<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.29 (Ruby 3.0.2) -->
<?rfc rfcedstyle="yes"?>
<?rfc tocindent="yes"?>
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc text-list-symbols="-o*+"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-irtf-hrpc-association-13" category="info" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.17.0 -->
  <front>
    <title abbrev="FoA">Internet Protocols and the Human Rights to Freedom of Association and Assembly</title>
    <seriesInfo name="Internet-Draft" value="draft-irtf-hrpc-association-13"/>
    <author initials="N." surname="ten Oever" fullname="Niels ten Oever">
      <organization>University of Amsterdam</organization>
      <address>
        <email>mail@nielstenoever.net</email>
      </address>
    </author>
    <author initials="S." surname="Couture" fullname="Stéphane Couture">
      <organization>Université de Montréal</organization>
      <address>
        <email>stephane.couture@umontreal.ca</email>
      </address>
    </author>
    <author initials="M." surname="Knodel" fullname="Mallory Knodel">
      <organization>Center for Democracy &amp; Technology</organization>
      <address>
        <email>mknodel@cdt.org</email>
      </address>
    </author>
    <date year="2023" month="April" day="11"/>
    <area>IRTF</area>
    <workgroup>Human Rights Protocol Considerations Research Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document explores whether the relationship between the Internet architecture and the ability of people to exercise their rights to peaceful assembly and association online. It does so by asking the question: what are the protocol development considerations for freedom of assembly and association? The Internet increasingly mediates our lives, our relationships, and our ability to exercise our human rights. As a global assemblage, the Internet provides a public space, yet it is predominantly built on private infrastructure. Since Internet protocols and architecture play a central role in the management, development, and use of the Internet, we analyze the relation between protocols, architecture, and the rights to assemble and associate to mitigate infringements on those rights. This document concludes that the way in which infrastructure is designed and implemented impacts people’s ability to exercise their freedom of assembly and association. It is therefore recommended that the potential impacts of Internet technologies should be assessed, reflecting recommendations of various UN bodies and international norms. Finally, the document considers both the limitations on changing association and impact of "forced association" in the context of online platforms.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <artwork><![CDATA[
    We shape our tools and, thereafter, our tools shape us. 

         - John Culkin (1967)

    Article 21 of the Covenant protects peaceful assemblies wherever 
    they take place: outdoors, indoors and online; in public and 
    private spaces; or a combination thereof.

         - General Comment 37 of the Human Rights Committee (2020)

    In the digital age, the exercise of the rights of peaceful 
    assembly and association has become largely dependent on business 
    enterprises, whose legal obligations, policies, technical 
    standards, financial models and algorithms can affect these 
    freedoms.

         - Annual Report to the UN Human Rights Council by the Special
         Rapporteur on the rights to freedom of peaceful assembly and 
         of association (2019).

]]></artwork>
      <t>The current draft continues the work started in “Research into Human Rights Protocol Considerations” <xref target="RFC8280"/> by investigating the impact of Internet protocols on a specific set of human rights, namely the right to peaceful assembly and the right to association. Taking into consideration the international human rights framework, the present document seeks to deepen the relationship between these human rights and Internet architecture, protocols, and standards. In that way, we continue the work of the Human Rights Protocol Consideration Research Group, as laid out in its charter, “to expose the relation between protocols and human rights, with a focus on the rights to freedom of expression and freedom of assembly” <xref target="HRPC-charter"/>.</t>
      <t>This document has seen extensive discussion and review in the IRTF Human Rights Protocol Considerations (HRPC) research group and represents the consensus of that group. It is not an IETF product and is not a standard.</t>
    </section>
    <section anchor="vocabulary-used">
      <name>Vocabulary used</name>
      <dl>
        <dt>Architecture</dt>
        <dd>
          <t>The design of a structure</t>
        </dd>
        <dt>Autonomous System (AS)</dt>
        <dd>
          <t>Autonomous Systems are the unit of routing policy in the modern world of exterior routing <xref target="RFC1930"/>.</t>
        </dd>
        <dt/>
        <dd>
          <t>Within the Internet, an autonomous system (AS) is a collection of connected Internet Protocol (IP) routing prefixes under the control of one or more network operators on behalf of a single administrative entity or domain that presents a common, clearly defined routing policy to the Internet <xref target="RFC1930"/>.</t>
        </dd>
        <dt/>
        <dd>
          <t>The classic definition of an Autonomous System is a set of routers under a single technical administration, using an interior gateway protocol and common metrics to route packets within the AS and using an exterior gateway protocol to route packets to other ASs
<xref target="RFC1771"/>.</t>
        </dd>
        <dt>Border Gateway Protocol (BGP)</dt>
        <dd>
          <t>An inter-Autonomous System routing protocol <xref target="RFC4271"/>.</t>
        </dd>
        <dt>Connectivity</dt>
        <dd>
          <t>The extent to which a device or network is able to reach other devices or networks to exchange data. The Internet is the tool for providing global connectivity <xref target="RFC1958"/>. Different types of connectivity are further specified in <xref target="RFC4084"/>. The combination of the end-to-end principle, interoperability, distributed architecture, resilience, reliability and robustness are the enabling factors that result in connectivity to and on the Internet.</t>
        </dd>
        <dt>Decentralization</dt>
        <dd>
          <t>Implementation or deployment of standards, protocols or systems without one single point of control.</t>
        </dd>
        <dt>Distributed system</dt>
        <dd>
          <t>A system with multiple components that have their behavior co-ordinated via message passing. These components are usually
spatially separated and communicate using a network, and may be managed by a single root of trust or authority <xref target="Troncosoetal"/>.</t>
        </dd>
        <dt>Infrastructure</dt>
        <dd>
          <t>Underlying basis or structure for a functioning society, organization or community. Because infrastructure is a precondition
for other activities it has a procedural, rather than static, nature due to its social and cultural embeddedness <xref target="PipekWulf"/>
            <xref target="Bloketal"/>. This means that infrastructure is always relational: infrastructure always develops in relation to something or someone <xref target="Bowker"/>.</t>
        </dd>
        <dt>Internet</dt>
        <dd>
          <t>The Network of networks, that consists of Autonomous Systems that are connected through the Internet Protocol (IP).</t>
        </dd>
        <dt/>
        <dd>
          <t>A persistent socio-technical system over which services are delivered <xref target="Mainwaringetal"/>,</t>
        </dd>
        <dt/>
        <dd>
          <t>A techno-social assemblage of devices, users, sensors, networks, routers, governance, administrators, operators and protocols</t>
        </dd>
        <dt/>
        <dd>
          <t>An emergent-process-driven thing that is born from the collections of the ASes that happen to be gathered together at any given time. The fact that they tend to interact at any given time means it is an emergent property that happens because they use the protocols defined at IETF.</t>
        </dd>
        <dt>Right to peaceful assembly</dt>
        <dd>
          <t>"The right of peaceful assembly protects the non-violent gathering by persons for specific purposes, principally expressive ones. It constitutes an individual right that is exercised collectively. Inherent to the right is thus an associative element." <xref target="UNGC37"/></t>
        </dd>
        <dt>Right to association</dt>
        <dd>
          <t>'The right and freedom of association encompasses both an individual's right to join or leave groups voluntarily, the right of the group to take collective action to pursue the interests of its members, and the right of an association to accept or decline membership based on certain criteria.' <xref target="FoAdef"/></t>
        </dd>
      </dl>
    </section>
    <section anchor="research-question">
      <name>Research question</name>
      <t>The research question of this document is: what are the protocol development considerations for freedom of assembly and association?</t>
    </section>
    <section anchor="methodology">
      <name>Methodology</name>
      <t>In this document, we deepen our exploration of human rights and protocols by assessing one specific set of human rights: freedom of association and assembly, abbreviated here as FAA. Our methodology for doing so is the following: first, we provide a brief twofold literature review addressing the philosophical and legal definitions of FAA and how this right has already been interpreted or analyzed in the digital context. This literature review is not exhaustive but aims at providing some lines of questioning that could later be used for protocol development. Second, we look at some cases of Internet protocols that are relevant to the sub-questions highlighted in the literature review and analyze how these protocols facilitate or inhibit the right to peaceful assembly and association.</t>
    </section>
    <section anchor="literature-review">
      <name>Literature Review</name>
      <section anchor="faa-definition-and-core-treaties">
        <name>FAA definition and core treaties</name>
        <t>The rights to peaceful assembly and the freedom of association are defined and guaranteed in national law and international treaties; however, in this document we limit ourselves to international treaties. Article 20 of the Universal Declaration of Human Rights <xref target="UDHR"/> states that “Everyone has the right to freedom of peaceful assembly and association” and that “No one may be compelled to belong to an association”. Article 23 further guarantees that “Everyone has the right to form and to join trade unions for the protection of his interests”. In the International Covenant on Civil and Political Rights <xref target="ICCPR"/>, article 21 stipulates that “The right of peaceful assembly shall be recognized” and that “No restrictions may be placed on the exercise of this right other than those imposed in conformity with the law and which are necessary in a democratic society in the interests of national security or public safety, public order (ordre public), the protection of public health or morals or the protection of the rights and freedoms of others” while article 22 states that “Everyone shall have the right to freedom of association with others, including the right to form and join trade unions”.</t>
        <t>General Comment No. 37 on the right of peaceful assembly by the United Nations Human Rights Committee affirms that the right of peaceful assembly protects non-violent online gatherings: “associated activities that happen online or otherwise rely upon digital services [...] are also protected” <xref target="UNGC37"/>. Interference with emerging communications technologies that offer the opportunity to assemble either wholly or partly online or play an integral role in organizing, participating in and monitoring physical gatherings are assumed to impede assemblies which are protected by this right. Moreover, any restriction on the "operation of information dissemination systems" must conform with the tests for restrictions on freedom of expression (see below).</t>
        <t>Other treaties are sometimes cited as the source and framework for the rights to freedom of association and assembly. An example of this is Article 5 of the International Convention on the Elimination of All Forms of Racial Discrimination <xref target="CERD"/> which stipulates freedom of peaceful assembly and association should be guaranteed “without discrimination as to race, colour, national or ethnic origin”; Article 15 of the Convention on the Rights of the Child <xref target="CRC"/> which recognises these rights for children with the restrictions cited above; and Article 21 of the Convention on the Rights of Persons with Disabilities <xref target="CRPD"/> which insists on usable and accessible formats and technologies appropriate for persons with different kinds of disabilities. The freedoms of peaceful assembly and association are also protected under regional human rights treaties: article 11 of the European Convention on Human Rights, articles 15 and 16 of the American Convention on Human Rights, and articles 10 and 11 of the African Charter on Human and Peoples’ Rights.</t>
        <t>From a more philosophical perspective, Brownlee and Jenkins <xref target="Stanford"/> distinguish between the concepts of association, assembly and interaction, deviating somewhat from what is established in interpretations of international human rights law. "Interaction" refers to any kind of interpersonal and often incidental engagements in daily life, like encountering strangers on a bus. Interaction is seen as a prerequisite for association. According to Brownlee and Jenkins, "assembly" has a more political connotation and is often used to refer to activists, protesters, or members of a group in a deliberating event. The authors refer to association as more "persistent connections" and distinguish between intimate associations, like friendship, love, or family, and collective association like trade unions or commercial businesses, or “expressive associations” like civil rights organizations or LGBTQIA associations. For Brownlee and Jenkins <xref target="Stanford"/>, the right to association is linked to different relative freedoms: permission (to associate or dissociate), claim-right (to oppose others interfering with our conduct), power (to alter the status of our association), and immunity (from other people interfering in our right). Freedom of association thus refers both to the individual right to join or leave a group and to the collective right to form or dissolve a group.</t>
        <t>Freedoms of association and peaceful assembly, however, are relative and not absolute. Excluding someone from an association based on their sex, race or other individual characteristic is also often contentious if not illegal. As mentioned above, international human rights law provides the framework for legitimate restrictions on these rights, as well as the right to privacy and the right to freedom of expression and opinion. Restrictions can be imposed by states, but only if this is lawful and proportionate. States must document how these limitations are necessary in the interests of national security or public safety, public order, the protection of public health or morals, or the protection of the rights and freedoms of others. Finally, states must also protect participants against possible abuses by non-state actors.</t>
        <t>The Human Rights Committee considers restrictions of activities of free association online or activities of free association reliant upon digital services, that are also protected under article 21, and stipulates that “States parties must not, for example, block or hinder Internet connectivity in relation to peaceful assemblies.  The same applies to geotargeted or technology-specific interference with connectivity or access to content.” Additionally, “States should ensure that the activities of Internet service providers and intermediaries do not unduly restrict assemblies or the privacy of assembly participants.” <xref target="UNGC37"/>.</t>
        <t>Interpreting international law, the right to freedom of peaceful assembly and the right to freedom of association protects any collective, gathered either permanently or temporarily for peaceful purposes, online and offline. It is important to underline the property of “freedom” because the right to freedom of association and assembly is voluntary and uncoerced: anyone can join or leave a group of choice, which in turn means one should not be forced to either join, stay or leave. In other words, free association means that only the association of people itself determines who can be a member. An assembly is an "intentional and temporary gathering of a collective in a private or public space for a specific purpose: demonstrations, indoor meetings, strikes, processions, rallies, or even sits-in" <xref target="UNGA"/>. Association has a more formal and established nature and refer to a group of individuals or legal entities brought together in order to collectively act, express, promote, pursue, or defend a field of common interests <xref target="UNSRFOAA2012"/>. Think about civil society organizations, clubs, cooperatives, non-governmental organizations, religious associations, political parties, trade unions, or foundations.</t>
        <t>When talking about the human right of freedom of association and assembly, one should always take into account that "all human rights are indivisible, interrelated, unalienable, universal, and mutually reinforcing" <xref target="ViennaDeclaration"/>. This means that in the analysis of the impact of a certain variable on freedom of association and assembly one should take other human rights into account too. When devising an approach to mitigate a possible negative influence on this right, one should also always take into account the possible impact this might have on other rights. For example, the following rights are often impacted in conjunction with freedom of association and assembly: the right to political participation, the right to privacy, the right to freedom of expression, and the right to access to information. For instance, when the right to political participation is hampered, this often happens in conjunction with a limitation of the freedom of association and assembly because political participation is often done collectively. When the right to privacy is hampered, the privacy of particular groups is also impacted (so-called ‘group privacy’ <xref target="Loi"/>), which potentially has consequences for the right to association and assembly. Where the freedom of expression of a group is hampered, such as in protests or through Internet shutdowns, this both hampers other people’s ability to receive the information of the group and impacts the right to assembly of the people who seek to express themselves as a group <xref target="Nyokabi"/>.</t>
        <t>Finally, if the right to association and assembly is limited by national law, this does not mean it is consistent with international human rights law. In such a case, the national law would therefore not be legitimate <xref target="Glasius"/>.</t>
      </section>
      <section anchor="faa-in-the-digital-era">
        <name>FAA in the digital era</name>
        <t>The United Nations Human Rights Council adopted resolutions on the promotion, protection and enjoyment of human rights on the Internet in 2012, 2014, 2016 and 2018, affirming and reaffirming "that the same rights that people have offline must also be protected online" <xref target="UNHRC2018"/>. Therefore the digital environment is no exception to application of the right of freedom of association. Various other resolutions and reports have established the online applicability of the freedoms of association and assembly, most recently and authoritatively the Human Rights Committee in General Comment 37 (2020)<xref target="UNGC37"/>. The questions that remain are how these rights should be conceptualized and implemented in different parts and levels of digital environments.</t>
        <t>The right to freedom of assembly and association online is the subject of increasing discussions and analysis. Especially since social media played an important role in several revolutions in 2011, there have been increasing and ever more sophisticated attacks by autocratic governments on online communities and other associational activities occurring on the Internet <xref target="RutzenZenn"/>. In 2016, the Council of Europe published the “Report by the Committee of experts on cross-border flow of Internet traffic and Internet freedom on Freedom of assembly and association on the Internet” <xref target="CoE"/> which noted that while the Internet and communication technologies are not explicitly mentioned in international treaties, these treaties nevertheless apply to “the online environment”. The report argues that the “Internet is the public sphere of the 21st century”, demonstrated by the fact that informal associations can be gathered at scale in a matter of hours on the Internet, and that digital communication tools often serve to facilitate, publicize or otherwise enable associations or assemblies in person, like a protest or demonstration. The report notes, on the other hand, the negative ways in which the Internet can also be used to promote or facilitate terrorism, violence and hate speech, thus insisting on the “extremely important and urgent” need to fight online terrorist activities such as recruitment or mobilization, while at the same time respecting the right to peaceful assembly and association of other users. The report mentions the following examples that could further our reflection:</t>
        <ul spacing="normal">
          <li>network shutdowns during the Arab Spring, to prevent people from organising themselves or assembling</li>
          <li>California's Bay Area Rapid Transit (BART) shutdown of mobile phone service, to prevent potential property destruction by protesters and disruption of service</li>
          <li>the wholesale blocking of Google in China as a violation of freedom of expression</li>
          <li>the telecom company Telus's blocking of customers' access to websites critical of Telus during a Telecommunications Workers Union strike against it</li>
          <li>the targeting of social media users who call for or organise protests though the Internet in Turkey's Gezi Park protests</li>
          <li>mass surveillance or other interferences with privacy in the context of law enforcement and national security</li>
          <li>use of VPNs (Virtual Private Networks) and the Tor network to ensure anonymity</li>
          <li>Distributed Denial of Service attacks (DDoS) as civil disobedience.</li>
        </ul>
        <t>In 2019 a UN Special Rapporteur noted the opportunities and challenges posed by digital networks to the rights to freedom of peaceful assembly and of association <xref target="UNSRFAA2019"/>. The report recommends that international human rights norms and principles should be used as a framework “that guides digital technology companies’ design, control and governance of digital technologies”. The report states that “technical standards” in particular can affect the freedom of association and assembly, and makes some relevant recommendations, including:</t>
        <ul spacing="normal">
          <li>"[Undertake] human rights impact assessments which incorporate the rights to freedom of peaceful assembly and of association when developing or modifying their products and services,"</li>
          <li>"increase the quality of participation in and implementation of existing multi-stakeholder initiatives,"</li>
          <li>"collaborate with governments and civil society to develop technology that promotes and strengthens human rights,"</li>
          <li>"support the research and development of appropriate technological solutions to online harassment, disinformation and propaganda, including tools to detect and identify State-linked accounts and bots," and</li>
          <li>"adopt monitoring indicators that include specific concerns related to freedom of peaceful assembly and association."</li>
        </ul>
        <t>In one of their “training kits” <xref target="APCtraining"/>, the Association of Progressive Communications addressed different impacts of the Internet on association and assembly and raised three particular issues worthy to note here:</t>
        <ol spacing="normal" type="1"><li>Organization of protests. The Internet and social media are enablers of protests, as was seen in the Arab Spring. Some of these protests - like online petitions or campaigns - are similar to offline association and assembly, but other protest forms are inherent to the Internet. Hacking and DDoS are subject to controversy within the Internet community: some finding them legitimate acts of protest, and others not.</li>
          <li>Surveillance. While the Internet facilitates association, that association in turn leaves many traces that can be used for law enforcement or for repression of political dissent. Even the threat of surveillance can deter association.</li>
          <li>Anonymity and pseudonymity. Anonymity and pseudonymity can be useful protection mechanisms for those who'd like to attend online assemblies without facing retribution. On the other hand, anonymity can be used to harm society, such as in online fraud or sexual predation.</li>
        </ol>
        <t>Online association and assembly are the starting point of civic mass mobilization in modern democracies, and even more so where physical gatherings have been impossible or dangerous <xref target="APC"/>. Throughout the world - from the Arab Spring to Latin American student movements and the #WomensMarch - the Internet has played a crucial role by providing means for the fast dissemination of information otherwise mediated by the press, or even forbidden by the government <xref target="Pensado"/>. According to Hussain and Howard the Internet helped “build solidarity networks and identification of collective identities and goals, extend the range of local coverage to international broadcast networks” and served as a platform for contestation of “the future of civil society and information infrastructure” <xref target="HussainHoward"/>. The IETF itself, defined as an "open global community" of network designers, operators, vendors, and researchers <xref target="RFC3233"/> is also protected by freedom of assembly and association. Discussions, comments and consensus around RFCs are possible because of the collective expression that freedom of association and assembly allow. The very word “protocol” found its way into the language of computer networking based on the need for collective agreement among a group of assembled network users <xref target="HafnerandLyon"/>.</t>
        <t><xref target="RFC8280"/> discusses issues of FAA, specifically:</t>
        <ul spacing="normal">
          <li>The expansion of DNS as an enabler of association for minorities. The document argues that the expansion of the DNS to allow for new generic Top Level Domains (gTLDs) can have negative impacts on freedom of association because of restrictive policies by some registries and registrars. On the other hand, gTLDs could also enable communities to build clearly identifiable spaces for association (such as .gay).</li>
          <li>The impact of Distributed Denial of Service attacks on freedom of association. Whereas DDoS has been used as a tool for protest, in many cases it infringes on the freedom of expression of other parties. Furthermore, often devices (such as IoT devices and routers) are enlisted in such DDoS attacks without the owner's or user's consent. Thus they do not have the possibility to exit this assembly. Therefore the document concluded that the IETF "should try to ensure that their protocols cannot be used for DDoS attacks".</li>
          <li>The impact of middleboxes on the ability of users to connect to the Internet. Lack of connectivity can significantly impact freedom of assembly and association. In particular, if the user cannot retrieve the reason for their inability to connect, there may not be access to due process to dispute the lack of (secure or private) connectivity, either in general or to a specific service.</li>
        </ul>
        <t>In June 2020, the United Nations High Commissioner for Human Rights concluded that technologies can be enablers of the exercise of FAA, but technology is also significantly used to interfere with those rights. Specifically, the report mentions network shutdowns and the use of technology to surveil or crack down on protesters, leading to human rights violations. This includes facial recognition technology, among other ways to violate the privacy of people engaged in an assembly or association. The report makes it explicit that companies play a significant role, by developing, providing or selling the technology, but also by directly causing these violations <xref target="UNHRC2020"/>.</t>
      </section>
      <section anchor="specific-questions-raised-from-the-literature-review">
        <name>Specific questions raised from the literature review</name>
        <t>Here are some questions raised from the literature review that can have implications for protocol design:</t>
        <ol spacing="normal" type="1"><li>Should protocols be designed to enable legitimate limitations on association in the interests of "national security or public safety, public order (ordre public), the protection of public health or morals or the protection of the rights and freedoms of others", as stated in the ICCPR article 21 <xref target="ICCPR"/>? Where in the stack do we care for FAA?</li>
          <li>Can protocols facilitate agency of membership in associations, assemblies and interactions?</li>
          <li>What are the features of protocols that enable freedom of association and assembly?</li>
          <li>Does protocol development sufficiently consider usable and accessible formats and technologies appropriate for all persons, including those with different kinds of abilities?</li>
          <li>Can a protocol be designed to legitimately exclude someone from an association?</li>
        </ol>
        <t>In the following sections we attempt to answer these questions with specific examples of standardized protocols in the IETF.</t>
      </section>
    </section>
    <section anchor="analysis">
      <name>Analysis</name>
      <t>As the Internet mediates collective action and collaboration, it impacts on freedom of association and assembly. To answer our research question regarding how Internet architecture enables and/or inhibits such human rights, we researched several independent and typical cases related to protocols that have been either adopted by the IETF, or are widely used on the Internet. Our goal is to determine how they facilitate freedom of assembly and association, or how they inhibit it through their design or implementation.</t>
      <t>We are aware that some of the following examples go beyond the use of Internet protocols and flow over into the application layer or examples in the offline world whereas the purpose of the current document is to break down the relationship between Internet protocols and the right to freedom of assembly and association. In some cases the line between protocols and applications, implementations, policies and offline realities are blurred and hard - if not impossible - to differentiate.</t>
      <t>We use the literature review to guide our process of inquiry for each case, and to dive deeper in what can be found interesting about each case as it relates to freedom of association. In each section, we consider one of the questions identified in the review, and apply the protocol or application (with some overlaps) to that question.</t>
      <section anchor="got-no-peace-spam-and-ddos">
        <name>Got No Peace: Spam and DDoS</name>
        <artwork><![CDATA[
Should protocols be designed to enable legitimate limitations on 
association in the interests of “national security or public safety, 
public order (ordre public), the protection of public health or morals 
or the protection of the rights and freedoms of others”, as stated in 
the ICCPR article 21 {{ICCPR}}? Where in the stack do we care for FAA?
