<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 3.4.7) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-iab-agews-report-00" category="info" consensus="true" submissionType="IAB" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="AGEWS Report">Report from the IAB/W3C Workshop on Age-Based Restrictions on Content Access</title>
    <seriesInfo name="Internet-Draft" value="draft-iab-agews-report-00"/>
    <author fullname="Mark Nottingham">
      <organization/>
      <address>
        <email>mnot@mnot.net</email>
      </address>
    </author>
    <author fullname="Martin Thomson">
      <organization/>
      <address>
        <email>mt@lowentropy.net</email>
      </address>
    </author>
    <date year="2026" month="January" day="09"/>
    <keyword>IAB workshop</keyword>
    <keyword>age gate</keyword>
    <abstract>
      <?line 72?>

<t>The Workshop on Age-Based Restrictions on Content Access was convened by the Internet Architecture Board (IAB) and World Wide Web Consortium (W3C) in October 2025. This report summarizes its significant points of discussion and identifies topics that may warrant further consideration and work.</t>
      <t>Note that this document is a report on the proceedings of the workshop. The views and positions documented in this report are those of the workshop participants and do not necessarily reflect IAB or W3C views and positions.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://intarchboard.github.io/draft-iab-agews-report/draft-iab-agews-report.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-iab-agews-report/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/intarchboard/draft-iab-agews-report"/>.</t>
    </note>
  </front>
  <middle>
    <?line 79?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Regulators and legislators around the world are increasingly restricting what can be made available to young people on the Internet, in an effort to reduce the online harms that they encounter.</t>
      <t>In October 2025, the Internet Architecture Board and the World Wide Web Consortium convened the Workshop on Age-Based Restrictions on Content Access. It brought together technologists, civil society advocates, business interests, and government stakeholders to discuss the nuances of the introduction of such measures.</t>
      <t>The primary focus was "to perform a thorough examination of the technical and architectural choices that are involved in solutions for age-based restrictions on access to content", with a goal of "build[ing] a shared understanding of the properties of various proposed approaches."</t>
      <t>See the workshop announcement <xref target="ANNOUNCE"/> for details. This report summarises the proceedings of the workshop.</t>
      <section anchor="views-expressed-in-this-report">
        <name>Views Expressed in this Report</name>
        <t>This document is a report on the proceedings of the workshop. The views and positions documented in this report were expressed during the workshop by participants and do not necessarily reflect the IAB's or W3C's views and positions, nor those of all participants.</t>
        <t>Furthermore, the content of the report comes from presentations given by workshop participants and notes taken during the discussions, without interpretation or validation. Thus, the content of this report follows the flow and dialogue of the workshop but does not attempt to capture a consensus.</t>
      </section>
      <section anchor="chatham-house-rule">
        <name>Chatham House Rule</name>
        <t>Participants agreed to conduct the workshop under the Chatham House Rule <xref target="CHATHAM-HOUSE"/>, so this report does not attribute statements to individuals or organizations without express permission.  Most submissions to the workshop were public and thus attributable; they are used here to provide substance and context.</t>
        <t><xref target="participants"/> lists the workshop participants, unless they requested that this information be withheld.</t>
      </section>
    </section>
    <section anchor="overview-of-the-workshop">
      <name>Overview of the Workshop</name>
      <t>The IAB/W3C workshop on Age-Based Restrictions on Content Access brought together a diverse group of participants from technical, policy, regulatory, and research communities to examine how the Internet might accommodate demands for age-based access controls. Over three days, discussions traversed the intersection of technology, governance, human rights, and social expectations, with a recurring emphasis on privacy, accountability, and the preservation of the open architecture of the Internet.</t>
      <t>The workshop began with a framing session that emphasized the Internet's original design as a universal, non-segmented space. Participants observed that the web does not natively distinguish between adult and child users, and that governments are creating regulatory environments that shift responsibility from parents and individuals to service providers. The scope of discussion was tightly defined: not the morality or policy of age restrictions, but the technical, architectural, and human-rights implications of enforcing them. The challenge, many participants agreed, lay in building mechanisms that are accurate, respect privacy, maintain global interoperability, and avoid creating infrastructure that could be repurposed for censorship or surveillance.</t>
      <t>Early exchanges focused on terminology and scope: whether "age verification" should be understood narrowly as identity checking or more broadly as "age assurance." The conversation also touched on the diversity of cultural expectations about parental authority and the variety of legal frameworks emerging across jurisdictions. Some participants warned of "slippery slope" effects, where mechanisms designed for age checks might evolve into tools for broader identity enforcement. Several noted that while liability drives many policy decisions, technical design should aim to minimize harm and avoid over-centralization. The question of who bears responsibility for child safety -- platforms, regulators, or device manufacturers -- surfaced repeatedly.</t>
      <t>Human-rights principles were foregrounded as a basis for evaluation. Privacy was discussed not only in terms of data protection law (including techniques like minimization) but as protection from unwanted exposure or interaction. Freedom of expression and opinion was considered, particularly how adults and children both have rights to communicate, access information and associate, free from the chilling effects of surveillance or discrimination. The group revisited long-standing Internet design tenets, such as decentralization and the end-to-end principle, asking how they should inform modern architectures that could easily drift toward central control. Some argued that successful systems must remain open, interoperable, and reversible, while others cautioned that any solution -- even a well-intentioned one -- would inevitably reshape the Internet's social and economic balance.</t>
      <t>Technical sessions explored a spectrum of enforcement models: service-based, network-based, and device-based. Service-enforced systems place the compliance burden on websites, risking fragmentation and user fatigue from repeated verification flows. Network-based filtering -- already common in some jurisdictions -- offers broad coverage but limited accuracy and significant privacy trade-offs. Device-enforced models, in which operating systems mediate access based on a one-time verification, were praised for their potential usability and consistency but criticized for potential concentration of power among major vendors. Many participants noted that a pluralistic approach is more likely to be successful, recognizing that no single architecture can meet all requirements equally across jurisdictions.</t>
      <t>Privacy-enhancing technologies (PETs) such as anonymous credentials and zero-knowledge proofs were discussed as promising, though not necessarily sufficient, tools. In particular, PETs don't address all privacy concerns, and likewise don't address wider issues around access to underlying sources of truth. Furthermore, some participants cautioned that PETs cannot prevent circumvention or censorship, are relatively untested, and that open-sourcing code does not automatically make systems trustworthy. A recurring concern was that while credential-based verification may work well in countries with unified ID systems, it risks excluding people without access to such credentials and entrenching inequalities.</t>
