcmgCAQNRT0U0avTlsxAsnJW
plsZIO2jRNIBXzqiu5kEhpsaCLN4O/42k04OUaEU6SzSa9Z1amWLP9xB8ngU
LKce7QrKPKQfKgVq/cotNNCaDNOLFPGS4jluOYC+Wi3xRTR66UIJRKRucDJC
GldFZ0HPBa0r7ctqTG76pKirokSxisWbYrH3azglR9INUHJT5m5eOdNUdOoO
M2yowHzzLxGQ9sRXYpC0OibzBx6AwG++xJctm3mPKXO7+6+Pw3FVqKJ51KfT
y3s4urPe8zQI/jmxBXU2EkE0zFPsR4Wsg4tD/8+1mB7H9STBYBwK+jTSs6hb
xv7g8fQqLQOAE7Mggod8kWTtBIXyLb53qCRT5iDzo+GVK4IA3pQaLY/z59LF
0gE9wl6j8aQWjQ6rlK64R5TY+qxq/+XkeO8Nrxn1cLv2Zzc3swX+Bo9ul1FR
euXFlymCDD2dSjjbomZcnds8WjL+Jjoh7z1GLsOkzIjG6zonEQgt9vQkXOOr
ST3mVwyY2jXL/1Fy/MFUmtxsqRQVTRxPXlfyW5BRXBRqaTU0N8L1DI1clxiN
zvgujtmttd8oec/entjZCSS+NvqX1xE8QzvZk7ZSuHCnIK/p+dzThOzShoZf
1LZpN8zvxZJgqREM4yGNwMQV1LZLPmNuReTi3DVnijC2jj+kD4WkMuL2ZRef
3t+cX98c/3L27sN7wuHt/igCHN7ANmFwRtqeKY+Kq0Xgu4oprxNm1peSkX+1
84g7LpyExUXXDqByWr7G0RrxjBA4m0yoyJQn/dNPi3mfkssjg+wFZZYHrJHx
g0GxYMYIBgEyNk6E+BxSxC4IBDRUkDTsKa2yu67yH0tBCGs01yQM5P99PNlI
oaLCTGhByrXjYUL4/JIh4C7nQ6NtaGZSTA2O7RhXHBBrH27Q4AoDwNktynt0
s93INsWKZZHLMlDmo5nofo5aFDK1ZXZoXYz5adMXTlSiR1BZVO7BBCgwHTbf
m/yEt1/aVLwB3wdBue/9dfj6yNsMVEZCBasDI7VWXN2R+ys91Ay2l84KNTLZ
J9FDXXMw37eDjZhaf6CcBYWz73fZg6bwtWQExcqpqM5cG4hK7tw1KyrSSOHB
xdaGUr+BJqoxvMEAXpfN09V0m7ggZ1J5sa/HWmTVmma4FClHCwKIspsoFLYl
VygFq14T0BorGLkSHbkBjtP9ojtVbeaA6c6EHJr4o44h6eSwySqV8I0phhbY
t7Xr3spdduvAnNTXuAoeVY9d4ORAMxayCs4X/nZiISXCYmExKdsbYg5JE2p3
hBJswpePZhljHkbOL6YqL2TIT9eK9tGOZ+NuGmHZokHhDOAkaMEWk+9evNc0
I+NyJSJQU19yUWkbOqJmRXWYoRo1MvPSWTIRWsUro07zQJqy57vqqzjuWIvk
H6Wg4tLWdACAvuMbmTBS9wcf31D7Qv9aw45DMGFmzq1kmpVvt0RWBod6EEcn
1b8UbSR893zr82FWUIJkmcdv0z5o3cozjwUfYl6hHHHKymx0+BN2krMEPVF3
IlDtbmyizCIk9dc2sJwwVc8ahmBP4vtIZ4Tf7QPFqyCn0K6gUJDrJLCr9iJX
hYTA9uAIvUigRUkP3oZ7EXKCCxRPW/lej3qClFbV1Juy/DTp5xG1/UAtso4m
kIVYlyB9tWKslGuq6Xp6oRFEQzeoA1YEN4isX8m8KgTBQZx9yINqczCXy0aI
P53SSwCq1ZGrOKbWhaDvG1ddY7cUTDnz5SABVA/r28OoCiVC2Uj8kce6RHeK
U4MvXrzcx1FPDmE2Y02oEr6/zGj4lhe7KhkdSh/VCBsjWjVuiyVn2jKeDUWj