]]></artwork>
        <t>The 2020 report by the United Nations Special Rapporteur on Human Rights <xref target="UNHRC2020"/> described how technology is often used to limit freedom of assembly and association, such as through network shutdowns and the surveillance of groups. Because access to the Internet is crucial not only for freedom of association and assembly, but also for the right to development, and the right to freedom of expression and information <xref target="Nyokabi"/>, the United Nation Special Rapporteur advises to:</t>
        <artwork><![CDATA[
(b) Avoid resorting to disruptions and shutdowns of Internet or 
telecommunications networks at all times and particularly during 
assemblies, including those taking place in electoral contexts 
and during times of unrest;
]]></artwork>
        <t>Whereas states have an obligation to protect human rights, there has been an increasing call for non-state actors, such as companies, also to respect human rights <xref target="UNGPBHR"/>. The UN adopted guiding principles on business and human rights <xref target="UNGPBHR"/> and talks within the HRC are ongoing about an international legally binding instrument to regulate the activities of transnational corporations and other business enterprises. This includes a chain-responsibility of actors: not only that the company’s own processes should not negatively impact human rights, but also that the company should also engage in due diligence processes, such as human rights impact assessments. This includes an assessment of whether the products that are sold, or the services that are provided, can be used to engage in human rights violations, or whether human rights violations occur in any stage of the supply chain of the company. If this is the case, measures should be taken to mitigate this.</t>
        <t>In the case of dual-use technologies, where technology could be used for legitimate purposes, but could also be used to limit freedom of association or assembly, this obligation might mean that producers or sellers should limit the parties they sell to, or even better, ensure that the illegitimate use of the technology is not technically possible anymore, or made more difficult.</t>
        <section anchor="spam">
          <name>Spam</name>
          <t>In the 1990s as the Internet became more widely adopted, spam came to be defined as irrelevant or unsolicited messages that were posted many times to multiple news groups or mailing lists <xref target="Marcus"/>. Here questions of consent, but also harm, are crucial. In the 2000s a significant part of the technical and policy debate on spam revolved around the fact that certain corporations considered spam to be a form of "commercial speech", thus encompassed by free expression rights <xref target="Marcus"/>. Yet spam can be not only a nuisance, but a threat to systems and users.</t>
          <t>This leaves us with an interesting case around spam mitigation: spam is currently handled mostly by mail providers on behalf of the user. Many countries are adopting regulatory opt-in regimes for mailing lists and commercial e-mail, with a possibility of serious fines in case of violation. Yet many ask: is spam not the equivalent of the fliers and handbills ever present in our offline world? The big difference between the proliferation of such messages offline and online is the scale. It is not hard for a single person to message a lot of people online, whereas if that person needed to go house by house the impact of their efforts would be much smaller. Conversely, if it were a common practice to expose people to unlimited unwanted messages online, users would be drowned in such messages. This puts a large burden on filtering, and in sifting through many messages, other expressions would be drowned out and would be severely hampered. Allowing unlimited sending of unsolicited messages would be a blow against freedom of speech: when everyone talks, nobody can hear.</t>
          <t>Whereas one could perhaps consider singular instances in which spam could be proportional, legitimate uses of online campaigning, or online protesting, would be drowned out by other spam. Furthermore, the individual receiving the spam never consented to receiving it. Finally, the widespread usage of spam constitutes an attack on the internet infrastructure in terms of mailservers, bandwidth, and inboxes. This in turn thus hamper the freedom of association and assembly that is happening in and is facilitated through the internet infrastructure. Finally, spam leads to spam filtering by users and mail providers on behalf of the user, this in turn might lead to the blocking of messages that a user would consent to, but that get caught in the filter.</t>
        </section>
        <section anchor="ddos">
          <name>DDoS</name>
          <t>Distributed Denial of Service attacks are leveled against a server or service by a controller of multiple hosts by overloading the server or service’s bandwidth or resources (volume-based floods) or exploiting protocol behaviours (protocol attacks). DDoS attacks can thus stifle the right to assemble online for organisations whose websites are targeted. At the same time there are comparisons made between DDoS attacks and sit-in protests <xref target="Sauter"/>. However the main distinction is significant: only a small fragment of “participants” (from controllers to compromised device owners) in DDoS attacks are aware or willing <xref target="RFC8280"/>. Notably, DDoS attacks are increasingly used to commit crimes such as extortion, which infringe on others’ human rights.</t>
          <t>Because of the interrelation of technologies, it cannot be said that there is one point in the technical stack where one can locate the characteristics of “peaceful” or “non-peaceful” association visible to protocol developers. In the cases of spam blocking and DDoS mitigation, “peaceful or non-peaceful” is not a meaningful heuristic, or even characteristic, of problematic content. Their commonalities are their volume, and the unrequested nature of participation in DDoS and the receiving of spam. One could say that the 'receivers' of demonstrations did not ask for it either, but in the case of spam the receivers are generally a larger group than one particular target, else the spam could be described as a DDoS attack against one target. This allows us to draw the conclusion that DDoS and spam are not examples of freedom of association or assembly.</t>
        </section>
      </section>
      <section anchor="holistic-agency-mailing-lists-and-spam">
        <name>Holistic Agency: Mailing Lists and Spam</name>
        <artwork><![CDATA[
Can protocols facilitate agency of membership in associations, 
assemblies and interactions?
]]></artwork>
        <section anchor="mailing-lists">
          <name>Mailing lists</name>
          <t>Since the beginning of the Internet mailing lists have been a key site of assembly and association <xref target="RFC0155"/> <xref target="RFC1211"/>. In fact, mailing lists were one of the Internet’s first functionalities <xref target="HafnerandLyon"/>.</t>
          <t>In 1971 four years after the invention of email, the first mailing list was created to talk about the idea of using Arpanet for discussion. What had initially propelled the Arpanet project forward as a resource sharing platform was gradually replaced by the idea of a network as a means of bringing people together <xref target="Abbate"/>. More than 45 years later, mailing lists are pervasive and help communities to engage, have discussions, share information, ask questions, and build ties. Even as social media and discussion forums grow, mailing lists continue to be widely used <xref target="AckermannKargerZhang"/> and are still a crucial tool to organise groups and individuals around themes and causes <xref target="APC3"/>.</t>
          <t>Mailing lists’ pervasive use are partly explained because they allow for free and low-cost association: people subscribe (join) and unsubscribe (leave) as they please. Another contributor to their widespread use is that email functions on low bandwith connections and across platforms. Mailing lists also allow for association of specific groups on closed lists. This enables agency of membership, a key component of freedom of association and assembly.</t>
          <t>As we mentioned before, there are interesting implications for freedom of association and assembly when looking at spam mitigation. Here we want to specifically note that if we consider that the rights to assembly and association also mean that "no one may be compelled to belong to an association" <xref target="UDHR"/>, spam infringes both rights if an opt-out mechanism is not provided and people are obliged to receive unwanted information, or be reached by people they do not wish to be in contact with.</t>
        </section>
      </section>
      <section anchor="civics-in-cyberspace-messaging-conferencing-and-networking">
        <name>Civics in Cyberspace: Messaging, Conferencing, and Networking</name>
        <artwork><![CDATA[
What are the features of protocols that enable freedom of 
association and assembly?
]]></artwork>
        <t>Civic participation is often expressed as the freedom to associate and assemble, along with other enabling rights such as freedom of expression and the right to privacy. Former UN Special Rapporteur David Kaye established a strong relationship between technology that allows anonymity and uses encryption with positive effects on freedom of expression <xref target="Kaye"/>. Here we look at messaging, including email, mailing lists and internet relay chat; video conferencing; and peer-to-peer networking protocols to investigate the common features that enable freedom of association and assembly online.</t>
        <section anchor="email">
          <name>Email</name>
          <t>Email was one of the first applications of the early Internet that showed what the architecture was really capable of, allowing people to exchange messages much faster and more cheaply than communication networks could do before. This enabled many collaborations among academics and other users of the early network, showcasing the importance of email in the forming of assemblies and associations. Whereas many messaging solutions have been invented since email, it is still widely used because of its distributed architecture, reliability, and ability to function on a wide range of devices and platforms.</t>
        </section>
        <section anchor="mailing-lists-1">
          <name>Mailing lists</name>
          <t>Not only are mailing lists a good example of how protocols can facilitate the necessary ingredient of agency in freedom of association, we can see how particular features of mailing lists enable or inhibit freedom of association and assembly.</t>
          <t>The archival function of mailing lists allows for posterior accountability and analysis.</t>
          <t>The ubiquity and interoperability of email, and by extension mailing lists, provides a low barrier to entry to an inclusive medium.</t>
          <t>Association and assembly online can be undermined when right to privacy is at risk. One downside of mailing lists are the privacy and security concerns generally associated with email. End-to-end encryption with OpenPGP <xref target="RFC4880"/> and S​/​MIME <xref target="RFC5751"/> can keep email communications authenticated and confidential if properly configured, deployed and used, but users often do not have those protections. And with mailing lists, this protection is not typically possible, because with many lists the final recipients are not known to the sender. There have been experimental solutions to address this issue <xref target="Schleuder"/>, but this has not been standardized or widely deployed.</t>
        </section>
        <section anchor="irc">
          <name>IRC</name>
          <t>Internet Relay Chat (IRC) is an application layer protocol that enables communication in the form of text through a client/server networking model <xref target="RFC2810"/>: a chat service. IRC clients are computer programs that a user can install on their system. These clients communicate with chat servers to transfer messages to other clients. Features of IRC include: federated design, transport encryption, one-to-many routing, creation of topic-based “channels”, and spam or abuse moderation.</t>
          <t>IRC servers may deploy different policies for the ability of users to create their own channels or ‘rooms’, and for the delegation of ‘operator’-rights in such spaces. Some IRC servers support SSL/TLS connections for security purposes <xref target="RFC7194"/> which helps stop the use of packet sniffer programs to obtain the passwords of IRC users and barring an ISP or government from knowing which user I am on IRC, but has little use beyond this scope due to the public nature of IRC channels. TLS connections require both client and server support (that may require the user to install TLS binaries and IRC client specific patches or modules on their computers). Some networks also use TLS for server to server connections, and provide a special channel flag (such as +S) to only allow TLS-connected users on the channel, while disallowing operator identification in clear text, to better utilize the advantages that TLS provides.</t>
          <t>For the purposes of civic participation and freedom of association and assembly in particular, it is critical that IRC’s federated design allows many interoperable, yet customisable, instances and basic assurance of confidentiality through transport encryption. IRC differs from email in the sense that it allows for real-time interaction, stimulating the sense of conversation. This allows people to organize, develop ideas as well as joint identities. This is strengthened through the federated nature of IRC, which gives users the ability to use and connect through different servers, contributing to freedom of association. We investigate the particular aspect of agency in membership through moderation in the section 'Block Together Now: IRC and Refusals' below.</t>
        </section>
        <section anchor="webrtc">
          <name>WebRTC</name>
          <t>Multi-party video conferencing protocols like WebRTC <xref target="RFC6176"/> <xref target="RFC7118"/> allow for robust, bandwidth-adaptive, wideband and super-wideband video and audio discussions in groups. This facilitates exchanges over the Internet in a similar manner to IRC, but including the usage of audio and video. WebRTC can be configured as direct peer-to-peer videochat without sending data through a central server. This ability to function without a central server is a strong facilitator of freedom of association and assembly.</t>
          <t>However, WebRTC comes with many different configuration options, which can leave users open to unexpected privacy leakages:</t>
          <artwork><![CDATA[
‘The WebRTC protocol was designed to enable responsive real-time
communications over the Internet, and is instrumental in 
allowing streaming video and conferencing applications to run in 
the browser. In order to easily facilitate direct connections
between computers (bypassing the need for a central server to act 
as a gatekeeper), WebRTC provides functionality to automatically 
collect the local and public IP addresses of Internet users (ICE 
or STUN). These functions do not require consent from the user,
and can be instantiated by sites that a user visits without their 
awareness. The potential privacy implications of this aspect of 
WebRTC are well documented, and certain browsers have provided 
options to limit its behavior.’ 
]]></artwork>
          <t><xref target="AndersonGuarnieri"/></t>
          <t>Even though some multi-party video conferencing tools facilitate freedom of assembly and association, their own configuration might pose concrete risks for those who use them. On the one hand WebRTC is providing resilient channels of communications, but on the other hand it also exposes information about those who are using the tool which might lead to increased surveillance, identification and the consequences that might be derived from that. This is especially concerning because the usage of a VPN does not protect against the exposure of IP addresses <xref target="Crawford"/>.</t>
          <t>The risk of surveillance also exists in offline spaces, but may generally be easier to analyze for the user. Security and privacy expectations of the user could be either improved or made explicit. This in turn would result in a more secure and private exercise of the right to freedom of assembly or association.</t>
        </section>
        <section anchor="peer-to-peer-networking">
          <name>Peer-to-peer networking</name>
          <t>Since the ARPANET project, the original idea behind the Internet was conceived as what we would now call a peer-to-peer system <xref target="RFC0001"/>. Over time it has increasingly shifted towards a client/server model with “millions of consumer clients communicating with a relatively privileged set of servers” <xref target="NelsonHedlun"/>. However, the foundational networking protocol of the modern Internet, the Border Gateway Protocol <xref target="RFC1163"/> <xref target="RFC1164"/> <xref target="RFC4271"/>, still functions like original peer to peer network, with an extensive practice of peering and transit <xref target="MeierHahn2015"/>. For an example higher up the stack one could look at the peer-to-peer architecture of BitTorrent <xref target="RFC5694"/>.</t>
          <t>At the organizational level, peer production is one of the most relevant innovations from Internet mediated social practices. According to <xref target="Benkler"/> these networks imply "open collaborative innovation and creation, performed by diverse, decentralized groups organized principally by neither price signals nor organizational hierarchy, harnessing heterogeneous motivations, and governed and managed based on principles other than the residual authority of ownership implemented through contract."</t>
          <t>In his book The Wealth of Networks, <xref target="Benkler2"/> significantly expands on his definition of commons-based peer production. In his view, what distinguishes commons-based production is that it doesn’t rely upon or propagate proprietary knowledge: “The inputs and outputs of the process are shared, freely or conditionally, in an institutional form that leaves them equally available for all to use as they choose at their individual discretion.” To ensure that the knowledge generated is available for free use, commons-based projects are often shared under an open license</t>
          <t>Peer-to-peer (P2P) is essentially a model of how people interact in real life because “we deal directly with one another whenever we wish to” <xref target="Vu"/>. Usually if we need something we ask our peers, who in turn refer us to other peers. In this sense, the ideal definition of P2P is that “nodes are able to directly exchange resources and services between themselves without the need for centralized servers” where each participating node typically acts both as a server and as a client <xref target="Vu"/>. <xref target="RFC5694"/> has defined the architecture as peers or nodes that should be able to communicate directly between themselves without passing intermediaries, and that the system should be self-organizing and have decentralized control. With this in mind, the ultimate model of P2P is a completely decentralized system, which is more resistant to speech regulation, immune to single points of failure and has a higher performance and scalability. Nonetheless, in practice some P2P systems are supported by centralized servers and some others have hybrid models where nodes are organized into two layers: the upper tier servers and the lower tier common nodes <xref target="Vu"/>.</t>
          <t>Whether for resource sharing or data sharing, P2P systems enable freedom of assembly and association. Not only do they allow for effective dissemination of information, but they also leverage computing resources and diminish the costs for the formation of open collectives at the network level. At the same time, in completely decentralized systems the nodes are autonomous and can join or leave the network as they want. This makes the system unpredictable: a resource might be only sometimes available, and some other resources might be missing or incomplete <xref target="Vu"/>. Lack of information might in turn make association or assembly more difficult.</t>
        </section>
      </section>
      <section anchor="universal-access-the-web">
        <name>Universal Access: The Web</name>
        <artwork><![CDATA[
Does protocol development sufficiently consider usable and accessible 
formats and technologies appropriate for persons with different kinds 
of abilities?