      <t>Discussions on parental controls and network operator roles highlighted practical tensions between effectiveness, usability, and user rights. Although some participants saw value in layered approaches combining device, service, and network measures, others noted the high complexity and low adoption of parental-control tools even where available. The workshop also revisited the ethical dimension: whether designing better tools might unintentionally legitimize over-broad or intrusive regulation.</t>
      <t>By the third day, participants reflected on the need for collaboration across disciplines and institutions. Many acknowledged that while complete solutions are unlikely in the short term, articulating shared vocabulary, architectural roles, and evaluation properties was an essential foundation. There was broad agreement that future work should map risks against possible architectures, document trade-offs in neutral terms, and communicate clearly with policymakers to prevent outcomes that could undermine Internet openness.</t>
      <t>The meeting closed with reflections on what process might be followed to take proposed solutions through a standards process. Both IETF and W3C representatives outlined how exploratory work might proceed within their respective frameworks, stressing that standardization would require consensus, open participation, and time.</t>
      <t>While this workshop would not provide specific standards proposals or take positions on the advisability of regulatory proposals, it was suggested that leadership bodies, including the Internet Architecture Board and Technical Architecture Group, could be places to make such statements.</t>
      <t>While the current status quo -- piecemeal, opaque, and often privacy-eroding -- was unsatisfactory to most participants, many cautioned that hasty solutions could entrench worse problems. This led to growing recognition that protecting children online must not come at the expense of the Internet's foundational freedoms, and that sustained, multi-stakeholder collaboration is the only viable path forward.</t>
    </section>
    <section anchor="key-takeaways">
      <name>Key Takeaways</name>
      <t>This section highlights aspects of discussion at the workshop that appeared to be most impactful.</t>
      <section anchor="collaboration">
        <name>There is a Need for Cross-Cutting Collaboration</name>
        <t>Many participants remarked that the workshop allowed them to appreciate perspectives that they had not fully considered previously. Although several substantial efforts have included industry, civil society, government, and technologists, collaboration across all stakeholders appears to be rare.</t>
        <t>This was especially evident when considering the involvement of the technical community. Although there have been a number of consultations by governments and other bodies, involvement of the technical community is often limited to participation by the policy representatives of tech companies. This can lead to an underappreciation of the architectural impact and related harms of the design decisions made.</t>
        <t>Architectures effective for the goals and less likely to have profound harmful consequences may require the cooperation of multiple actors fulfilling different <xref target="roles"/>. To that end, standardization may be especially important for interoperable, collaborative development of architectures involving both servers and clients.</t>
        <t>Some participants also noted that approaches where liability rests only on one party -- for example, a content or platform provider -- are unlikely to lead to the desired results, because this creates disincentives for the cooperation that is necessary for meaningful reduction of harms. An approach that considers the roles of the young, their parents, device manufacturers, operating system vendors, content providers, and society overall was believed to be more likely to succeed.</t>
      </section>
      <section anchor="roles">
        <name>Identifying the Roles Involved is Important</name>
        <t>One of the more substantive discussions on architecture involved presentations on the functional roles involved in any system <xref target="HANSON"/>.</t>
        <t>Four key roles were identified:</t>
        <dl>
          <dt>Verifier:</dt>
          <dd>
            <t>The verifier role determines whether a person falls into a target age range.</t>
          </dd>
          <dt>Enforcer:</dt>
          <dd>
            <t>The enforcer is responsible for ensuring that a person who does not satisfy the verifier is unable to access age-restricted content or services.</t>
          </dd>
          <dt>Policy selector:</dt>
          <dd>
            <t>The policy selector is responsible for determining which policies should apply to the user, based on their jurisdiction, status or preferences.</t>
          </dd>
          <dt>Rater:</dt>
          <dd>
            <t>The rater is responsible for determining whether content or services require age restrictions and the age ranges that apply.</t>
          </dd>
        </dl>
        <t>In addition, it was noted that ratings and laws are often limited by geography or jurisdiction, so it is often necessary for services to first identify the applicable jurisdiction. It was generally accepted that this function often uses IP geolocation mappings, despite acknowledged limitations around accuracy and susceptibility to circumvention using VPNs.</t>
      </section>
      <section anchor="a-common-vocabulary-is-necessary">
        <name>A Common Vocabulary is Necessary</name>
        <t>Early discussions highlighted how not all participants used the same terminology when referring to different activities or functions. There was a recognition of the value of shared language, and some participants pointed to <xref target="ISO-IEC-27566-1"/>, which establishes key terms, including:</t>
        <dl>
          <dt>Age assurance:</dt>
          <dd>
            <t>Age assurance is an umbrella term for technology that provides some entity with information about the age of a person. This is understood to encompass multiple classes of specific methods, including age verification, age estimation, and age inference. Age assurance does not need to result in a specific age; age ranges are often preferred as these can have better privacy properties.</t>
          </dd>
          <dt>Age verification:</dt>
          <dd>
            <t>Age verification refers to gaining high assurance that a person is within a given age range. Strong assurances are often tied to official or governmental documentation, so age verification can involve the use of government-issued digital credentials.</t>
          </dd>
          <dt>Age estimation:</dt>
          <dd>
            <t>Age estimation uses statistical processes that process physical or behavioral characteristics of a person to produce a probabilistic value for how old someone is or whether their age is in a target range. A variety of techniques are used, the most common being facial age estimation, which uses machine learning models to estimate how old a person is based on still or moving images of their face.</t>
          </dd>
          <dt>Age inference:</dt>
          <dd>
            <t>Age inference draws on external data sources to determine whether a person fits a given age range. This method requires identification information, such as an email address or phone number, to find relevant records. For example, evidence of online activity prior to a certain date in the past might support the view that a person is older than a target threshold.</t>
          </dd>
          <dt>Age gating:</dt>
          <dd>
            <t>Age gating is the process of restricting access to something based on the age of the person requesting access.</t>
          </dd>
        </dl>
        <t>Relating these functions to the roles described in <xref target="roles"/>, all age assurance types fit the "verifier" role, where age gating applies to the "enforcer" role.</t>
      </section>
      <section anchor="trust">
        <name>Privacy and Trust Expectations Need Further Discussion</name>
        <t>Privacy was a recurrent theme at the workshop, but it was clear that there are multiple considerations at play when talking about privacy. The question of privacy was often caught up in discussions of trust, where approaches each depend on different sorts of trust between the different actors.</t>
        <t>Participants identified privacy as important to maintaining trust in any system that involves age assurance or age gating.</t>