jMVeGQcmip936FGyLLcQwgXEXmWbXX01jlUhXcPDtWDrEk/Ez4PlwhMNyaGP
fX6K82qviQgB2JmX4RsYs63wlvo2nPLIRlHmvcluPOX5W68zBWMkujC5qoME
YDlfmUxQcENmR+oWgMxP3QVNto578/gQl84aTF/hIfl5k4QV7k7yG0vBaM9s
QfEQAeJWPAxFoLdwH4cGAw4AkAM7W4J/8XODlk/dNTizU+xocVyUY0OcZSjc
AgEapjIqQ/hBX0LlAA6EXHGTJjqVeZLTCwgrtjYdQh23SDTA59uacE/iR+OG
O3WuIjjYUSUZ7MGDDunswA6S9CejUcDXnaj7A01qpFotwtsGbWED8z7qgONa
1eicMdciTwrWffYifjZyTIAfCVoUwAN4XJOb4+DopFkQ6eHEWVDOGQ/dBAxU
wO7D8D0fwwByHnmFDXZasW8xiACO7qxfq/3nUel+0bmcHue7XKKTrkh/kfw8
FYWNPR5rxQ6tanu+pgMr0xYFWsiJSXvF0UQ8i895rNqfjH43WDnf7ioCsJPl
7w49JXOtsgvOduARmflK3V4/MsIko24Lv8ixHjkUJzbbqswCN6rjrnzDGy2F
C/s0GDGF0ZiXMY9r8J94ql2QCvQNsqn8lCQzl+cNVOYEnfsqbLesk6TKhwbD
B93XgBrSVqQMyGXDXJBe6xCc4BwsN7XpOzXusK+ykgqhKAzEXNUMO/Msnkp2
T7CMl/UZTsLSmYr9Ubwxyvz8I418HNOMR+ZFDE+jl4LIpACF+Z3laz2ShMFw
dDAoyKQz8VNDMXqF1SekPjYOso2/ReMp45HsktzSRYg981DxLRycV8C12gLU
ZmsmhHVtpAgdRUSWK8jzQmiMpVRUdtWTN2tUSvH4Gmn4mOfOjxX54NTrNC5I
Jf+6dO6Pf223kndG7e/Y0uH/1WJhAnVQkCfALTivitPNUrwn7WmlAxJYZLe9
F420UdGaSoVmZVUxqNOPHqahKtSeN6jvCNvj6MRJX6E4MABIYcW+q4gzA4N2
sSympckqr95NGO32WxEPBJH/vvccDSPisLA/NAGUc6IeXUTEfnHIlurnFVmg
mQOZuwMq9EOBU2XM2pIzQCJGbCgW5FWpbU8zad/MTvjXr2+OT07enaOC5CyP
MAY1KXANZkImm/BEszQ05F7t7BxIO1nJWsQuSg+wbiQoKH4wRw3YepQOimhS
vd45lKemIJUntWXoSUwYynN70iSPZQQZdg7EJOW83uWWHlTjtMrqrvstaxxp
68bXO0cUORIg6YNfkM9zgz1i99c7TzwVcrvAdG2wHRdb12/Gz32dfHYV/+QG
wv1FNP5rChhHS5QGlrJN8nNdljLfvt55KsvQ2244wMaAXAr8PLirv//t3+Ut
f//bf7zeecakkFY4lf0jokRf5zaF+uJxMDpWZVpqF+g5p68dwWlsqiWHY0/K
kgnA2BkPIGEUrG1LX7N/c0OuC3a6cqPb37ocxddH7YawEg4SpmF6P/GRLNvO
lKbOIHjpVo3fqzIx7pzKlXnLovwEksLmkeSYOSgwYbPWKzz2bzM3gsG90edY
tLkh9snEu0KdalCGSTwh6LSgBkOvTIPLDKsm6AzusPbdcJdikdWoQ4BLDNzU
CVGdkJdJ2PfgWjOCCFA1G/UxlTa6cfE/pj61J11Jo7AFk8i1wmLiJWpfm1Sq
r0PIKQ0qkLtTlMko8JpKMOPsiPPrRSrwzkxGfsPCed6NAqo6GKSOc6LkMkHi
C8fg3Jz/6fzmL9c3V2fHFzhYglvwBqyk0BpEUDi7guWdVoyZENzLybfZNsSJ
91omeIbU+LInn7fXEOrLEGNHE4z1/dAIPUoE7LJHFvTazhAGTb8UqgU1ERFP
