<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.17 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-irtf-pearg-censorship-07" category="info" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.15.3 -->
  <front>
    <title abbrev="draft-irtf-pearg-censorship">A Survey of Worldwide Censorship Techniques</title>
    <seriesInfo name="Internet-Draft" value="draft-irtf-pearg-censorship-07"/>
    <author initials="J. L." surname="Hall" fullname="Joseph Lorenzo Hall">
      <organization>Internet Society</organization>
      <address>
        <email>hall@isoc.org</email>
      </address>
    </author>
    <author initials="M. D." surname="Aaron" fullname="Michael D. Aaron">
      <organization>CU Boulder</organization>
      <address>
        <email>michael.drew.aaron@gmail.com</email>
      </address>
    </author>
    <author initials="A." surname="Andersdotter" fullname="Amelia Andersdotter">
      <organization/>
      <address>
        <email>amelia.ietf@andersdotter.cc</email>
      </address>
    </author>
    <author initials="B." surname="Jones" fullname="Ben Jones">
      <organization>Princeton</organization>
      <address>
        <email>bj6@cs.princeton.edu</email>
      </address>
    </author>
    <author initials="N." surname="Feamster" fullname="Nick Feamster">
      <organization>U Chicago</organization>
      <address>
        <email>feamster@uchicago.edu</email>
      </address>
    </author>
    <author initials="M." surname="Knodel" fullname="Mallory Knodel">
      <organization>Center for Democracy &amp; Technology</organization>
      <address>
        <email>mknodel@cdt.org</email>
      </address>
    </author>
    <date year="2022" month="December" day="15"/>
    <area>General</area>
    <workgroup>pearg</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document describes technical mechanisms employed in network censorship that regimes around
the world use for blocking or impairing Internet traffic. It aims
to make designers, implementers, and users of Internet protocols aware
of the properties exploited and mechanisms used for censoring
end-user access to information.  This document makes no suggestions on
individual protocol considerations, and is purely informational,
intended as a reference. This document is a product of the Privacy Enhancement and Assessment Research Group (PEARG) in the IRTF.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="intro">
      <name>Introduction</name>
      <t>Censorship is where an entity in a position of power -- such as a
government, organization, or individual -- suppresses communication
that it considers objectionable, harmful, sensitive, politically
incorrect or inconvenient <xref target="WP-Def-2020"/>. Although censors that engage in censorship
must do so through legal, military, or
other means, this document focuses largely on technical
mechanisms used to achieve network censorship.</t>
      <t>This document describes technical mechanisms that censorship regimes
around the world use for blocking or impairing Internet traffic.  See
<xref target="RFC7754"/> for a discussion of Internet blocking and filtering in
terms of implications for Internet architecture, rather than end-user
access to content and services. There is also a growing field of
academic study of censorship circumvention (see the review article of
<xref target="Tschantz-2016"/>), results from which we seek to make relevant here
for protocol designers and implementers.</t>
      <t>Censorship circumvention also impacts the cost of implementation of a censorship measure and we include mentions of tradeoffs in relation to such costs in conjunction with each technical method identified below.</t>
      <t>This document represents the consensus of the Privacy Enhancement and Assessment Research Group (PEARG).</t>
    </section>
    <section anchor="terms">
      <name>Terminology</name>
      <t>We describe three elements of Internet censorship: prescription,
identification, and interference. The document contains three major
sections, each corresponding to one of these elements. Prescription is
the process by which censors determine what types of material they
should censor, e.g., classifying pornographic websites as undesirable.
Identification is the process by which censors classify specific
traffic or traffic identifiers to be blocked or impaired, e.g.,
deciding that webpages containing "sex" in an HTTP Header or that
accept traffic through the URL www.sex.example are likely to be
undesirable.  Interference is the process by which censors intercede
in communication and prevents access to censored materials by blocking
access or impairing the connection, e.g., implementing a technical
solution capable of identifying HTTP headers or URLs and ensuring they
are rendered wholly or partially inaccessible.</t>
    </section>
    <section anchor="tech-prescrip">
      <name>Technical Prescription</name>
      <t>Prescription is the process of figuring out what censors would like to
block <xref target="Glanville-2008"/>. Generally, censors aggregate information "to
block" in blocklists, databases of image hashes <xref target="ekr-2021"/>, or use real-time heuristic assessment of content
<xref target="Ding-1999"/>. Some national networks are designed to more naturally
serve as points of control <xref target="Leyba-2019"/>. There are also indications
that online censors use probabilistic machine learning techniques
<xref target="Tang-2016"/>. Indeed, web crawling and machine learning techniques
are an active research idea in the effort to identify content deemed
as morally or commercially harmful to companies or consumers in some
jurisdictions <xref target="SIDN2020"/>.</t>
      <t>There are typically a few types of blocklist elements: Keyword, domain
name, protocol, or Internet Protocol (IP) address. Keyword and domain name
blocking take place at the application level, e.g., HTTP; protocol blocking
often occurs using deep packet inspection to identify a forbidden protocol;
IP blocking tends to take place using IP addresses in IPv4/IPv6 headers.
Some censors also use the presence of certain keywords to enable more
aggressive blocklists <xref target="Rambert-2021"/> or to be more permissive with
content <xref target="Knockel-2021"/>.</t>
      <t>The mechanisms for building up these blocklists vary. Censors can purchase
from private industry "content control" software,
which lets censors filter traffic from broad categories they would like to
block, such as gambling or pornography <xref target="Knight-2005"/>. In these cases,
these private services attempt to categorize every semi-questionable
website as to allow for meta-tag blocking. Similarly, they tune real-time
content heuristic systems to map their assessments onto categories of
objectionable content.</t>
      <t>Countries that are more interested in retaining specific political control
typically have ministries or organizations that maintain blocklists. Examples
include the Ministry of Industry and Information Technology in China, Ministry of
Culture and Islamic Guidance in Iran, and specific to copyright in France <xref target="HADOPI-2020"/>
and across the EU for consumer protection law <xref target="Reda-2017"/>.</t>
      <t>Content-layer filtering of images and video require institutions or organizations to store hashes of images or videos to be blocked in databases, which can then be compared, with some degree of tolerance, to content that is sent, received or stored using centralized, content applications and services <xref target="ekr-2021"/>.</t>
    </section>
    <section anchor="tech-id">
      <name>Technical Identification</name>
      <section anchor="poc">
        <name>Points of Control</name>
        <t>Internet censorship takes place in all parts of the network
topology. It may be implemented in the network itself (e.g. local loop
or backhaul), on the services side of communication (e.g. web hosts,
cloud providers or content delivery networks), in the ancillary
services eco-system (e.g. domain name system or certificate
authorities) or on the end-client side (e.g. in an end-user device
such as a smartphone, laptop or desktop or software executed on such
devices).  An important aspect of pervasive technical interception is
the necessity to rely on software or hardware to intercept the content
the censor is interested in. There are various logical and physical
points-of-control censors may use for interception mechanisms,
including, though not limited to, the following.</t>
        <ul spacing="normal">
          <li>Internet Backbone: If a censor controls the gateways into a region,
they can filter undesirable traffic that is traveling into and out
of the region by packet sniffing and port mirroring at the relevant
exchange points. Censorship at this point of control is most
effective at controlling the flow of information between a region
and the rest of the Internet, but is ineffective at identifying
content traveling between the users within a region. Some national
network designs naturally serve as more effective chokepoints and
points of control <xref target="Leyba-2019"/>.</li>
          <li>Internet Service Providers: Internet Service Providers are
frequently exploited points of control. They
have the benefit of being easily enumerable by a censor -- often
falling under the jurisdictional or operational control of a censor
in an indisputable way -- with the additional feature that an ISP
can identify the regional and international traffic
of all their users. The censor's filtration mechanisms can be placed
on an ISP via governmental mandates, ownership, or voluntary/coercive influence.</li>
          <li>Institutions: Private institutions such as corporations,
schools, and Internet cafes can use filtration mechanisms.
These mechanisms are occasionally at the request of a
government censor, but can also be implemented to help achieve
institutional goals, such as fostering a particular moral outlook on
life by school-children, independent of broader society or
government goals.</li>
          <li>Content Distribution Network (CDN): CDNs seek to collapse network
topology in order to better locate content closer to the service's
users. This reduces content transmission latency and improves quality
of service. The CDN service's content
servers, located "close" to the user in a network-sense, can be
powerful points of control for censors, especially if the location
of CDN repositories allow for easier interference.</li>
          <li>Certificate Authorities (CAs) for Public-Key Infrastructures (PKIs):
Authorities that issue cryptographically secured resources can be a
significant point of control. CAs that issue certificates to domain
holders for TLS/HTTPS (the Web PKI) or Regional/Local Internet
Registries (RIRs) that issue Route Origination Authorizations (ROAs)
to BGP operators can be forced to issue rogue certificates that may
allow compromise, i.e., by allowing censorship software to engage in
identification and interference where not possible before. CAs may
also be forced to revoke certificates. This may lead to adversarial
traffic routing or TLS interception being allowed, or an otherwise
rightful origin or destination point of traffic flows being unable
to communicate in a secure way.</li>
          <li>Services: Application service providers can be pressured,
coerced, or legally required to censor specific content or data flows.
Service providers naturally face incentives to maximize their
potential customer base and potential service shutdowns or legal
liability due to censorship efforts may seem much less attractive
than potentially excluding content, users, or uses of their
service. Services have increasingly become focal points of
censorship discussions, as well as the focus of discussions of moral
imperatives to use censorship tools.</li>
          <li>Content sites: On the service side of communications lie many platforms that
publish user-generated content require terms of service compliance with all content
and user accounts in order to avoid intermediary liability for the web hosts.
In aggregate these policies, actions and remedies are known as content moderation.
Content moderation happens above the services or application layer, but
these mechanisms are built to filter, sort and block content and users
thus making them available to censors through direct pressure on the private entity.</li>
          <li>Personal Devices: Censors can mandate censorship software be
installed on the device level. This has many disadvantages in terms
of scalability, ease-of-circumvention, and operating system
requirements. (Of course, if a personal device is treated with
censorship software before sale and this software is difficult to
reconfigure, this may work in favor of those seeking to control
information, say for children, students, customers, or employees.)