        <t>Where private information is used by the actors in a proposed architecture, those actors might need to be trusted to handle that private information responsibly. In that approach, the importance of different safeguards on personal information, such as the prompt disposal of any personal information -- a practice that many age verification providers promise -- becomes a core part of what might allow people to trust that system.</t>
        <t>Several people observed that the sort of trust that is asked from people might not correspond with the role that certain entities play in people's lives. This will depend on context, where "adult" content providers generally serve anonymous users, whereas social media often already has a lot of personal information on users.</t>
        <t>In either case, users might have no prior knowledge of -- or trust in -- providers that are contracted to provide age assurance functions. It was observed that one likely consequence of some arrangements is to train people to become more trusting of strange sites that ask for personal information.</t>
        <t>Alternatively, it might be that trust in the system is not vested in actors, but instead the system as a whole. This is possible if no information is made available to different actors, removing the need to trust their handling of private information. For this to be achievable, the use of zero-knowledge proofs or similar cryptographic techniques was seen as a way to limit what each entity learns. Some participants noted, however, that these techniques do not address circumvention or censorship risks, still introduce new information into the ecosystem, and may concentrate trust in particular software implementations.</t>
        <t>Other aspects of trust were considered equally important from different perspectives.  Services that rely on an independent age assurance provider need to trust that the provider makes an accurate determination of age, at least to the extent that they might be held liable in law.  They also need to trust that the service respects privacy, lest the use of a low-quality provider could create other forms of liability or drive away potential customers.</t>
      </section>
      <section anchor="waterfall">
        <name>More than One Approach will be Required</name>
        <t>A recurrent theme in discussion was the insufficiency of any particular age assurance technique in ensuring that people are not unjustifiably excluded. All age assurance methods discussed fail to correctly classify some subset of people:</t>
        <ul spacing="normal">
          <li>
            <t>Age verification that depends on government-issued credentials will fail when people do not hold accepted credentials. This includes people who do not hold credentials and those who hold credentials, but not those that are recognized.</t>
          </li>
          <li>
            <t>Age estimation produces probabilistic information about age that can be wrong by some number of years, potentially excluding people near threshold ages. This manifests as both false acceptance (people who are outside the target age range being accepted) and false rejection (people who are in the target age range being rejected). Where there is a goal of minimizing the false acceptance rate, that increases the number of false rejections.</t>
          </li>
          <li>
            <t>Age inference techniques can fail due to lack of information.</t>
          </li>
        </ul>
        <t>Discussion often came back to an approach that is increasingly recommended for use in age verification, where multiple methods are applied in series. Checks with lower friction -- those that require less active participation from people -- or that are less invasive of privacy are attempted first. Successive checks are only used when a definitive result cannot be achieved.</t>
        <t>Some participants noted that inconsistent friction and invasiveness create a different kind of discrimination, one that can exacerbate existing adverse discrimination. For example, the accuracy of age estimation for people with African heritage is often significantly lower than for those with European ancestry <xref target="FATE"/>. This is attributed to the models used being trained and validated using datasets that have less coverage of some groups. People who are affected by this bias are more likely to need to engage with more invasive methods.</t>
        <t>One consequence of having multiple imperfect techniques is the need to recognize that any system will be imperfect. That cuts in both directions:</t>
        <ul spacing="normal">
          <li>
            <t>Some people will never be able to satisfy age assurance checks and will therefore be excluded by strict assurance mandates. Here, discussions acknowledged that purely technical systems are likely inadequate.</t>
          </li>
          <li>
            <t>Some people who should be blocked from accessing content or services will find ways to circumvent restrictions. In this context, the term "advanced persistent teenager" was recognized as characterizing the nature of the "adversary": individuals who are considered too young to access content, but who are highly motivated, technically sophisticated, and have time to spare.</t>
          </li>
          <li>
            <t>Offering more choices to people can improve privacy because they get to choose the method that suits them. However, when a chosen method fails, having to engage with additional methods has a higher privacy cost.</t>
          </li>
        </ul>
        <t>Some participants argued that accepting these risks is necessary in order to gain any of the benefits that age-based restrictions might confer. However, it was clear that other participants were unwilling to accept potential impositions on individual rights in light of the insufficiency of restrictions in providing meaningful protection; see <xref target="holistic"/>.</t>
      </section>
      <section anchor="risks">
        <name>Mapping the Risks for Architectures is a Useful Next Step</name>
        <t>How the identified roles (see <xref target="roles"/>) are arranged into architectures was some of the more substantive discussion. <xref target="JACKSON"/> describes some of the alternatives, along with some of the implications that arise from different arrangements.</t>
        <t>Throughout this discussion, it was acknowledged that active deployments tended to fall into a common basic pattern. Several participants noted that this is a somewhat natural consequence of some of the constraints that actors are subject to.</t>
        <t>An observation was made that laws often seek to designate a single entity as being responsible for ensuring that age restrictions are effective. That lawmakers feel the need to designate a responsible entity is due to constraints on how laws function, but one that creates other constraints.</t>
        <t>Another constraint identified was the need for specialist expertise in order to administer all of the multiple different age assurance techniques; see <xref target="waterfall"/>. This means that there is a natural tendency for services to contract with specialist age assurance services.</t>
        <t>Some of the proposed architectures were better able to operate under these constraints. Others required greater amounts of coordination, further emphasizing the importance of collaboration identified in <xref target="collaboration"/>.</t>
        <t>In discussion of the constraints on different architectures, it was common for participants to point to a particular aspect of a given approach as carrying risks. Indeed, the final reckoning of risks produced a long list of potential issues that might need mitigation.</t>
        <t>Architectures are not equally vulnerable to different risks, so a more thorough analysis is needed to identify how each risk applies to a different approach. An analysis that considers the constraints and assumptions necessary to successfully deploy different architectures is a contribution that would likely be welcomed by the community.</t>
      </section>
      <section anchor="holistic">
        <name>Safety Requires More than a Technical Solution</name>
        <t>Experts in child safety frequently acknowledged that restricting access to selected content cannot be assumed to be sufficient. The task of ensuring that children are both kept appropriately safe, while preparing them for the challenges they will face in their lifetimes, is a massively complex task.</t>