dUMArop2xtmQ+RZhDZyGNqytt9ra18WVpfQrTs+dXhxTKfmNsAF+WOpB/DpF
Bg1WOlJrt/jEuuYLm2sh4MnMbzWQn4f7TwjbtZ5FY+gcBrYodaAQx9RrDLm6
YlfNlH39enn2eQLq9uT4pw8yFsA00bql+6duiuIBY4GNB88dOC+MupVpWvvZ
fn6GSZCtmCbXYWSTUXjouTjuYJZBO4KLv7CWkh/ae6tbaDyOM9lkDY5HFjuF
IvDavFikE0twPKFooGQ49SXPTFaXBMEo0jiGK/E5l4PwU741BOe8HGnHxsoQ
vqTh4nBUr09r8FqBToWffqDG/CD/x/wlkbYzTnReu+qyr49kFAQnG4I0hkyc
6HfycXhJr3Wkl0gVZsgfTNURcaTzLnmUGgPiN/owAXUd+YIyBgMsq1IGADJ7
aMtQcvvQDRI9nzmN0xH/IzT+C3FGuXANjOO0xFFg0u9X0AsoCn1Sub5FwmOU
Q6CC/P5Girpc2t04uRE9MtPBKRSt0l7+veDBCJycz+c3cAMvf/r2LQoleP4X
e1xH/GCHs2yeNVwBTCOkpPYjKEnzhYR6kh0sq1g7vrSjA4utBffHTbBIL9FE
lJ2dD0XYN9G30iOd4l4rZndv8kcuLf7usNJnhuktKZ2Mis07Y+zitbK1o+33
eo08Hd3ZfNKCjs4jy7Dj57gzmkDqDfFm9oEW6j4hi0uHSC1Qy6oQIUhokw+Y
cbvmXBK87rfQ2TWiaJwdDvee3P1FYD1oIsT3clyItg26RvY6y1DjA5q8x0gT
ByXAL3PLbFHMh9MD/CBVPh4evABXW1roCeZb3x/EhKLWwEOY994JSlJTV+Ur
Y6kKMuSK3jlV4cmDGhSbLyiw0pidLFVEEAlnUdYOUYlx1jWX/BN3rtGtJtan
yx/U4bn49TiCnWOtLs80jMZVsNwQdLSyppc4QW8oHdDDfT7DnSIARDUl/kmD
fQ4BohIhSk34ZbjCx4aLCj0CjOZ51BRk53IIV+Qclig73Bn3TSIjmR9XUAYh
uqNx7TplVqiBkgxzc0vVmlz7pUFTyxdnktpD8UrVusxAHYL4t4VJAOUh43fb
+R6KnrKkLCU538QJryIM4i5GKDgLRzyE5SnOqolUqD6NRyC6VZOSYhUGlubW
C76oI022iLwnzNVJmynyC0JEot9Mo82L3DRNtDpZ7kbuyCZuoTy4HOelNNzn
3aVNg1lpiz4vxoY+K0w3fMhTno9zXaIGkDGbLCCCyTtcWNhRPtTWVu5EJi7Q
Gjj0TsCXHtcQ4d9Zx2gzfK8bghGdQSGApMXZTOBiCPCNbm6uyD86m3y8+vD2
/OYas7afEauAvJwOIcCki5wa56XG0LnxfHjCHnVHR7Shsn/UAL4TzzjCU4gT
QnEDV6ydaYb0RNTMKVcai97iUfBfH9HLMNioLRuuo2IJOQTkJbrmhk1hl8tw
pZ9VjPWJC5jZy/CTNRgf4DpV84eazoB5jpDwofD4+jNNguGU5As0zoNKn6Lr
HXQbQHOOWarauLOj0eEN3OKxO/BHG8PLiKGt6xiAK5NxcW7mIKGspImlby2s
8xxIsnfKZmqZ/6blqvQsbajCUXdhZ5lfQ2IGBzsCxYLBb9o0juIvdBqui1QT
D4OE1U9qOiLNZOlAbCmn5aAWTTRVl8SnHclA2ZismtAaZu3WVnuwQIzUUHQa
fYKvJ+dXJ5/eH19NTj5cfro8vcJyHp7SfM0KiYdcn/jbD8I75EIeXNbhA+qd
yWm0tkptESpPPHwChsiIFdHXPsEqrjxhpJYFzzXLcW7zopS63Y69T/AWmbf+
cJxCaCe+KYIpJzhx1KYuWMbbjkQNbP2dueu0MEH9UuZZatyoJgZSokapw3vg