]]></artwork>
        <section anchor="accessibility">
          <name>Accessibility</name>
          <t>The W3C has done significant work to ensure that the Web is accessible to people with diverse physical abilities <xref target="W3C"/>. For example, the implementation of accessibility standards helps people who have issues with seeing or rendering images to understand what the image depicts. Making the Web more accessible for people with diverse physical abilities enables them to exercise their right to online assembly and association. While there are accessibility standards implemented for the Web, this is less the case for the Internet.</t>
        </section>
        <section anchor="internationalization">
          <name>Internationalization</name>
          <t>The IETF uses English as its primary working language, both in its documentation and in its communication. This is also the case for reference implementations. It is estimated that roughly 20% of the Earth’s population speaks English, whereas only 360 million speak English as their first language. <xref target="RFC2277"/> states that ‘"Internationalization is for humans. This means that protocols are not subject to internationalization; text strings are.", this implies that protocol developers, as well as people that work with protocols, are not people, or that protocol developers all speak English. As a result, it may be significantly easier for people who have a command of the English language to become a protocol developer. It could also lead to a divergence, with the development of separate protocols that are developed within large language communities that don't use English language or Latin script. This makes it harder for people who seek to shape their own space of association and assembly on the Internet to do so. Communities may therefore be driven to rely on proprietary and non-interoperable services, such as Facebook and Weibo, where use of their own script and language is supported.</t>
          <t>When Ramsey Nasser developed the Arabic programming language قلب (transliterated Qalb, Qlb and Alb) <xref target="Nasser"/> he called it "engineering performance art" instead of engineering, because he knew that his language would not work. In part this is because historically programming tools used the ASCII character set, which encodes Latin characters and was based on the English language. Though modern tools use Unicode, there persist cultural biases in computer science and engineering down to the level of code. Despite long significant efforts, it is still largely impossible to register an email address in a language such as Devanagari, Arabic, or Chinese. Even where possible, it is to be expected that there will be a significant failure rate in sending and receiving emails to and from other services. This makes it harder for people who do not speak English and/or don’t use the Latin script to exercise their freedom of association and assembly.</t>
        </section>
      </section>
      <section anchor="block-together-now-irc-and-refusals">
        <name>Block Together Now: IRC and Refusals</name>
        <artwork><![CDATA[
Can a protocol be designed to legitimately exclude someone 
from an association?
]]></artwork>
        <t>Previously we spoke about the privacy protecting features of IRC that enable freedom of association and assembly, including transport security. But now we turn to the ability to block users and effectively moderate discussions on IRC as a key feature of the technology that enables agency in membership, a key aspect of freedom of association and assembly.</t>
        <t>For order to be kept within the IRC network, special classes of users become “operators” and are allowed to perform general maintenance functions on the network: basic network tasks such as disconnecting (temporary or permanently) and reconnecting servers as needed <xref target="RFC2812"/>. One of the most controversial powers of operators is the ability to remove a user from the connected network by ‘force’, i.e., operators are able to close the connection between any client and server <xref target="RFC2812"/>.</t>
        <t>Moderation and de-federation can be a tool to uphold freedom of association and assembly, because it allows groups to have control over their own make up. IRC servers may deploy different policies for the ability of users to create their own channels or ‘rooms’, and for the delegation of ‘operator’-rights in such spaces. However, these controls can also seriously hamper the ability of a group to get together. Some argue that the low cost of creating a new group is a protection against this, however, this could lead to a repetition of crises of moderation of membership and speech.</t>
      </section>
    </section>
    <section anchor="conclusions-what-can-we-learn-from-these-case-studies">
      <name>Conclusions: What can we learn from these case studies?</name>
      <t>Communities, collaboration and joint action lie at the heart of the Internet. Even at a linguistic level, the words "networks" and "associations" are closely related.  Both are groups and assemblies of people who depend on "links" and "relationships" <xref target="Swire"/>. Taking legal definitions given in international human rights law and related normative documents, we can easily conclude that the rights to freedom of assembly and association protect collective activity online. These rights protect gatherings by persons for a specific purpose and groups with a defined aim over time for a variety of peaceful, expressive and non-expressive purposes, if and when participation is voluntary and uncoerced.</t>
      <t>Given that the Internet itself was originally designed as a medium of communication for machines that share resources with each other as equals <xref target="RFC0903"/>, the Internet is now one of the most basic infrastructures for assembly and association. Since Internet protocols and the Internet architecture play a central role in the management, development and use of the Internet, we established the relation between protocols and the right to freedom of assembly and association.</t>
      <t>After reviewing several cases representative of FAA considerations inherent in protocols standardized at the IETF, we can conclude that the way in which infrastructure is designed and implemented impacts people's ability to exercise their freedom of assembly and association. This is because different technical designs come with different properties and characteristics. These properties and characteristics on the one hand enable people to assemble and associate, but on the other hand also add limiting, or even potentially endangering, characteristics. More often than not, this depends on the context. A clearly identified group for open communications, where messages are sent in cleartext and where people's persistent identities are visible, can help to facilitate an assembly and build trust, but in other contexts the same configuration could pose a significant danger. Endangering characteristics should be mitigated, or at least clearly communicated to the users of these technologies. It is therefore recommended that the potential impacts of Internet technologies should be assessed, reflecting recommendations of various UN bodies and international norms.</t>
      <t>Lastly, the increasing shift away from federated and interoperable messaging exchange towards closed platforms with non-interoperable chat and media-sharing functionality have a significant impact on the distributed and open nature of the use of the Internet. Often these platforms are built on open protocols but do not allow for interoperability or data portability. Future research could further investigate how the use of social media platforms has enabled individuals to associate in groups, but at the same time rendered those groups unable to change or transcend platforms, therefore leading to sorts of "bounded association" and "forced association" both of which inhibit people from fully exercising their freedom of assembly and association.</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <ul spacing="normal">
        <li>Gisela Perez de Acha for co-authoring the first versions of this document</li>
        <li>Fred Baker and Jefsey for work on Internet definitions.</li>
        <li>Stephane Bortzmeyer, ICNL, and Lisa Vermeer for several concrete text suggestions that found their way in this document.</li>
        <li>Mark Perkins and Gurshabad for finding a lot of typos.</li>
        <li>Nick Doty, Gurshabad Grover, an anonymous reviewer, ICNL, Lisa Vermeer, and Sandra Braman for full reviews.</li>
        <li>The hrpc mailinglist at large for a very constructive discussion on a hard topic.</li>
        <li>Efforts put in this document by Niels ten Oever were made possible through funding from the Ford Foundation, the Open Technology Fund, and the Dutch Research Council (NWO) through grant MVI.19.032 as part of the program 'Maatschappelijk Verantwoord Innoveren (MVI)'.</li>
      </ul>
    </section>
    <section anchor="work-space">
      <name>Work Space</name>
      <t>Current work on this draft is happening at: https://github.com/IRTF-HRPC/draft-association
Pull requests and issues are welcome.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>As this draft concerns a research document, there are no security considerations.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no actions for IANA.</t>
    </section>
    <section anchor="research-group-information">
      <name>Research Group Information</name>
      <t>The discussion list for the IRTF Human Rights Protocol Considerations Research Group is located at the e-mail address <eref target="mailto:hrpc@ietf.org">hrpc@ietf.org</eref>. Information on the group and information on how to
subscribe to the list is at <eref target="https://www.irtf.org/mailman/listinfo/hrpc">https://www.irtf.org/mailman/listinfo/hrpc</eref></t>
      <t>Archives of the list can be found at:
<eref target="https://www.irtf.org/mail-archive/web/hrpc/current/index.html">https://www.irtf.org/mail-archive/web/hrpc/current/index.html</eref></t>
    </section>
  </middle>
  <back>
    <references>
      <name>Informative References</name>
      <reference anchor="RFC0001">
        <front>
          <title>Host Software</title>
          <author fullname="S. Crocker" initials="S." surname="Crocker">
            <organization/>
          </author>
          <date month="April" year="1969"/>
        </front>
        <seriesInfo name="RFC" value="1"/>
        <seriesInfo name="DOI" value="10.17487/RFC0001"/>
      </reference>
      <reference anchor="RFC0155">
        <front>
          <title>ARPA Network mailing lists</title>
          <author fullname="J.B. North" initials="J.B." surname="North">
            <organization/>
          </author>
          <date month="May" year="1971"/>
        </front>
        <seriesInfo name="RFC" value="155"/>
        <seriesInfo name="DOI" value="10.17487/RFC0155"/>
      </reference>
      <reference anchor="RFC0903">
        <front>
          <title>A Reverse Address Resolution Protocol</title>
          <author fullname="R. Finlayson" initials="R." surname="Finlayson">
            <organization/>
          </author>
          <author fullname="T. Mann" initials="T." surname="Mann">
            <organization/>
          </author>
          <author fullname="J.C. Mogul" initials="J.C." surname="Mogul">
            <organization/>
          </author>
          <author fullname="M. Theimer" initials="M." surname="Theimer">
            <organization/>
          </author>
          <date month="June" year="1984"/>
          <abstract>
            <t>This RFC suggests a method for workstations to dynamically find their    protocol address (e.g., their Internet Address), when they know only    their hardware address (e.g., their attached physical network address).    This RFC specifies a proposed protocol for the ARPA Internet community,    and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="38"/>
        <seriesInfo name="RFC" value="903"/>
        <seriesInfo name="DOI" value="10.17487/RFC0903"/>
      </reference>
      <reference anchor="RFC1163">
        <front>
          <title>Border Gateway Protocol (BGP)</title>
          <author fullname="K. Lougheed" initials="K." surname="Lougheed">
            <organization/>
          </author>
          <author fullname="Y. Rekhter" initials="Y." surname="Rekhter">
            <organization/>
          </author>
          <date month="June" year="1990"/>
          <abstract>
            <t>This RFC, together with its companion RFC-1164, "Application of the Border Gateway Protocol in the Internet", specify an inter-autonomous system routing protocol for the Internet.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="1163"/>
        <seriesInfo name="DOI" value="10.17487/RFC1163"/>
      </reference>
      <reference anchor="RFC1164">
        <front>
          <title>Application of the Border Gateway Protocol in the Internet</title>
          <author fullname="J.C. Honig" initials="J.C." surname="Honig">
            <organization/>
          </author>
          <author fullname="D. Katz" initials="D." surname="Katz">
            <organization/>
          </author>
          <author fullname="M. Mathis" initials="M." surname="Mathis">
            <organization/>
          </author>
          <author fullname="Y. Rekhter" initials="Y." surname="Rekhter">
            <organization/>
          </author>
          <author fullname="J.Y. Yu" initials="J.Y." surname="Yu">
            <organization/>
          </author>
          <date month="June" year="1990"/>
          <abstract>
            <t>This RFC, together with its companion RFC-1163, "A Border Gateway Protocol (BGP)", specify an inter-autonomous system routing protocol for the Internet.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="1164"/>
        <seriesInfo name="DOI" value="10.17487/RFC1164"/>
      </reference>
      <reference anchor="RFC1211">
        <front>
          <title>Problems with the maintenance of large mailing lists</title>
          <author fullname="A. Westine" initials="A." surname="Westine">
            <organization/>