        <t>A recurrent theme was the old maxim, "it takes a village to raise a child". This concept transcends cultural boundaries and was recognized. The role of parents, guardians, educators, governments, and online services in creating an environment in which children can thrive and grow.</t>
        <t>Content and service restrictions are likely only a small part of a suite of actions that combine to provide children with protection, but also support and encouragement. This theme was raised several times, despite the goal of the discussion being to explore technical and architectural questions.</t>
        <t>Restrictions are necessarily binary and lacking in nuance. Though questions of what to restrict were out of scope for the workshop, discussions often identified subject matter that highlighted the challenges inherent in making simplistic classifications. Participants acknowledged the importance of the role of the adults who support children in their life journey. For example, on the subject of eating disorders, which can be challenging to classify, participants pointed to the importance of being able to recognize trends and inform and engage responsible adults. Ultimately, each child has their own challenges and the people around them are in the best position to provide the support that best suits the child.</t>
        <t>The concept of age-appropriate design was raised on several occasions. This presents significant privacy challenges in that it means providing more information about age to services. However, it was recognized that there are legal and moral obligations on services to cater to the needs of children of different age groups. This is a more complex problem space than binary age restrictions, as it requires a recognition of the different needs of children as they get older.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Age verification has a significant potential security impact upon the Internet; see <xref target="trust"/>.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-informative-references">
      <name>Informative References</name>
      <reference anchor="ANNOUNCE" target="https://datatracker.ietf.org/group/agews/about/">
        <front>
          <title>IAB/W3C Workshop on Age-Based Restrictions on Content Access (agews)</title>
          <author>
            <organization>Internet Architecture Board</organization>
          </author>
          <date/>
        </front>
      </reference>
      <reference anchor="CHATHAM-HOUSE" target="https://www.chathamhouse.org/about-us/chatham-house-rule">
        <front>
          <title>Chatham House Rule</title>
          <author>
            <organization>Chatham House</organization>
          </author>
          <date/>
        </front>
      </reference>
      <reference anchor="HANSON" target="https://datatracker.ietf.org/doc/slides-agews-slides-where-enforcement-happens/">
        <front>
          <title>Where Enforcement Happens</title>
          <author fullname="Julia Hanson">
            <organization/>
          </author>
          <date/>
        </front>
      </reference>
      <reference anchor="FATE" target="https://nvlpubs.nist.gov/nistpubs/ir/2023/NIST.IR.8491.pdf">
        <front>
          <title>Face Analysis Technology Evaluation (FATE)</title>
          <author fullname="Mei Ngan">
            <organization/>
          </author>
          <author fullname="Patrick Grother">
            <organization/>
          </author>
          <author fullname="Austin Hom">
            <organization/>
          </author>
          <date/>
        </front>
      </reference>
      <reference anchor="JACKSON" target="https://datatracker.ietf.org/doc/slides-agews-where-enforcement-happens/">
        <front>
          <title>Where Enforcement Happens</title>
          <author fullname="Dean Jackson">
            <organization/>
          </author>
          <date/>
        </front>
      </reference>
      <reference anchor="ISO-IEC-27566-1" target="https://www.iso.org/standard/88143.html">
        <front>
          <title>Information security, cybersecurity and privacy protection — Age assurance systems Part 1: Framework</title>
          <author>
            <organization>ISO</organization>
          </author>
          <date/>
        </front>
      </reference>
    </references>
    <?line 256?>

<section anchor="workshop-agenda">
      <name>Workshop Agenda</name>
      <t>The following sections cover each of the main topics of discussion sessions.</t>
      <section anchor="topic-introduction">
        <name>Topic: Introduction</name>
        <t>We will launch the workshop with a greeting, a round of introductions, and an explanation of the terms of engagement, background, goals and non-goals of the workshop.</t>
      </section>
      <section anchor="topic-setting-the-scene">
        <name>Topic: Setting the Scene</name>
        <t>Successfully deploying age restrictions at Internet scale has many considerations and constraints. We will explore them at a high level in order. The goal is to discuss within the group about the scope of topics that the workshop will seek to address.</t>
      </section>
      <section anchor="topic-guiding-principles">
        <name>Topic: Guiding Principles</name>
        <t>Architectural principles give us a framework for evaluating additions and changes to the Internet. Technical principles are subject to a number of other considerations, in particular human rights principles. We will review the principles that might apply to age-based restrictions, explain their function, impact, and how they are applied. Including human rights impacts, such as:</t>
        <ul spacing="normal">
          <li>
            <t>Privacy and Security</t>
          </li>
          <li>
            <t>Safety and efficacy</t>
          </li>
          <li>
            <t>Censorship and Access</t>
          </li>
          <li>
            <t>Access to the Internet</t>
          </li>
          <li>
            <t>Freedom of Expression</t>
          </li>
        </ul>
        <t>And effects on the internet and web architecture, such as:</t>
        <ul spacing="normal">
          <li>
            <t>Deployment, Extensibility and Evolution</t>
          </li>
          <li>
            <t>Avoid Centralization</t>
          </li>
          <li>
            <t>End-to-End</t>
          </li>
          <li>
            <t>One Global Internet/Web</t>
          </li>
          <li>
            <t>Layering and Modularity</t>
          </li>
        </ul>
      </section>
      <section anchor="topic-potential-impacts">
        <name>Topic: Potential Impacts</name>
        <t>We now want to look at some of the higher-level considerations that apply regardless of approach. We will look at some different perspectives on how to think of the overall problem. Discussion will seek to find how those perspectives can be shaped to guide choices.</t>
      </section>
      <section anchor="topic-where-enforcement-happens">
        <name>Topic: Where Enforcement Happens</name>
        <t>The Internet standards community is in the unique position to make controlled changes to the architecture of the Internet, and so there are multiple ways and places to deploy age restrictions. We will examine the options, with an eye to the deployment properties of each location and configuration, as related to the architectural principles. In particular, it will consider the establishment of new roles as well as the use of existing ones.</t>
      </section>
      <section anchor="topic-available-techniques">
        <name>Topic: Available Techniques</name>
        <t>There are several active and proposed systems for age restriction on the Internet. We will review them from the perspective of their interaction with the architectural principles, potential impacts, and with consideration of the enforcement options. Including:</t>
        <ul spacing="normal">
          <li>
            <t>Age verification: including server-side solutions using government identity systems / ZKP</t>
          </li>
          <li>
            <t>Age estimation: including biometrics and data analysis</t>
          </li>
          <li>
            <t>Age "inference" approaches</t>
          </li>
          <li>
            <t>In-network solutions</t>
          </li>
          <li>
            <t>Classification and On-device / parental control designs</t>
          </li>
        </ul>
      </section>
      <section anchor="discussion">
        <name>Discussion</name>
        <t>We will follow up on incomplete discussions and revisit architectural learnings.</t>
      </section>
      <section anchor="summary-and-reflection">
        <name>Summary and Reflection</name>
        <t>We will summarise what we have discussed and learned thus far.</t>