em0OzK0VJzqWbN1Qj7IrActp6hBJyYWlkDcyqq9WKMXLkvp9mn1TKjZIOh07
mPwGdo6x8UCSpgOTuj9yz0SgwtuBwixqzyFtFdW+dQ+bbQM6eXyB0SYuQdLM
A8/crDhJpXB0Cs2FKpOYrdQ1uCZh069fL87/DCbsudwHb+qHMs0NddBYmzei
khniLE01BDyMcUdump9rFMNVCi7ogF0sDF4aAvAoh4850cOTcunulxOEalia
Q1bOQFzhFzBY7fX7Yw1BoZX+8vBoH0N6HHwk9eoqO+iUpbABCMxtHhrpFefn
Ymr8DV1cnierRe0RjE0GT3k5n/lpw9pVPqs6eMIRPHZ+ux31yDdz/Vg9B7gC
ACGGSunGD5eSm6I9A0jSYIRwJgPpsoihwtnelAv3oyEx1RxC8v1sTfUkvHHe
KRGFrTiv0rghE71M6gWbploXVvmqZMP9MKRXgxN+wAqjYFcZTgXg9r/sYRGP
j2hw+og6tNQ4eVobKVHa0D9MnAc08BvCoPuxkYkrx6OH0AVwWWrFxjVar4Vt
y5bEtTRnrRYo5Yozkpp9NGwGKHNIeV8s/jsFdGOacEVA2Zx665BAIhlBgX1Y
9Svu6d+ln4RApAUwcwJHdekV8Vt5+oxuKxgXQHn2auvXy1UrwoV3DPFm21oA
AtqwnYnXWU3QkS4IoJUzHiHni9k7y1OgAja3VXxOVJvEZo5e4YKgnL68pdtm
iRsqdyI5iE0IpseEHKaDaDwJBXitd0+zAVqF4MgXyjCKkpW17T6cq41prg7G
SKldk9ylPHfmEdXoGbyL1CPB8ox1LNwNej6JaUpn7qgQ0GdmaswTOf7XLPrc
kOfju4L42UaRTkAaXbt4H5g8l2cnNwm4tKsyVRdMgyQvp0fTZ/olEL5jCb1T
3TfioH22y8dDCCAuyaHxMLk4PXQfhQx4RjtZW7Jzf07UaUmOwcUqJVHI2t1J
QCaPdqoKEHg0hwA39/p8cjqFZa1rROOuM9CbC50DjpdUWzo6ry52OCSmw8NA
Qtk8cuhnSiVxTwkUagKzo0ypBLi3vgehNBKVIS3kHUl4bSbqshN/6ib64NLL
6bqB68GKA4AZmb86rBFt4DocgEGpgI6ysVzyRMETP1CG+1Xm2+7nca10Aztc
dDR9HvCQn4EUtNgj0+ThrqEBrFDEPSwFq4Ap5BYdD81gdZlgjXj5ZkehF4ou
Kw4O1E9FKRC5PgxZ2Eqajw0TLYJvN+QocKqBTao33o7C4bQkWr6JihyAWJnu
eFjuAkj1hw2VJo6oSd6ESgZGoQ51JXidIANX+fpRFWGP/WholZ/koK0H51rZ
VLc0waKPj4vVeHfxszYDeTbiGMBInr/uSu6wE0LQblnsHhMaQ3GPqkazBIT+
1CajDHwjT6+jhesYdBsKezV5pIGJYCcpue5ECfgeaGSm5b1US3mpHgj0oE+e
tm3C6+n86HHYLzWoKeVHskmfS1lePfZ5QMNOprYcwQFJdBsruy7vXCCX9e+u
D7m6xYRGXTCMBRvx8VAmxhyusPGkQ+uL2iAnxzleCCgmwDHSH5aoNKR7h7ZU
FjSQRz+0FKzCAy0UWSNITk9fQlhDN4Qvpz432OMKhG2npBLYFNv4qJsdxFFJ
E/Z7HrC34yxH7+lgYE9KOgsqVw9bCnAHu0i1dE6+x20OJShmdfQkahSH6Jm2
cfNlXRQpazxQmMxT9fF4mAwfkOu2yaYW2/YI5hQBzXSNpzCwr6M2b7TicUhJ
UltrsguzZmBWTuh+olfJEB/filvzb2Le+DgeD2E+4wiwWIsnppJBf18f+WCv
1H+JjPwhKjKzhHsnbVW53sPaTpIbMq6tZZctqn4nEaVzfgou9NR2YmrwhWBl