          </author>
          <author fullname="J. Postel" initials="J." surname="Postel">
            <organization/>
          </author>
          <date month="March" year="1991"/>
          <abstract>
            <t>This RFC discusses problems with maintaining large mailing lists, especially the processing of error reports.  This memo provides information for the Internet community.  It does not specify an Internet standard.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="1211"/>
        <seriesInfo name="DOI" value="10.17487/RFC1211"/>
      </reference>
      <reference anchor="RFC1771">
        <front>
          <title>A Border Gateway Protocol 4 (BGP-4)</title>
          <author fullname="Y. Rekhter" initials="Y." surname="Rekhter">
            <organization/>
          </author>
          <author fullname="T. Li" initials="T." surname="Li">
            <organization/>
          </author>
          <date month="March" year="1995"/>
          <abstract>
            <t>This document, together with its companion document, "Application of the Border Gateway Protocol in the Internet", define an inter-autonomous system routing protocol for the Internet. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="1771"/>
        <seriesInfo name="DOI" value="10.17487/RFC1771"/>
      </reference>
      <reference anchor="RFC1930">
        <front>
          <title>Guidelines for creation, selection, and registration of an Autonomous System (AS)</title>
          <author fullname="J. Hawkinson" initials="J." surname="Hawkinson">
            <organization/>
          </author>
          <author fullname="T. Bates" initials="T." surname="Bates">
            <organization/>
          </author>
          <date month="March" year="1996"/>
          <abstract>
            <t>This memo discusses when it is appropriate to register and utilize an Autonomous System (AS), and lists criteria for such.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="6"/>
        <seriesInfo name="RFC" value="1930"/>
        <seriesInfo name="DOI" value="10.17487/RFC1930"/>
      </reference>
      <reference anchor="RFC2277">
        <front>
          <title>IETF Policy on Character Sets and Languages</title>
          <author fullname="H. Alvestrand" initials="H." surname="Alvestrand">
            <organization/>
          </author>
          <date month="January" year="1998"/>
          <abstract>
            <t>This document is the current policies being applied by the Internet Engineering Steering Group (IESG) towards the standardization efforts in the Internet Engineering Task Force (IETF) in order to help Internet protocols fulfill these requirements.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="18"/>
        <seriesInfo name="RFC" value="2277"/>
        <seriesInfo name="DOI" value="10.17487/RFC2277"/>
      </reference>
      <reference anchor="RFC2810">
        <front>
          <title>Internet Relay Chat: Architecture</title>
          <author fullname="C. Kalt" initials="C." surname="Kalt">
            <organization/>
          </author>
          <date month="April" year="2000"/>
          <abstract>
            <t>This document is an update describing the architecture of the current IRC protocol and the role of its different components.  Other documents describe in detail the protocol used between the various components defined here.  This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="2810"/>
        <seriesInfo name="DOI" value="10.17487/RFC2810"/>
      </reference>
      <reference anchor="RFC2812">
        <front>
          <title>Internet Relay Chat: Client Protocol</title>
          <author fullname="C. Kalt" initials="C." surname="Kalt">
            <organization/>
          </author>
          <date month="April" year="2000"/>
          <abstract>
            <t>This document defines the Client Protocol, and assumes that the reader is familiar with the IRC Architecture.  This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="2812"/>
        <seriesInfo name="DOI" value="10.17487/RFC2812"/>
      </reference>
      <reference anchor="RFC3233">
        <front>
          <title>Defining the IETF</title>
          <author fullname="P. Hoffman" initials="P." surname="Hoffman">
            <organization/>
          </author>
          <author fullname="S. Bradner" initials="S." surname="Bradner">
            <organization/>
          </author>
          <date month="February" year="2002"/>
          <abstract>
            <t>This document gives a more concrete definition of "the IETF" as it understood today.  Many RFCs refer to "the IETF".  Many important IETF documents speak of the IETF as if it were an already-defined entity. However, no IETF document correctly defines what the IETF is.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="58"/>
        <seriesInfo name="RFC" value="3233"/>
        <seriesInfo name="DOI" value="10.17487/RFC3233"/>
      </reference>
      <reference anchor="RFC1958">
        <front>
          <title>Architectural Principles of the Internet</title>
          <author fullname="B. Carpenter" initials="B." role="editor" surname="Carpenter">
            <organization/>
          </author>
          <date month="June" year="1996"/>
          <abstract>
            <t>The Internet and its architecture have grown in evolutionary fashion from modest beginnings, rather than from a Grand Plan. While this process of evolution is one of the main reasons for the technology's success, it nevertheless seems useful to record a snapshot of the current principles of the Internet architecture. This is intended for general guidance and general interest, and is in no way intended to be a formal or invariant reference model.  This memo provides information for the Internet community.  This memo does not specify an Internet standard of any kind.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="1958"/>
        <seriesInfo name="DOI" value="10.17487/RFC1958"/>
      </reference>
      <reference anchor="RFC4084">
        <front>
          <title>Terminology for Describing Internet Connectivity</title>
          <author fullname="J. Klensin" initials="J." surname="Klensin">
            <organization/>
          </author>
          <date month="May" year="2005"/>
          <abstract>
            <t>As the Internet has evolved, many types of arrangements have been advertised and sold as "Internet connectivity".  Because these may differ significantly in the capabilities they offer, the range of options, and the lack of any standard terminology, the effort to distinguish between these services has caused considerable consumer confusion.  This document provides a list of terms and definitions that may be helpful to providers, consumers, and, potentially, regulators in clarifying the type and character of services being offered.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="104"/>
        <seriesInfo name="RFC" value="4084"/>
        <seriesInfo name="DOI" value="10.17487/RFC4084"/>
      </reference>
      <reference anchor="RFC4271">
        <front>
          <title>A Border Gateway Protocol 4 (BGP-4)</title>
          <author fullname="Y. Rekhter" initials="Y." role="editor" surname="Rekhter">
            <organization/>
          </author>
          <author fullname="T. Li" initials="T." role="editor" surname="Li">
            <organization/>
          </author>
          <author fullname="S. Hares" initials="S." role="editor" surname="Hares">
            <organization/>
          </author>
          <date month="January" year="2006"/>
          <abstract>
            <t>This document discusses the Border Gateway Protocol (BGP), which is an inter-Autonomous System routing protocol.</t>
            <t>The primary function of a BGP speaking system is to exchange network reachability information with other BGP systems.  This network reachability information includes information on the list of Autonomous Systems (ASes) that reachability information traverses. This information is sufficient for constructing a graph of AS connectivity for this reachability from which routing loops may be pruned, and, at the AS level, some policy decisions may be enforced.</t>
            <t>BGP-4 provides a set of mechanisms for supporting Classless Inter-Domain Routing (CIDR).  These mechanisms include support for advertising a set of destinations as an IP prefix, and eliminating the concept of network "class" within BGP.  BGP-4 also introduces mechanisms that allow aggregation of routes, including aggregation of AS paths.</t>
            <t>This document obsoletes RFC 1771.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="4271"/>
        <seriesInfo name="DOI" value="10.17487/RFC4271"/>
      </reference>
      <reference anchor="RFC4880">
        <front>
          <title>OpenPGP Message Format</title>
          <author fullname="J. Callas" initials="J." surname="Callas">
            <organization/>
          </author>
          <author fullname="L. Donnerhacke" initials="L." surname="Donnerhacke">
            <organization/>
          </author>
          <author fullname="H. Finney" initials="H." surname="Finney">
            <organization/>
          </author>
          <author fullname="D. Shaw" initials="D." surname="Shaw">
            <organization/>
          </author>
          <author fullname="R. Thayer" initials="R." surname="Thayer">
            <organization/>
          </author>
          <date month="November" year="2007"/>
          <abstract>
            <t>This document is maintained in order to publish all necessary information needed to develop interoperable applications based on the OpenPGP format.  It is not a step-by-step cookbook for writing an application.  It describes only the format and methods needed to read, check, generate, and write conforming packets crossing any network.  It does not deal with storage and implementation questions. It does, however, discuss implementation issues necessary to avoid security flaws.</t>
            <t>OpenPGP software uses a combination of strong public-key and symmetric cryptography to provide security services for electronic communications and data storage.  These services include confidentiality, key management, authentication, and digital signatures.  This document specifies the message formats used in OpenPGP.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="4880"/>
        <seriesInfo name="DOI" value="10.17487/RFC4880"/>
      </reference>
      <reference anchor="RFC5694">
        <front>
          <title>Peer-to-Peer (P2P) Architecture: Definition, Taxonomies, Examples, and Applicability</title>
          <author fullname="G. Camarillo" initials="G." role="editor" surname="Camarillo">
            <organization/>
          </author>
          <author>
            <organization>IAB</organization>
          </author>
          <date month="November" year="2009"/>
          <abstract>
            <t>In this document, we provide a survey of P2P (Peer-to-Peer) systems. The survey includes a definition and several taxonomies of P2P systems.  This survey also includes a description of which types of applications can be built with P2P technologies and examples of P2P applications that are currently in use on the Internet.  Finally, we discuss architectural trade-offs and provide guidelines for deciding whether or not a P2P architecture would be suitable to meet the requirements of a given application.  This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5694"/>
        <seriesInfo name="DOI" value="10.17487/RFC5694"/>
      </reference>
      <reference anchor="RFC5751">
        <front>
          <title>Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 3.2 Message Specification</title>
          <author fullname="B. Ramsdell" initials="B." surname="Ramsdell">
            <organization/>
          </author>
          <author fullname="S. Turner" initials="S." surname="Turner">
            <organization/>
          </author>
          <date month="January" year="2010"/>
          <abstract>
            <t>This document defines Secure/Multipurpose Internet Mail Extensions (S/MIME) version 3.2.  S/MIME provides a consistent way to send and receive secure MIME data.  Digital signatures provide authentication, message integrity, and non-repudiation with proof of origin. Encryption provides data confidentiality.  Compression can be used to reduce data size.  This document obsoletes RFC 3851.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5751"/>
        <seriesInfo name="DOI" value="10.17487/RFC5751"/>
      </reference>
      <reference anchor="RFC6176">
        <front>
          <title>Prohibiting Secure Sockets Layer (SSL) Version 2.0</title>
          <author fullname="S. Turner" initials="S." surname="Turner">
            <organization/>
          </author>
          <author fullname="T. Polk" initials="T." surname="Polk">
            <organization/>
          </author>
          <date month="March" year="2011"/>
          <abstract>
            <t>This document requires that when Transport Layer Security (TLS) clients and servers establish connections, they never negotiate the use of  Secure Sockets Layer (SSL) version 2.0.  This document updates the  backward compatibility sections found in the Transport Layer Security (TLS). [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6176"/>
        <seriesInfo name="DOI" value="10.17487/RFC6176"/>
      </reference>
      <reference anchor="RFC7118">
        <front>
          <title>The WebSocket Protocol as a Transport for the Session Initiation Protocol (SIP)</title>
          <author fullname="I. Baz Castillo" initials="I." surname="Baz Castillo">
            <organization/>
          </author>
          <author fullname="J. Millan Villegas" initials="J." surname="Millan Villegas">
            <organization/>
          </author>
          <author fullname="V. Pascual" initials="V." surname="Pascual">
            <organization/>
          </author>
          <date month="January" year="2014"/>
          <abstract>
            <t>The WebSocket protocol enables two-way real-time communication between clients and servers in web-based applications.  This document specifies a WebSocket subprotocol as a reliable transport mechanism between Session Initiation Protocol (SIP) entities to enable use of SIP in web-oriented deployments.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7118"/>