      </section>
      <section anchor="outcomes">
        <name>Outcomes</name>
        <t>We will outline the potential outcomes, further actions and next steps.</t>
      </section>
    </section>
    <section anchor="participants">
      <name>Workshop Attendees</name>
      <t>Attendees of the workshop are listed with their primary affiliation. Attendees from the program committee (PC), the Internet Architecture Board (IAB), and W3C Technical Architecture Group (TAG) are also marked.</t>
      <ul spacing="normal">
        <li>
          <t>Steve Bellovin</t>
        </li>
        <li>
          <t>Hadley Beeman, TAG (PC)</t>
        </li>
        <li>
          <t>Matthew Bocci, IAB (Observer)</t>
        </li>
        <li>
          <t>Christian Bormann, SPRIND</t>
        </li>
        <li>
          <t>Marcos Cáceres, TAG (Observer)</t>
        </li>
        <li>
          <t>Andrew Campling, 419 Consulting</t>
        </li>
        <li>
          <t>Sofıa Celi, Brave</t>
        </li>
        <li>
          <t>David Cooke, Aylo</t>
        </li>
        <li>
          <t>Iain Corby, Age Verification Providers Association</t>
        </li>
        <li>
          <t>Dhruv Dhody, IAB (Observer)</t>
        </li>
        <li>
          <t>Nick Doty, Center for Democracy and Technology (PC)</t>
        </li>
        <li>
          <t>Sarah Forland, New America Open Technology Institute</t>
        </li>
        <li>
          <t>Jérôme Gorin, Ecole Polytechnique</t>
        </li>
        <li>
          <t>Alexis Hancock, Electronic Freedom Foundation</t>
        </li>
        <li>
          <t>Julia Hanson, Apple</t>
        </li>
        <li>
          <t>Wes Hardaker, University of Southern California Information Sciences Institute</t>
        </li>
        <li>
          <t>Kyle den Hartog, Brave</t>
        </li>
        <li>
          <t>Dennis Jackson, Mozilla</t>
        </li>
        <li>
          <t>Leif Johansson, SIROS Foundation</t>
        </li>
        <li>
          <t>Mallory Knodel, Article 19</t>
        </li>
        <li>
          <t>Mirja Kühlewind, IAB (Observer)</t>
        </li>
        <li>
          <t>Jonathan Langley, Ofcom UK</t>
        </li>
        <li>
          <t>Veronica Lin, Carnegie Mellon University</t>
        </li>
        <li>
          <t>Thibault Meunier, Cloudflare</t>
        </li>
        <li>
          <t>Tom Newton, Qoria</t>
        </li>
        <li>
          <t>Mark Nottingham, IAB (PC Co-Chair)</t>
        </li>
        <li>
          <t>Georgia Osborn, Ofcom UK</t>
        </li>
        <li>
          <t>Tommy Pauly, IAB (PC)</t>
        </li>
        <li>
          <t>John Perrino, Internet Society</t>
        </li>
        <li>
          <t>Eric Rescorla, Knight-Georgetown Institute</t>
        </li>
        <li>
          <t>Beatriz Rocha, Ceweb.br</t>
        </li>
        <li>
          <t>Omari Rodney, Yoti</t>
        </li>
        <li>
          <t>Gianpaolo Scalone, Vodafone</t>
        </li>
        <li>
          <t>Sarah Scheffler, Carnegie Mellon University</t>
        </li>
        <li>
          <t>Andrew Shaw, UK National Cyber Security Centre</t>
        </li>
        <li>
          <t>Aline Sylla, German Federal Commissioner for Data Protection and Freedom of Information</t>
        </li>
        <li>
          <t>Martin Thomson, TAG  (PC Co-Chair)</t>
        </li>
        <li>
          <t>Carmela Troncoso, EPFL, the Swiss Federal Institute of Technology in Lausanne</t>
        </li>
        <li>
          <t>Benjamin VanderSloot, Mozilla</t>
        </li>
        <li>
          <t>Tara Whalen, World Wide Web Consortium (PC)</t>
        </li>
      </ul>
    </section>
    <section anchor="potential-impacts">
      <name>Potential Impacts</name>
      <t>During the workshop, participants were asked to name potential impacts -- whether positive or negative -- that could be seen in association with the introduction of an age control mechanism. This list is not exhaustive, focuses largely on the challenges surrounding the introduction of such a mechanism, and does not imply that all points were agreed to by all participants'</t>
      <section anchor="impact-on-children">
        <name>Impact on Children</name>
        <ol spacing="normal" type="1"><li>
            <t>Children encounter online harms</t>
          </li>
          <li>
            <t>Pushing kids to less safe resources</t>
          </li>
          <li>
            <t>Kids lose the ability to explore on their own</t>
          </li>
          <li>
            <t>Diminishing children's rights</t>
          </li>
        </ol>
      </section>
      <section anchor="ecosystem-impact">
        <name>Ecosystem Impact</name>
        <ol spacing="normal" type="1"><li>
            <t>Centralization</t>
          </li>
          <li>
            <t>Fragmentation of the Internet</t>
          </li>
          <li>
            <t>Increased costs for running a Web site</t>
          </li>
          <li>
            <t>Chilling effects on use of the Internet</t>
          </li>
          <li>
            <t>VPNs proliferate</t>
          </li>
          <li>
            <t>Chilling effects on the publication of borderline content</t>
          </li>
          <li>
            <t>Less content being available online</t>
          </li>
          <li>
            <t>Restricting people to a few platforms / services</t>
          </li>
          <li>
            <t>More use/utility of the Internet due to a perception of safety</t>
          </li>
          <li>
            <t>More (or all) online services require a verified login</t>
          </li>
        </ol>
      </section>
      <section anchor="implementation-and-deployment-difficulties">
        <name>Implementation and Deployment Difficulties</name>
        <ol spacing="normal" type="1"><li>
            <t>Device compatibility</t>
          </li>
          <li>
            <t>"Advanced Persistent Teenagers"</t>
          </li>
          <li>
            <t>Difficulties regarding jurisdiction checking</t>
          </li>
          <li>
            <t>Spillover to other software (e.g., VPNs)</t>
          </li>
          <li>
            <t>Displacing users from compliant to non-compliant sites</t>
          </li>
          <li>
            <t>False sense of addressing the problem</t>
          </li>
          <li>
            <t>Dealing with conflict of laws</t>
          </li>
          <li>
            <t>Operators pulling out of territories</t>
          </li>
          <li>
            <t>Increasing the footprint of the deep web</t>
          </li>
          <li>
            <t>Imposition of cultural norms on other jurisdictions</t>
          </li>
          <li>
            <t>Technical solutions are reused for other purposes (scope creep)</t>
          </li>
          <li>
            <t>Dealing with obsolete and non-compliant systems</t>
          </li>
        </ol>
      </section>
      <section anchor="security-and-privacy">
        <name>Security and Privacy</name>
        <ol spacing="normal" type="1"><li>
            <t>Increased cybersecurity risks</t>
          </li>
          <li>
            <t>Fingerprinting risk</t>
          </li>
          <li>
            <t>Ad targeting could get creepier</t>
          </li>
          <li>
            <t>Needing to trust someone on their word without evidence</t>
          </li>
          <li>
            <t>Normalizing online identity requests -- increase to phishing risk</t>
          </li>
          <li>
            <t>Data breaches</t>
          </li>
        </ol>
      </section>
      <section anchor="equity">
        <name>Equity</name>
        <ol spacing="normal" type="1"><li>
            <t>Lack of access (e.g. due to lack of device support)</t>
          </li>
          <li>
            <t>Refugees, stateless people, people without identity</t>
          </li>
          <li>
            <t>Harm to vulnerable people</t>
          </li>
          <li>
            <t>Not addressing other vulnerable groups (i.e., not age-based)</t>
          </li>
          <li>
            <t>Lack of availability of redress mechanisms</t>
          </li>
          <li>
            <t>Users' rights to restitution</t>
          </li>
          <li>
            <t>Loss of control over and access to data</t>
          </li>
          <li>
            <t>Risk to anonymity</t>
          </li>
          <li>
            <t>Loss of ability to run software of your choice</t>
          </li>
        </ol>
      </section>
      <section anchor="societal-impacts">
        <name>Societal Impacts</name>