8EUXuQF322zRFUWO3Swrk3aD7ShltQ/VOBSJQVGs25oYe5yNcsHwxA0KqqP5
2DLUIJpnJpPRU2kWxYKIs28IZOEOFmFvORuMw3aOLQt7/9poyqOfGUKxUFdc
LJ60Rk0pROUFoTIC2k++cLaXnZ9t1W96IC/ALehEbWv2qg5zCk3VWmcic/bd
ZVscyEAKhDWIHnSJhYPgXCz3QQSZPtS39frD8cew7wnYMPAbyg1SHidZ5PZL
FsC4EPssos29NICe8wqpbS2H49U3kdTCgMMvAQIalVhR2xAlUjDXgK86C5aU
r6uGR8VXHcyoq7kujhzH8R20QQK5VAft6CVijzqBSYqzCZoHYqeuVhpAxLYV
h634RikgFq+U5ig6HKLVGmuxWkMEYDCtPXB7eA8OWsItfKL5HmFaWuk4w3av
QbDLTd0CFym3dYTclqYmcbdmmWHvLnccVaIQOwGO/G2IMqZwNG+4P5+TX+Gj
MB8TTUTv31WTDVSABVhHP380DutxsozaZ4WDwTFJMtHdDwSAAoyjcB2pofQ3
Mw/hMaTBXXuREhQt+8wPoNUIRt8DinU7R4e4uvO4uCbzg3uFQHHDP1SxUSUu
eT3USyTsyxqvQQyUftq6lgpY0wSWlBgPZSxTyXfH1Je7dmMVmBoXAZFOBbh9
gJjHTWH1OPabp951a0EysC/o5CfF2lH7UOGSFCULhiwgtJsd/VgtOWw7gVy6
22Mk7o7xtqXA+Ge08qgTBsEIvsnEY22kwnMvq2WrHdi68EZplUBWlPSX5aFO
sKmwaF7r0aVIXayV/miDXsZM+xV1HGQ9YErW07V0Ys1wxDjs7iBKjToBPlzm
cyPVAvgdV2llQTyVjBTlwZmFyOuUxcaC6Yii70cgWztrcnFwK6kqrQQTpyPo
QFNMk0uwU75X8ejeL+2MM2FvLVv4kQNs96jUTSVdkOLpMsR6OmBEco58HiEI
T/E51H7Kr5GPn1tVoqdAByz9NGgyiHNhVuX9xPUIIMvFzm8RjCxlMyZ3hm0X
NfdmeDAerqbU4EmrnY9KajzBRF9RQ19EQmYLrpvjPjpCNO7DIN2+JJ6AjSvC
WirspNpNsHH5YNj6c8utVb2PGjelpfRq8Hny4CV45KsyuoGOnEojKZRau5uN
LcS2vfpCavCFNKqDsiphLPKEMBXILWUQpiZ4JvKhumPhiIhxD371YnQ0j4YZ
JTvFA3NcclLLOn3mWIsyo4J2HPdOvSk4XWlEAIhwcLOB0Lh3Tg2Hih3C1+WE
3py9O/7T+YdPVwwTAbF1rZm9uMSwK7actSh5Qek96fKCvmN2P2Cj/S1BCY9D
40919nBRJnOySdbbKmOZ7l9GiGsNKN2vthKNxOyBzcnjqrZBiQ/udAKqFvHR
tOlj1zZHXJ6vj7BtbE9YY7cuEFYFNUhEAczx86AIjq7hGxxJgj38gXdwtCvp
iQT7KEi/T3I4uoL4OAA2J29KtOFBNrDtTuYgF5L9ZME+St61dSPC8iLL8Z8X
Lafkpc0E2G0dQ0inXzeuVtx1HGImF+S9vOdnEAawptvbcpz8UlE9B8iTKsVh
K1cZjrpNkxO4jw2y2smKPgG7focNttZmnFygbQZk/6Xgrm5neQbs8t7irfu5
XBXwT3C/gelv4O3b5KNpc4HCXeD9BPpxdDnYkK6T7wnLSvYjPdqhkYY2EzmV
fwY9v8BeawhnJElJopNKL6MGnu4czguwtd0EoeTKcrlr8hPoyY1Hu1ABHTqJ
/vjZm7E2RcYCYl6W0pI5h3vXYnSFOtzVXFGhtRKcXQqzC1Gj6enO/wM+tYWe
ruAAAA==

-->

</rfc>