        <seriesInfo name="DOI" value="10.17487/RFC7118"/>
      </reference>
      <reference anchor="RFC7194">
        <front>
          <title>Default Port for Internet Relay Chat (IRC) via TLS/SSL</title>
          <author fullname="R. Hartmann" initials="R." surname="Hartmann">
            <organization/>
          </author>
          <date month="August" year="2014"/>
          <abstract>
            <t>This document describes the commonly accepted practice of listening on TCP port 6697 for incoming Internet Relay Chat (IRC) connections encrypted via TLS/SSL.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7194"/>
        <seriesInfo name="DOI" value="10.17487/RFC7194"/>
      </reference>
      <reference anchor="RFC8280">
        <front>
          <title>Research into Human Rights Protocol Considerations</title>
          <author fullname="N. ten Oever" initials="N." surname="ten Oever">
            <organization/>
          </author>
          <author fullname="C. Cath" initials="C." surname="Cath">
            <organization/>
          </author>
          <date month="October" year="2017"/>
          <abstract>
            <t>This document aims to propose guidelines for human rights considerations, similar to the work done on the guidelines for privacy considerations (RFC 6973).  The other parts of this document explain the background of the guidelines and how they were developed.</t>
            <t>This document is the first milestone in a longer-term research effort.  It has been reviewed by the Human Rights Protocol Considerations (HRPC) Research Group and also by individuals from outside the research group.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8280"/>
        <seriesInfo name="DOI" value="10.17487/RFC8280"/>
      </reference>
      <reference anchor="UDHR" target="http://www.un.org/en/documents/udhr/">
        <front>
          <title>The Universal Declaration of Human Rights</title>
          <author>
            <organization>United Nations General Assembly</organization>
          </author>
          <date year="1948"/>
        </front>
      </reference>
      <reference anchor="ICCPR" target="http://www.ohchr.org/EN/ProfessionalInterest/Pages/CCPR.aspx">
        <front>
          <title>International Covenant on Civil and Political Rights</title>
          <author>
            <organization>United Nations General Assembly</organization>
          </author>
          <date year="1966"/>
        </front>
      </reference>
      <reference anchor="HussainHoward" target="https://doi.org/10.1111/misr.12020">
        <front>
          <title>What Best Explains Successful Protest Cascades? ICTs and the Fuzzy Causes of the Arab Spring</title>
          <author initials="M. M." surname="Hussain">
            <organization/>
          </author>
          <author initials="P. N." surname="Howard">
            <organization/>
          </author>
          <date year="2013"/>
        </front>
        <seriesInfo name="Int Stud Rev (2013) 15 (1): 48-66." value=""/>
      </reference>
      <reference anchor="APC" target="https://www.apc.org/es/system/files/FOAA_online_IndiaMalaysiaPakistan.pdf">
        <front>
          <title>Freedom of assembly and association online in India, Malaysia and Pakistan. Trends, challenges and recommendations.</title>
          <author>
            <organization>Association for Progressive Communications</organization>
          </author>
          <author initials="" surname="Gayathry Venkiteswaran">
            <organization/>
          </author>
          <date year="2016"/>
        </front>
      </reference>
      <reference anchor="Swire" target="https://ssrn.com/abstract=1989516 or http://dx.doi.org/10.2139/ssrn.1989516">
        <front>
          <title>Social Networks, Privacy, and Freedom of Association: Data Empowerment vs. Data Protection</title>
          <author initials="" surname="Peter Swire">
            <organization/>
          </author>
          <date year="2012"/>
        </front>
        <seriesInfo name="North Carolina Law Review (2012) 90 (1): 104." value=""/>
      </reference>
      <reference anchor="UNGA" target="http://www.un.org/en/ga/search/view_doc.asp?symbol=A/59/401 para. 46">
        <front>
          <title>Human rights defenders</title>
          <author initials="" surname="Hina Jilani">
            <organization/>
          </author>
          <date year="2004"/>
        </front>
        <seriesInfo name="A/59/401" value=""/>
      </reference>
      <reference anchor="HafnerandLyon" target="https://doi.org/10.1111/misr.12020">
        <front>
          <title>Where Wizards Stay Up Late. The Origins of the Internet</title>
          <author initials="K." surname="Hafnerand">
            <organization/>
          </author>
          <author initials="M." surname="Lyon">
            <organization/>
          </author>
          <date year="1998"/>
        </front>
        <seriesInfo name="First Touchstone Edition (1998): 93." value=""/>
      </reference>
      <reference anchor="Pensado" target="http://revista.drclas.harvard.edu/book/student-activism">
        <front>
          <title>Student Activism. Utopian Dreams.</title>
          <author initials="" surname="Jaime Pensado">
            <organization/>
          </author>
          <date year="2012"/>
        </front>
        <seriesInfo name="ReVista. Harvard Review of Latin America (2012)." value=""/>
      </reference>
      <reference anchor="Abbate" target="https://mitpress.mit.edu/books/inventing-internet">
        <front>
          <title>Inventing the Internet</title>
          <author initials="" surname="Janet Abbate">
            <organization/>
          </author>
          <date year="2013"/>
        </front>
        <seriesInfo name="Cambridge: MIT Press (2013): 11." value=""/>
      </reference>
      <reference anchor="AckermannKargerZhang" target="https://people.csail.mit.edu/axz/papers/mailinglists.pdf">
        <front>
          <title>Mailing Lists: Why Are They Still Here, What’s Wrong With Them, and How Can We Fix Them?</title>
          <author initials="M. S." surname="Ackerman">
            <organization/>
          </author>
          <author initials="D. R." surname="Karger">
            <organization/>
          </author>
          <author initials="A. X." surname="Zhang">
            <organization/>
          </author>
          <date year="2017"/>
        </front>
        <seriesInfo name="Mit. edu (2017): 1." value=""/>
      </reference>
      <reference anchor="Benkler" target="http://www.benkler.org/Peer%20production%20and%20cooperation%2009.pdf">
        <front>
          <title>Peer Production and Cooperation</title>
          <author initials="Y." surname="Benkler">
            <organization/>
          </author>
          <date year="2009"/>
        </front>
      </reference>
      <reference anchor="AndersonGuarnieri" target="https://iranthreats.github.io/resources/webrtc-deanonymization/">
        <front>
          <title>Fictitious Profiles and WebRTC's Privacy Leaks Used to Identify Iranian Activists</title>
          <author initials="C." surname="Anderson">
            <organization/>
          </author>
          <author initials="C." surname="Guarnieri">
            <organization/>
          </author>
          <date year="2016"/>
        </front>
      </reference>
      <reference anchor="NelsonHedlun" target="http://library.uniteddiversity.coop/REconomy_Resource_Pack/More_Inspirational_Videos_and_Useful_Info/Peer_to_Peer-Harnessing_the_Power_of_Disruptive_Technologies.pdf">
        <front>
          <title>A Network of Peers: Models Through the History of the Internet</title>
          <author initials="N." surname="Minar">
            <organization/>
          </author>
          <author initials="M." surname="Hedlun">
            <organization/>
          </author>
          <date year="2001"/>
        </front>
        <seriesInfo name="Peer to Peer: Harnessing the Power of Disruptive Technologies, ed: Andy Oram" value=""/>
      </reference>
      <reference anchor="Vu" target="https://www.springer.com/cn/book/9783642035135">
        <front>
          <title>Peer-to-Peer Computing: Principles and Applications</title>
          <author initials="" surname="Vu, Quang Hieu">
            <organization/>
          </author>
          <author initials="" surname="Lupu, Mihai">
            <organization/>
          </author>
          <author initials="" surname="Ooi, Beng Chin">
            <organization/>
          </author>
          <date year="2010"/>
        </front>
      </reference>
      <reference anchor="Schleuder" target="https://schleuder.nadir.org/">
        <front>
          <title>Schleuder - A gpg-enabled mailinglist with remailing-capabilities.</title>
          <author>
            <organization>Nadir</organization>
          </author>
          <date year="2017"/>
        </front>
      </reference>
      <reference anchor="Crawford" target="https://www.bestvpn.com/the-webrtc-vpn-bug-and-how-to-fix-it/">
        <front>
          <title>The WebRTC VPN “Bug” and How to Fix</title>
          <author initials="D." surname="Crawford">
            <organization/>
          </author>
          <date year="2015"/>
        </front>
      </reference>
      <reference anchor="Troncosoetal" target="https://www.petsymposium.org/2017/papers/issue4/paper87-2017-4-source.pdf">
        <front>
          <title>Systematizing Decentralization and Privacy: Lessons from 15 Years of Research and Deployments</title>
          <author initials="C." surname="Troncoso">
            <organization/>
          </author>
          <author initials="M." surname="Isaakdis">
            <organization/>
          </author>
          <author initials="G." surname="Danezis">
            <organization/>
          </author>
          <author initials="H." surname="Halpin">
            <organization/>
          </author>
          <date year="2017"/>
        </front>
        <seriesInfo name="Proceedings on Privacy Enhancing Technologies ; 2017 (4):307-329" value=""/>
      </reference>
      <reference anchor="Mainwaringetal" target="http://www.dourish.com/classes/readings/Mainwaring-Infrastructure.pdf">
        <front>
          <title>Infrastructures and Their Discontents: Implications for Ubicomp</title>
          <author initials="S. D." surname="Mainwaring">
            <organization/>
          </author>
          <author initials="M. F." surname="Chang">
            <organization/>
          </author>
          <author initials="K." surname="Anderson">
            <organization/>
          </author>
          <date year="2004"/>
        </front>
        <seriesInfo name="DBLP Conference: Conference: UbiComp 2004: Ubiquitous Computing: 6th International Conference, Nottingham, UK, September 7-10, 2004. Proceedings" value=""/>
      </reference>
      <reference anchor="Bowker">
        <front>
          <title>Information mythology and infrastructure</title>
          <author initials="G." surname="Bowker">
            <organization/>
          </author>
          <date year="1994"/>
        </front>
        <seriesInfo name="In: L. Bud (Ed.), Information Acumen: The Understanding and use of Knowledge in Modern Business,Routledge,London,1994,pp.231-247" value=""/>
      </reference>
      <reference anchor="Bloketal">
        <front>
          <title>Infrastructuring Environments</title>
          <author initials="A." surname="Blok">
            <organization/>
          </author>
          <author initials="M." surname="Nakazora">
            <organization/>
          </author>
          <author initials="B. R." surname="Winthereik">
            <organization/>
          </author>
          <date year="2016"/>
        </front>
        <seriesInfo name="Science as Culture 25:1, 1-22." value=""/>
      </reference>
      <reference anchor="PipekWulf">
        <front>
          <title>Infrastructuring: Towards an Integrated Perspective on the Design and Use of Information Technology</title>
          <author initials="V." surname="Pipek">
            <organization/>
          </author>
          <author initials="W." surname="Wolf">
            <organization/>
          </author>
          <date year="2009"/>
        </front>
        <seriesInfo name="Journal of the Association for Information Systems (10) 5, pp. 306-332" value=""/>
      </reference>
      <reference anchor="CRC" target="https://www.info.dfat.gov.au/Info/Treaties/treaties.nsf/AllDocIDs/E123F4F71DCAE3E7CA256B4F007F2905">
        <front>
          <title>Lorum</title>
          <author initials="" surname="Wikipedia">
            <organization/>
          </author>
          <date year="2000"/>
        </front>
      </reference>
      <reference anchor="CERD" target="https://www.info.dfat.gov.au/Info/Treaties/treaties.nsf/AllDocIDs/2F70352A0B65EB67CA256B6E0075FE13">
        <front>
          <title>Convention on the Elimination of all forms of Racial Discrimination</title>
          <author>
            <organization>United Nations</organization>
          </author>
          <date year="1966"/>
        </front>
      </reference>
      <reference anchor="Sauter">
        <front>
          <title>The Coming Swarm</title>
          <author initials="M." surname="Sauter">
            <organization/>
          </author>
          <date year="2014"/>
        </front>
        <seriesInfo name="Bloomsbury" value=""/>
      </reference>
      <reference anchor="HRPC-charter" target="https://datatracker.ietf.org/doc/charter-irtf-hrpc/">
        <front>
          <title>Charter for Research Group</title>
          <author initials="" surname="Human Rights Protocol Consideration RG">
            <organization/>
          </author>
          <date year="2015"/>
        </front>
      </reference>
      <reference anchor="CRPD" target="http://www.austlii.edu.au/au/other/dfat/treaties/2008/12.html">
        <front>
          <title>Convention on the Rights of Persons with Disabilities</title>
          <author>