        <ol spacing="normal" type="1"><li>
            <t>Air cover for blocking the Internet</t>
          </li>
          <li>
            <t>User control of the content they see online</t>
          </li>
          <li>
            <t>Costs to society (e.g., regulatory overhead)</t>
          </li>
          <li>
            <t>Increased online tracking and state surveillance</t>
          </li>
          <li>
            <t>Use as a censorship mechanism</t>
          </li>
          <li>
            <t>Advancing foreign policy goals with censorship</t>
          </li>
          <li>
            <t>Abuse of guardians who don't cut off their wards</t>
          </li>
        </ol>
      </section>
    </section>
    <section anchor="desirable-and-essential-properties-of-a-solution">
      <name>Desirable and Essential Properties of a Solution</name>
      <t>During the workshop, participants were asked to nominate the properties that they believed would be advantageous or even essential for a solution in this space to have. This set of requirements and desiderata was recognised as not all being achievable, as some goals are in tension with others.</t>
      <section anchor="functional">
        <name>Functional</name>
        <ol spacing="normal" type="1"><li>
            <t>Underage don't access content that's inappropriate</t>
          </li>
          <li>
            <t>Not trivially by-passable</t>
          </li>
          <li>
            <t>Flexible enough to be provided through different means</t>
          </li>
          <li>
            <t>Bound to the user</t>
          </li>
          <li>
            <t>Reliable</t>
          </li>
          <li>
            <t>Handles user-generated content</t>
          </li>
          <li>
            <t>Enables differential experiences or age-appropriate design (not just blocking)</t>
          </li>
          <li>
            <t>Agile by design -- assume adversarial engagement</t>
          </li>
          <li>
            <t>Difficult to bypass</t>
          </li>
          <li>
            <t>Accurate</t>
          </li>
        </ol>
      </section>
      <section anchor="accountability-and-transparency">
        <name>Accountability and Transparency</name>
        <ol spacing="normal" type="1"><li>
            <t>Transparency and accountability regarding what is blocked</t>
          </li>
          <li>
            <t>Minimises the need for trust decisions</t>
          </li>
          <li>
            <t>Can be independently / publicly verifiable and tested</t>
          </li>
          <li>
            <t>Auditability</t>
          </li>
          <li>
            <t>Appeal mechanism for incorrect labelling of content</t>
          </li>
        </ol>
      </section>
      <section anchor="privacy-and-security">
        <name>Privacy and Security</name>
        <ol spacing="normal" type="1"><li>
            <t>Issuer-Verifier and Verifier-Verifier unlinkability</t>
          </li>
          <li>
            <t>Unlinkability across components</t>
          </li>
          <li>
            <t>Purpose limitation of the data processed</t>
          </li>
          <li>
            <t>Security of data processed</t>
          </li>
          <li>
            <t>Phishing-resistant</t>
          </li>
          <li>
            <t>Doesn't process or transfer any more data than is necessary</t>
          </li>
          <li>
            <t>Avoids becoming a tracking vector</t>
          </li>
        </ol>
      </section>
      <section anchor="equity-1">
        <name>Equity</name>
        <ol spacing="normal" type="1"><li>
            <t>Inclusive</t>
          </li>
          <li>
            <t>Fair -- avoids or minimises bias</t>
          </li>
          <li>
            <t>Does not create inequalities (e.g., across education, other properties)</t>
          </li>
          <li>
            <t>Discriminates solely upon age, not other properties</t>
          </li>
          <li>
            <t>Works on open devices</t>
          </li>
          <li>
            <t>Device independence</t>
          </li>
          <li>
            <t>Usable by people of all ages to increase their safety online</t>
          </li>
          <li>
            <t>User choice in who verifies their age, and how</t>
          </li>
          <li>
            <t>No clear losers</t>
          </li>
          <li>
            <t>Accessible to people with disabilities</t>
          </li>
          <li>
            <t>Includes appeal mechanisms for incorrect age determinations</t>
          </li>
        </ol>
      </section>
      <section anchor="jurisdiction-and-geopolitical">
        <name>Jurisdiction and Geopolitical</name>
        <ol spacing="normal" type="1"><li>
            <t>Able to handle arbitrary composition of different jurisdictional requirements (possibly down to school level)</t>
          </li>
          <li>
            <t>Applicable globally</t>
          </li>
          <li>
            <t>Applies the rule of law in the jurisdiction where it applies universally</t>
          </li>
          <li>
            <t>No concentration of power in any one entity (or small group of them)</t>
          </li>
          <li>
            <t>No concentration of power in any country</t>
          </li>
          <li>
            <t>Aligned to legal duties</t>
          </li>
          <li>
            <t>Based upon a valid legal basis</t>
          </li>
        </ol>
      </section>
      <section anchor="usability">
        <name>Usability</name>
        <ol spacing="normal" type="1"><li>
            <t>Economically sustainable</t>
          </li>
          <li>
            <t>Low friction for adults</t>
          </li>
          <li>
            <t>Fast</t>
          </li>
          <li>
            <t>Comprehensible by users</t>
          </li>
        </ol>
      </section>
      <section anchor="implementation-and-deployment">
        <name>Implementation and Deployment</name>
        <ol spacing="normal" type="1"><li>
            <t>Low dependency on a single root of trust</t>
          </li>
          <li>
            <t>Enforceable by a good mix of technology and law</t>
          </li>
          <li>
            <t>Broad deployability -- not expensive or complex</t>
          </li>
          <li>
            <t>Decentralized</t>
          </li>
          <li>
            <t>Future-proof</t>
          </li>
          <li>
            <t>Ability to report / learn when there are issues in the system / telemetry</t>
          </li>
        </ol>
      </section>
      <section anchor="general-other">
        <name>General / Other</name>
        <ol spacing="normal" type="1"><li>
            <t>Not perfect</t>
          </li>
          <li>
            <t>Technically robust</t>
          </li>
          <li>
            <t>Not a single, sole solution</t>
          </li>
          <li>
            <t>Stable -- resilient</t>
          </li>
          <li>
            <t>Alignment of incentives among participants</t>
          </li>
          <li>
            <t>Simple to implement</t>
          </li>
          <li>
            <t>Resistance to repurposing for censorship</t>
          </li>
          <li>
            <t>Unable to be used for surveillance</t>
          </li>
          <li>
            <t>Addresses risk of verification becoming over-prevalent</t>
          </li>
          <li>
            <t>Accountable governance</t>
          </li>
          <li>
            <t>Open Standards-based</t>
          </li>
        </ol>
      </section>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA719yZIbV9beHk+RUVqI7ADApqSe2Ju/VOIktUiaRUnhaXEB
XACpSmTiz6FAiMEIP4RfwEsvHeGld+0n8ZP4fN85d0gAlNrtiL8XahaAzLz3
3DN8Z8zZbDbpy77yT4qrt37ftH2xbptd0W998fL660c/fXlT/NS0d9222RdN
XVxv/Oxr1/lV8dZ3fVsu+7KpO3xz09S9r/viern0XXc1cYtF6+/lttfPn/50
W+jNryZL1/tN0x6fFGW9biaTVbOs3U4ev2rdup+VbjFzG3/oZi0vmP3+95Nu
WOzKrpMH9ce9/FLWNamH3cK3TyYrud2TyVLW4Otu6J4UfTv4iTz2y8mdPx6a
dvVkUhQzXFMcbB/8QB5SbOTiyb2vB48fbcp+OyxkwWXdu3a5XTSuXT26vKwr
+X0lV3e9/H7b9/vuyaNH+XVzvdu8bD5xh098PN/2u+pqMnFDv21kf8VMnlQU
66GqlEzfu/aueNX0fVlvtm7Hb/3OldWTYlc3/b/gP/Pa9xevlIuKd9tm1zX1
6ML+X6rmIIfXNvsjL57UTbtzfXkvlJngoOJfRXH96tXrH17dPH3CWxjz/P/w
SvGAFHio93PtxgtVA1HlgF3fuuWdb+el79fzpt082rTNsH/Eqx65RTP0j3ht
JBr/Jz+UdcmDWtlRcS0nU/Z+2Q+tL77GEfFn5J9i7arOy983L67fvbj+fvbi
9Q+34/3dbF0v5C5eNEPni7dD5S+u9nA4zJf60y1+ydVyhbOhe2TfzPjVrA03
yZc902WPHndhoS+uX92+fjVa4U9bLzt7irNa+h2o+8Lt9yIV/zhZRRYfdVW5
8p3xpP1xwK1nPt16ttVbn5N9ljHct0NVOllFHdhtvIdn1+/GNH7mlr64rl11
7MqueOeX27qpms2xeHrvqsGBe4oHuOoyp9T31X5YdPO67Pr5prl/hH/gk0dl
++iL33/x5aNXL2/fzV++nf/5q788nu9X6/PVG+tkQuPL4tXG1Z/4+o0DX98V