The emergence of mobile devices exacerbate these feasibility
problems. This software can also be mandated by institutional actors
acting on non-governmentally mandated moral imperatives.</li>
        </ul>
        <t>At all levels of the network hierarchy, the filtration mechanisms used
to censor undesirable traffic are essentially the same: a censor
either directly identifies undesirable content using the identifiers
described below and then uses a blocking or shaping mechanism such as
the ones exemplified below to prevent or impair access, or requests
that an actor ancillary to the censor, such as a private entity,
perform these functions.  Identification of undesirable traffic can
occur at the application, transport, or network layer of the IP
stack. Censors often focus on web traffic, so the relevant protocols
tend to be filtered in predictable ways (see <xref target="http-req"/> and
<xref target="http-resp"/>). For example, a subversive image might make it past a
keyword filter. However, if later the image is deemed undesirable, a
censor may then blocklist the provider site's IP address.</t>
      </section>
      <section anchor="app-layer">
        <name>Application Layer</name>
        <t>The following subsections describe properties and tradeoffs of common
ways in which censors filter using application-layer information. Each
subsection includes empirical examples describing these common
behaviors for further reference.</t>
        <section anchor="http-req">
          <name>HTTP Request Header Identification</name>
          <t>An HTTP header contains a lot of useful information for traffic
identification. Although "host" is the only required field in an HTTP
request header (for HTTP/1.1 and later), an HTTP method field is necessary
to do anything
useful. As such, "method" and "host" are the two fields used
most often for ubiquitous censorship. A censor can sniff traffic and
identify a specific domain name (host) and usually a page name (GET
/page) as well. This identification technique is usually paired with
transport header identification (see <xref target="sec_thid"/>) for a more robust
method.</t>
          <t>Tradeoffs: Request Identification is a technically straight-forward
identification method that can be easily implemented at the Backbone
or ISP level. The hardware needed for this sort of identification is
cheap and easy-to-acquire, making it desirable when budget and scope
are a concern. HTTPS will encrypt the relevant request and response
fields, so pairing with transport identification (see <xref target="sec_thid"/>) is
necessary for HTTPS filtering. However, some countermeasures can
trivially defeat simple forms of HTTP Request Header Identification.
For example, two cooperating endpoints -- an instrumented web server
and client -- could encrypt or otherwise obfuscate the "host" header in
a request, potentially thwarting techniques that match against "host" header values.</t>
          <t>Empirical Examples: Studies exploring censorship mechanisms have found
evidence of HTTP header/ URL filtering in many countries, including
Bangladesh, Bahrain, China, India, Iran, Malaysia, Pakistan, Russia,
Saudi Arabia, South Korea, Thailand, and Turkey
<xref target="Verkamp-2012"/> <xref target="Nabi-2013"/> <xref target="Aryan-2012"/>. Commercial technologies are often purchased by
censors <xref target="Dalek-2013"/>.  These commercial technologies use a
combination of HTTP Request Identification and Transport Header
Identification to filter specific URLs. Dalek et al. and Jones et
al. identified the use of these products in the wild
<xref target="Dalek-2013"/> <xref target="Jones-2014"/>.</t>
        </section>
        <section anchor="http-resp">
          <name>HTTP Response Header Identification</name>
          <t>While HTTP Request Header Identification relies on the information
contained in the HTTP request from client to server, response
identification uses information sent in response by the server to
client to identify undesirable content.</t>
          <t>Tradeoffs: As with HTTP Request Header Identification, the techniques
used to identify HTTP traffic are well-known, cheap, and relatively
easy to implement. However, they are made useless by HTTPS because
HTTPS encrypts the response and its headers.</t>
          <t>The response fields are also less helpful for identifying content than
request fields, as "Server" could easily be identified using HTTP
Request Header identification, and "Via" is rarely relevant.  HTTP
Response censorship mechanisms normally let the first n packets
through while the mirrored traffic is being processed; this may allow
some content through and the user may be able to detect that the
censor is actively interfering with undesirable content.</t>
          <t>Empirical Examples: In 2009, Jong Park et al. at the University of New
Mexico demonstrated that the Great Firewall of China (GFW) has used this
technique <xref target="Crandall-2010"/>. However, Jong Park et al. found that the
GFW discontinued this practice during the course of the study. Due to
the overlap in HTTP response filtering and keyword filtering (see
<xref target="kw-filt"/>), it is likely that most censors rely on keyword
filtering over TCP streams instead of HTTP response filtering.</t>
        </section>
        <section anchor="tls">
          <name>Transport Layer Security (TLS)</name>
          <t>Similar to HTTP, censors have deployed a variety of techniques towards
censoring Transport Layer Security (TLS) (and by extension HTTPS). Most of
these techniques relate to the Server Name Indication (SNI) field,
including censoring SNI, Encrypted SNI, or omitted SNI. Censors can also
censor HTTPS content via server certificates. 
Note that TLS 1.3 acts as a security component of QUIC.</t>
          <section anchor="sni">
            <name>Server Name Indication (SNI)</name>
            <t>In encrypted connections using TLS, there
may be servers that host multiple "virtual servers" at a given network
address, and the client will need to specify in the
Client Hello message which domain name it seeks to connect to (so that
the server can respond with the appropriate TLS certificate) using the
Server Name Indication (SNI) TLS extension <xref target="RFC6066"/>. 
The Client Hello message is unencrypted for TCP-based TLS. 
When using QUIC, the Client Hello message is encrypted but its 
confidentiality is not effectively protected because the initial encryption 
keys are derived using a value that is visible on the wire. Since SNI is
often sent in the clear (as are the cert fields sent in response),
censors and filtering software can use it (and response cert fields)
as a basis for blocking, filtering, or impairment by dropping
connections to domains that match prohibited content (e.g.,
bad.foo.example may be censored while good.foo.example is not)
<xref target="Shbair-2015"/>. There are undergoing standardization efforts in the
TLS Working Group to encrypt SNI <xref target="I-D.ietf-tls-sni-encryption"/>
              <xref target="I-D.ietf-tls-esni"/> and recent research shows promising results in
the use of encrypted SNI in the face of SNI-based filtering
<xref target="Chai-2019"/> in some countries.</t>
            <t>Domain fronting has been one popular way to avoid identification by
censors <xref target="Fifield-2015"/>. To avoid identification by censors,
applications using domain fronting put a different domain name in the
SNI extension than in the Host: header, which is protected by
HTTPS. The visible SNI would indicate an unblocked domain, while the
blocked domain remains hidden in the encrypted application header.
Some encrypted messaging services relied on domain fronting to enable
their provision in countries employing SNI-based filtering. These
services used the cover provided by domains for which blocking at the
domain level would be undesirable to hide their true domain
names. However, the companies holding the most popular domains have
since reconfigured their software to prevent this practice.  It may be
possible to achieve similar results using potential future options to
encrypt SNI.</t>
            <t>Tradeoffs: Some clients do not send the SNI extension (e.g., clients
that only support versions of SSL and not TLS), rendering this method
ineffective (see <xref target="omitsni"/>). In addition, this technique requires deep packet
inspection (DPI) techniques that can be computationally and
infrastructurally expensive, especially when applied to QUIC where DPI requires key extraction and decryption of the Client Hello in order to read the SNI. Improper configuration of an SNI-based
block can result in significant overblocking, e.g., when a
second-level domain like populardomain.example is inadvertently
blocked. In the case of encrypted SNI, pressure to censor may
transfer to other points of intervention, such as content and application providers.</t>
            <t>Empirical Examples: There are many examples of security firms that
offer SNI-based filtering products <xref target="Trustwave-2015"/> <xref target="Sophos-2015"/>
              <xref target="Shbair-2015"/>, and the governments of China, Egypt, Iran, Qatar,
South Korea, Turkey, Turkmenistan, and the UAE all do widespread SNI
filtering or blocking <xref target="OONI-2018"/> <xref target="OONI-2019"/> <xref target="NA-SK-2019"/>
              <xref target="CitizenLab-2018"/> <xref target="Gatlan-2019"/> <xref target="Chai-2019"/> <xref target="Grover-2019"/>
              <xref target="Singh-2019"/>. SNI blocking against QUIC traffic has been first observed in Russia in March 2022 <xref target="Elmenhorst-2022"/>.</t>
          </section>
          <section anchor="esni">
            <name>Encrypted SNI (ESNI)</name>
            <t>With the data leakage present with the SNI field, a natural response is to 
encrypt it, which is forthcoming in TLS 1.3 with Encrypted Client Hello
(ECH).  Prior to ECH, the Encrypted SNI (ESNI) extension is available to
prevent the data leakage caused by SNI, which encrypts only the SNI field.