            <organization>United Nations</organization>
          </author>
          <date year="2007"/>
        </front>
      </reference>
      <reference anchor="Nyokabi" target="https://repository.gchumanrights.org/bitstream/handle/20.500.11825/1582/3.Global%20article%20HRDA_2_2019.pdf?sequence=4&amp;isAllowed=y">
        <front>
          <title>The right to development and internet shutdowns: Assessing the role of information and communications technology in democratic development in Africa</title>
          <author initials="D. M." surname="Nyokabi">
            <organization/>
          </author>
          <author initials="N." surname="Diallo">
            <organization/>
          </author>
          <author initials="N. W." surname="Ntesang">
            <organization/>
          </author>
          <author initials="T. K." surname="White">
            <organization/>
          </author>
          <author initials="T." surname="Ilori">
            <organization/>
          </author>
          <date year="2019"/>
        </front>
      </reference>
      <reference anchor="Stanford" target="https://plato.stanford.edu/entries/freedom-association/">
        <front>
          <title>Freedom of Association</title>
          <author initials="K." surname="Brownlee">
            <organization/>
          </author>
          <author initials="D." surname="Jenkins">
            <organization/>
          </author>
          <date year="2019"/>
        </front>
      </reference>
      <reference anchor="ViennaDeclaration" target="https://www.ohchr.org/en/professionalinterest/pages/vienna.aspx">
        <front>
          <title>Vienna Declaration and Programme of Action</title>
          <author>
            <organization>United Nations</organization>
          </author>
          <date year="1993"/>
        </front>
      </reference>
      <reference anchor="Loi" target="https://link.springer.com/article/10.1007/s13347-019-00351-0">
        <front>
          <title>Two Concepts of Group Privacy</title>
          <author initials="M." surname="Loi">
            <organization/>
          </author>
          <author initials="M." surname="Christen">
            <organization/>
          </author>
          <date year="2020"/>
        </front>
      </reference>
      <reference anchor="Glasius" target="https://academic.oup.com/isq/article/64/2/453/5823498">
        <front>
          <title>Illiberal Norm Diffusion: How Do Governments Learn to Restrict Nongovernmental Organizations?</title>
          <author initials="M." surname="Glasius">
            <organization/>
          </author>
          <author initials="J." surname="Schalk">
            <organization/>
          </author>
          <author initials="M." surname="De Lange">
            <organization/>
          </author>
          <date year="2020"/>
        </front>
      </reference>
      <reference anchor="CoE" target="https://mk0rofifiqa2w3u89nud.kinstacdn.com/wp-content/uploads/COE-report-on-FOAA-rights-on-the-internet-.pdf">
        <front>
          <title>Freedom of assembly and association on the Internet</title>
          <author>
            <organization>Council of Europe</organization>
          </author>
          <date year="2015"/>
        </front>
      </reference>
      <reference anchor="APCtraining" target="http://itrainonline.org/itrainonline/mmtk/APC_IRHRCurriculum_FOA_Handout.pdf">
        <front>
          <title>Multimedia training kit</title>
          <author initials="D." surname="Sauter">
            <organization/>
          </author>
          <author>
            <organization>Association for Progressive Communications</organization>
          </author>
          <date year="2013"/>
        </front>
      </reference>
      <reference anchor="UNHRC2020" target="https://www.ohchr.org/EN/HRBodies/HRC/RegularSessions/Session44/Documents/A_HRC_44_24_AEV.docx">
        <front>
          <title>Impact of new technologies on the promotion and protection of human rights in the context of assemblies, including peaceful protests. Report of the United Nations High Commissioner for Human Rights A/HRC/44/24, 2020</title>
          <author initials="" surname="Michelle Bachelet">
            <organization/>
          </author>
          <author>
            <organization>United Nations</organization>
          </author>
          <date year="2000"/>
        </front>
      </reference>
      <reference anchor="Benkler2" target="http://is.gd/rxUpTQ">
        <front>
          <title>The wealth of Networks - How social production transforms markets and freedom</title>
          <author initials="Y." surname="Benkler">
            <organization/>
          </author>
          <date year="2006"/>
        </front>
        <seriesInfo name="New Haven and London - Yale University Press" value=""/>
      </reference>
      <reference anchor="W3C" target="https://www.w3.org/standards/webdesign/accessibility">
        <front>
          <title>Accessibility</title>
          <author>
            <organization>W3C</organization>
          </author>
          <date year="2015"/>
        </front>
      </reference>
      <reference anchor="Nasser" target="https://nas.sr/%D9%82%D9%84%D8%A8/">
        <front>
          <title>&amp;#1602;&amp;#1604;&amp;#1576;</title>
          <author initials="R." surname="Nasser">
            <organization/>
          </author>
          <date year="2013"/>
        </front>
      </reference>
      <reference anchor="UNGPBHR" target="https://www.ohchr.org/documents/publications/guidingprinciplesbusinesshr_en.pdf">
        <front>
          <title>Guiding Principles on Business and Human Rights</title>
          <author>
            <organization>United Nations</organization>
          </author>
          <date year="2011"/>
        </front>
      </reference>
      <reference anchor="Kaye" target="https://www.ohchr.org/EN/HRbodies/HRC/RegularSessions/Session29/Documents/A.HRC.29.32_AEV.doc">
        <front>
          <title>The use of encryption and anonymity in digital communications</title>
          <author initials="D." surname="Kaye">
            <organization/>
          </author>
          <date year="2015"/>
        </front>
      </reference>
      <reference anchor="Marcus" target="http://www.cardozoaelj.com/wp-content/uploads/2013/02/Marcus.pdf">
        <front>
          <title>Commercial Speech on the Internet: Spam and the first amendment</title>
          <author initials="J." surname="Marcus">
            <organization/>
          </author>
          <date year="1998"/>
        </front>
      </reference>
      <reference anchor="APC3" target="https://www.apc.org/en/node/36145/#tools">
        <front>
          <title>Closer than ever</title>
          <author>
            <organization>Association for Progressive Communications</organization>
          </author>
          <date year="2020"/>
        </front>
      </reference>
      <reference anchor="UNHRC2018" target="https://digitallibrary.un.org/record/1639840?ln=en">
        <front>
          <title>UN Human Rights Council Resolution 'The promotion, protection and enjoyment of human rights on the Internet' (A/HRC/32/L.20)</title>
          <author>
            <organization>United Nations Human Rights Council</organization>
          </author>
          <date year="2016"/>
        </front>
      </reference>
      <reference anchor="UNGC37" target="https://tbinternet.ohchr.org/_layouts/15/treatybodyexternal/TBSearch.aspx?Lang=en&amp;TreatyID=8&amp;DocTypeID=11">
        <front>
          <title>Human Rights Committee “General comment No. 37 (2020) on the right of peaceful assembly (article 21)”, CCPR/C/GC/3</title>
          <author>
            <organization>United Nations Human Rights Committee</organization>
          </author>
          <date year="2020"/>
        </front>
      </reference>
      <reference anchor="UNSRFOAA2012" target="http://freeassembly.net/wp-content/uploads/2013/10/A-HRC-20-27_en-annual-report-May-2012.pdf">
        <front>
          <title>Report of the Special Rapporteur on the rights to freedom of peaceful assembly and of association", A/HRC/20/27</title>
          <author initials="" surname="Maina Kiai">
            <organization/>
          </author>
          <author>
            <organization>United Nations</organization>
          </author>
          <date year="2012"/>
        </front>
      </reference>
      <reference anchor="FoAdef" target="https://en.wikipedia.org/wiki/Freedom_of_association">
        <front>
          <title>Freedom of association</title>
          <author>
            <organization>Wikipedia</organization>
          </author>
          <date year="2021"/>
        </front>
      </reference>
      <reference anchor="RutzenZenn">
        <front>
          <title>Association and Assembly in the Digital Age</title>
          <author initials="D." surname="Rutzen">
            <organization/>
          </author>
          <author initials="J." surname="Zenn">
            <organization/>
          </author>
          <date year="2011" month="December"/>
        </front>
        <seriesInfo name="The International Journal of Not-for-Profit Law, Volume 13, Issue 4" value=""/>
      </reference>
      <reference anchor="UNSRFAA2019" target="https://undocs.org/A/HRC/41/41">
        <front>
          <title>Report of the Special Rapporteur on the rights to freedom of peaceful assembly and of association</title>
          <author initials="" surname="Clément Voule">
            <organization/>
          </author>
          <author>
            <organization>United Nations</organization>
          </author>
          <date year="2019"/>
        </front>
      </reference>
      <reference anchor="MeierHahn2015" target="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2587843">
        <front>
          <title>Creating connectivity: trust, distrust and social microstructures at the core of the internet</title>
          <author initials="" surname="Uta Meier-Hahn">
            <organization/>
          </author>
          <date year="2015"/>
        </front>
      </reference>
    </references>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA9V9W3McV5LeO35FBSZmRNp9wYVXyLNaEOBthqQ4BCh61+Fg
VHed7q5BdVWrLgBbDG0oHH6yH/2yG7F+9/6O/RPeV/0S55eZ51bdAKHR2BGe
0EgAuvrUueTJ65eZw+Fwp83bwhwlL8vW1KVpk7d11VbTqmiStMySdmGSF90y
LZN3+XzRNklbJc9qY7JqmVSz5LhpqmmetnlV8uP0u1lOivXOTjqZ1ObyKHlW
He9k1bRMl/SSrE5n7TCv29lwUa+mw9R/fbh/uDNNWzOv6vVRkpezamcnX9VH
SVt3TXuwt/d472AnrU1KU313/mznqqov5nXVrY7i+dnpJydV2eSZqXn0Jnln
GpPW00XyHF/auTBrGiHz6x6eYm47TUvL+JgWVUnTXZtmZ5Uf7SRJPZuarGnX
hf41oX2YBj/mZWbK1v6hqeq2NrPG/b5eRr+2dT51D0+r5ZK+6z7NyyIv/WvM
p3ZY5E07pEEmdCpHybD6d/+e9rdrF1V9tLMzpKf4f3lJH74Z0VfK5FtzaWr7
gez9m9zQmW58WNXztMx/4F06St6XOX3W5O2aT3fZ0OZk6dI+bJZpXhwl+Pff
lhiPhqsw2oh20D7Um9HZiI6ia7vaxPM5a//1X1aLtDT24+QLU/rXf0kyk7yu
yrb+139Ji96caCo82mgqo/1tt8STJi1G07S/S69HyR/LKjNFPKXXaVEQ+fU+
i6dzYkAwyayqk1OzrKZ1Ol0nv0vOzXRRVkU1X/f36oIH+9tp1o5opJ2dsqqX
NNalobMDmfvfkuTds5O9vb39I/1x//59++PjvUP9cX//QfDjPfvjwb792v7D
h+7Hx4d7+uPBwcOH9sdH+3v+xwP98fDg0I37+P4j/fHe3iP7insHbtx7jx7Z
Ee4/eGwfuP/wvn3gwf7DB/rjw/39R+5H9+yjA4xAP78/ffHuiPdMGdE5cRw9
87SgPZ4WqdxhUGR41flLGbGMo4TGfcS/2lshRzDE2TEFtSZL3igneG5K4gqF
51X88rSeG7qTi7ZdHY3HV1dXo67EgY1NOSb+1fEdHXfZoh5j2i9PTt7G8xZG
wu9IwX0uTZmWbULzPskv84LZ49uqyNt8Sp9vWcKDB3/1JVSL6aLmVTx9MybO
ODNNw/PjyZqmHb9N56YZYzGjtFl9wtJedE2T5uWL6iolBhkucffDIm2TJ/S9
5OmnVUEPNclZN53SqLOuYNaLz07SZppmpvmGdunci5Fn3Q8/rOnDrjENzhJ/
O67TSXK2qvNyvhtsxsEeSYNtm6G3l+6vzjL+5O2I+J9MfGNLGtqTrMp5N/b3
Rvv0v/Eyb+rR/sHewR4/3pg6Nw0uJa2Vtoh4VJeR5LhM7mBGd5P9+8md/btH
yb1HwwcPRrvYreO3J9EeBcIx1dPhHQhEHdEEWDxNmYgmy9MBGE+6bvJUiCS9
yCGGRsl5bcqsGSTTBTEmU9JJ8QO1EZmRCTWM4o27gYpCaQ0GRgc2r0ESl2DC
y2VXEm3ymPG2Pk/XabsgxvidKS+IEBva4LTcusOgunQ1lZvTjJs18eXleJYX
9Muzb4+PP8raP/LC7bLdilfZDHt6dpXXJqa8M0y8SN6YFoKf9uRtnV8S6x3w
jmzXSI6S07RNk6fLVXVlalzg5LIZyR+ZVqd4qkd3B9fT3VsDzs+T27r2pqlL
Ej/LcTohEZ9O29/vP370+P7+A9p9eyuzT6OACA/2Dx/L1/TJTTJ8Q7rEgm5N
TayjTJNX6RUIMjdXTJMHd5PHe0KT+3v3hCLfv3l+HG2eMM1a9KPMzIhyiLlG
y967d/2yX+C9f8gLEoJfZpXzdCx61hhz/EicE3zlG1Fefn88vv94fG9vP1kR
AY2Se5vrtU8wI0pnYHNl9mpNhxmu6MOCuFfygYRynRELatN18n5Fe9OaEcuP
b2mxYE7KZayOF7Hbx9slBi/5jyP/8j7vSTCbX81dnuU1ccrzqpsumpaUzeRp
lvO9vIOZ0XE+PpTTfGvKJs2qaPlgS6DmYyLgy7xZjpL3bbXK6ZBPSeFZ9jnC
DST9hzRfGvuObadLOjyu5iirSQ43o0VaX9Kej0zWjSdVdTFuZCrDVKeyudJ3
5jsegXaUv2vJl86GDox44PGSHp+mSs/KVScTzD6WryRR6fn5dUd6s9D4Qwrj
RsbdenrLvF2BGY7oB7e+Zpzb1w7z8JXREk/S5aTOszlUyJfnxFtoGBUZRGn7
uqTpBTGhtCz/iBfXf0/K6jzmca9JYcT6XtF+NSDyNclHA4Je05HnRZG8ILIf
JJDCP//0T03yoa7o8Q85MQh6aCm8kMQfsYsy+UASN//EH3zT43EPb5KtUNjt
XOPPTkfJO1KcefrxJ8ej5D+OEl7S1r1dmWpVkGpOErtw+5t++mG8SlfEisZL
WTnsnIaFwMYWv6YvJfQt3taH2FbZ1SckkQpTRxv51hiWbVk3dYbpSVWt1BaM
Gd/j6/fi70Z2+Ov43kQ+5luPt/72YG/l3ku/0Jvp31P/7t/ijW6Fv9lcJr0y
7Wj6v0uXq6+Z26TtD/T7HTI/R3cHdInKDIQJvRL34Om0KqtlPt3gdYPkZGEK
ss8W6ZJ3gAUJjUrcZkDcBjpS8rSYp7WSJwuFqnzepTWZdnUe0+YzsljBoDq2
sFme86gfzOTd+clXjZXHySuTXjTJ+4a01bZKXoI55LN18pJYKRiUsqy26ZHk
dq2Fj+Fk5Ca38YGb7Vayy+mlpLeYlKhqTrekm4zyilhaU3U1Ka3jKzOp2+kw
M2lZleul2nis378h47YqX5is6GLRs3tslRDsOA4dtwYmXkN3ra66+UKcJrRI
2JK9Y4mXTXLu2mWTJvuaJG+9cT9lUtGCd5Umi3xSp/Wa5DHMhcza8iNQ4Pid
0Mr64zvdgI9v0+nF+HVVQx1rVnmtxsvH7/LMVM1HeELoIEm1p89nFVP4x7b6
iP8OiZuXUB3L+Uda38e3ULE+VrOPpyT0uhUs2o/OJib6Bs3vbl5rvqpEJ/jv
UeLH5D3jMbGBfswkHHNADOEItLEmgZ8umYy/6+LT4rm21ZBfRDruqgMvPwK5
ltN8Zcn4eLUqrO7bo8y964/ou26Q/Kkjpkenbbr4s1fdij59nS/SPP7g2yof
gK/M6YLmW47RatENW0XEXKBRTksRt48fPjp8cO9g7/D+/uF9XvDZdFEYksEx
C3R/pbceJ/PVfEjW6KSgSxmw2uQKkqM2+qfhNF2lkxwWqumrENslBhsVb9Is
32SQrA/bSYxKPMNcElM+qdOrWdW3LaG3CTdJvnv7Jvn5p39+0s1//ul/OqEG
z2P+qXc6968/HRJX9k3XmioTslcvV6K1E8kNlSPQn4aTbj6kVw8X1RUIaJZ/
GuYtz/+cxO60airTpkXPSmFzh8joB9DwqZkS9yM7XRmLWHfCJ4lAiNJhy89q
MlzIsPw7UpuZiztPJR4/NauiWrPz4RZCPOCMdpK9T4h/vGzS9CLLm94nz2EZ
leaHjQ9eQHUrVkqr8fWtqylZXrTYBgLJyoCnJHTodtEWhNc1+Zqnndy5d/fo
cO/hzz/9j8ODx7vXHs3KtGQ1rKom75ZMOviyVRjypunMPfnt0cMhPhreGwpb
s1YkqVMlSTlcoo2DIn5Wp2SkkaTuauUBRIB5DV5DbLIVj+zLpWcLbDG/n+RE
KqseF99mPNndOxsRHfqpbBzHM6JSpzcloQUSCb1o20+fvHoL//aM1MFySnMI
f6Ypgs/xvPi377u8hdwOuN8Duvd9f5UdYUCaQovHSFkYJO//OEjOzIqoekLM
5OFwf2/AI4+S4Ow3D1HPMKMDyZuFsLAC/pCGxG/KXxr7TRnGx2EP8El1ddHj
ay+tw5Sobbmm/YbHlU8vj4aILb2bzofIXt6zzQNEt5Q+7rLkztMM2lf4+mP2
CVp/JY4KoQMQPabTNQZ3+Y9ldUVcd87OHmgJdUnj0Qvo8g/eVV3LHw5eVWVG
ahmmOlitRgeH+3Q7Du49FBW3qC42KDjaMbz0aXmZ05VnTvFl1SpQ3DH8JpN4