z9tGNGb7iV9dDx0k70Wzu0CGb69vvvu3OMt/8hC/8a4uvpWbXz7El7evZy+f
3sy++NMf/vjH2ePRLq5eBsUhB9f55dCW/XFaLI+iucOfhatXxb4t793yKP/f
QELx8//zX/4r9Efhum5oXS2M0R273u86IbnYqMfCLa2sDyr96pOSWHYNadH1
8hQo8z//+fFXX1LFfkrwZD9nu5zMZmIvFh1oLKrxnZjGf0rNHVxXiKUSgyO/
XRzVxn5aPxUPRKk+JIHkcZX8V06z+MkvcN9ObEU57IoHonQfiiktXi/7Ruha
CKP/YS5KXiRILUrRDbuda8tffFeUfVd05aYu1+XSycL2jdgsWeq6WJXdcqCN
5QPlSXUvv5Jr+mZfLuX/RCMVO3eUXbQtrl0PLVgeO+rk560eMy7GocwnEzFS
Xi/rsRphyIGsLP92YW1yBaggB7/0fiUmjYvBR8FYYy++uC+FhZVXmq5UAocb
CjHLWp9hd3UtHtyIoj65WbGHDVyWe4dt43arphCDWdQeJyRUqo5yk3Ul50DI
0LQFrNqFx8sGyRe7crUSPT75DEfZNquBxz+ZvPWbQRBC0+p1ld+UXfhbrJd8
ZAuTg8V6y3rZetcJCbgEY6R6UxxAQTmtYuGF/sIB7l6MtltUssemOMqtNsXe
N3v526gZeGoKusiFfr0GVeTXrZf1ef6oqauy9sXWtbsunJI/Fr5eyh3letnf
yzFXTX+TYZ3t6tPsGtm//yeFaF687IuFEHCzxY5E5MGDfbAVovE70TDlfVkV
XbMUbSgaZnXfAHXKF4tBCAxRLLELzx9j0WItZFPkTtEVd37bVMLR4P0gGFxw
PUATRRYtswPHZ92w3BY7OUShCPjjHTm7FOE7FmthVtUAV3LTvW+hGUUOoICw
mcK/d7uyduFeuD93JYJacY0u0Vs+WW6bEkvhySn/3DfVvcpC11SD0k+eAqQ7
W5C07QlpneolWdBSiXw1LQ6CW2Vdm0YeIuu4WgxltfpP/1E48T/Lx53wi9xI
2FfIA60KDrXlihDLvvpSCXQvwiTghZ82eLgYm7Zxy62QRvDtrfdjyXR1LYxn
1u7DhwAyP37kHla+F6bvLiq2zne/qUREPj8rfqQUP32/Fzp0mdZQ1wTn9W+r
pg4w8j4uZyUGUag5oopYif8XlWVe2+edKS75x4UlTeX6NilIV1Wjhwixnqlu
3zWtV6k3/gi7tg0sm53Qnv4iNiE/cLrnjbgKNRb/acUrW8C5ibDV+c6THeqU
FwU6q7TKE3oTj1a4S6AN/wLhh+7CKhOd100l7o0yyVr+pVQsneiL4dxELOSB
q0bWBiK7XjDHnrpz6fZUda6I3qay1QXXYPJmtN1N66HyKGbQF+MHUpj40fmd
RBJGPsnHj1OR7tHu8rW2pazeQ4f1FCTKdilSel+uBsEyIJ3AHFeXv9hJBRIb
G0Izma89L4rvmw5SFrxv3m20dHKwQOyqXJryF4kP64CJ+qtaFSioATxOXAsF
2Db3MA9yc6gRsUm4nOf3vheyfviQM4wogQqa/dO2fCpUrLyqaYjDvw6i6mhm
AvwoMywqlhT73vpqhSMsXov2h5wEXgiGSVV4cG0P/wzmOzNVTjjvHvi3oBOL
R45kQ6MvQfNPRWqFuIKa24AnjmqyIG8wCRDC3VCXvWI1syNi2IXPR/Z6V2Id
ovLl9w3grSjVndzp1EiYUcBZtA1ULqgjtxIeFlR8FFJnMloIJuZuVsEiEtpH
KxZ9uKnZWJz1tNgO8uSixYrMAsNYi8URNpSrXZ/kn0pYfAVqCJHFrYNzKLc3
p2HKLQlkcYuyon8RUAhVUns/MqlioerckkbxD2Qys520gRdpCQtZt6DtRnwZ
RcrkLlvTL0aCcCPq4HIjJr0SQgN0iy8j95CjAsFwtHVTzzq/MePQ7cX9nRcj
zdEssIPEx7IwwVNR4mvGZET/y4kAKw5lt5UV9wePXa6Gqlex2ooJh/y1XaCO
3C1hno7yCfhJwJk4TdDgfdk29iNe1W3LdQ/m2wP2K8nNAshNgnLPVY7wJDYh
aCVIfdupteyWchwnzgcQUg++wK78Wjh59YR7xebFHjk+UBhW5YL2a+NHyGZK
FT4CUNMxelIqkAlnyoRFudvL/Uwpyk3VTzartNP1LrdiKn29EQaWK08tM5X8
tKjERRI7T9iEy3eyBtG33S7DasKxsozeT0lIGO7IzDuHKKLcYFM1C2EdShRw
1Yi93X1TrtKJiW5rnRBgUJbmc0Qm5NAXtNVDqxAMgr70AONyjHtQUaDqvS+r
CmIprP/UtUJ3/x5L3sC0A7XKheB1GAaLx1BgcXhPxDtRtXaFUxCGomcJKl4J
q4QlGFxsGjH74j02B3mInLM6mXKcAgqXd0SSLc7YQ2u6lf6IN45RgPmVngTc
CBEidTkrWMRGwLetlDAC35NV1sVSBIGgOdcuBaNyxrWA2IwFhIgE7gEE6/UO
4r3JT9Yh4tCJ0Pt2gxW7ZduItvxZEEy3MgacF7cCjMbsIV4z3B4g6q4q93Kg
x6KrhIRXcM9kVVB3tI4Zw6jesIMDHUiozlS5J+AHh2D7oqr5M5JODiQSN4v4
yMK80EW2AvRleuAg2sGLfTUGK1bCinL0yuEqZCu/LA2SJZ/ElJqdsit3kHRh
kXInupB+Zcaq0DWzJSLMIsC/RODmCxpqU9CHbSPc4truTL+Ab6nEOrfGkYjf
vRcVBYveZaZR/k1fgcpGNjCsHSVC7ihXCAvJ33SD9iI4XhhMWP5FrgVEDGs5
MUESCm3kAX5Dbx2GEep7QfODBfkYlBSlbQEsaC9TZp4QF2429QHERwMtrnd5
oKtyh+KBPLUaqC6UvqCKHMmdDwTlcx5Ssbkuv5yqd6gPjjZEGLzpaNVa1Rxu
qQt8BuUkv4RmU6QXgjXNXp5gijeEcqDHlHuFrtAIABO0J10yKC0QfiN2cSsI
wGy5YlzikSX1m4GJHHyRKTrae/xiDVwRU064c0VLr0KhbnXSUTxfIbB41eYs
Kxsplmrl5EXohRBVU29m0UGNGMh4VgCah8DRYceR+TFrRhXg69Wsb2ZeY5TK
GrKpjsrKENYxiIBuUhSYUHAMMrpcJSPIU1HM1oCFBwRO7PEBdJkCca34Jyal
slRQcj1UMRC6GzpYYlgM4pppbiy4TsJEKkL+rZLOQLWctWOIINwf0h7CBhAW
DwfOiRRU1awkotUfy3/w9cF2LAQHzmfEauv2/hQCGazDSrxsrtmJoyBmzczN
u6hMDFF14M6qQYjBFbSM7bBL5liDAyBw1T0JqEJhq6ApwT2im8Of9PF8+gF0
n/7e7rWKhBRVYkEx4V2BAWS0xdCKBoU9EcgFpoKiKfXkxRAQtSVmAbgq1vI3
PEpyc1AyI6NI91Psw6t8rcW6rIRguDHizJVY9dWRYiQXMJojvDAyMPhdIwLS
dqru5cdQ6xtPBVGJbPQK5MXqLc1c51Ff01bCcis/kxvJir7xY9ookRlBFLYR
MSFbEW1E/vMriHCQcd0L6AEmmfXlbgwIpuYttq4MWERIXgLJkb2EC4YuGCHz
BkXXyneyVOxLhB729Be7OF0mP1QBCoZk3xzgaQn9BH+5nxEvEBFugDu/PwNu
mSkUxVwBKABNL2PACpEgohIoZGH1HlYqE0gYoGUj5P1F4aLcqBbMi0iuH/sa
iOLuvOghhFzgpJatuenyb/nseBlOTCZmX+R4BBoso51gxFO0y4M3T991D6M6
c+JYHHcIvglCXCmRVHH/IuphdlcLAPOrDfF4szZTl8yWGhjx+eU5iKswPHka
ceqGtRxsKTefKviYi9hnRmNaYE3iqtSfy3ZXKwYXGGky5uOhtbV5JCDtQfji
5IJDSSgj6M/HsHkKWhJWVkfyZDO0ITLbCpITi5eHsLozPHai/rjYJWKQEA8o
P+G3sl0Ou3tVfcUIOk8J41tfBQcMIXMEHDL/Cip5xnVhgUuRpyxUM/QNzOGS
h75zdym9JcvvoBz67XFeXGe+rxFMPaQE3NIRmzYZ6RsmbETTUJFDmOkqt2Aa
+rQDlIJc9PKbsAAR+Z6KDro4oBLLL4RgUToCstwpl0EWRWq36pqQtRmeEEb+
JgsdNHVC3yHaoKFB1Y6mcoTw8o0seCsQowLM8LDGQDawHKIE9HbB71XkgACk
rHGadMo0KWoFK0Leyrj7nD86gWUAeMDX8Ol8OwphQz0vBDjJDtXITIM5mo62
ELIB02B2g7bx3I4aHP8+qDwGJ1fNPioyo8/M6GM4n8ZZvYWYDFIclMLpcIoS
HiKY6bcK3EUzk2bJe1NchN0IFXuEe/gc9TOERwIAILsildUryiesVxOkiFOY
twQaVEQOeDaZfK2ZTnm6IJ2VO07HlLbYdfLdah9c1UZA36IJmUVVjdBTAsOQ
xrFQgyjrfjDHi+rdLaOKG/k4SmzER2N+hIHJ2hR7qc8X+iFbJroDYq76TA2f
Jj+QTVpAxx1PwgrKp8oAyTvI8yIHaucC8X41XWuotIRjZTX4iVKUEQUiHu5h
PdCGkK0Mce7c3kTVbRwIgRg/wd4Yfk5TViPZfGy39gNxJ72TqVndCN+LZeUJ
/6kq1BeErtLEWFCTohA0D5BhXGpmhiEj9IY6hERagA1mkFqtYmSCTzBOCMqB
iU+mXLrAigtvwXwNpyN7kBJM6VT7rebUXBEy/1240bz4Gj7Ly6fvnmlm/csb
QLWYvYDrKzsCf62I8BWQajhMRZorsVQQF658I0jGojmQgBQrEM3Q0+EK4CCs
KTgbiqUNDqTkwlSDlVFWFEPRvIgACxl/IlMzuJ0C8ryXWjGLsMuKYA/GpBCK
WTpAaRizVSaDbiWaI4AxUURZTDBeTUsBdu2GzSYLtwvTINyDCNOiWZWeKDL6
t/9ACjm5BaMfPIePN02BLcJ2sqIaUJiilPnICCREFRtqyd1eYNG/Dg1DCKWH
S4F4YLN34nMreZt172N4eSaIaWXQHHsdakSdOgQWQAw8HEmScS6CsZMThLF1
XX/MeNScQTOVOMGOvCzCuwt5zkrZXJzbgwZmCTP7GHoOcQDIUXDJLa9P5xB8
sKQnqfFQxL/q7izm/XmX6SHGuRgsyIPFwo+ISgLg7IaqL2dZmvxET5ddqC84
Fvcl6xSEebfQ6PB1mXD5Trzmd3IDd3DHzhKvIW0QzbxoNYrTWX3KSf5Mofte
3K1W6YVCCRxKudvLMQlC1zyd6lemdV8FE3MDmzK7GVhOWdyMNvLhs9HGPk4m
584D3O/2bhSgTxbY9NTWMzQG8OAZ9ECSLSiKvPZi61R0UXx1zIIxVLVIplfH
HLNYKM9SaDQnWunRaUhGhY5p55UcH8zVqDBimqUA7KhPyigu2V9g+FGNhFK+
M8K3cghzO1HICzViSdzg7xmTBOio4+6CTrDyhV2WZE6hxpDiyrff8zS50QXT
HYWWBDPgKzcXLrVA7+I4znVAxIl6knb6R54NzlHVEBxsGMFcO4eaLouanpkV
zYcRhrgaeFilHF4hdCaZpFbbGZkly12NsYYyt8V4KkYatJbHfm2hrhi6Ze2Q
nMz1KC4VwXLwx1n4EUqWui7zeUlq0ThUFXwWglE0V6I6WRcDbyPYMQ2nWNRA
N0HNAT+CyrMDn68t3LcqEc7Q0g+iqI8fhTqNZdjq1fTMauJZwm8ZfwlFhPlZ
mhbCnykWlvHyPYgjXluzDyc+jtUpOxAMAyowA2dVXMuqNNtyHuEn4s6DCclZ
UKieQuysPFINCcrUeieGtRlZfu92GmhMFQ1tDHjHLBqjRTl+lUMKfBQ4oNWq
H0Rup0IusUmdQQYmjzzxdMnwCXk0cEF+ctyNXBHcf43Hi92EwwAeYFVZOGQy
ochpneInBgxV4NU6qEdnrMoatmmIBmkacXoxjD89C0OFyM40kiomGVNimVkc
astK8bWXc7zPjMUouMPIjl+p0XiphZDHoKfecuEvY7GV/Duy3YfPlHUnk9d1
NLK8edTR96MKF0bLcogTi7jG5TQGytZDvTQTrfTLa74YwFWSfPig5eEiQ5PJ
s2ZoizsURTQxrRGrO1dPJpMfGS9AL8UTrWGyv3kBCq8UyXfRWXS0XwhmCj07
zT85q7/VZCySh8gmajAx3tmCiwjopAxPpaoHkLeNEDk+AimhGDVR5KU6Nq6y
BCYL1ZAWmEAxQ8gI+1UuROakM6amWrrz8DmauMj9+ONLaw000epMBEd5ERy8
kA3b75WXsFSEHKYpPKpsnkf4pgGXQsrFCYIi1DW+FRGNK0PG+B9Yjw9Vuad7
jqr5NGEe0x3x8Lqowpgje4lqglWpazXQn2k6FUgzGu6gXvXYVMIG+2Yjdm3L
7P3J9hvcNdrXsaKJyxdyrssWuM5kUte8Z+IetMhvyjpRrHPjawr+kcyxHxcF
BYmyBw8oJXz5BkutmhhB2++xOyikbl8y3p2FF7jBkFGOAcos7j50eGrIZCI/
NgorDvQLf3zzyorJrgWEMvD/Y4wygDCvAklCjj7XInlgDC4rI4wnRX1afsXw
hjimo2w+8RjZTgWwyawxomz3WlskRxHI1eXBCjfyS0zraegMyTuNmVTCVYPb
+KCTT40nC9FVIX/4cNJTgJo3FTPhWTnosoNNhUqzsEX0LkWbjXoGIDnjJoKS
8RcBioKZKscbqM1LzSbBs4IR6XSplklnkGKUymQJQZAcAAnTW4bsqJti6QOK
s2qCP8QzAhZaVvKn2sLoqu9EhpvVyG8+La+Y8hPkzndZZACfyQJVgcxP9p7K
hqwaUYEBjUd6ttzir7kiSLKsqqnVDIFsutOEhkFwhg2zRg4Lec31SPKlh1MZ
Bap5b8o4IllMryI+mlY/tgtlFyIvzopNk+EpbvsWmZ94bb6JvtS9N0xfoMa5
zbwDREctUuaiajolPXdtpjcoeBxfus2MGQvUmG5KRrdTgNzokQ4uUCN9omoI
JoF5KFeF2FVQyyEmJrq04/co+/ByDmWjpeEO0XFZMS7vcr600ks2AbAKYUFI
ynSXiiyEATqkqVRMAU5LCn+wLGq/yGmd8o6ZfqP+dV44k5UzhBrQqcGirg85
zoVnUtVpqviErVXySZKdQ07BA+S2ZBFNUlKw9Aof155zSjS98qOq0iIj4nu5
ZBNhaIkELtPS17kUhfOJH6BR9UBM5t8jfgKeQU1HSEFBfwbQdAEzoQXnAs9S
X6jcBzvdRZxmfJepnmmW7NMuzpgzA4jY4tjUH56q3VQ30d8Dp0JftytR4s9y
Z0Pd8yVZ2YJIpv0hzyWUJHCe4DfWp7GC1CLmotFCfWk37FmV3Fs1/LncasxI
Ps5YB9WlHQIKRv0NEUUg/caq3LIy/67TqGRqk8lyUg3oSP8tw1xBRfMWuhgr
E05XA3F5C/argosWL4A5RdFiGZZtuVDkHT3WKa3uqF6tQMdyh1Pn1VcBtl7x
RqHky6VNEs74+LirgJn1AsUIodqIsVKkC9HTkArbGNyy9GeREm7injC3+DGm
k5P5tvAoQlX+NL6m5ZSG+pgRiCErLB0Va9GW5a1gKASH02oAQ/Qgayes7E5X
cF4Dts+WphpbfFZmofag9ch5WmuyNFIxOdwebufK71G409QZnukYHgtXxpyh
lgxmoAe1AidV/Mlpiot0XRZ0YBxaizfJP3zA2DFTT1otR3fCKFbhp2zA4LVW
S8iTKGgJdZQG5izaZMEUauLUbJN5lczhd/GHKqcBA4j7y5XqXyKUq8oHK3P+
6OR5HJnvHwU6VLEHgiytsjdS3q29QEDkH5ATowSyvvWCTjMxR+OFHDizDbRi
iL5euJCBkJASttUzBH9muWNswCocWMu08Jq/QrSlVVyq1YguFs0jlBuS4JBM
nq0GxnmyCAhZODa04p1VbneN3je7GGi0Q/RYC6j1Sjsfhu5bJbjlx4L+sYCK
KWKCU6iMvZUe630+R+zuPgYZD7B8SSKs0yKIzhWL+67OYyiZ+8T9ZLUlVk/O
G7hY6cWiIJPcUMq0pZqpGm7/4gEq6KHMCVf5Ul1Y0d5T/dyIQqhZN2aOUh2L
3BYVUW0SOmR34h5i3TWz6G4ZYreWIRvLYebjmAc5PkpYVosVZbFPwnet2aNB
11BzqXq8dfFUVOSYk2FgiAu2Hjr0F8ulBYvNbNHdndY6XSAaTGVFAKI1KPTM
Y5pU2S6Qg/ynOqhUH+BeE3bQGkutnKWWr+VTt8p/z7M7bJvKJ6cmZpnLNY7j
RDmdN6meqlZUTBkEiwn/TKwAxaiJjDAXNJFiF/rwqsQADQXdMNabYfLLBU+I
KojfLs61QPPjvtfAhGDgDK4yscnEAgngNLwKb181A02MOYYEpBfLvhklmQKV
Qj1MozbofP4s6+gLCO5XCo803T81JBsaUEHCw/gYagMQwmt6kOogImqeyuV8
4pBUuSV8vO4PbCkFMIy+EITztYLZlJbT6xlUzPJVoZoti8hDwSU2yBNg8yJU
ZhrTt17j4vSyVGWRdUZiGoPgp8xj2jZ+j9wwUXJouojoPOYlNC7BxHXXB+QF
cF+nGx6TaKFtjMH8yoqDDrKFd2xzYwrg8oJCD4zVCHSp5UOwY5/zLFTlYaZV
U8e0EU0Ya9jeElisf2d/QkwtIByIAv4CqdW8RlIWI9zZWpjp+0b7ROoCoerr