Unfortunately, censors can target connections that use the ESNI extension
specifically for censorship. This guarantees overblocking for the censor,
but can be worth the cost if ESNI is not yet widely deployed within the
country.  Encrypted Client Hello (ECH) is the emerging standard for protecting
the entire TLS Client Hello, but it is not yet widely deployed.</t>
            <t>Tradeoffs: The cost to censoring Encrypted SNI (ESNI) is significantly
higher than SNI to a censor, as the censor can no longer target
censorship to specific domains and guarantees over-blocking. In these
cases, the censor uses the over-blocking to discourage the use of
ESNI entirely.</t>
            <t>Empirical Examples: In 2020, China began censoring all uses of Encrypted
ESNI (ESNI) <xref target="Bock-2020b"/>, even for innocuous connections. The
censorship mechanism for China's ESNI censorship differs from how
China censors SNI-based connections, suggesting that new middleboxes
were deployed specifically to target ESNI connections.</t>
          </section>
          <section anchor="omitsni">
            <name>Omitted-SNI</name>
            <t>Researchers have observed that some clients omit the SNI extension
entirely. This omitted-SNI approach limits the information available
to a censor. Like with ESNI, censors can choose to block connections that
omit the SNI, though this too risks over-blocking.</t>
            <t>Tradeoffs: The approach of censoring all connections that omit the SNI field
is guaranteed to over-block, though connections that omit the SNI field
should be relatively rare in the wild.</t>
            <t>Empirical Examples: In the past, researchers have observed censors in Russia
blocking connections that omit the SNI field <xref target="Bock-2020b"/>.</t>
          </section>
          <section anchor="server-response-certificate">
            <name>Server Response Certificate</name>
            <t>During the TLS handshake after the TLS Client Hello, the server will respond
with the TLS certificate. This certificate also contains the domain
the client is trying to access, creating another avenue that censors
can use to perform censorship. This technique will not work in TLS 1.3, as the 
certificate will be encrypted.</t>
            <t>Tradeoffs: Censoring based on the server certificate requires DPI techniques that can be more computationally
expensive compared to other methods. Additionally, the certificate is
sent later in the TLS Handshake compared to the SNI field, forcing
the censor to track the connection for longer.</t>
            <t>Empirical Examples: Researchers have observed the Reliance Jio
ISP in India using certificate response fields to censor connections
<xref target="Satija-2021"/>.</t>
          </section>
        </section>
        <section anchor="kw-filt">
          <name>Instrumenting Content Distributors</name>
          <t>Many governments pressure content providers to censor themselves, or
provide the legal framework within which content distributors are
incentivized to follow the content restriction preferences of agents
external to the content distributor <xref target="Boyle-1997"/>. Due to the
extensive reach of such censorship, we define content
distributor as any service that provides utility to users, including
everything from web sites to storage to locally installed programs.</t>
          <t>A commonly
used method of instrumenting content distributors consists of keyword
identification to detect restricted terms on their platform. Governments
may provide the terms on such keyword lists. Alternatively, the content
provider may be expected to come up with their own list.</t>
          <t>An increasingly common method of instrumeting content distribution consists of hash matching to detect and action images and videos known to be restricted either by governments, institutions, organizations or the distributor themselves <xref target="ekr-2021"/>.</t>
          <t>A different
method of instrumenting content distributors consists of requiring a
distributor to disassociate with some categories of users. See also
<xref target="notice"/>.</t>
          <t>Tradeoffs: By instrumenting content distributors to identify
restricted content or content providers, the censor can gain new
information at the cost of political capital with the companies it
forces or encourages to participate in censorship. For example, the
censor can gain insight about the content of encrypted traffic by
coercing web sites to identify restricted content. Coercing content
distributors to regulate users, categories of users, content and
content providers may encourage users and content providers to exhibit
self-censorship, an additional advantage for censors (see <xref target="selfcensor"/>). The tradeoffs
for instrumenting content distributors are highly dependent on the
content provider and the requested assistance. A typical concern is
that the targeted keywords or categories of users are too broad, risk
being too broadly applied, or are not subjected to a sufficiently
robust legal process prior to their mandatory application (see p. 8 of
<xref target="EC-2012"/>).</t>
          <t>Empirical Examples: Researchers discovered keyword identification
by content providers on platforms ranging from instant messaging
applications <xref target="Senft-2013"/> to search engines <xref target="Rushe-2015"/>
            <xref target="Cheng-2010"/> <xref target="Whittaker-2013"/> <xref target="BBC-2013"/> <xref target="Condliffe-2013"/>. To
demonstrate the prevalence of this type of keyword identification, we
look to search engine censorship.</t>
          <t>Search engine censorship demonstrates keyword identification by
content providers and can be regional or worldwide.  Implementation is
occasionally voluntary, but normally it is based on laws and regulations
of the country a search engine is operating in. The keyword blocklists
are most likely maintained by the search engine provider. China is
known to require search engine providers to "voluntarily" maintain
search term blocklists to acquire and keep an Internet content provider
(ICP) license <xref target="Cheng-2010"/>.  It is clear these blocklists are
maintained by each search engine provider based on the slight
variations in the intercepted searches <xref target="Zhu-2011"/>
            <xref target="Whittaker-2013"/>. The United Kingdom has been pushing search engines
to self-censor with the threat of litigation if they do not do it
themselves: Google and Microsoft have agreed to block more than
100,000 queries in U.K. to help combat abuse <xref target="BBC-2013"/>
            <xref target="Condliffe-2013"/>.  European Union law, as well as US law, requires
modification of search engine results in response to either copyright,
trademark, data protection or defamation concerns <xref target="EC-2012"/>.</t>
          <t>Depending on the output, search engine keyword identification may be
difficult or easy to detect. In some cases specialized or blank
results provide a trivial enumeration mechanism, but more subtle
censorship can be difficult to detect. In February 2015, Microsoft's search
engine, Bing, was accused of censoring Chinese content outside of
China <xref target="Rushe-2015"/> because Bing returned different results for
censored terms in Chinese and English. However, it is possible that
censorship of the largest base of Chinese search users, China, biased
Bing's results so that the more popular results in China (the
uncensored results) were also more popular for Chinese speakers
outside of China.</t>
          <t>Disassociation by content distributors from certain categories of
users has happened for instance in Spain, as a result of the conflict
between the Catalunyan independence movement and the Spanish legal
presumption of a unitary state <xref target="Lomas-2019"/>. E-sport event
organizers have also disassociated themselves from top players who
expressed political opinions in relation to the 2019 Hong Kong
protests <xref target="Victor-2019"/>. See also <xref target="discon"/>.</t>
        </section>
        <section anchor="dpi">
          <name>DPI Identification</name>
          <t>DPI (deep packet inspection) technically is any kind of packet
analysis beyond IP address and port number and has become
computationally feasible as a component of censorship mechanisms
in recent years <xref target="Wagner-2009"/>. Unlike other
techniques, DPI reassembles network flows to examine the application
"data" section, as opposed to only headers, and is therefore often
used for keyword identification. DPI also differs from other
identification technologies because it can leverage additional packet
and flow characteristics, e.g., packet sizes and timings, when identifying
content. To prevent substantial quality of service (QoS) impacts, DPI
normally analyzes a copy of data while the original packets continue
to be routed. Typically, the traffic is split using either a mirror
switch or fiber splitter, and analyzed on a cluster of machines
running Intrusion Detection Systems (IDS) configured for censorship.</t>
          <t>Tradeoffs: DPI is one of the most expensive identification mechanisms
and can have a large QoS impact <xref target="Porter-2010"/>.  When used as a
keyword filter for TCP flows, DPI systems can cause also major
overblocking problems. Like other techniques, DPI is less useful
against encrypted data, though DPI can leverage unencrypted elements
of an encrypted data flow, e.g., the Server Name Indication (SNI) sent
in the clear for TLS, or metadata about an encrypted flow, e.g., packet
sizes, which differ across video and textual flows, to identify traffic.
See <xref target="sni"/> for more information about SNI-based filtration mechanisms.</t>
          <t>Other kinds of information can be inferred by comparing certain unencrypted elements
exchanged during TLS handshakes to similar data points from known sources.
This practice, called TLS fingerprinting, allows a probabilistic identification of
a party's operating system, browser, or application based on a comparison of the
specific combinations of TLS version, ciphersuites, compression options, etc.
sent in the ClientHello message to similar signatures found in unencrypted traffic <xref target="Husak-2016"/>.</t>
          <t>Despite these problems, DPI is the most powerful identification method
and is widely used in practice. The Great Firewall of China (GFW), the
largest censorship system in the world, uses DPI to identify
restricted content over HTTP and DNS and inject TCP RSTs and bad DNS
responses, respectively, into connections <xref target="Crandall-2010"/> <xref target="Clayton-2006"/> <xref target="Anonymous-2014"/>.</t>
          <t>Empirical Examples: Several studies have found evidence of censors
using DPI for censoring content and tools. Clayton et al., Crandal et al.,
Anonymous, and Khattak et al., all explored the GFW <xref target="Crandall-2010"/>
            <xref target="Clayton-2006"/> <xref target="Anonymous-2014"/>. Khattak et al. even probed the
firewall to discover implementation details like how much state it stores <xref target="Khattak-2013"/>.
The Tor project claims that China, Iran, Ethiopia, and others must have used
DPI to block the obfs2 protocol <xref target="Wilde-2012"/>.  Malaysia has
been accused of using targeted DPI, paired with DDoS, to identify and
subsequently attack pro-opposition material <xref target="Wagstaff-2013"/>.  It
also seems likely that organizations not so worried about blocking
content in real-time could use DPI to sort and categorically search
gathered traffic using technologies such as high-speed packet processing
<xref target="Hepting-2011"/>.</t>
        </section>
      </section>
      <section anchor="transport">
        <name>Transport Layer</name>
        <section anchor="sec_thid">
          <name>Shallow Packet Inspection and Transport Header Identification</name>
          <t>Of the various shallow packet inspection methods, Transport Header
Identification is the most pervasive, reliable, and predictable type
of identification.  Transport headers contain a few invaluable pieces
of information that must be transparent for traffic to be successfully
routed: destination and source IP address and port.  Destination and
Source IP are doubly useful, as not only does it allow a censor to
block undesirable content via IP blocklisting, but also allows a
censor to identify the IP of the user making the request and the IP
address of the destination being visited, which in most cases can be
used to infer the domain being visited <xref target="Patil-2019"/>. Port is useful
for allowlisting certain applications.</t>
          <t>Combining IP address, port and protocol information found in the transport header, shallow packet inspection can be used by a censor to identify specific TCP or UDP endpoints. UDP endpoint blocking has been observed in the context of QUIC blocking <xref target="Elmenhorst-2021"/>.</t>
          <t>Trade-offs: header identification is popular due to its simplicity,
availability, and robustness.</t>
          <t>Header identification is trivial to implement, but is difficult to
implement in backbone or ISP routers at scale, and is therefore
typically implemented with DPI. Blocklisting an IP is equivalent to
installing a specific route on a router (such as a /32 route for IPv4
addresses and a /128 route for IPv6 addresses). However, due to
limited flow table space, this cannot scale beyond a few thousand IPs
at most. IP blocking is also relatively crude. It often leads to
overblocking and cannot deal with some services like content
distribution networks (CDN) that host content at hundreds or thousands
of IP addresses. Despite these limitations, IP blocking is extremely
effective because the user needs to proxy their traffic through
another destination to circumvent this type of identification. 
In addition, IP blocking is effective against all protocols above IP, e.g. 