k16kP1R12vvkyYgsgA9kCcEAzy829+xsmoOIkpTorSvYrX9w/2h/kOwPDw7U
os1X5uJDV8xuuJJMpefsyMPlZGKdk35CAuwt7fQKrhvSBlQJPqXXz4W9vpd9
Dw/Ku+Z713ab6u9E+0jm2fvzB1p9VWyxT/5AlI57ZP2aPU9bOB8REmQg7u/d
Te4PEjrw5HDvwfDw8ID35+SdehTt1ryq6k5DMG7uopVsF3wf8guaepbr4W1j
rpj1KJul7WheXY7SbswK3jlUZVrTuNUfRmUzGx8XxWk1fXnajJ/uHxw+u/fs
4f7pyfHTw6cPT44P7j94cu/Z3t7DZweP9+5rBAdrePruNF4EMRg2pNn9KaZL
kS/z0rn2U7JvsUkiA1N294EZ1+6pcAucu/w2/vK/9j4cPHtIGtjB8d6TB/ef
Pnmg+/DgKe3D/WdP9w9ZL6N5WeYVhjaIC+O6nhFp9850/94NZwq7nEeUP4e0
Rxe4WjaTrl7vsNfs3duT4XSR1huvP5E/MkH2wqHxRO7fMJFbBFuTd8+37zi9
IIVjlLjtKDftjMV6Vk3HOl0fGRY98d3bLxKRToRNsZr1KVZqiXCcKtu7OQ9/
BdlYB3fXtEWew4sBmqF/KjDEMQjJ0QzpK3uPxvsHo0W7LNzFeLOuLmhm8bJY
92X/LJTczFyaolqxv1okm0bmm0XXZtUV822IUmco1VXBXC8PuAy+OY18+knr
GCGkUSbRyzafRm+EQ24Gf9xujyge30AUp4jI6NI2rNjTHGHV/p+Jk75pTeM1
H/3kfESqz4dF3pr+35OXRaWG/gZl1QaKIgzu0Xy6AImKu5spbJK3DU5lOSZF
KysMnczo/h6ctI8O7o/37z86GB+OnhfVJC3gs6lpSwpDP714d3r88eAj1g6V
5JvGfN9BuP3+3u/yhrgBmafZ79d82Un0e4tmSygokAe/YFtpJ57UdOCFMf39
Tv6AUMx1rG1VpG01anRW7G2DJQKqnMmkQugFX7bvSG6XaRBujdciH0fhWLFm
KhLLyyWT3/F0k0s/PvwrcGkfxjTleBWEMXMbxlxxGPOSJ8mBzARrelX1Ltr5
VQUeMiWFlnkGMz9rtsQHc3CThIVfrso3/nayIG2XTIftK6HZXsRWvZIaBwyI
MY2b/cPDew+HRBTDPZj4wz2s4jkpznnX9FjGy6LIJxwEfkN3ni7ZbNY1HPSC
rXxaJc+rS2IbrA/CKUeKJ/EWYvsMPqEvlXP3AA3ybQByaL7Z/WV7oTOM//6H
EbwQaXGx8fipSV7RvTfbtylF7HiZT0d0NLxLefO926kH98YH43v3D8d0aQ/v
aQiHFY7q6bWX74Y47GYs4YtSkCn3pOrIwGV172lXV6tr1rK82IOzdJZ/nx5c
HXaPHpddNsK1bdNpJl6Hq9VQ7c1xR6Z+mjXjk2+fDsHQ6nZYlUNETYfCzfAr
vBRWIgydJxlbcPz2hIRrXuY2rmC34jUp4vkSCmFiH0gu8v5yr7molt+E2sdf
Gk/uidKcZyMBYb7d4R/Gy2V7MaY1fXz57sW7k64msu2KbvmR9uMjvOBkPEXL
f/+GHgOtxosnEz4leqeDKs2VF4HwR+jxE0NZVo6jrVxgGN9ZhKHTXJ7n4/rU
BpTFvsi8nBYd238rk07hNZWxENKge4fjtNZBD83xgobn/cqZramGFilax2Na
3PgeUf+9AV/I5BfYA6/z6cIUpCI8SfGDQ2r9xVz46RuazpMqgzzBvN6ZeUdi
4UzYcjPWH2i6pw45Q4f27uTjvXsfD+59PH763YjUvk/u7DTMcrCpLl+ZtCB9
jjbOhv5p2uBwjQACfLgFtE1qOlsQy7Qmk1ncOirwevt1jfGwLe6zQbbNaJ6N
60/vV+d/2tTG3xCVvUhJS+WXi2FPA/9dWpgQXccxQrf+D4c9k++YQTU5q7Dr
X8CXaKDrD/DqkE+P/RQwrBH/yNh0Jqa78T4oq6DvnhHxb//l3/7r//5fv4B3
vBvpONsnVqbNqKnHvz19/NtHB/zve789ffTb40fjJLjaz98+sTAxO5HnXc63
LfDkV965Il7jPlrMz3j/r6qWeIDYqps4j+F4LlNcuRlOdHaL+qMpI+71x3Rt
NqlfvUikdNbrlWNRGq1qRY3P5zkE+HQLv72VQXc64pff+t5PvnjvDx6H935E
T44OHo8OD+y9F+dsPd3QacADTc33+mxliFX3JfQR/V3DmfjzjEEUKaBQeFmk
tTiAxzVwgJFO4Vojb0pXpPqhSk3x5+sENSh/vHcwlpH8eVpxfNizXouqQbiL
rJDEQ3C/pGT9akm7Acsqx4Ckjg8f7N+7P/5NW1VFE1w1lqIC2QyO5v2bWCBZ
BQixxKLjeX11HgrTQShJcWCm/LMEMjbkau+Qv0ruiLg7PBi/Gh3s3e1bord3
/Gyd8zW+CblHPoLKewWoXZ2N9x8cPn50b++bovy91e6FLZ0cPuxtVO+NJNTb
1hiEsyxoUwHfpIKPksOHADTQGu0miBeAdsgpEU57vaNKcHKwf/fnn/7nIAFq
c3wyfk47dUuF/RZbpBPevkntxKqeAVf4WKRrUsYasqTF+bEmFrEmDQnhhWJ8
/uSMPU1sln0DxZ/28HfsYlu/PP39o98Rrzhfrwz9bLky7+3ZO2i+wATFOxyr
UsQnmF+8S1f4s+nqaCc5X2HmTYHNXQVpiiZnL9juQNWtg73xwcMe7R3cpGel
QMr9MQ8ivrf1KmGKdkrA0l/Lbfb3xsdDmtzwYG948JCkyDAtyy4trMHwOl0j
GnYQCZdn1XFmZjfZR9udEwdbpaTTNW52M5OAu7JPMJ3gt7G+FkiBjdfSv991
7Q+m/Hsy43v60DV5JlYnP1UpeGytSlkCIrAcuLpe4jtkE795Q0hgKptK3rlj
VzZ+Fvj/31TtkHj0kHEyLRCbg+Q7YpJLk+wfDpKXCF0m7Ou1dM5k/vj/MZn3
CPsmP9RJ8a//wizru6orzC8jbpBCR0rwVHxxasjs0z+sBpjc1C/SRQklpa8N
sCOVNDy6CCUHfEjl0XygAek9Df/EK1NjYJlP6yqM6rZqsNXGbmQe4XBupyG9
b1OZ6BAz3b5EiUuPHASYpOKh/eN0tvzGQoI/5tnvD+4/evjonurMO8PhMLGf
7uycL/ImsepkYj7R3cdKrhYGHmY5cVPIZi/yVTIhq8iYWIAmYLc5ZC/Cb1ZZ
En/4WsgDcDzQjPkEfYu0zJaD356YtlPQJoh9lLxsab40xaZKJvRUc2G90t93
ZPuyR+oKaQNpbay5LTGD0Os8jZO1oOLMvuzA+Sa4iAau6ymRDLzi9Cj7O1oY
BXRXCtKTyETHj+HuNYKYxJ/t7oR7gr+HisqI2E6SJnP2FNtJpXMziHefFnhJ
a8GjYg0kzSpFXH2NOdI/DT2CpeVIEKGpTrq84ESRFRyRrenFskfJWY6QaviC
IEMvOuwVyWJ6r+JOJDCgLJLWQXPFbg/CrR+E4eoYQHgF4kmL9Q8mojtHc24e
g2gSA0dynpx0s0x0gkyBpG7kc7touEbFY8ncjdRlt/XxxSB6gbeFNrld6C2/
SlkaXC1yshviHcSWi6FrMgmpLIn+MZDhn+nmNXopGFe7jRjkgtyCKPlG5JiY
qc0MrMflawATaae7qiDcwbXsBDhsrUcc+amaBbHdjLad30n/ZAMac1aAJ9Jd
66WDYJzLtGaoJmntYq4FgSQrsZCHRvv6jKiwKNZCw+H+8n1s6PutABoRrW3t
K0rkpJRzRjv0RHPuHG67tPqpiTZnd4sTTbNhELNg781oh3niMs8yEjY7O7Qp
zsmz8/vgfzs7//AP/7DDbPSDoV0ibst3li0azGUgh5DOaN2D4CN5lCy2n3/6
bztWqwG7/0O1KIFbIB4GIP6Dh3fl42Onedtb4vK71MppNjhmLmy7hqUnrowW
QO42veC1AqpTIZ5X1ew85B+EHfF+fI2dUv6Bv/IIlkEwQ2m+Rl5JCntiYuPo
vN5qNopWZQ2PEzU8yOjQVVxjrIhJImO8lPOybgbH7jyXnIV3PVQ++PvXyo9F
SsQF0iXSgjClRzKzMpxICwKzvhIZhrMuafkN+PgVc4bCzKFw0Q7NhSzJ5Kxo
u9gbyxeIM+34687nNUhmYLuiLghqlydWzKs6bxfLJpnSjqSzGZ0p1tVoWqpe
/Cbe2WPWva2uRuyCvbvXmMokHQNVzg/zq3Q6P0ys3TFO/vHdkdwR99AOBOa0
q2tsMmdj803My45ZKXFRAJtpt2pmjSXsVgcVIP5R3SrZGqjNz581y/PHH7Fy
pFE0zOmteuD5xBbBBl6SAOaTzyA/zYbTYMApu8U6MJqv1VqiRyJOfZ6ytsIL
i1SQQFe0/DJyWZB0WRrs1UB1Gtoj7Kjln40xF40E80HTN+ptRGLR2JjyVlVu
EElcqL2WqkdyTUm0kBRkwW1P1R/qtit/HX4jAocMAOYq0hyKEuMDcvqmIjYG
IBAWk6uq+ZKawHOOD5HBGinpe9OuuZH66QW1eBdDp34oh4XoQvTLjz+O+go1
mE6DScE9UbL7jAwJerkbuZbsJBVTKDVwu/oCd/Dmu0ltt45rE+iISh6NlXz0
S9NpxgadGT9q1Yayahnw9pRerMENEav6kTt0Wtt31TSdwAO7hgKXRcKR5eNx
QD07YraKHsQbl3i45M5x1yI5AEqD4NOSO8dnd+k7Gx80TpNHlgEGounzrWbu
60zypaAdifaKTE6QjiQniWUfZw6BDHWc0xGnMeWxIQMqh0lmJ9D4mWE/IPqK
wgfr1E40wfVxp3Xn5du7fqKkPeWfiON1wG06fYS0ZdFHDATrEqpbaVM9OIEH
EpoJe5EWM91CWBukmGWkzcMi5Vx+SCs2tWqivGWa6910ZMAyewkfKSkVac2S
j8QSTby3lSpR3HJ6W8bMHLBaxvDQCLkD05WbBydbprwUL4J6Jzvg1uHFZrgi
zLRrBNoqXBHnCK0dSrcz6CzkCNhcA5gBX2J+U7IC6qsVdJae8vGZmh46sCOQ
jYE3RqE/MOKKxmh2ZFMePtzn+/6kqrGi5zqGJ4Anz98yPesKhpv748lDv8Mj
o+wBj3wSuCF085mLsFgRsyOFZZVPmX4s6WDXJ2JtkyqKmAbPXB5sgicbsTdY
sTbwTKSjnn0rDAQ6LFvIYmhixmqSho4SSyv3H9HkGR5iWOi365Wk30cP40rP
uppnpmJX5L9swd6jexiF6S3QNlWkkM6GDAnD0XMNdQ1kl/neiDWlLpt80uGG
xnKNLgY9I+hzkh+5NcCYfVakCbYS01PGw7ksWPeMNAhcSr5eNEhXsICKlgaZ
z1p1dJXoPPvpGTuC92e7UNeHY7L5F1htoEYGukqtjEmoG0ISLERv1KrK5bvK
YfDiYB/km6BLy91YJC4B2YCPBtkGNJoIjxQC7NLaomBDl7gv02pIRI9DoQEv
85RuX9OQok7XhTGCfHBNNBZ2sms6WH47ZEzADiUu1BjkZbdqJPuIorGX1JKq
qB9Lul8T61jI2PtjV11Xlfgu2UUHM4Uda0KXYf4M36wY/r9zJHj6Yo13TtIm
lz121vyMzZ4ZadU4JTwElc6AxMJaLQlvDa+hXSOkP0XpiS2ugRScmY5HMrB3
MLzcUUlqBpgTfhvoDni0Ipu2I7IhUk3VKUfcqwHNTKGW8rBZxzceqpI6J3lL
GRJPv8ArnWUmY7L+/NlB4n/8kdiZBfzLlaMJLk1a6vlvmX1BfK5xaldaHPUf
0ifU6cM4Fqek0RwbMsHAlOe8y/QLqJdmwVkRej4KkBKuF+Q/lq4eA8+OdehG
zMAtikNr/YBeUrdByuR2qT3iywFHKmPrWt7Pauglld4boNmUDTemFuaKd5GN
B9QFvevz5zgl6McfBzy2OFuG9pycXw+rUDYN+WdgqEN1Y4vdr1xF6SARQF3K
XCwQn/y4VyAsyIiZhwgkYjlkAJftkImraYYZ2flsHIixlDLvn1SkTnG2mCgs
VvXxxVTOjOMSK7Y6KtzPOVMp5+POxYuMUyjXyVxeki+1agK4qXNQrVEqinN4
mZHjo42vKWGKTzP168D6aL1gvn42bO3zDeTR9YeAj1odiL4B7Zfo7t21dt1O
BJreah07xwzeUlblkHhlgcnJfjBvWTNdWY+zszdXXQ1zhrk8yzPmjtYE4bwT
07DCDoInVa9r2cUGNw4xjAw+ATU49eystyRz50Z3cQ2zbaFiuQrMVBb0HY/o
zFVolSKbRrtEyRJ7JnbhNymM7RxJNF6G2zSYnJeARC4JBXYriqcvWsRXjbeb
/0xyDAyCFFaaCpssTXJZFR0Jyzq3DkR3HvhFTCCsDD4vv3Dmq8J7aKcbNVIt
lpfJGXxzyaG7pudOVu02XATWPgWmVwT2lN2J+m22tVNsPHyWRJPQxqckiIgC
0tFXtJMSHMVO7ji714Yu+hYVbCre1/6DsuTQ0syb/4txj52d13STq0wKjsXz
Y09AMBN2B6gbAi5QiSk5BW7D9eAvJIdzbJ4BqzQ3OGSOriMxnTsvhM6SywLm
rGRwERcSqs+Oj0fJtzS1pV8Ub0VWiXC3mu+sAuiec8MY+sNL03ALieZJnRs6
hquKnsuSAmcswlht+jTL6iBrYrXIC9JC6D9TFc/iUfSWFJMizU4cF0hBxsYK
GbI2UCCZEUqQUauCOARWBgVFIieZNYc9Tosd3yrZNyepdr75tECWCW4LKYpJ
mi85nOlV/oYdp/CQYpKWDp28mHLIgIS8gaLI7gFrM2xQ4Sg5Y/WHt7NAcYm0
lfGnqdbq2uKic8KcdAlzmXoe1nSToZ1PkyxotwrsmN+KLSfDqDYJNck+Q1/1
7yLJBIMAmiitIS8X+SRvb+P6C719dMFf+TdLFZptF/w3v+EzDwxq0YZxjzW3
R7nAF6KlTLLXXApWTFTe0aPzDhW1WiOb5HyORXq1JXJjZ/E19grhhYHsbMh+
rjRggyvfmOLSNE6Ub4wz8vGNvQCi/OUKfJBDpy/e/fgja79W+fj5p39+St9d
g2PglkTH9EWHdrBLNvnfjvqmYi6kZgcEF1DNmag5BUrhsK3XGyJY3aGzcd1+
32rOSLBIRRliMUhaXcbuL8uzLX8PgON54yUaz+JlaID+sjKBtM9cb5AU1sSD
wGjT81VXRBv/BZ2oQSE5bB7snTkZSibbssm1Jonw8nS3OWLlrOg4+ON4YuXN
IQne5sjfF5omBoN9hAXIFi4zAiVvdZ6wvw36LxyaecneFJejpiae5SGRtuC2
szHTrlbPm429pzO2DPVX8Q7dof8gWs5/uzvYcn76+ELh5+wOTMXY33w48FoH
uhZPjbeEAyK0SDgK7fEdXHtn5JCsob/16oSshHdTXhMmIWyn4A3yZdLc2emH
CBWb+GVQoga1boUpRFgtr5dBzP426nuoumuo2GnwpHXQzjk8QRZa7KEhpN+z
hv0VSLdG9KhbVR5C7czG/zQajf4z0yMdeWWnInfFq94juctaNkHOgS0gwSxt
T710M6vgkONNqDj8x16KCCphcr5OV4sK1gcomogHP7nFCNpDVI95iPdQNwhN
ZMDfymHDtBLqEtcNqQpkjbK3c7FumNf4XZWlNw2JErEAidNmJg5s2xvrNkdI
wfKCUYK6QhULJxiNAU+xVLXrqmL1c1ezHG+yXkZ1ru0mS/iSlI94JsIZNsyF
I74FoPTW8NGdhigR8uIK0dFvhWWpJOQVsT+ErNsmmTJRqziQ4iJ6wTX655j/
1pjVdVrwiG3+TymcjY6D0j9WTt2PoThBiY6bM+iPiW08uzGDnqgXmfkksNVR
4iXILxHMASIlUFzoJlr/Zxa/NZVAAIOgSJ+jjRx4nk07SGp/ybwZVRvpkn3t
tmLf7cVNqd/8ObFXuHhO3p245amUayS27cBEfGpTPE831xNSRD569BOi4K8F
cboFAvIXJKPzDN/6E8itw6wkHT11CClNxynY2Um3QqvohlyEOFtdrWrGUbFm
H74yc/7+CzLneUpZMAv19wRy6stnvskONXhUm/mWCLm9UkdO5O27nZOUSXo2
3sJQajhFpwENYC4oo6p+LikY+YWvMzTODrEnQ7gZSIp76UoiuK+z+sVIMBKN
/6SjEZ94Br9bKkHB2HBc+XokA5euzeNoijYduc0Pp2NHEIR4bJc3iwi8OQ3S
koNtH8QHYn1x/EnGhrQ1BtnZwO7BK+t0Ig2D2HWzEA3MGageJ3YDwoF0sxEX
Qbbv2wXmDCFDVrLXTFhuDCE+NaOrWcv28DTPJLnYlPPUAvuQspTmtJwin9GG
FfmFYS9Ux2FFrAV5fHNTKwhk0jUqaNVrlGsEX73xROXf02bmegsieMfxdMqB
ETYMth3NINm127ur/n05YaeAw1NdtQG6rdHldVrhkDdFXFBa2XBg8z5ZI4Pq
KK4oCRiLU0y1W0nh5iM0l2yJ415KrKQJhg6vYSNT3A084jbeheJ1PMttREbn
lC/BLILRGj0Aug2oNL3IV/SHCoQMR1S6ZL+eWL/eeRdMhr8cWUMac9EsLovh
MrIRJCECJ2o4D2hWPNiUjSALJguT0jHAq+dPzv/08jj66ggy78sXbxBrxOEq
2A9TXsh5es4pMZJLzyePcNc1STe5EwzCyhiUFvntLuL6ab6UrG1+EjoezCVW
0+XKzITcRX3vsG0lwB53gWJD3UN+QdGqkghjQSAjjFb2s787UNSlxLmSO8wC
xBJTnHf4ulycgDyzu6NrskDE+6zXXQCglVpdff923zGcBsAX/VJAO7FBYjet
8N9jTuulUl+D2pBSA+8CUVeUHBkeZrjMhNPTzCh5+slaRjbExRvVcyU7V7GE
WBvzacB6izMdwi0AzIhuvUHRB1JfOBZH8lH4g2bvMAw3n/Fk8oIdjAwjX4rc
sjrG4Aus2IPKxakU6p80aK5Xu68Bh1oPw7iuTFEkff/GSsv2bWDlrsdfVau8
ZBb7LlKaUoBjnNVPBoHYuAP2YZLdssZWWHWXlsVHKT5n2EBYO87qTCxj1vc9
dMv5BUMk8obT4Fc7B36BN2DwF7oDAtR1Eyw11K682cbh+jl6LdAfK9UK0wl3
UaAdhnnMgySChRiJb/IaC9zjumNSmYWWM/2GOW9rWVDVX3qQ4Rt0XFst64H3
Gm9VJb1zywIcNzxcShu8PXbj6HIN+CqoUUX0VlTTCy67n/PAzn8dQUN6gfAt
CO5RwhK5ofsGhZttX3pybipJABJfvy+sNHQhknzDNxC9mjcSZJsI9BS8YgQp
eJwJDEHIwy9YTS4gBzmgpB6U+DTcMnXDLduogwQAToxBKhtdLWZLtPVd4S30
0Mx35C0MIgxJhfQ56jlGFDEAXVPhtQFrK5AP98t8wrdxgzl/EXRTL3IGPvyt
/pQVVzY3nHnDZ0fcquYQpppRtniHCwIr7YtqO3NZT+Bi+G6rsQ8mYX5SWYKE
wGmedIo6a2xUEAb/4qpCtwFeaAOusi8d6c0GKRZHWDVkGjjwdoEMBNKiymGC
W8szabu61Bi+OB6ZxEATE9amp6IS6cZhXGZYazc6e7VFLqKbFtD1fX4QYFdY
ADDRhozFpaPlbWMKIC5ApBzYulpUVqakqkWz7yTcEfp4N1dRaw0Qe6brINbP
ynegirAGbvMpAomAzApFGPXxAEfsjy4tJtKlbdDUmNABD6ErdCHAAUZyyGM1
8spVB4aen5C50gzzUgP5x/AlhhmugSXC5r+sKjTnFGUk8GJrJfiT9kpKI2c1
ZyusFUYxYchN6/EgTC+ZjBLiE8BdBlb0DzS3HzB0jtoPJNyOdiKAY+VGcL6K
APUyGGv0ydwKaiovoPiQViAKv/XuRxo/1Ohugv/YAvqcxQeJF9Wu6n0JEmjO
elds6XijToXHIDJdxOYhO9S11dn5sIBxnhacJCDTBfkGypkVgV+Mewf3S+FY
DIrgzAMSBDB/5ZLssvM/CsrXVvFm2a+qIgsuZIJ1qIMm1b3xi4btFKHXtYzx
oz1h/ypqMoPoNoq9bYeayWVFXJYxeJpB6/I2UgeoQL4ZO69ir+u1nCzYDd4G
YSG9YkvhzlQVigKakn0eFjDMHjAgasM0wtQrSaWZp3rXZwVX7hOd2Pqoe6fS
VDcdjfHj6g7wQEsFA0gxWlmHTVl8FmokEX4hPFr1lvCYLlT2ZwU3iuZwiy09
6qn0Ma2L+x8+o22K//Xi2Gv9fRSOYm4aDSs7372smiuclSJrTHmrqYGXoz0F
RPVA9lZ2xqLHtm1MGtgClj5vQ39WBN8wF3l5xkI1gmx92FyRqke9FUR6k4yP
XA2LnbLmojv5O001nKYc0f75p38UXq4jwBX5+fOrKv/xx7tWfrsEUloPBAbn
lUiByiaOS2y4kKJYhPRS6u1cYO6FXqtwgU2HCBCfi61zJvqiADq9Kmqrluqp
sj9BhmkiP0U/9bYmsy6/tOAwHx2K0GU+47TZWLDyGnlclQyoFEjOEqw9LxIf
LxUjwYJXRv78WQuaskLrDLZ8druNFa/SMtfIWF/9ZayGEawPeK6CKBVAywgO
EPiXHLSkfsk5MFRHqC5Cj1wJk3W5yKrcBT6Dz5+1fCNkgEO/9FBLJH3FrrxF
fZ0kzaoVHqpdbaDNWnt/eXkgTA2KxIBLJvO/H/AIqFo00BizLcOO5F/7+64z
mtics3EKzswR4hA2Lip+YJJPwiinGAOiuWmpJE2N0B2Ots0XZRdgF/I7zMqh
Fn3XkchvcL1WMUq+09RuFTXBFmuuGRkkjawkVBg50Kx2jLzVl4MI7v5Wr5vX
YpZV0/K9ZOuJP1Ncf6oaY3u974HObUsmsuQah1F1kJnHj2lqB2dRQVx6N5Ae
oI9FagilQ0bHtkT/MnDugh83Cvq7RBYwR8g2Ts26U66x025u79hYONyfjShM
vkBFkHXYePQbXf1R8rSRBGHAdbjugy1uwgU8EfLntQW2p436N3CEwjVrLh1R
yGXZ10x4oQuFK7q58PUDep4tDg5swaEpgIq2TacXggXtWgvGmQe1Zf2CbbKF
rTegSRR+Z2DIBP6KKRKRBVsa3/DPn30dIMFZ8C0faNi1V3pVTDdH5ZyxzPnY
ik3xFCiCzdQya9SKaYYTsXxmpJhFHhQyDWYzzb13f3SnX/4l9WXFS3JSPXXR
X+LGtiaEwIOibYiTcJhnRAFgZecA9JLq0nLRE+tVtvG+DbDfQG+PgzyUOPoW
dUEbDioXLHyR1utZRnAjGDDEV0I2Oa3nXViGg77YT1hzpjWToDKcg32AOWjA
rl5zNTNvW1ssSZiRoApAEdl01jngXDzArU7TQq17Em+tNJBaAAXZPw6r0qbt
9iKKWixCFEE41Dijx0NRrduYmE2MLBJjLJ6phCatXw06E0dMNf6WWhVKTOrA
yRDtNciF/VHCzsVosnUuvLnDNowrhRKRFBc3UJlmI5hq1kvIz+FsYWISY2+W
g0TQV4p9WUj9CVRnHEicSCAMwT3mMB/RF+fnezbFHivOD8FFKI28fSYCT+jM
vrQN+YRVNEnu1F3eio4AZgUJ9oPaNYquC+Q7J6iQfFxpmZRYZf9yeSN11kvi
T3QMest6mHRr6uldEAC2xZtK5aGZZuwckZ7171yCqFOQk0xauTBAwTdGHsgh
cYDYaioS5GO/h8WzWxU2oLRyjveckDyky1PmKWvYT1JuK5mi7kSeJeeomkvK
550nx+/O77rJYP28w4A7sJksHuV4Mq6GjfN2ZkbyzjiYtg4i4TYuzY3cZH91
SMwRSwbQzTS4vey9V6fd86qay4VGu7RUNHRQpDumrWaLHbQlvka3mtHC8Ayf
m6JrvmqiV5AgbqslwzT/KbBqr8wEsIKG00XYSKRn+fv2oFL8anpQvw90pljv
+5KRUuwQdAGcvHUT4/iBziAS8Uxw6vuUnijMXuSwjTe2ALXqZ87RNp139P41
H/Vz80OevE2JxuyX8PYlkQddKuJneVGkZRzc9EELRRI543ajbg/MC8NeJeN6
VWwE2/BCLS713ds3TXLnu7yGhiZF91uXTNjcdQ6G8yB5GlaaRDxc0VuMGGbQ
npoyl7M506CH1VnunJ5WZ3dBMeJkJOqrJrTFWB3HKLjuHZ3i+zfbCuxZ4Rwi
NK1qE3TkdrFOK0TCdO4gFPjLK/RZz6mUB7SqsTIhV/XJeeuutRS50pPGWV2t
ZK82sxzga+Xjyiz+UZqi46CzXVrQQUQuVC4wKSkqMXBVFDilwWVDhrp1qMH0
VYkeIDrI8LRp1xAckJ3emRJX67llDhLnLl9wzbplkL/SK6QVoKmPQHS7/4nT
kuEc/M89X6U4BCVZSrRiG2OZVjVCEa35laRwpc5P5Oxoqu6yInNmrdw/r221
EDlpF3GlLaO503aqwi8T+R5GUht4ppznq4ztJsdlzScV8pyajpDzhSGGnTHX
oIuh3nn3OjjN0oksnRlJaDPwFYoc/77vTUhkWjaD9RNdF+kV5ZyWgNSisJSM
e3HTraQa0yLI02PhE+TdYXcD/KSnSiY3Zz0BuSOaCaAecrZcx6DfaQdDEY8n
0okw+KxA8tI4ps87azviclx3qMAj9TPLGieVrAe/yJrYoxKCthEPmKa+9oG8
M8jQY1u4LjUvXFWtXwDxRUiXWSRXQ5kpieFWBh0ktNBT0HjC4qyOY03q+nLV
NinPZIFxHlTEi6RbVV7vbmPvR8optmj5a0Imwd0iG4Qo2wWTGlg7px/Sxd4f
Rc1PeHdc34bzvj0WSWpYYKLsC7rPfk+gNrbUkC134jW6UXJWLe22hiJ9KOaA
rYhn2txZD1NSLlNisniIUer5MsfaQKLqsbqe4zH8RlytamdInwQJLcUpyK5C
RvIiFRUJY0GUynvVnaGwhRq3ulmHdV0CrIWC0o6E0c7y0qamLEMPpD1rndvA
Ow/YP0qi+oB2LFBYuEFU31r2tksU+LOQkxDvp5FvDmEjw4n0QpRfdaq7WJUu
Z7Kv6FS1phuEPnIfSuDsBWA5n15qpEB6ULOiF6pdeA9Hu3tpiocIctsS/8xd
GtNl+oebPgtm7tqPTDUKj7IyZM3Z0ADQiKRikvDOFMVZQW8yZebchEG2h8L6
scVccFKULzZPv900Rn1/gnAn6QXERJe+VkcQQNBXkv7RMaCmMZ86tipMZjfl
2/JGGndp1ly7Tkoo2cIrJGimovWGNiPeqzWqNM1MKgeqN6y03jAp4rg1TSbw
pi1ddBAWPAOY4aVl5iiaG4dFbAhZqmINfTmHgDtgp14BFOyB7k3bcVnEJd02
L0Hxvd98oJtVNq9Zyg3jG4GokPUXkhHTMediZ6FYZppJLCFfGzGapU3bS8Dp
Zed4R4fW2HXuGsUJWJQDfWWSZzRx+7lXAVDzhKZNco2xDyFO+0XXNKmqIS+4
A2hvVaZYSbYJ6uaCIxc5KYcgN6d5B4I28K+H6I/MoSFEV2U0H5dz0ignF2GC
lVMJDByu1bnZTKKd1FWaTbFp9u02o5JdRqpZ2+KmknoCG6rxqpX62mYdYzqU
Yr1qJMgtv/9xdRcteyebJvtlLQWuISeomoHPNhbITIW0OFc2Svn0LuMl1fTS
grlR8ZJBQueaVbYog1WvwKi5UNThweHhjz+60GaUG3ar0rmn3i0+sI0SVF10
ZfPSGiCNhF4nAszdPBvVVbUhOO4gnNlKmsSXY8RoWnglG4nMTAY44ahsVjo2
nuEiXKxCqg+rCCX2Pu+0gMyUuy4bZ9JqTSOfS8uOMCELj7EnbUmN6mXFjgYH
7bHpgZk7KPEXEA2kM0RXyuzVmgEdOzthDU4NOMD5KNpQxaUNBk5lRMSB7Rys
mDYMbiGhz9M3Z0o2quz09w2zJ26BOJBLLnK43b6DOBoaf8DwjHWHC37Gxv9V
MkekiNj2ORkEr6C4J6dcSY+s+vn5q9PmLssWZsAe5mHVxmtBKAGFOPzrpXFl
YxmxLCbhnD0MxkbV+NcUfsAt8o4npA4/pnt1AIfxEOSoM7uyFf8se+InpZ5v
P4EluWNF5GierpGtKIfjETi384Ncux8a/KcXsHonFXltbgvzrbDWnOhmkJoM
seTSEHnr6nY7//q1MALVQAV8NUqeiW8UYnZg4RZaFM8t/GV17v7IJyG1lu6q
6l0gVs7BDv6CKKm6aqu08GldETV9xXo0bstXipaQhJuOHblrC4d1idfCV4JK
4Llifjx2ohf17VcnD8p9My/etZineh14tuwzua/OwZENDdU7NTRc3e4WYpCC