EKmnlZAtvlUPZCWY8YCoIyK9ghuvz7DiCJJZaRo+jeWB1qIT86bksBOIHASh
oDXL48CmNMGMEJCh/hnqcl2y5FjL01DZe30Guy2CklU1ruEjsTxd1r9EexEj
LwgjUnEjRO/NQuGhTyaT352HKbgq5UnimHOfPy+GIzn5YEJg241J+5ZuaohJ
5iEC07Oavu1i8R1D4enS06o7BXn41enXqtu1iarpfLKHoW4VyY7fnUYhLE7Q
nYQJzuNfoHyfDSk4MPqyMLqmrOwRaeJp4sl4hFmFYa3uhXmDuHUghwC6cs28
GRI4SMxxOIdRkIf+IKMUIz5DD42kCd2T9IQFHQL9dcyG3rH1P1spwukNzZJ+
4l56ndxrbvNb+lRwENrprZ0jWL6zLWhXmPkJHAjhw+iBQMaTRXbh6FKAIrMs
OBIy4GqgJa7c8g43GeOIzEkMPpec3AK/1Zz0OJWnzJlPq0Agx7NJBmgFeqys
L4QsrcEpuItBSF1rYXybXuBbJsdvtNmJ0LdiRffaMhaAdxkrh7wGE9ZO09nj
xHyOrw0pBhmotD/l3rFwMfNAuSpt/2aNftuhf0qrvvFT68UioyGTS5+Mcu60
c7HstRSSQVarLY5IhfnFT+CFeP6hAL5PO9eSR10tJ1mYQXCZdb0rWcV00igz
JXSNgurfO/EgFrjWvy8tCrLSzuTTDptRnEh9TktxWPtlpjYUrsZy4eIaS0eY
WE61t6ihMlnWkoCqUp4wTdI6TifgHZ4OiCaDCxHL7dtj8eEDpkCxRMAQaex9
j9lviw2qp+zVI2cFE0lo8wMwyoIJGETwRP0bAqGfUWkXtDVWBHzPRiNhzjdj
zeBYRxGccsQcS6e8cZJcDujA1xvclhvkTyILmlTMNYt84mMgyIvAZxAhQVhi
nTn6IQm9BcpSmN+0fJE6fRTbB3Mf7wKCgj+GngEFqtlV2ZqmoUlUng0HLNfX
QLZkbEP7IU07tshBXOjMymVUjms2e/poymk1GNLLbTkKP3pohBce0Yw8BnRe
6rsfiB9TAU8orHfpHISxV8CovZ+f7kjOM/WtLqpmGd1zDRFaJf5ZblVNPQQP
JW3jPN8o2Wpxk7JLPrgWHLU7uOH32PKKANlEvxcnREjZXhFeJZMNO5hC/dGk
iMxmbe1XKtKuPV49GXVlB8bNUHvfhHFCKZNuW1UEEa5hvlEAcdPTL1tlXaGI
EzTiSjFxEfshKE9sCAJ77Fki9rviNfSVhvGxkDDQpglnwTTLDvjXR6WcSlg8
Mso6mGPbqCkIsmORmaHUiRE7YZzgf5l+XkK71OHnMJACTEy2ToQzJL4Z21B7
pfEMUCFLeYmf1V+uC8q6+NTSp/CyFm+PamvQzNcyQq6pMMqrneZCVP66DFrq
E3N91E+RgxPqZjs/D+CqDzHuUvasJzpYVZbxwb7PHAn4dFmxcOKp0AIKl4hL
iFOSTpyB0WrLEJTTXvlYU5RaXP8KN1xUvgBCshWrWuDCaGJeq3JIR9iNcXkb
sdcPnccdX4msFbe936NOB78Xh+aFDcnIYrsa4H+gz7TA/kPV8RraWVnFy+hB
jBbg6H+76mcu97WZfx8/xkzC+HKXAjsoY0I3q3Jj/qPRyALDMwhpnvjaeUSK
lZmsjdfEddllC4s8cq5UDVSJ41M1R5sGoXgPySWnoQhmhyyjJ6ZsibJfbCN1
nX8K6vTBinN/DK9QjbnqYozN9o+vaNOjQCxtvBpJ/zOtYoMwWW0xPKu3dxaj
0mp1JvMUkHh/p+k7QBNFVdbGZ4Ee1o4p1v/V8qWzAhsMegqllmZk5cHWTLH2
vhpZ7HwB+ZNsFTg1hfM5CVA6LezM/YQgpurthPus5q8JJULhYhLp9NNcKoJn
H3tzrOxSJJJV5XKuCvqj7nIr+DodqgLAH0EuAnDJ+PNyMKALcp8CEB9jmtTV
qW46uFiBY8iYUDWnxUMh+muSlDYwXkFWInabcdvF1IppTKt+CABIaxR9GuzU
jZh1XjCMFuuxVgIqPWu73A7deZ2WMAslI3IPsxbDrJlYNT1KtpzU4afTY5Jy
XMz+UUPtq9zzO5OqUerspKMo2BMVeKL+XLphxlHTo0njPPajA08Y57IseHAu
cTvRVqy1pIYGVlr5UDKw5iwdAUB3TW2RYbWfFqlYMXImX/BQ2QYcjZZ2kPYp
pUNG3okd28Rg+uhcQ8gphDLvh6rWWuJxQDvEY7FLjeiHgX4uDLKlefemLGPt
GnuLsGvcIU/75p5cII3W04YbXqinzU/NBiwMu70qn4QtQnEr25Y5YAf6/FNn
rGJFqYFrFcNf2mNkUBrxHl8hoRETkqlan3b6Vkd2vA1FDSn06LJOn9swe+DD
Z9HQTyZPqVqIEkbzP9ZM3dNvPDdWn6gK8NZlGNB75pGDWDEdmjqbNTvdIwnD
EQS5io/9NmAU+kl3wEk8MIGEIs6AwrLaMHZh33qRgjBQKBVah5lCNrrMQobL
EGwqW6G07FnAM4QOJ7JzDEAwAcXuUS5xfik8G9R2w2bB9+VuWlyhFEFj4sU9
pmpsyNHsyicyln1dhc4EZAr2bBqsuyVjnnGWzoIdQ+wkpk838k2UcsxVxi5W
WT7zv6VD0zdKxm1kS9acYQ1YWn0SdTdOP4w6QuQiDaVK4wniecBr6LcaAsdk
z7Y5CGnCVDZWH6ZI/NhCG0szmiOWfxdqKFVZwZ/Q+Pwyg1zaBzyaaReXom2T
EciqMWaOIFTJaLf0shkQY9gZy6n7bqdn0xJCs4/xQShFDQ0bsekjqXOLeTRh
osavThMNFRhaAXNClrztX/YKRaKVvjqzCW2knIuKtVPzxbvFNLoWG6pjT4sJ
+Ak4xwlgQRZSxcm4zAPYLLNmAdvtnLYqM2KTlcCeiFVZb1W5lSjm5ZI7QmeG
sy0JEHD0yfy1E+VyanD7jMkJ23VEDoMIdsKRGUbiXPwsR17740lozSqVwgah
dJTrhR4EVl2oh7NQe9imHXXIaEw/WVx7vgeLg5thy2JFLeVd4406rJbMujFw
G0Gpbnpe/FBpCR4y0TRsqrG3qoJk482hzs8ljukLOZ4wFHmXx9oXXruaresx
SZkSKhSbuV5/GZ1+fbo1Gwc9ptHKWaakQ5tUJmqoEzRpa5ZL14V6Z+S9tSuj
uzhNZcRyFsLtDatmLq7G+i7mUJqEPc/89izuc1J9pbPJmNxl+WezqAzUdLqX
DAE77e2PUF6hZmwdXZ/A8hDsjFFWC9WY2bFuVZ1cqCY96IezkXwolYqR+k8U
jaeHn6/NdSnmwwpC9pHehinyN6PKs/OaY4vZjGefB3QYZ9FbT92wPxmkHVwR
rZ8DdMa47+tX12fPHY8Q3rJPQn/p4jAXjg1HcgV3iTOwZcViT5VftcddJ00u
Q7swoqyUq+BKIThkw9nHDbJhmJK1veInT06mk/9kwdvKDfVyO9K+cQJ0qy36
aENT2WTeKN3FrDVzCfvKnc6uttS0agztMcWmdZzaNOszxBhM/evi1GZb/63v
Q+CsuBUs4sU9O8eyoVR+bNv71HLeiQH0PBht0j6pWLSxQ9FTC3SKRpTqqbfw
n8ie4LDo9toosoYORz47PA0JsEFlqXEgzsDMx+yfHAc6bi00YSUiI8o8H1S1
vInD60bODOvH41g7uFwFhvSmCQWjaXbMAq3KjBw2CtK0RpyTmmH37Pbj2Muo
KTeFFxLBpyelJ/lc2Oy26RzQCO0P5pDHp2Z+Xey8uhwdnSqvRmOcAiUq+xav
DpPdsswkfNGQrB4tUy9M0+SYJclLdIOSQqpB3RdaUngZ8hP59CaV9+AbnRyM
rG50XnLKyxfZNL+ncZofQjirNDevtuCr8T0xul+cFIbmS/4mBvemcleO1cmG
cT29NwcN6+JIx5vRyDz5+KkOy5P/Q3BfMPFzHWEaFv7oJ7+Qb/6GYToK5Vfi
DK5w8KBOxtFvomp+qcSlwhIkVhys0rZqmjvIYR4P1ID8TGXyRLBTOxtGWYgX
UlkJefKwo0rMb325ZCnE2ngyZX0Xpwtbj6kZxnlefT0SYyaKlMuQuhjd26Ad
x+np+IdBvYrGolKJTp9+TYwOro5KL47+GHWzm0oatPgmB1kcqGEzhzCE4kQJ
/NoA5dDhlSGUGPRjaoyj6OPoDgtBnOrsXPPqPGvSd29CrCZKDM/Rp27nwL4n
LyKgzYztfKbh1+VmaEPjVBc76M/3N1JvZzPOAM6wyMBtvDp2qYX2chTnaVrB
dTqIy9xyK/iK+femPjng61hF+S7GRXm2RtkAVC0+r+/SCeNwLO8ZZsdm5D19
Ucgl/bpLQzkz9ky9Mtl40VSd/CnCTccJJNWXLtQ1j98gY/yUT3y0c89U8MXq
rCdZv5x27c9Y/5OGrmiyP3vbR5ySG6j1qPgP3705K4bK77wo0V/SwlhzxiR6
f0Jozi68irU4V1lXgnz5sp6FyWBxUTAAIyeUt31dz6wB/tHZlDRzWjpySlIx
CdUpfkTLBDN0ce7VKHOuw0ExH+zk2EJ7lbHiLd+yoVbgbZzQlB4W38Khrv7B
hnJk8wQ5S0LnH/MFAWvX6q1f2+iodDMbvaRsF1kmjJhKgfAQg9FZa++h4vye
C84Qdc9UgIjdh89GbxMQSxm/On37g8aBWBsduLps41tcnBjtqrSqmHSTJCkt
Sol3VLOlfO2LB29uHv72i3P4pqdpHEj1awOQigfvrp9bQhKhJJ0/M2dpRi/q
oPhaFAxqq+WDF07s3FE+waD/aSEXcj3yzfeulzUd5PHLZTnlq44evNY69xbf
32zZPSgq9mt4qrVcffvm7ctX3/Dadtl0xc3f/9vSMxXA++ZXCxBp5eY3CGvQ
g/jq8V/oKsEQ1BvWXKz/9/9wgiEqefrXeIcAEIi7B64Q+yvQ5PpYNZAYYLWb
pl0cpxStH3On7k0s8b+2gcKKRL7ZtsO9/LdZHS/s7RVe2PZNgwE4wDBaRyvw
Z9csY9t29vI5o9ita90W4RrxdMR9eSX7u9551DYVrzGnK7vipY2kw56+/ft/
b//+PwVJPG9EGwqyWiJe9KapjjHTBYJhBmCHV+Utm+Wd/ApS1jbCAxHrPYsT
mnDX7M16U5TvVrjLTx63aFfIKk6LH+p8BvqtyNAW4yNvBLLJfmu5Pn892y3z
8xxtkRb/3ZETIGrctW822Un5upb12mvhpgLjfkEoGejOl+vi20bwQsdvbl++
fX07Xvz3aKcRYfquRomWLB+iKQ96/Bd8WbY/u+K7v/+vbeXFA15dOL9vm9ox
2PA3h9ysHOPrtQhc8cN38qXwB8jmir+B2jfQOpvSF99DKOqMJvJT8dUXDrV5
33uBQCDZTdUMq7VYduzxndxSTrnHLv6dHJ5T1s9fvmmLe3MjHDq72bqS63vu
m3Yj5H3dLYTOo9XJPXfH4o089Riv1S1thZvZgN9Mk6a41dklwNbCaHjVyBL8
NxXSwfeY8Um+R2AtP7avPd5K+EvxthHcBiYX4D9ftEDl0NTy+aoG2f5905dY
r4j53gnrChOg1ECE78dm5dbyr8j3t2LA1qL729+gqUn+7dYdhAO/K16FmWI3
eOlfFq/h4DNyPtT97bHCtp576JrimV8R1WASgr55JsgobO2bNPwckpr5Qhk/
61llrztVLXV2VrKZnWC/4p1wjSg1If7TN8/+pgr79iAPj4uJBMaTMmEvwYdD
JypSSV//DLxa/OiQ/L0VZ6LPxeOdUFNgu6swrvtX3uoHthBbdsER+ub8LVHT
C0U82leGgkOU8p6hL46zs95kBf73bEGUk9UJSaywzV8jwV4YlCMlTZtw3+mb
0JxW/wa8El9pEObaIUFrjUj+/dahqP8es+D5ugn5HgXW2gRyEszvhpbxozQ2
7MIr2Fx6oM0BD5MPEPe3CQ/00/T1h0qw+JKmxfFsesbnOgtIw4PypBsLS04m
j+fxj/TuvNHL9SZfzIs3Q8eG5Lty1emYpq5jdhCoXPvGJ1/Oi+/wdRWK2Vya
GRLCT3F8jIj85Cv4lyyy2OYTAD/vLDLBNT8N/T+2el3x2HX/Au8HyCean7h0
WNpLq0ZfsdBNvYp2qJmId2RftK1hTTdnI/zr4OiMbvqHOceeADMhJYKKickf
L19OaMW3TMX1LRhxI5UtoTv501ysT6pZDJmN6ELpoUz+PE/vbEqNBwxWrUV1
xfdKCPAOsfPJX+aatpZ9PBLUHqZijmCdleSw1Z1VfsaRDPlMHv/ebvGgYUHM
w7MsZ5zOE2YbYRzwRnCcsV7WikWmTvEaYQMEkwCugKUfh2nuOmkuzJ7BMV9d
hwLTN6nA9J0VmHZXOOj8XhYrAZny2TrxfS047tt9CbypeQWN8cUGsgd+vplP
ecwPcd7iq8Dzx/20rZPAOQzdZ2AHweD0AVshwRXP2PTQhemVFgYNWsDiLeCA
b7wj9wTHcl2VmklDXRTO/rUNlRbGG5TRLBfZw/zKF6We98vY4aDFJ6LI4c/G
skYB/nj/2YIn+zIWRTJpEXLktfZn1UaX0VT3yePHeQx1PJK49UOYkW9VmvoK
HxQmMmAsa/P7h5PHX5zsuFnIjeDqhcB6Rkv1cNWny9++a7FKMk4m5qO39LLM
hYpCHoV38QklQpkOuOZ6ZV0xWh8Nm4FMDZcp0AqM8krfnJha48J4kajU8Lb2
9EI6G0cBvnkFs15p2ZOJTXTcbYgDLVpomWGecGt6kUsUFiJ4WLRefXHqRhG4
Xvf9N+uLsXoRMu5pz4z545Z0fAhqiD88bLzvdIKXr/QNeg2TuScz08OCQa0X
eDmO3DkrKtJfk06pE5T75flnv9SkXPGgnPv5VPtGQ6ibQha3ooovG+Gr3aXp
/UKgyg+Qw8+z17cgTGTztKlRm87q0dSUU9LdaAw/IiDUqihkYr8QWsSx1b+k
6zNjJmYjqQj0hWFCnYY3lTmJenPMIwd0XbaWA+NLjlCYfzpOGAeC7aS1xoo2
a+XEu1p8NARyEDe0ZZwZolMCTWNl447xzK13QtuvcvEwNuRrt0Mwmzwwel0N
zuMH1NWwkiqF+eMZ4AhUJ3MEjhgIZKNtBp0mxVSTxWtxKNeLMHIoFNRYdyDe
nbCkOgthOozcBbeLmuhKZSCG8+ME8jejYKmLhVj/BNJs2DHkY7mk3Ta10Ma5
i4eAKtnwgLagRsffcbJ9Ph69ZVGw1YaF96dawllnkhqmtObN0Vs19B0wFlt0
eR7d3nMRJqWFZsDUQx7quS1NaQUJOjffVC2LODWQ9SxOZiSz/sARrpv4NotR
LwXp8Tmi71kdAngXgi+w5F5bIxfHGQaFYTXg1GeIEGgNsI6/Za2aFUMgrqZF
hylfwcID8OzXWleRZhGCKd96bWAG/73g0A8d6DDTeQ9ZnRz47SkHLHbp7uFV
ja0FDewFkhcKKx6AxD9z1orJ7EPoiusNauIWx/AzTPBgFV4RGlb4iJg7hiqJ
yERBOqhD43ttjd06P2/0MkgbkSOUYAzVjFz+QdBl+UUJ9Rys3dEagXBK37OD
M7ZlhnpoNWlx2i6ViyZysh52OdZHBmRRUkqYF0VSXyCCE7seVmVYDA7rGhOW
My/K5ttaJ7PYJ5GrMCshnNrpnKCYhKSVRzlsOwuTP/mD8Ef6FHNl6zuX0OMP
+QdhHjQAhlhxETfs+Y3ilGwsYsRL9t4zDjLjNiMIadan38qm35j9xiDPkm0U
NOLiyUGk4hCoVosT19zFUetTeDNGiPLOGipOZC47ncChnktU4Pcc93mKC5hw
QLUlsY8rdeiu3gVzxCIzoN+P8Dm4mtaXmb//JFgXo5yWQGpnpoK8qDMfqnMX
uzDZHlLxRTOoTeHAAr5d7uQ6EI7xb4JOhCUVtNDUm1OQ+FHs059gn8iCeNO0
ja5ZhzlW9vrgAKpoUKwCNzlTanJpvrUcswkOTCj8inMft80BgvyqsTYkuLpt
FGJvQ0VSBxj17Cq8iAD7exzOBI3x7kQuuhPBoAbOhz0o7Ps2d2WwrOfytAYP
WJr+vrZl2Dgk1y5K4ZNWC24zoJ+0bQ7t3cm7nR7YuBRRdojUAW2gZa3S6hHi
yOs0xFTf+1kRJ16HqnDUGQ56NHhfoCVuRz6Z9laXfSwljy+alXt9pUS//J6s
0GNWxwYT+Kha/hrfUYyM4EPF4r9xH33D0JHIptLXVzLigSq11cBTFK7Tlycr
N2s3rv2EL1jkOf0QXkDBM3lqr4/THkN9HQEt2BcAmYfUIU3MwJpE2k3X9YxK
yMm1fuutaHFxVA/0t51rdQ/kAVFqdDhJ6AxqmyaNdcJiLB0fhAq9/w1aDd7H
eYjpJapymFjk13zfi2awg3oVPaPhMeTzLTpnhXdUDumVhaovn/H1MDNOuCHt
M8CtLwp/pFk4G8cWc8jWGzGeEvSogDeDPKcWZjzXMVDyOXtXSBTgFesbxr7f
ZT2g4o+DGl+aN2O0mlKJRThHG8C3hGOzUPOcrk6LB8YJ6fNsPLm+0i3HoNjq
LQfVUFeFkwSLvTXDsbTKVvWhDWfniBpKLI6QXtibytcnb8eF4rpWtwyBkVKb
AkY1htGs8LVIeGkD4rx90G8KMSDi8U3Y1GdMH92GEg315Cb/F5AYHRKYjQAA

-->

</rfc>