TCP and QUIC.</t>
          <t>Port-blocking is generally not useful because many types of content
share the same port and it is possible for censored applications to
change their port. For example, most HTTP traffic goes over port 80,
so the censor cannot differentiate between restricted and allowed web
content solely on the basis of port. HTTPS goes over port 443, with
similar consequences for the censor except only partial metadata may
now be available to the censor. Port allowlisting is occasionally
used, where a censor limits communication to approved ports, such as
80 for HTTP traffic and is most effective when used in conjunction
with other identification mechanisms. For example, a censor could
block the default HTTPS port, port 443, thereby forcing most users to
fall back to HTTP. A counter-example is that port 25 (SMTP) has long
been blocked on residential ISPs' networks to reduce the risk for
email spam, but in doing so also prohibits residential ISP customers
from running their own email servers.</t>
        </section>
        <section anchor="prot-id">
          <name>Protocol Identification</name>
          <t>Censors sometimes identify entire protocols to be blocked using a
variety of traffic characteristics.  For example, Iran impairs the
performance of HTTPS traffic, a protocol that prevents further
analysis, to encourage users to switch to HTTP, a protocol that they
can analyze <xref target="Aryan-2012"/>. A simple protocol identification
would be to recognize all TCP traffic over port 443 as HTTPS, but more
sophisticated analysis of the statistical properties of payload data
and flow behavior, would be more effective, even when port 443 is not
used <xref target="Hjelmvik-2010"/> <xref target="Sandvine-2014"/>.</t>
          <t>If censors can detect circumvention tools, they can block them, so
censors like China are extremely interested in identifying the
protocols for censorship circumvention tools. In recent years, this
has devolved into an arms race between censors and circumvention tool
developers. As part of this arms race, China developed an extremely
effective protocol identification technique that researchers call
active probing or active scanning.</t>
          <t>In active probing, the censor determines whether hosts are running a
circumvention protocol by trying to initiate communication using the
circumvention protocol. If the host and the censor successfully
negotiate a connection, then the censor conclusively knows that host
is running a circumvention tool. China has used active scanning to
great effect to block Tor <xref target="Winter-2012"/>.</t>
          <t>Trade-offs: Protocol identification necessarily only provides insight
into the way information is traveling, and not the information itself.</t>
          <t>Protocol identification is useful for detecting and blocking
circumvention tools, like Tor, or traffic that is difficult to
analyze, like VoIP or SSL, because the censor can assume that this
traffic should be blocked. However, this can lead to over-blocking
problems when used with popular protocols.  These methods are
expensive, both computationally and financially, due to the use of
statistical analysis, and can be ineffective due to their imprecise
nature.</t>
          <t>Censors have also used protocol identification in the past in an
'allowlist' filtering capacity, such as by only allowing specific,
pre-vetted protocols to be used and blocking any unrecognized
protocols <xref target="Bock-2020"/>. These protocol filtering approaches can also lead to
over-blocking if the allowed lists of protocols is too small or
incomplete, but can be cheap to implement, as many standard 'allowed' 
protocols are simple to identify (such as HTTP).</t>
          <t>Empirical Examples: Protocol identification can be easy to detect if
it is conducted in real time and only a particular protocol is
blocked, but some types of protocol identification, like active
scanning, are much more difficult to detect. Protocol identification
has been used by Iran to identify and throttle SSH traffic to make it
unusable <xref target="Anonymous-2007"/> and by China to identify and block Tor
relays <xref target="Winter-2012"/>. Protocol identification has also been used for
traffic management, such as the 2007 case where Comcast in the United
States used RST injection to interrupt BitTorrent Traffic
<xref target="Winter-2012"/>. In 2020, Iran deployed an allowlist protocol filter,
which only allowed three protocols to be used (DNS, TLS, and HTTP) on
specific ports and censored any connection it could not identify <xref target="Bock-2020"/>. 
In 2022, Russia seemed to have used protocol identification to block most
HTTP/3 connections <xref target="Elmenhorst-2022"/>.</t>
        </section>
      </section>
      <section anchor="residualcensorship">
        <name>Residual Censorship</name>
        <t>Another feature of some modern censorship systems is residual censorship, a
punitive form of censorship whereby after a censor disrupts a forbidden
connection, the censor continues to target subsequent connections, even if they
are innocuous <xref target="Bock-2021"/>. Residual censorship can take many forms
and often relies on the methods of technical interference described in the next
section.</t>
        <t>An important facet of residual censorship is precisely what the censor
continues to block after censorship is initially triggered. There are three
common options available to an adversary: 2-tuple (client IP, server IP),
3-tuple (client IP, server IP+port), or 4-tuple (client IP+port, server
IP+port). Future connections that match the tuple of information the censor
records will be disrupted <xref target="Bock-2021"/>.</t>
        <t>Residual censorship can sometimes be difficult to identify and can often complicate
censorship measurement.</t>
        <t>Trade-offs: The impact of residual censorship is to provide users with further
discouragement from trying to access forbidden content, though it is not
clear how successful it is at accomplishing this.</t>
        <t>Empirical Examples: China has used 3-tuple residual censorship in conjunction
with their HTTP censorship for years and researchers have reported seeing similar
residual censorship for HTTPS. China seems to use a mix of 3-tuple and 4-tuple
residual censorship for their censorship of HTTPS with ESNI. Some censors that
perform censorship via packet dropping often accidentally implement 4-tuple
residual censorship, including Iran and Kazakhstan <xref target="Bock-2021"/>.</t>
      </section>
    </section>
    <section anchor="tech-interference">
      <name>Technical Interference</name>
      <section anchor="application-layer">
        <name>Application Layer</name>
        <section anchor="dns-mangling">
          <name>DNS Interference</name>
          <t>There are a variety of mechanisms that censors can use to block or
filter access to content by altering responses from the DNS
<xref target="AFNIC-2013"/> <xref target="ICANN-SSAC-2012"/>, including blocking the response,
replying with an error message, or responding with an incorrect
address. Note that there are now encrypted transports for DNS queries
in DNS-over-HTTPS <xref target="RFC8484"/> and DNS-over-TLS <xref target="RFC7858"/> that can
mitigate interference with DNS queries between the stub and the
resolver.</t>
          <t>Responding to a DNS query with an incorrect address can be achieved
with on-path interception, off-path cache poisoning, and lying by
the nameserver.</t>
          <t>"DNS mangling" is a network-level technique of on-path interception where an incorrect IP
address is returned in response to a DNS query to a censored
destination. An example of this is what some Chinese networks do (we
are not aware of any other wide-scale uses of mangling). On those
Chinese networks, every DNS request in transit is examined (presumably
by network inspection technologies such as DPI) and, if it matches a
censored domain, a false response is injected. End users can see this
technique in action by simply sending DNS requests to any unused IP
address in China (see example below). If it is not a censored name,
there will be no response. If it is censored, a forged response
will be returned. For example, using the command-line dig utility to
query an unused IP address in China of 192.0.2.2 for the name
"www.uncensored.example"  compared with
"www.censored.example" (censored at the time of writing), we get a
forged IP address "198.51.100.0" as a response:</t>
          <artwork><![CDATA[
% dig +short +nodnssec @192.0.2.2 A www.uncensored.example
;; connection timed out; no servers could be reached

% dig +short +nodnssec @192.0.2.2 A www.censored.example
198.51.100.0
]]></artwork>
          <t>DNS cache poisoning happens off-path and refers to a mechanism where a censor interferes
with the response sent by an authoritative DNS name server to a recursive
resolver by responding more quickly than the authoritative name server
can respond with an alternative IP address <xref target="Halley-2008"/>.
Cache poisoning occurs
after the requested site's name servers resolve the request and
attempt to forward the true IP back to the requesting device; on the
return route the resolved IP is recursively cached by each DNS server
that initially forwarded the request. During this caching process if
an undesirable keyword is recognized, the resolved IP is "poisoned"
and an alternative IP (or NXDOMAIN error) is returned more quickly
than the upstream resolver can respond, causing a forged IP
address to be cached (and potentially recursively so). The alternative
IPs usually direct to a nonsense domain or a warning page.
Alternatively, Iranian censorship appears to prevent the communication
en-route, preventing a response from ever being sent <xref target="Aryan-2012"/>.</t>
          <t>There are also cases of what is colloquially called "DNS lying", where
a censor mandates that the DNS responses provided -- by an operator of
a recursive resolver such as an Internet access provider -- be
different than what authoritative name server would provide
<xref target="Bortzmeyer-2015"/>.</t>
          <t>Trade-offs: These forms of DNS interference require the censor to
force a user to traverse a controlled DNS hierarchy (or intervening
network on which the censor serves as a Active Pervasive Attacker
<xref target="RFC7624"/> to rewrite DNS responses) for the mechanism to be
effective. It can be circumvented by using alternative DNS resolvers
(such as any of the public DNS resolvers) that may fall outside of the
jurisdictional control of the censor, or Virtual Private Network (VPN)
technology. DNS mangling and cache poisoning also imply returning an
incorrect IP to those attempting to resolve a domain name, but in some
cases the destination may be technically accessible; over HTTP, for
example, the user may have another method of obtaining the IP address
of the desired site and may be able to access it if the site is
configured to be the default server listening at this IP address.