2ZPqkz+KIMgrXEK09lIV+Fjdf5VOL4RjBThl1j5IDjCH4KivvvB2ldBDX43D
TmAqdoGsSxqb6k6kqOxE9oM0EH8AOi8bykRhAt0i77NF2TWFXkoyTwPmq0xZ
lneHXZOC+RQf5N1oyQOLdyWqmmu8ulKAZVAAh6+YeBH/0JWGm+6I7fvLu/v1
6SWM8qkKHZqZwkV9BQZm4zDxwga/KoLjs7OKuPPz2uzXsNL+WSAQFBrWi3ts
Ri6sOmrFb+DCqazRw1Ysuj8nEmAog+jAAMaY1QAj35pz9dseALmt/D+TDGdN
8o3jo/DyseRUcDKj+iodzAK0PThLgiqSppiJDywAEPWyCsNIEHsRcx+DtbEf
9Y3afgzBKbACPmB/sfPmDQJtnK2forBxoHBFXAiokD4bWU7rxpFCoOnDtPd+
tzxA5YCrxSZA9tijDfAV6jNxhshGcZ6dnRdcp0kz43/JV705zUwVTkXn9+kV
I8IOiTPmTHhkUIbKFi1WNLoI18B/0OtM0Df1F72EINLh/n8oGMJOJHaJu8JJ
XAQmrADj6sJ8ozA+fRD9ZXHNuBJ4qiUziU18w66UkzQsyh3EfIn6S7kRQfW0
PNrRZhA6Bnopyc037Lz4EJY9m5lUmvGogycoHqUneQtlnMa9R8YBAHNby6g1
HbAaucCSbI7Tr02oR/BNk+rjwirsO7kmy96l2NOU78tWp37OPVL2NMzlBdWF
e3164jda3S2MOje2COQVK3xmuRJYYtlcSepoE15ZnraTYi5iXfnStgyd8gdl
KU8KMh4rSmnHV8s6bmLz3PXd2az3ZxOJJSzAvrm8vYXWHuNVz93iJKjer8RH
ynoqzgRAxbb3RBLKYxoY+4JiCjXoVaj3UQSU61WIFbLKbK8KJqT1StLFWSsO
fO49kvceI1UyLFZSPSTYZ3agpCybM2OFdg+7IvXy4LZgkE3ls2YsQG4dXuxb
KGv8VvddW2KNJZqr0JrXrnx83QsRIVtChER6lVqltvFe7m04iTlgKGSrRqrD
NV2OBJ91KTFq0VxD9CS8XBwmd4Mr4VrfuDjcrtTcYY4sST3OW2CbYvgCjmy0
0fOqsIgmtKWHwzVTjgAnt1WXg7J7IlJLc00jhWD54E/RaQStUMK0NSjYWoYE
ZzQpsOZMYT01/JE2U9m7M4dRUjyuthy1zWDbIvQrCRvz/bTKOPsQv+/yWrLs
uBC6QJY1UzzjXgwoU1kLdsk74tXLojLc5+K4QdiLrAn75oYqPLzD/C3lmrZV
hsgLH+oKOKa1070UlmUO3CGsnYBnHo/LG1DmHWG5fBOIfIt0RdYrUzAt0L5m
xLjr5xUKbyVvDTcHcp1uYfdxB5dfrRnZhjx/DfVI+hH9dXQkHuuvpSjZVkt/
DW3Jtczhlut1BCvtmXnbOzT2qyV6jRwnN63zidHKopHpFpcYkUKOt+Lh1m9i
mfb1lloMAJppVoovk+5t6hhg1LhIAhgFp3RuVq29IQzJBsxGespGQ7rrmGev
DkHoFw8SNrYY4tsOKM0upThUdSRtne5M7ibHl1UuuQsSRxI3gsLWFITgdjMU
WJVt87WJCfOBiZbVSikvxuE75x5BFxCBlYV9szgk1Vc+W2lbxDUZQcR4YVvV
vrqsXilGPSimkN8IP1CJm/41JzeyLFTUDWsmRKu+n5ZVX+AsinWiVrHk6i5M
IzS5A631KxN46nT28UDIgZN9GKgZ2/6cFYDO7zai8f6NU5i0t3oIaaqCpmEs
064ZSwgsLS6idiR0MyUfr5xXXsakfRw159IihUyD2YD11aIx8DLmnfMwxLn5
KGvUuGEsLsjRlDgq3PyDfmd9v0cK9FleDrFlEF3exyf7fORvpnM/KvyRUYHQ
ZVQsexwYvmId6d7JFx+7u779YaMcSvGicLZFh0wYIicGD7tXejr4AohqY+Fl
8CnWG3ZFdegnV2GiqYrMVehwtR3dx1oagR7pRan9Aq5xRPGg9t3XPCPZDeJK
4jIoc6dbAKAEMxWH6GNVvJGkoPj6KPx3VpGWdLXYhvagPcCvyijxFV+Dm0ct
RNaLALxDc2hW1gJbd6BB7QjPF8IBe3VlfC0E0EAQ6Qi2bZuU8higOhADktzp
+Yzk0HIWnAV80VGys1OcYfhRly5v4QPXCiBsr+ApmoSPPZPOzO3J+vUyuAaP
XVYQLIzlL26Dgx+i2IWru1KuNV5BygtyxxkkAPUYTLyVBLrfsO7mbPX9x4/3
Glt0x0kLhKKW+n019JS1ISRHqh9/zKWNw9htXju4IoIZZcNqPhiiNn1RCr8y
EhnlTxjgwgIABGNby5TmqrHJqLycnL2ORS5J+4AUSFIg+/+8RiwhgoZFtWMJ
gHZIDSZVD1zB44O9vb2m5wPF2UU770qwa+OrzEy4LkMpe8EZTRxMl9ivABVs
bogr6x/yVKvVw2jHELKTqVaemiW7QZkySWfY1XwG3xPBxa1DtcPJE79Bf4c0
Vzkz5iSO/6ZJ2eWNZELzViUKBYJX3HZTKzPNMdBmdQpL6tRbk5aR6SP2jmwD
v1MZAKcV8B+gookxy5nBZYZgMTL3pFwvzjmoC1OF/cxsdGaUvJYyKl2pUVAY
9iBPwf+wkKvIlqO/DLmKzpzJa7ZBRzaHSXfaDPGx6/sXhtgkIYBzG2dc/QMn
qkzM8VXZaybotLk44mKAWDNfWIRFyMS8TAuVD0wmpEJp9gH2gl5GBgdnu9mm
jVoSLfIUSGfpST53pu/U2+EqblDA0NevZZnm7qCD5Hk8lU0HRH5S2OyPLW8t
OKIto9jpyHdVGzmlSVG1QaRChhw4f0aunQT1m4AUCFOeV8h9ahjxIz+0UcxQ
nDpmNuOs0SsrA5ZYTLMExp1ogctsooq8pD/nyl1sFzvaC2g6U20ozk4V32G8
K20WdFdepWXEqewyNOPBvj1DLb8grGufV31g1XELPW4aS7eqzrjAMxFNIRUk
tSAe4pYzzfwRY4jJxg42UI3L3+wtMxANMPMfsP/P8L2SPPgRqu6KX8uvlMgq
08yOrRzaDZciD+XKZYcEwlNY0pHgvo0tDc5KKyqgTKpMYrNkS9cjr8xLuQL2
Eph6ka48H2TiEjSsFmcIcsSEedlZBdXYikESy0sxvTXfUyGpvOfIIVHYqkT1
+K9bd5RoUfYer+3hAMQd4asMcg0AGwyTq86XVyWQrcFpn8rbXkdriNZmhTYd
CAeIEqarjTr3SFzdullzn08Tt9tCiFELLIORMcQLls2EqIRe1S4s8XEY3imw
gjdl6SKE0wdKXItCsg2EpApGUME7DyM3cR+ta2YfVp3DDiDiyhoB/+auD45H
LqTkSXxZWqhG5wpKsTqH0a33IEy2itUUyXZSMtEzZT2Ow9mcgcJZi1yvSA01
malVtdg7tnM7IAykGKd7Q5PQO5cKTq8WXVOe5052msuicCenNZEB3jJQiL15
VeqK7W8Mw8aWI4xECpRzEfEmuYMM7aUZChJsVlRV1twV//WqqPK4DaU2+kMK
6x3fbFPWdHcUo16mqdIZEfes6BUZs9gxh7f1eWWqNUlnbZf5xp58LXRHnK6f
XSl+AGnoRqyArFXpGJF5WRlNjn0nOWsMDvL++fNZ2kmzXsA9+XLjLZzwL3Vs
fd1fr0IeWQWLpRSQw3NrFQKjFxSnA05PiqL6E1UgzBKpJRzDtm07gROig8j7
E3dxDVh+uYTnA3TdKHlTodYCXa2N73nXSADAmHJOOjILl0GGq/nUCt/1NdoE
W+VqC3G2VWhyouNpDHv01aGsDzUy/PI2wBY16OpsbSNpJwgJItBpvW5RGhax
SLEcbbE5wGPV3RGXQ7W+ZJtpgmOQEsDwC4V/DXmf1rgKI2fWN8hZuIFx2zhW
7tiLS1TwOvEgnEOiXqnw7a6vMuxPGgSPLUwni/D2ZLy4gUazaapLLohgKzhC
bcxrVYzCWIsoWnLrvYcTzjg2rHxJt20ZWUJT1ivqhJ2uH5hEK/WbNHD6fKUV
dOrmK/YERMXr6G5pidxGysgCxcIxSWG+eexGEBvKvZ7FA81WAVJ8E1khq23X
NzSBYVryaTjCScgmL1QPjdUO7xBn6GFwkRyzFh0Io6hoZdAo20pw09bplXpT
4DLycF+3f/xCXzfBR7+/7LaQEM2LqpBiv8cMlTgiO0msnVfO2hHbH+7XX4mz
6LmBt4EtIABfh/bWzs4Z1wxhqUuKW1kqocQx+shE8zHpNLmALwW11G+IMgjj
29u/f//HH7XL8MH+vtbpmHHJwPgFV5Zh9ObBApIbublmrqnrkrCJZqbR9x8/
3Ec4sE7WpPfSlsxsfezcdwKYJUaMTFEWMHw4H07MAktW5RE6dVDcj/ScVPCS
+MJxTTLEtNKNzmHTFeKySDPNfSykYY3tR7Uw7ov0V06XogE4lYFJ2+oBaPVT
qydf0gMwt3mdZrZqn7Zd0pCTnZvrwyvDaQXPGRrgldx9xplfWuDx8+fjCRwq
OKTXAlcl2rx3X7eR28T1T419pKTJpI0tqI3Miz6oWZylAyGiLETvY21R4a4B
sxrnRxIuKKBoAQRzvlTa9HLspGyAjot97JbstrrqTxg8OC876zQL0RO0/ukF
130t/8hc6u/RZFsjAewrbnMUxnaxLcY9I7XOZt2rn0zuoC+u6f1RNqDDslgT
fw6ZbqMLCvntd5UDbbWxnX2g/KXs6YtapXpkvFRXRdGi6mo4RTGm4F4e2WNv
uolw0uQOarZKZj0Zov7P7GK6qz5JIt0CicGcWcbkwooStGnBvYrsiiwpdWcA
xMUWgr2/bCFgtqL3BlWPXaEjLrvjKL4ZxQzM1mG0K+6V5HDQJeu3JMlccAI+
f1ulgoP3bOGzA+Vyrhn2Dew/Ah4x1OnKBDV2Jgz9tuEwoXbvqNtAO97G3GNz
Hy0YWZ1p+x4+9cVeocaLBJzC7A1JaxWLcRYhG+KGW01UH6/P3fkAvDN+t/zl
Xfd2XWNANTV9jgBX/7MRH+7kChcimK9LUbQqmQ3QiF9YSJtVcEQOQsPfeNdS
xG6qWlrdpQzd4ma/whYDtP8VWmQIw5ACky08Y6BcEfhoyjdl2/ZkDQpaMTbj
NRux7OE4qUrxDzrP0xuX6CNqwF8Oh9zAa/QwkTy560pXqmPLN7CyA7dh44pg
ROilfJ6+o5zMKShYai2V6yPykcGpGGsuCrqk4bYX2jgl6zZL/piu45J1KZL9
K/Y3bwFd9asEqCaYRsmxzIrpbOq1FJ2RiiYVaTicFcZ1I25oFfb5MyblQiBB
d9SlJwAfnFe1Y9MB7hwyWAlH/tqvE9A2JzU48vlaKd3Uw7Ya4r9h0lhALRWr
O40L/BnriXXU9QvxteoQGIlG+RQr2Nnh/7BGEuhuok+F2DOXkcAQBl8/jQGA
6M6RCZiLI+IhCPOKazox45qmKykfPBvIQUZKDKCxC87HdM4jdlAjVRUQSrip
oNTQNU8FjpWWvVJeDoAh1kZWKfOOBIZGyiKIamMz8KYp2U9gBT5YL16yaPn6
ngGvfJq6XsO2CpZgbURmWndWJeUpvcZtlf3QHPCpWoEXW7qZ2GIVYW2/S/GN
SgFBpUupMCqaTqgcBUlxwMBmgSstPC8prK35OIp+88k5VgGQpk0Y3qfQhglc
gdzfar68caEzTvGJblIyr6osbJwH4FSUMhUVMFvEnUHmNZf+kdofohjk10GO
BReI1CcjgNrAig05eDxBvW8eUHxLveLc3ozLtAg2sj+8cjhOnEBgt86liQSC
dPYkeGRXSlKG7ib5913uEonpi5zP68NuSh+sjq8lCZrZX/R6m6PCABTR8Oo6
l5rxtKuS0SZIIJjel5Id3i1Zb7qR6zj8BarrLFn9ZTVoW31l1ALNmwtxeTAE
i4GmG1vleq77zjYOy+hKowTOC99BVNt40nBkkJQZODFywvtC5NuVKd8+fyv2
771HnGLL1v/PP/33Mf3/9cvXT+XD+w/vk3HMi7wwZqWXvwcQQxlV6JVadFPy
nWeCPQXGe6YV1iS9YZbPO67BnJGBWK31G7jM4ruxjEkqWIdZjVUTIizR+bnU
JfcOmz36ARbTgiIE5x5AIgaOf+gw5VoPQcRFKVGcfJVLKrc6Xy5KhlRrx3Ag
6WtNpwwx8ijWmWuV/6gqj1aNsViZpkMd47PpojBdBl+yDSBw5KTRPEGUcQyz
HKra8kG7jyoAX7470RYmkGTvWGifQIbdoU/uateJTfi581gG0rfpCaKA6Ytv
9pNH2JP5iUr+7VhDCYHwR6GKQujp4NE+EduRwMBcp5cRJq3fb5xLnhPPVyi+
ky7jiMuUryptBwmDyrW7YkgCnwOdpx3ML8A2srHvVUc6I9vQhMLHdioVkToG
KYAB18RMFdR1ROw0M1Lz0xYR4+EYaesvHZfqx11k+kIWMOte7Maxbu6KSFMD
Kqg/RUpAaQoFCFvfHzgmWidJ5Q+buYAJ2fXAzhFyCKsFWzC9Ba5uTaxln5Ju
JajbTkH83v9YV9US9r9Mx45E52rmQSmIf7TFFujJoeuFIIq3pIlr9aBw0rbm
1dnZq/H5q7PI6J5xREp5nwVyCSk93H98z9WihXcH6gEqcPl0DHrjBdAtJe9F
QEt0whNG3QgWq2m4AYw9Xh9AZDEh/Rpenr3FVgRVQDgsA1aAJ2QaTJ0vk5SL
7NJQcpNxiWnD20Im5tJGoNBMUQM4E78PT0ZQ5t6fzjdDz4KIu7c/3D8S2RCw
TIVeffmO2m3tHb49oA77BRv+FH1crhIGnxDPc6UD/K0M2smkLamqjdZw6wqX
ry2Rg5WkuOsxe+gw7HIsHu+YaZhR3q4/BasSGlOJbROXpWUdtiGZFencZ9n/
+7O7WurMOpvoHUMdzmRWnpQ2zIMhbMlVtJW1Grsl3X7tFVjWKHvA7G4g5jaX
5qVrjFrdcqUyoNp8aBjLtCoHCvDb/ABLwZWt7BPbv0GawI0WT95LTVdou9Zw
4hnQ2YmLuseirCbGvChQqCAM1whXcz3RvEm1W4uFW8h1aFBUmiRWba2BUNKz
Nm1D+Vv4oLB5YUyNXJ/ImECJFOsCakONEYbWkIO2UQtZsgaWwHL5IHbZ2Elx
Ixmb8uxjLd4s0747ZuBK98FBzVBH22fwzxJJdNV2LCKiCQr59dALfrejG2xD
ovNcwHHMdANO3MrlUNVJKhzoqJ6PO7yG83Aqwv/a+hhmw9QOTIFUMOuRQRFE
dBzuyMkaf0yiVX31hPvUnVs//Zvq6ohPGMt4Z2Yd3a3mK+lWrrrJBzN5d07q
yWsuw4jJrLe4EgKziKt7ybeE6z/Yf/jARm4e7qN9QeBvrSsSj20AaBmmWbqS
TmpQliZiYWTgi6Yeuj/JFPjDLsurqL49CilodgmfflipzZr2jST3RWEqLuJt
69zBdy/czgmFMC3CeHiPTMBNamQXr2aG159BoJJHHztd+Gus5NgaIhbQlaVt
GqprMHy0vaHor3mz1Si24/S/wqqkdXO5banq2/qkycJ7Yfuf2lVWS1u6l/mT
J367cFU2Vioo5FpxLJ8bximzXwm8vCuhhLMUsMYUPXYBNq05M6SywMrU1zsd
GN6dLclpNmnh0niWxMP0DKINahhY1JNPuOA8XHWSunRo1LVnf4qnyOhiRK4r
uJC7Msoam9TE5HCYL4OmaMBvFFFGrdJNIHJ5BOuddGI8uTNZQzuyVOqqPW2Q
QsstpK3PF94Oes8FJ0TeHQTbKzZ4GDAV07sjmZO2ap3plnIGNr9XypixUiDq
0cu3rvRmnMYk53/n5clTl5d3dv7+zV1rFvhQj5qWVh+y8C1XD4KxYS4RyTaH
ZXHYurpxAjQKTRNgQNqofk+umVUMwUF6jGQDheXH1UOw7PsluVyP5dLijped
5ARrSCmb8GsybXWtaHIlBPWruWCE7MnK0Y8kJGDCCtOqR4jxofjWMazapiqf
d2ld5mTJ/vjjzo4WhWQOwlmhy5sZudSQ/aW53IEREt16weYxRBdukNqgaXDe
XPTKQtrs3qWvd8U1cOk1un3iHdCaJURFuei43uSZ9W607QEso7W2epaoKY0F
DjdRRp+NyttZ4cxctROJ0Qr3iiGHttJxFiU5DvpaqY1WRI2zRMvn4RiSQoTl
S5ykrddfjG/Tog4lxk4GvT29QELpc9/uyebUWVALe4+xeqvshDfz8+eTOr2S
FuauF01zIYjzIINT95AdL5xWJPhzsRhl72G7eJcXagoRV1PGA5fhD8YZpZID
cGatRrEl5IqJOIhd/+JRsDgeWz4J6LpLcbMwJNDWyOmhYgX7SculeyAiXwpv
SpUm9+o2rnkUhZm2XYmqX1UVytPb7bGVEDVz/O7t8Zun5xa4ISiSil7FnixG
YNBFz8teVcor6cDG4UhWLK4kC0eXRyauJEamsaohHhdF1OztMYrmW5YGrKqL
4RshCEmznAlyBXiSZsNpJJ4ilv8///TPS2AVg6SdbumdMuEFtVG/1LVQZ0QL
6lCaOSPaW03QuJSka2Tb0j2vyhcmK7oyQG/aVoe2kaaviB+BWvUMtQKrl/L4
4xMRvM/p0FFX8a39joCN9h8cOuDR/oN79ud7Bw/3OeDMAQ4vpaSisj1A3nVu
AOIpYOASbdT3zfxecxo46cLUFl7YaruMz59fG7o8L9JFebC3fx/rh4XKY0h8
YkHUCRNX3CmNwsstUM8GEtmiCCkiCpHRy5/k7XklpSnEnfwAPht41bW0XVC7
mtNTL2Gb81CaEmmjwj6Ip228NI8sL8vq0uIUwOj6tVxc1Wu7KU2vZOvnz09M
eVHA8Yrxm8BrAYm81nKjQWCNm3La14rYVVce5l5DBNimCpx6AhNT9SV23bq0
NbFAXWcDYW2Iw2mz5xpnCC0UaJ3S4Z3dfi3oELHla0CYaugWXDkG1VQqMEuk
I6Fj3aWrflTa1gbqdictm6uGuaKeYUZyK+mpqa0c0Uhag+2axg5EAR0zBDDo
VmatDLZUadtHu4yAkw6KRDuic0shhZnrojHwZ3FAhxFXf+PKmxk7crj/ILIK
c+t5lAhyow7UHv2wNozvSOWLK+mZxDiXDsH6pv/1iPKsOwISsCTliGlvLR3i
pQoYaue3knhS54b7W8MrWJhsbo7Ax84Z4ieZPyVnkfDPSs+2yAgjuQA7y6QR
tYgB2sGwpXquCeuS/SFUwO54nqYm30H3QTKZRIcuUzJBtXaU5O+rs0HxU9NF
BRXFlXEMElhgB6MNulTUR/GifkaqW6gKZ4axNL2XMvCrwz3Y2Og/S9dz10lW
NkCiaYKvAaSIrgFpOTs7kQS88/bg7V1RZhrXSzRVEWLjq9qcW71GCWf7gdHk
M19xl07oCtoSL1gL0wmKhHPgtAgffD0QUZCKArsRQfJdB/b5vpHdFugS20nQ
j5GfP+fiVtB6UFHGsAcH+qBVIaQFdhfEHfghhYvD2YTFDxyGsujRPm2Do1MG
qGc25VGx6G5RDongUzmsr5hD3EGKoO3HFNYh9bV+A14WCFXB1nOFmsCrSevH
lILgGxfMYoc1W4oq+sUKcBqB29lAbrA+YdOJNxAZqBduNO9aNsGiOGy+mu5H
GBJye3PD2q0FzFTEUqV2tdZ9V07RhfzbULh6qPzayl/BmUayQNM6RskHqWUp
uuUyt33RYF9x+pqjaz1vTmAk4m4lBBidCc/FpWE0opOCf7P1qsg7Q59pMixL
rhy7whtkMznh/hSAOd1mq89Ke3fVD1Tapba/GvJD1YWErJISjsGCy6rnQaYl
W45Yhssiro0NVYjg3EJhMj5XImoXzrJdrCd1nsnmNEqB/gZ4CSt1t64qCXY2
0nCa3sjKqqmjl4jH4cp+pOgkGVWpknMW+a7Ogswoh4jmKvptan8fRIvdCmy6
pqaWA5RkVR9NK/ivXIDL19a7t6Fk/mpTsYbFpeDFx6P2b8AMspxGYv7GxiUs
MldcP2xi7HQimURj1UGL7WZVbjPraiBAxRsJV1zjAR/r2qqsllBmrCsGnvmE
qzzYescBppxXC0il7QrPdU6DS9qV6M2QT4HWM0chpN3ZzrzpzMGl2I2VZ4Me
GQa7577LtXKFCvLSrtXxM1uoOHQVyFddCiIauF+TyNEv2cAwz/cl65kkGY65
7tGR6lcT8XH+dSpP8lC3Lj+ppSe3V5oUL1RcbhIG7rG+jfmHL1/14fBEOD93
8gsKMfSarDleTCtnDuknzzaTtNCWCbFe7ttiuJnQMdHrrEGk1tDAouB6XaXS
cL6+z5cGo4Oe3VJAVvv4cEU1Y5RCakaPCOTaog9Y++HhPPiQP0Vsn8iWYecX
1pOE1TJVxGVCb7tgi/RgpZHhiuqnEG3QuSnixipbeJXraqNw8ut2J7QTLGuh
Ndg8XJSQaHz9GPeILx6pMJewsJGaROJi4mrlDJ59SnIMvIwr7OEO0C5KMwTe
PdvpYCDaCLrOAkKoLlVv3ekHkUvQ+9K0qFAwXdbouOhCr7ChrZyAkNwydd1z
2VaiLT3Y+601Cp6SArXg+O2qWqmIhtBOL9yqfAEFZlaHD/YSdZjIg+Hq5SwF
/mpXrarVwcHDhzC2ovZ1/7i7bXs5bbvSqkE2Hib5O7b0jS3xqECpoN9SvmXA
rwVCBMgmOtLQt0a7lg7gDDe9gYNsykEYqHXQ+FSZgjZ/1OkM3HzkQa2rtH1g
NpGiDSQppnlPxHE52K7pBD0DVRyS4dWzV1+KTbDtp8erR+N6bTCqANGvsOCu
mxTTTVC4yPqKU7nYXKJqYKuhm36vuMaQOq4WagjZx6bYV2S2mJgUpnDzihKm
2HCuyq84zLK5Blq4dP5Bos4qlr65lArZ3B/ihMzDSVVahfAj9v1+AfUdOzFh
6dA41cg2aeNJLzmn1DY64FoO+aVEB9mOl0LuznDHG5BkGwEjfD9Cl0LwjGbH
ngyJKuSTylal8snMdiW8G5L4ZLcqb7y+K8pkmbxLyfBYJ2+wwDo4GPbrAvE6
tQCmZci8kn/7L//2X//3/0rusHNPC5rS1/6UFsRT/1RM+M3HxeQuvJ48OCwp
wx5dwyGMXYPEO/UTRip93e6yswH0Bqytf84jJ9kLYMulcwkgO7MrV5wNl9I1
VHCM3o1AdklVW2hmsEYJH0naOXbh7OTlS5/MDL+uNXJQ9gj6ohCge0Q0Fbi3
o641fdIFqXqwQ+nfC9UKA9s0KTAIZGFC9+oQ/pzk0knEB03pvHPXbzrc2CzA
jLJ2LI6rjN5+apoV8lY5gSXUcLS2TQx/5yuqzam9fiNtXsRrIqgaCzPlsIQ7
FEvBp/CfpnMyUAZKXswW0afYIJ2OQ33aPcyhZXNXWdgkLrQepOCjuoCUhglX
Yc1HZkLgDwpIwA75hHCetOBjSw1aaaEVvX23Yyga1+2JQCmVTcyLPXg2yBWy
qy26z+0A8KSL3AYII/qszaz+C8uqixK+rbY6j/4W1X3JToIDC+GzCoaESw62
QTALjAZqowds/YWZN1FxTwf4snjNUfKkazl4RJORGjJVH/XE1Q8CwKWzatnU
ESxVBMcRXKV4ipAJqSuwgrWfWNVLpowgTjaZ0ofYb3fgz9gRr+AKOr0Ls2qj
FpI0P59KY7GLRWrBCrJaFfc///TPrkGZ7b3G2jMMfa3CLhzZ9XNBcZHWSHPi
KHU1sIOPFKvnWlGnCJPbu48NVewHndwd1N2vaog/sdyI+bNJeNfeUP+s85M0
tk6XhXUfcPSvF6bxTTY5AgOnSqPeA1myLSwWkERt0CjQ4ikcHsMDOu2aJmto
qtzZkoHJ+ciMgnZvkQ+U82zDcXIuBiQ+P86b2sDOhgvb2XntYXDsJjFDhfrh
L4oOSV3mdbdCd+Fb1hVWKeghjxofalV7tH2pLapI9Qp2E3SrUfL/GwA8DLU2
bnmSAiVtf6SSnitU1p+zbSiHEnGs+AnfVcwxt2zzzgD4yzjZHNKWw3Tcko7b
tPEo7EsNkkU8siEnwbvwk81tAp5Xv2tj29zK8Lle8QA0GdfJECw/fK+wY09c
qY/mSDJtsQfI1DRpXTrab9S2RCNN9pb8/lf/D+92SvIgzhrkSQr2VXtf0N2w
/j2UbHPlCb1NLtUPgIIqJKyGMiMazsWTgq/ftZHVXX7HbpgjuCt5H7inXDyC
m1CMkuQJBwrqqIhBkGpYzSLhz30twAt30ZvavifMwW2Q3312ldecGnsufhSu
ixzEVRpG6jK27obW9GitKxxSOmaU4tC79M3UGpeLpyA82yzL0+fWrurX5rdb
+E2vPwl3O9M0WEW66bj2C0HjV84lF/ecVm502H7tKsFhYtluBVa4Iq75UvkQ
IB7y9UvEQ7Qdu9YmGrhEZK2+AZsq+JMvyctp9Jozt5ELjopDpbPLSNRVpJ+x
xfRcjDjXoM6hbrlhqOT9KmqCvcyqX2nFEaT2bYC8tP7nlBVgGztK6zBaJul1
CHCJZoqqV99zKQ3BwDzeO7Tl28Oa81CB+gAGEc9xjTvXQ/EaD5vgfG5o2LG9
X4y28bKITe6hq6qKhP+1MXzgNdCMvP49Z2oOs9wFF6Duqe2dPr6Ideovc2fn
mAvjSKcKUTqkb43tT6O1T+WqVdxCznmvFQri+oLn4XyiBLqgt6G7pZvXU1qj
BhXNwoKKAUiY/YSBZ9M2BhLm9FWErL7RzLjm7M97NrOX7r7EmUyGHZUbPZ4k
A9P1DO6VO7NM4+anHADSwinVUvBJFa5GXzh/cx16UqqlZFoX2xbi5IplDh0L
I6iUltSSNNefOFcEEvAAQ1XI+FNhLcLAp/5Id4FRcrzRxtRicqSmoES2Yvin
GMIuRZADlkpePBj7MZWR1cafujoMTJRHwl/XYnEDLYRasDoTltkqY2rQWkO1
JDhIjTNf8IbbJrhIWwyb1ZKqzNgju1y2lTOF7QZvHLkPaNta7VKWXtAmUPF1
L4OouiudGdYY6BVxt65w75urjbRMjjqPepS067QVoL2jEFQQ6Oc6+5goDV2o
5eKG9+hPCC5EFd+/SSZVFlUpcwK/5HT/nZ1XKUpQ2xKvrl8EAxoB7V6Ltubz
f3r56oUJyh44IIbFQWoZIFdfQG7vpiOS8zoYtwUYwtDGm2M8vbqcw5O2NZPl
JkRFEqAugeLLyI7ewvzJutNbxpzCTZWbMRFx8vA8VNDjp2utQ8ZHrjez+DVc
zlUmLHrgWadtmbRFmlDxTMrtRnlN2vfLzjkqwOWniQiirZQRFsGKCsq4ZB+t
eN6vGSrROibQytfV6kpnZsqxwjiCO2RqwqIRg4DYg4ahDVevponvTgA7NRHj
VwWWjdzeBxyzqmZONEnRBuXFQowds0+RNhouvK28ISk8deAuVmU3rI6dnWHy
nMRYkSZvaV0/EMNNjmkHtB/4UHGCGqaU4BO7AsL8BqspY7Bn2NknZNYKGugP
ZgaHOEZje78KmpUFqvoIXz1rzYr2ntG37Q9Ls4bJ9vLkzSsxV1/lTZp8B/SO
OgydSmHzCCQQ1c3ntlGAtFq3BdLy2moC0az53a9TmhztwEWuVcKed2TspZNU
zOSZ9lpxZdDbNfFi/uabfHqRnFaoSOK/85wdJgMWAFwPCCxKlCG/qHBBssQz
+ledJk/qFBYKv5iOX78or0NwdFGvprZcAhcUBCPnmI8q8+gWz+WloeXkUV08
KY/CJd85X50Hfarl11e27GawPTA13uTwIYBxfKv4Oa6Nknm3cmLRosTGeKec
z+cZutY/c2Bs4b4oXpGcez/fs67MfFHS066l2/DOco0T+jKJ1OTOmw/f3nUv
mtdgiq+/eznafzzaOzzgGGJg12oMIvnqdZq2zZTLVxf5ny+w4/TNqwrzegkI
MJSr5A6NdPcr2o2dD6DTM/g5diJbW9vzWTKWTarTWa86dtoeJYu2XTVH4/Gc
JEA3GZHQGr98d/5s+OLd25Mxf2cYXNSdt3LIXJhQ5ZfgDDRFCLogbrNLhziJ
FOXrXAnaGtNN05UdST1Htqcc1pArq6hUSfAmVCo4fnN8i/drJwlHRFIDQ30R
YiNhJBrQHfNz1t5eekjNDS4SAQkEVM3XwMEMaK/jxmcOwB/PPOm9HIGvSiug
aFrMMArD/Adcvb8lS3k2qur534zC6VrJLFqoqA7Rhyzjqh1fBdEGkjB3KS3z
HyzlXF1djfJaXjPGFGgxY678SmOOMYu/oePlkj3GoZB5oKhlIRHjzvVjDqXm
jxlfmQmPOda2HWN0F/00WrTL4m92/g+xkBgXoxMBAA==

-->

</rfc>