Target blocking has also been a problem, as occasionally users outside
of the censors region will be directed through DNS servers or
DNS-rewriting network equipment controlled by a censor, causing the
request to fail. The ease of circumvention paired with the large risk
of content blocking and target blocking make DNS interference a
partial, difficult, and less than ideal censorship
mechanism.</t>
          <t>Additionally, the above mechanisms rely on DNSSEC not being deployed
or DNSSEC validation not being active on the client or recursive
resolver (neither of which are hard to imagine given limited
deployment of DNSSEC and limited client support for DNSSEC
validation). Note that an adversary seeking to merely block resolution
can serve a DNSSEC record that doesn't validate correctly, assuming of
course that the client/recursive resolver validates.</t>
          <t>Previously, techniques were used for e.g. censorship that relied on
DNS requests being passed in cleartext over port 53
<xref target="SSAC-109-2020"/>. With the deployment of encrypted DNS (e.g.,
DNS-over-HTTPS <xref target="RFC8484"/>) these requests are now increasingly passed
on port 443 with other HTTPS traffic, or in the case of DNS-over-TLS
<xref target="RFC7858"/> no longer passed in the clear (see also <xref target="sec_thid"/>).</t>
          <t>Empirical Examples: DNS interference, when properly implemented, is
easy to identify based on the shortcomings identified above. Turkey
relied on DNS interference for its country-wide block of websites such
Twitter and YouTube for almost week in March of 2014 but the ease of
circumvention resulted in an increase in the popularity of Twitter
until Turkish ISPs implementing an IP blocklist to achieve the
governmental mandate <xref target="Zmijewski-2014"/>.  Ultimately, Turkish ISPs
started hijacking all requests to Google and Level 3's international
DNS resolvers <xref target="Zmijewski-2014"/>. DNS interference, when incorrectly
implemented, has resulted in some of the largest "censorship
disasters".  In January 2014, China started directing all requests
passing through the Great Fire Wall to a single domain,
dongtaiwang.com, due to an improperly configured DNS poisoning
attempt; this incident is thought to be the largest Internet-service
outage in history <xref target="AFP-2014"/> <xref target="Anon-SIGCOMM12"/>. Countries such as
China, Iran, Turkey, and the United States have discussed blocking
entire TLDs as well, but only Iran has acted by blocking all Israeli
(.il) domains <xref target="Albert-2011"/>. DNS-blocking is commonly deployed in
European countries to deal with undesirable content, such as child
abuse content (Norway, United Kingdom, Belgium, Denmark, Finland,
France, Germany, Ireland, Italy, Malta, the Netherlands, Poland, Spain
and Sweden <xref target="Wright-2013"/> <xref target="Eneman-2010"/>), online gambling (Belgium,
Bulgaria, Czech Republic, Cyprus, Denmark, Estonia, France, Greece,
Hungary, Italy, Latvia, Lithuania, Poland, Portugal, Romania,
Slovakia, Slovenia, Spain (see Section 6.3.2 of: <xref target="EC-gambling-2012"/>,
<xref target="EC-gambling-2019"/>)), copyright infringement (all European Economic Area countries),
hate-speech and extremism (France <xref target="Hertel-2015"/>) and terrorism
content (France <xref target="Hertel-2015"/>).</t>
        </section>
      </section>
      <section anchor="transport-layer">
        <name>Transport Layer</name>
        <section anchor="performance-degradation">
          <name>Performance Degradation</name>
          <t>While other interference techniques outlined in this section mostly
focus on blocking or preventing access to content, it can be an
effective censorship strategy in some cases to not entirely block
access to a given destination, or service but instead degrade the
performance of the relevant network connection.  The resulting user
experience for a site or service under performance degradation can be
so bad that users opt to use a different site, service, or method of
communication, or may not engage in communication at all if there are
no alternatives.  Traffic shaping techniques that rate-limit the
bandwidth available to certain types of traffic is one example of a
performance degradation.</t>
          <t>Trade offs: While implementing a performance degradation will not
always eliminate the ability of people to access a desire resource, it
may force them to use other means of communication where censorship
(or surveillance) is more easily accomplished.</t>
          <t>Empirical Examples: Iran has been known to shape the bandwidth available to
HTTPS traffic to encourage unencrypted HTTP traffic <xref target="Aryan-2012"/>.</t>
        </section>
        <section anchor="packet-dropping">
          <name>Packet Dropping</name>
          <t>Packet dropping is a simple mechanism to prevent undesirable
traffic. The censor identifies undesirable traffic and chooses to not
properly forward any packets it sees associated with the traversing
undesirable traffic instead of following a normal routing
protocol. This can be paired with any of the previously described
mechanisms so long as the censor knows the user must route traffic
through a controlled router.</t>
          <t>Trade offs: Packet Dropping is most successful when every traversing
packet has transparent information linked to undesirable content, such
as a Destination IP. One downside Packet Dropping suffers from is the
necessity of blocking all content from otherwise allowable IPs
based on a single subversive sub-domain; blogging services and github
repositories are good examples. China famously dropped all github
packets for three days based on a single repository hosting
undesirable content <xref target="Anonymous-2013"/>.  The need to inspect every
traversing packet in close to real time also makes Packet Dropping
somewhat challenging from a QoS perspective.</t>
          <t>Empirical Examples: Packet Dropping is a very common form of technical
interference and lends itself to accurate detection given the unique
nature of the time-out requests it leaves in its wake. The Great
Firewall of China has been observed using packet dropping as one of its primary
mechanisms of technical censorship <xref target="Ensafi-2013"/>. Iran has also used
Packet Dropping as the mechanisms for throttling SSH
<xref target="Aryan-2012"/>. These are but two examples of a ubiquitous censorship
practice. Notably, packet dropping during the handshake or working connection is the only interference technique observed for QUIC traffic so far, e.g. in India, Iran, Russia and Uganda <xref target="Elmenhorst-2021"/><xref target="Elmenhorst-2022"/>.</t>
        </section>
        <section anchor="rst-inject">
          <name>RST Packet Injection</name>
          <t>Packet injection, generally, refers to a man-in-the-middle (MITM)
network interference technique that spoofs packets in an established
traffic stream. RST packets are normally used to let one side of TCP
connection know the other side has stopped sending information, and
thus the receiver should close the connection. RST Packet Injection is
a specific type of packet injection attack that is used to interrupt
an established stream by sending RST packets to both sides of a TCP
connection; as each receiver thinks the other has dropped the
connection, the session is terminated.</t>
          <t>QUIC is not vulnerable to these types of injection attacks once the
connection has been setup. While QUIC implements a stateless reset mechanism, 
such a reset is only accepted by a peer if the packet ends in a previously 
issued stateless reset token which is hard to guess. 
During the handshake, QUIC only provides effective protection
against off-path attackers but is vulnerable to injection attacks by
attackers that have parsed prior packets.
(See <xref target="I-D.ietf-quic-transport"/> for more details.)</t>
          <t>Trade-offs: Although ineffective against non-TCP protocols (QUIC, IPSec), RST Packet Injection has a few advantages that make it
extremely popular as a technique employed for censorship. RST Packet Injection is
an out-of-band interference mechanism, allowing the avoidance of the the
QoS bottleneck one can encounter with inline techniques such as Packet
Dropping. This out-of-band property allows a censor to inspect a copy
of the information, usually mirrored by an optical splitter, making it
an ideal pairing for DPI and protocol identification
<xref target="Weaver-2009"/> (this asynchronous version of a MITM is often called a
Man-on-the-Side (MOTS)).
RST Packet Injection also has the advantage of only
requiring one of the two endpoints to accept the spoofed packet for
the connection to be interrupted.</t>
          <t>The difficult part of RST Packet Injection is spoofing "enough"
correct information to ensure one end-point accepts a RST packet as
legitimate; this generally implies a correct IP, port, and TCP
sequence number. Sequence number is the hardest to get correct, as
<xref target="RFC0793"/> specifies an RST Packet should be in-sequence to be
accepted, although the RFC also recommends allowing in-window packets
as "good enough". This in-window recommendation is important, as if it
is implemented it allows for successful Blind RST Injection attacks
<xref target="Netsec-2011"/>.  When in-window sequencing is allowed, it is trivial
to conduct a Blind RST Injection: while the term "blind" injection
implies the censor
doesn't know any sensitive sequencing information about
the TCP stream they are injecting into, they can simply enumerate all
~70000 possible windows; this is particularly useful for interrupting
encrypted/obfuscated protocols such as SSH or Tor <xref target="Gilad"/>.
Some censorship evasion systems work by trying to confuse the censor
into tracking incorrect information, rendering their RST Packet Injection
useless <xref target="Khattak-2013"/>, <xref target="Wang-2017"/>, <xref target="Li-2017"/>, <xref target="Bock-2019"/>,
<xref target="Wang-2020"/>.</t>
          <t>RST Packet Injection relies on a stateful network, making it useless against UDP
connections. RST Packet Injection is among the most popular censorship
techniques used today given its versatile nature and effectiveness
against all types of TCP traffic. Recent research shows that a TCP RST
packet injection attack can even work in the case of an off-path
attacker <xref target="Cao-2016"/>.</t>
          <t>Empirical Examples: RST Packet Injection, as mentioned above, is most
often paired with identification techniques that require splitting,
such as DPI or protocol identification. In 2007, Comcast was accused of
using RST Packet Injection to interrupt traffic it identified as
BitTorrent <xref target="Schoen-2007"/>, this later led to a US Federal
Communications Commission ruling against Comcast
<xref target="VonLohmann-2008"/>. China has also been known to use RST Packet
Injection for censorship purposes. This interference is especially
evident in the interruption of encrypted/obfuscated protocols, such as
those used by Tor <xref target="Winter-2012"/>.</t>
        </section>
      </section>
      <section anchor="routing-layer">
        <name>Routing Layer</name>
        <section anchor="discon">
          <name>Network Disconnection</name>
          <t>While it is perhaps the crudest of all techniques employed for censorship, there is
no more effective way of making sure undesirable information isn't
allowed to propagate on the web than by shutting off the network. The
network can be logically cut off in a region when a censoring body
withdraws all of the Border Gateway Protocol (BGP) prefixes routing
through the censor's country.</t>
          <t>Trade-offs: The impact to a network disconnection in a region is huge
and absolute; the censor pays for absolute control over digital
information by losing the benefits a globally-accessible Internet brings. Network disconnections are also politically expensive - citizens used to being able to access Internet platforms and services see such disconnections as a loss of civil liberty. 
Network disconnection is rarely a long-term solution for any censor and is normally only used
as a last resort in times of substantial unrest.</t>
          <t>Empirical Examples: Network Disconnections tend to only happen in
times of substantial unrest, largely due to the huge social,
political, and economic impact such a move has. One of the first,
highly covered occurrences was with the Junta in Myanmar employing
Network Disconnection to help Junta forces quash a rebellion in 2007
<xref target="Dobie-2007"/>. China disconnected the network in the Xinjiang region
during unrest in 2009 in an effort to prevent the protests from
spreading to other regions <xref target="Heacock-2009"/>. The Arab Spring saw the
the most frequent usage of Network Disconnection, with events in Egypt
and Libya in 2011 <xref target="Cowie-2011"/>, and Syria in 2012
<xref target="Thomson-2012"/>. Russia indicated that it would attempt to
disconnect all Russian networks from the global internet in April 2019
as part of a test of the nation's network independence. Reports also
indicate that, as part of the test disconnect, Russian telecommunications firms
must now route all traffic to state-operated monitoring points
<xref target="Cimpanu-2019"/>. India was the country that saw the largest number of
internet shutdowns per year in 2016 and 2017 <xref target="Dada-2017"/>.</t>
        </section>
        <section anchor="advroute">
          <name>Adversarial Route Announcement</name>
          <t>More fine-grained and potentially wide-spread censorship can be achieved with BGP hijacking, which adversarially re-routes BGP IP prefixes incorrectly within a region and beyond. This restricts and effectively censors the correctly known location of information that flows into or out of a jurisdiction and will similarly prevent people from outside your jurisdiction from viewing content generated outside your jurisdiction as the adversarial route announcement propagates. The first can be achieved by an adversarial BGP announcement of incorrect routes that are not intended to leak beyond a jurisdiction, where the latter attacks traffic by deliberately introducing bogus BGP announcements that reach the global internet.</t>
          <t>Trade-offs: A global leak of a misrouted website can overwhelm an ISP if the website gets a lot of traffic. It is not a permanent solution because incorrect BGP routes that leak globally can be fixed, though within a jurisdiction only the ISP/IXP is in a position to correct them for local users.</t>
          <t>Empirical examples: In 2008 Pakistan Telecom censored Youtube at the request of the Pakistan government by changing its BGP routes for the website. The new routes were announced to the ISP's upstream providers and beyond. The entire Internet began directing Youtube routes to Pakistan Telecom and continued doing so for many hours. In 2018 nearly all Google services and Google cloud customers like Spotify all lost more than one hour of service after it lost control of several million of its IP addresses. Those IP prefixes were being misdirected to China Telecom, a Chinese government-owned ISP <xref target="Google-2018"/>}, in a manner similar to the BGP hijacking of US government and military websites by China Telecom in 2010. ISPs in both Russia (2022) and Myanmar (2021) have tried to hijack the same Twitter prefix more than once <xref target="MANRS"/>.</t>
        </section>
      </section>
      <section anchor="multi-layer-and-non-layer">
        <name>Multi-layer and Non-layer</name>
        <section anchor="ddos">
          <name>Distributed Denial of Service (DDoS)</name>
          <t>Distributed Denial of Service attacks are a common attack mechanism
used by "hacktivists" and malicious hackers, but censors have used
DDoS in the past for a variety of reasons. There is a huge variety of
DDoS attacks <xref target="Wikip-DoS"/>, but at a high level two possible impacts
tend to occur; a flood attack results in the service being unusable
while resources are being spent to flood the service, a crash attack
aims to crash the service so resources can be reallocated elsewhere
without "releasing" the service.</t>
          <t>Trade-offs: DDoS is an appealing mechanism when a censor would like to
prevent all access to undesirable content, instead of only access in
their region for a limited period of time, but this is really the only
uniquely beneficial feature for DDoS as a technique employed for censorship. The
resources required to carry out a successful DDoS against major
targets are computationally expensive, usually requiring renting or
owning a malicious distributed platform such as a botnet, and
imprecise. DDoS is an incredibly crude censorship technique, and
appears to largely be used as a timely, easy-to-access mechanism for
blocking undesirable content for a limited period of time.</t>
          <t>Empirical Examples: In 2012 the U.K.'s GCHQ used DDoS to temporarily
shutdown IRC chat rooms frequented by members of Anonymous using the
Syn Flood DDoS method; Syn Flood exploits the handshake used by TCP to
overload the victim server with so many requests that legitimate
traffic becomes slow or impossible
<xref target="Schone-2014"/> <xref target="CERT-2000"/>. Dissenting opinion websites are
frequently victims of DDoS around politically sensitive events in
Burma <xref target="Villeneuve-2011"/>. Controlling parties in Russia
<xref target="Kravtsova-2012"/>, Zimbabwe <xref target="Orion-2013"/>, and Malaysia
<xref target="Muncaster-2013"/> have been accused of using DDoS to interrupt
opposition support and access during elections.
In 2015, China launched a DDoS attack using a true MITM system
collocated with the Great Firewall, dubbed "Great Cannon", that was
able to inject JavaScript code into web visits to a Chinese search
engine that commandeered those user agents to send DDoS traffic to
various sites <xref target="Marczak-2015"/>.</t>
        </section>
        <section anchor="censorship-in-depth">
          <name>Censorship in Depth</name>
          <t>Often, censors implement multiple techniques in tandem, creating
"censorship in depth". Censorship in depth can take many forms; some
censors block the same content through multiple techniques (such as
blocking a domain by DNS, IP blocking, and HTTP simultaneously), some deploy
parallel systems to improve censorship reliability (such as deploying
multiple different censorship systems to block the same domain), and others 
can use complimentary systems to limit evasion (such as by blocking
unwanted protocols entirely, forcing users to use other filtered protocols).</t>
          <t>Trade-offs: Censorship in depth can be attractive for censors to deploy,
as it offers additional guarantees about censorship: even if someone evades 
one type of censorship, they may still be blocked by another. The main
drawback to this approach is the cost to initial deployment, as it requires
the system to deploy multiple censorship systems in tandem.</t>
          <t>Empirical Examples: Censorship in depth is present in many large censoring
nation states today. Researchers have observed China has deployed
significant censorship in depth, often censoring the same resource across
multiple protocols <xref target="Chai-2019"/>, <xref target="Bock-2020b"/> or deploying additional
censorship systems to censor the same content and protocol <xref target="Bock-2021b"/>. 
Iran also has deployed a complimentary protocol filter to limit which
protocols can be used on certain ports, forcing users to rely on protocols
their censorship system can filter <xref target="Bock-2020"/>.</t>
        </section>
      </section>
    </section>
    <section anchor="nontechint">
      <name>Non-Technical Interference</name>
      <section anchor="manualfiltering">
        <name>Manual Filtering</name>
        <t>As the name implies, sometimes manual labor is the easiest way to figure
out which content to block.  Manual Filtering differs from the common
tactic of building up blocklists in that it doesn't necessarily target
a specific IP or DNS, but instead removes or flags content.  Given the
imprecise nature of automatic filtering, manually sorting through
content and flagging dissenting websites, blogs, articles and other
media for filtration can be an effective technique on its own, or combined with other automated techniques of detection that are then followed by an action that would require manual confirmation. This filtration
can occur on the Backbone/ISP level -- China's army of monitors is a
good example <xref target="BBC-2013b"/> -- but more commonly manual filtering
occurs on an institutional level.  Internet Content Providers such as
Google or Weibo, require a business license to operate in China.  One
of the prerequisites for a business license is an agreement to sign a
"voluntary pledge" known as the "Public Pledge on Self-discipline for
the Chinese Internet Industry".  The failure to "energetically
uphold" the pledged values can lead to the ICPs being held liable for
the offending content by the Chinese government <xref target="BBC-2013b"/>.</t>
      </section>
      <section anchor="selfcensor">
        <name>Self-Censorship</name>
        <t>Self-censorship is difficult to document, as it manifests primarily
through a lack of undesirable content. Tools which encourage
self-censorship are those which may lead a prospective speaker to
believe that speaking increases the risk of unfavourable outcomes for
the speaker (technical monitoring, identification requirements,
etc.). Reporters Without Borders exemplify methods of imposing
self-censorship in their annual World Press Freedom Index reports
<xref target="RWB2020"/>.</t>
      </section>
      <section anchor="serverko">
        <name>Server Takedown</name>
        <t>As mentioned in passing by <xref target="Murdoch-2011"/>, servers must have a
physical location somewhere in the world. If undesirable content is
hosted in the censoring country the servers can be physically seized
or -- in cases where a server is virtualized in a cloud infrastructure
where it may not necessarily have a fixed physical location -- the
hosting provider can be required to prevent access.</t>
      </section>
      <section anchor="notice">
        <name>Notice and Takedown</name>
        <t>In many countries, legal mechanisms exist where an individual or other
content provider can issue a legal request to a content host that
requires the host to take down content. Examples include the systems
employed by companies like Google to comply with "Right to be
Forgotten" policies in the European Union <xref target="Google-RTBF"/>,
intermediary liability rules for electronic platform providers
<xref target="EC-2012"/>, or the copyright-oriented notice and takedown regime of
the United States Digital Millennium Copyright Act (DMCA) Section 512
<xref target="DMLP-512"/>.</t>
      </section>
      <section anchor="dns-seizures">
        <name>Domain-Name Seizures</name>
        <t>Domain names are catalogued in so-called name-servers operated by
legal entities called registries. These registries can be made to cede
control over a domain name to someone other than the entity which
registered the domain name through a legal procedure grounded in either
private contracts or public law. Domain name seizures is increasingly
used by both public authorities and private entities to deal with
undesired content dissemination <xref target="ICANN2012"/> <xref target="EFF2017"/>.</t>
      </section>
    </section>
    <section anchor="future-work">
      <name>Future work</name>
      <t>In addition to establishing a thorough resource for describing censorship techniques this document implicates critical areas for future work.</t>
      <t>Taken as a whole the apparent costs of implementation of censorship techniques indicate a need for better classification of censorship regimes as they evolve and mature and specifying censorship circumvention techniques themselves. Censors maturity refers to the technical maturity required of the censor to perform the specific censorship technique. Future work might classify techniques by essentially how hard a censor must work, including what infrastructure is required, in order to successfully censor content, users or services.</t>
      <t>On circumvention, the increase in protocols leveraging encryption is an effective counter-measure against some forms of censorship described in this document, but that thorough research on circumvention and encryption be left for another document. Moreover the censorship circumvention community has developed an area of research on "pluggable transports," which collects, documents and makes agile methods for obfuscating the on-path traffic of censorship circumvention tools such that it appears indistinguishable from other kinds of traffic <xref target="Tor-2020"/>. Those methods would benefit from future work in the internet standards community, too.</t>
      <t>Lastly the empirical examples demonstrate that censorship techniques can evolve quickly, and experience shows that this document can only be a point-in-time statement. Future work might extend this document with updates and new techniques described using a comparable methodology.</t>
    </section>
    <section anchor="Contributors">
      <name>Contributors</name>
      <t>This document benefited from discussions with and input from
David Belson, Stephane Bortzmeyer, Vinicius Fortuna,
Gurshabad Grover, Andrew McConachie, Martin Nilsson, Michael
Richardson, Patrick Vacek and Chris Wood.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>Informative References</name>
      <reference anchor="RFC7754" target="https://www.rfc-editor.org/info/rfc7754">
        <front>
          <title>Technical Considerations for Internet Service Blocking and Filtering</title>
          <author fullname="R. Barnes" initials="R." surname="Barnes">
            <organization/>
          </author>
          <author fullname="A. Cooper" initials="A." surname="Cooper">
            <organization/>
          </author>
          <author fullname="O. Kolkman" initials="O." surname="Kolkman">
            <organization/>
          </author>
          <author fullname="D. Thaler" initials="D." surname="Thaler">
            <organization/>
          </author>
          <author fullname="E. Nordmark" initials="E." surname="Nordmark">
            <organization/>
          </author>
          <date month="March" year="2016"/>
          <abstract>
            <t>The Internet is structured to be an open communications medium.  This openness is one of the key underpinnings of Internet innovation, but it can also allow communications that may be viewed as undesirable by certain parties.  Thus, as the Internet has grown, so have mechanisms to limit the extent and impact of abusive or objectionable communications.  Recently, there has been an increasing emphasis on "blocking" and "filtering", the active prevention of such communications.  This document examines several technical approaches to Internet blocking and filtering in terms of their alignment with the overall Internet architecture.  When it is possible to do so, the approach to blocking and filtering that is most coherent with the Internet architecture is to inform endpoints about potentially undesirable services, so that the communicants can avoid engaging in abusive or objectionable communications.  We observe that certain filtering and blocking approaches can cause unintended consequences to third parties, and we discuss the limits of efficacy of various approaches.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7754"/>
        <seriesInfo name="DOI" value="10.17487/RFC7754"/>
      </reference>
      <reference anchor="RFC7624" target="https://www.rfc-editor.org/info/rfc7624">
        <front>
          <title>Confidentiality in the Face of Pervasive Surveillance: A Threat Model and Problem Statement</title>
          <author fullname="R. Barnes" initials="R." surname="Barnes">
            <organization/>
          </author>
          <author fullname="B. Schneier" initials="B." surname="Schneier">
            <organization/>
          </author>
          <author fullname="C. Jennings" initials="C." surname="Jennings">
            <organization/>
          </author>
          <author fullname="T. Hardie" initials="T." surname="Hardie">
            <organization/>
          </author>
          <author fullname="B. Trammell" initials="B." surname="Trammell">
            <organization/>
          </author>
          <author fullname="C. Huitema" initials="C." surname="Huitema">
            <organization/>
          </author>
          <author fullname="D. Borkmann" initials="D." surname="Borkmann">
            <organization/>
          </author>
          <date month="August" year="2015"/>
          <abstract>
            <t>Since the initial revelations of pervasive surveillance in 2013, several classes of attacks on Internet communications have been discovered.  In this document, we develop a threat model that describes these attacks on Internet confidentiality.  We assume an attacker that is interested in undetected, indiscriminate eavesdropping.  The threat model is based on published, verified attacks.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7624"/>
        <seriesInfo name="DOI" value="10.17487/RFC7624"/>
      </reference>
      <reference anchor="RFC6066" target="https://www.rfc-editor.org/info/rfc6066">
        <front>
          <title>Transport Layer Security (TLS) Extensions: Extension Definitions</title>
          <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd">
            <organization/>
          </author>
          <date month="January" year="2011"/>
          <abstract>
            <t>This document provides specifications for existing TLS extensions.  It is a companion document for RFC 5246, "The Transport Layer Security (TLS) Protocol Version 1.2".  The extensions specified are server_name, max_fragment_length, client_certificate_url, trusted_ca_keys, truncated_hmac, and status_request.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6066"/>
        <seriesInfo name="DOI" value="10.17487/RFC6066"/>
      </reference>
      <reference anchor="RFC8484" target="https://www.rfc-editor.org/info/rfc8484">
        <front>
          <title>DNS Queries over HTTPS (DoH)</title>
          <author fullname="P. Hoffman" initials="P." surname="Hoffman">
            <organization/>
          </author>
          <author fullname="P. McManus" initials="P." surname="McManus">
            <organization/>
          </author>
          <date month="October" year="2018"/>
          <abstract>
            <t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS.  Each DNS query-response pair is mapped into an HTTP exchange.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8484"/>
        <seriesInfo name="DOI" value="10.17487/RFC8484"/>
      </reference>
      <reference anchor="RFC7858" target="https://www.rfc-editor.org/info/rfc7858">
        <front>
          <title>Specification for DNS over Transport Layer Security (TLS)</title>
          <author fullname="Z. Hu" initials="Z." surname="Hu">
            <organization/>
          </author>
          <author fullname="L. Zhu" initials="L." surname="Zhu">
            <organization/>
          </author>
          <author fullname="J. Heidemann" initials="J." surname="Heidemann">
            <organization/>
          </author>
          <author fullname="A. Mankin" initials="A." surname="Mankin">
            <organization/>
          </author>
          <author fullname="D. Wessels" initials="D." surname="Wessels">
            <organization/>
          </author>
          <author fullname="P. Hoffman" initials="P." surname="Hoffman">
            <organization/>
          </author>
          <date month="May" year="2016"/>
          <abstract>
            <t>This document describes the use of Transport Layer Security (TLS) to provide privacy for DNS.  Encryption provided by TLS eliminates opportunities for eavesdropping and on-path tampering with DNS queries in the network, such as discussed in RFC 7626.  In addition, this document specifies two usage profiles for DNS over TLS and provides advice on performance considerations to minimize overhead from using TCP and TLS with DNS.</t>
            <t>This document focuses on securing stub-to-recursive traffic, as per the charter of the DPRIVE Working Group.  It does not prevent future applications of the protocol to recursive-to-authoritative traffic.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7858"/>
        <seriesInfo name="DOI" value="10.17487/RFC7858"/>
      </reference>
      <reference anchor="RFC0793" target="https://www.rfc-editor.org/info/rfc793">
        <front>
          <title>Transmission Control Protocol</title>
          <author fullname="J. Postel" initials="J." surname="Postel">
            <organization/>
          </author>
          <date month="September" year="1981"/>
        </front>
        <seriesInfo name="RFC" value="793"/>
        <seriesInfo name="DOI" value="10.17487/RFC0793"/>
      </reference>
      <reference anchor="I-D.ietf-tls-sni-encryption" target="https://www.ietf.org/archive/id/draft-ietf-tls-sni-encryption-09.txt">
        <front>
          <title>Issues and Requirements for Server Name Identification (SNI) Encryption in TLS</title>
          <author fullname="Christian Huitema" initials="C." surname="Huitema">
            <organization>Private Octopus Inc.</organization>
          </author>
          <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
            <organization>RTFM, Inc.</organization>
          </author>
          <date day="28" month="October" year="2019"/>
          <abstract>
            <t>This document describes the general problem of encrypting the Server Name Identification (SNI) TLS parameter. The proposed solutions hide a hidden service behind a fronting service, only disclosing the SNI of the fronting service to external observers. This document lists known attacks against SNI encryption, discusses the current "HTTP co-tenancy" solution, and presents requirements for future TLS-layer solutions.

 In practice, it may well be that no solution can meet every requirement and that practical solutions will have to make some compromises.
            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-tls-sni-encryption-09"/>
      </reference>
      <reference anchor="I-D.ietf-tls-esni" target="https://www.ietf.org/archive/id/draft-ietf-tls-esni-15.txt">
        <front>
          <title>TLS Encrypted Client Hello</title>
          <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
            <organization>RTFM, Inc.</organization>
          </author>
          <author fullname="Kazuho Oku" initials="K." surname="Oku">
            <organization>Fastly</organization>
          </author>
          <author fullname="Nick Sullivan" initials="N." surname="Sullivan">
            <organization>Cloudflare</organization>
          </author>
          <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
            <organization>Cloudflare</organization>
          </author>
          <date day="3" month="October" year="2022"/>
          <abstract>
            <t>   This document describes a mechanism in Transport Layer Security (TLS)
   for encrypting a ClientHello message under a server public key.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Source for this draft and an issue tracker can be found at
   https://github.com/tlswg/draft-ietf-tls-esni
   (https://github.com/tlswg/draft-ietf-tls-esni).

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-tls-esni-15"/>
      </reference>
      <reference anchor="I-D.ietf-quic-transport" target="https://www.ietf.org/archive/id/draft-ietf-quic-transport-34.txt">
        <front>
          <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
          <author fullname="Jana Iyengar" initials="J." surname="Iyengar">
            <organization>Fastly</organization>
          </author>
          <author fullname="Martin Thomson" initials="M." surname="Thomson">
            <organization>Mozilla</organization>
          </author>
          <date day="14" month="January" year="2021"/>
          <abstract>
            <t>This document defines the core of the QUIC transport protocol.  QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration.  QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances.  Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.
            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-quic-transport-34"/>
      </reference>
      <reference anchor="RWB2020" target="https://rsf.org/en/2020-world-press-freedom-index-entering-decisive-decade-journalism-exacerbated-coronavirus">
        <front>
          <title>2020 World Press Freedom Index: Entering a decisive decade for journalism, exacerbated by coronavirus</title>
          <author>
            <organization>Reporters Without Borders</organization>
          </author>
          <date year="2020"/>
        </front>
      </reference>
      <reference anchor="HADOPI-2020" target="https://www.hadopi.fr/en/node/3668">
        <front>
          <title>Présentation</title>
          <author>
            <organization>Haute Autorité pour la Diffusion des oeuvres et la Protection des Droits sur Internet</organization>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="SSAC-109-2020" target="https://www.icann.org/en/system/files/files/sac-109-en.pdf">
        <front>
          <title>SAC109: The Implications of DNS over HTTPS and DNS over TLS</title>
          <author>
            <organization>ICANN Security and Stability Advisory Committee</organization>
          </author>
          <date year="2020"/>
        </front>
      </reference>
      <reference anchor="ICANN2012" target="https://www.icann.org/en/system/files/files/guidance-domain-seizures-07mar12-en.pdf">
        <front>
          <title>Guidance for Preparing Domain Name Orders, Seizures &amp; Takedowns</title>
          <author>
            <organization>ICANN Security and Stability Advisory Committee</organization>
          </author>
          <date year="2012"/>
        </front>
      </reference>
      <reference anchor="Tor-2020" target="https://2019.www.torproject.org/docs/pluggable-transports.html.en">
        <front>
          <title>Tor: Pluggable Transports</title>
          <author>
            <organization>The Tor Project</organization>
          </author>
          <date year="2020"/>
        </front>
      </reference>
      <reference anchor="WP-Def-2020" target="https://en.wikipedia.org/w/index.php?title=Censorship&amp;oldid=943938595">
        <front>
          <title>Censorship</title>
          <author>
            <organization>Wikipedia contributors</organization>
          </author>
          <date year="2020"/>
        </front>
      </reference>
      <reference anchor="EC-gambling-2012" target="https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:52012SC0345">
        <front>
          <title>Online gambling in the Internal Market</title>
          <author>
            <organization>European Commission</organization>
          </author>
          <date year="2012"/>
        </front>
      </reference>
      <reference anchor="EC-gambling-2019" target="https://ec.europa.eu/growth/content/evaluation-regulatory-tools-enforcing-online-gambling-rules-and-channelling-demand-towards-1_en">
        <front>
          <title>Evaluation of regulatory tools for enforcing online gambling rules and channeling demand towards controlled offers</title>
          <author>
            <organization>European Commission</organization>
          </author>
          <date year="2019"/>
        </front>
      </reference>
      <reference anchor="EC-2012" target="https://ec.europa.eu/information_society/newsroom/image/document/2017-4/consultation_summary_report_en_2010_42070.pdf">
        <front>
          <title>Summary of the results of the Public Consultation on the future of electronic commerce in the Internal Market and the implementation of the Directive on electronic commerce (2000/31/EC)</title>
          <author>
            <organization>European Commission</organization>
          </author>
          <date year="2012"/>
        </front>
      </reference>
      <reference anchor="Bentham-1791" target="https://www.google.com/books/edition/_/Ec4TAAAAQAAJ?hl=en">
        <front>
          <title>Panopticon Or the Inspection House</title>
          <author initials="J." surname="Bentham" fullname="Jeremy Bentham">
            <organization/>
          </author>
          <date year="1791"/>
        </front>
      </reference>
      <reference anchor="Ellul-1973" target="https://www.penguinrandomhouse.com/books/46234/propaganda-by-jacques-ellul/">
        <front>
          <title>Propaganda: The Formation of Men's Attitudes</title>
          <author initials="J." surname="Ellul" fullname="Jacques Ellul">
            <organization/>
          </author>
          <date year="1973"/>
        </front>
      </reference>
      <reference anchor="Reda-2017" target="https://juliareda.eu/2017/11/eu-website-blocking/">
        <front>
          <title>New EU law prescribes website blocking in the name of 'consumer protection'</title>
          <author initials="J." surname="Reda" fullname="Julia Reda">
            <organization/>
          </author>
          <date year="2017"/>
        </front>
      </reference>
      <reference anchor="Knight-2005" target="https://www.newscientist.com/article/dn7589-iranian-net-censorship-powered-by-us-technology/">
        <front>
          <title>Iranian net censorship powered by US technology</title>
          <author initials="W." surname="Knight" fullname="Will Knight">
            <organization/>
          </author>
          <date year="2005"/>
        </front>
      </reference>
      <reference anchor="SIDN2020" target="https://labs.ripe.net/Members/giovane_moura/detecting-and-taking-down-fraudulent-webshops-at-a-cctld">
        <front>
          <title>Detecting and Taking Down Fraudulent Webshops at the .nl ccTLD</title>
          <author initials="G." surname="Moura" fullname="Giovane Moura">
            <organization/>
          </author>
          <date year="2020"/>
        </front>
      </reference>
      <reference anchor="Cimpanu-2019" target="https://www.zdnet.com/article/russia-to-disconnect-from-the-internet-as-part-of-a-planned-test/">
        <front>
          <title>Russia to disconnect from the internet as part of a planned test</title>
          <author initials="C." surname="Cimpanu" fullname="Catalin Cimpanu">
            <organization/>
          </author>
          <date year="2019"/>
        </front>
      </reference>
      <reference anchor="Hertel-2015" target="https://www.sciencesetavenir.fr/high-tech/comment-les-autorites-peuvent-bloquer-un-site-internet_35828">
        <front>
          <title>Comment les autorités peuvent bloquer un site Internet</title>
          <author initials="O." surname="Hertel" fullname="Olivier Hertel">
            <organization/>
          </author>
          <date year="2015"/>
        </front>
      </reference>
      <reference anchor="Eneman-2010" target="https://www.gu.se/forskning/publikation/?publicationId=96592">
        <front>
          <title>ISPs filtering of child abusive material: A critical reflection of its effectiveness</title>
          <author initials="M." surname="Eneman" fullname="Marie Eneman">
            <organization/>
          </author>
          <date year="2010"/>
        </front>
      </reference>
      <reference anchor="Gatlan-2019" target="https://www.bleepingcomputer.com/news/security/south-korea-is-censoring-the-internet-by-snooping-on-sni-traffic/">
        <front>
          <title>South Korea is Censoring the Internet by Snooping on SNI Traffic</title>
          <author initials="S." surname="Gatlan" fullname="Sergiu Gatlan">
            <organization/>
          </author>
          <date year="2019"/>
        </front>
      </reference>
      <reference anchor="Lomas-2019" target="https://techcrunch.com/2019/10/30/github-removes-tsunami-democratics-apk-after-a-takedown-order-from-spain/">
        <front>
          <title>Github removes Tsunami Democràtic’s APK after a takedown order from Spain</title>
          <author initials="N." surname="Lomas" fullname="Natasha Lomas">
            <organization/>
          </author>
          <date year="2019"/>
        </front>
      </reference>
      <reference anchor="Victor-2019" target="https://www.nytimes.com/2019/10/09/world/asia/blizzard-hearthstone-hong-kong.html">
        <front>
          <title>Blizzard Sets Off Backlash for Penalizing Hearthstone Gamer in Hong Kong</title>
          <author initials="D." surname="Victor" fullname="Daniel Victor">
            <organization/>
          </author>
          <date year="2019"/>
        </front>
      </reference>
      <reference anchor="Glanville-2008" target="http://www.theguardian.com/commentisfree/2008/nov/17/censorship-internet">
        <front>
          <title>The Big Business of Net Censorship</title>
          <author initials="J." surname="Glanville" fullname="Jo Glanville">
            <organization/>
          </author>
          <date year="2008"/>
        </front>
      </reference>
      <reference anchor="EFF2017" target="https://www.eff.org/files/2017/08/02/domain_registry_whitepaper.pdf">
        <front>
          <title>Which Internet registries offer the best protection for domain owners?</title>
          <author initials="J." surname="Malcom" fullname="Jeremy Malcolm">
            <organization/>
          </author>
          <author initials="M." surname="Stoltz" fullname="Mitch Stoltz">
            <organization/>
          </author>
          <author initials="G." surname="Rossi" fullname="Gus Rossi">
            <organization/>
          </author>
          <author initials="V." surname="Paxson" fullname="Vern Paxson">
            <organization/>
          </author>
          <date year="2017"/>
        </front>
      </reference>
      <reference anchor="Tschantz-2016" target="https://oaklandsok.github.io/papers/tschantz2016.pdf">
        <front>
          <title>SoK: Towards Grounding Censorship Circumvention in Empiricism</title>
          <author initials="M." surname="Tschantz" fullname="Michael Carl Tschantz">
            <organization/>
          </author>
          <author initials="S." surname="Afroz" fullname="Sadia Afroz">
            <organization/>
          </author>
          <author initials="A." surname="Anonymous" fullname="Anonymous">
            <organization/>
          </author>
          <author initials="V." surname="Paxson" fullname="Vern Paxson">
            <organization/>
          </author>
          <date year="2016"/>
        </front>
      </reference>
      <reference anchor="Cao-2016" target="https://www.usenix.org/system/files/conference/usenixsecurity16/sec16_paper_cao.pdf">
        <front>
          <title>Off-Path TCP Exploits: Global Rate Limit Considered Dangerous</title>
          <author initials="Y." surname="Cao" fullname="Yue Cao">
            <organization/>
          </author>
          <author initials="Z." surname="Qian" fullname="Zhiyun Qian">
            <organization/>
          </author>
          <author initials="Z." surname="Wang" fullname="Zhongjie Wang">
            <organization/>
          </author>
          <author initials="T." surname="Dao" fullname="Tuan Dao">
            <organization/>
          </author>
          <author initials="S." surname="Krishnamurthy" fullname="Srikanth V. Krishnamurthy">
            <organization/>
          </author>
          <author initials="L." surname="Marvel" fullname="Lisa M. Marvel">
            <organization/>
          </author>
          <date year="2016"/>
        </front>
      </reference>
      <reference anchor="Leyba-2019" target="https://forrest.biodesign.asu.edu/data/publications/2019-compass-chokepoints.pdf">
        <front>
          <title>Borders and Gateways: Measuring and Analyzing National AS Chokepoints</title>
          <author initials="K." surname="Leyba" fullname="Kirtus G. Leyba">
            <organization/>
          </author>
          <author initials="B." surname="Edwards" fullname="Benjamin Edwards">
            <organization/>
          </author>
          <author initials="C." surname="Freeman" fullname="Cynthia Freeman">
            <organization/>
          </author>
          <author initials="J." surname="Crandall" fullname="Jedidiah R. Crandall">
            <organization/>
          </author>
          <author initials="S." surname="Forrest" fullname="Stephanie Forrest">
            <organization/>
          </author>
          <date year="2019"/>
        </front>
      </reference>
      <reference anchor="Chai-2019" target="https://www.usenix.org/system/files/foci19-paper_chai_update.pdf">
        <front>
          <title>On the Importance of Encrypted-SNI (ESNI) to Censorship Circumvention</title>
          <author initials="Z." surname="Chai" fullname="Zimo Chai">
            <organization/>
          </author>
          <author initials="A." surname="Ghafari" fullname="Amirhossein Ghafari">
            <organization/>
          </author>
          <author initials="A." surname="Houmansadr" fullname="Amir Houmansadr">
            <organization/>
          </author>
          <date year="2019"/>
        </front>
      </reference>
      <reference anchor="Patil-2019" target="https://irtf.org/anrw/2019/anrw2019-final44-acmpaginated.pdf">
        <front>
          <title>What Can You Learn from an IP?</title>
          <author initials="S." surname="Patil" fullname="Simran Patil">
            <organization/>
          </author>
          <author initials="N." surname="Borisov" fullname="Nikita Borisov">
            <organization/>
          </author>
          <date year="2019"/>
        </front>
      </reference>
      <reference anchor="Wright-2013" target="https://policyreview.info/articles/analysis/internet-filtering-trends-liberal-democracies-french-and-german-regulatory-debates">
        <front>
          <title>Internet filtering trends in liberal democracies: French and German regulatory debates</title>
          <author initials="J." surname="Wright" fullname="Joss Wright">
            <organization/>
          </author>
          <author initials="Y." surname="Breindl" fullname="Yana Breindl">
            <organization/>
          </author>
          <date year="2013"/>
        </front>
      </reference>
      <reference anchor="Grover-2019" target="https://cis-india.org/internet-governance/blog/reliance-jio-is-using-sni-inspection-to-block-websites">
        <front>
          <title>Reliance Jio is using SNI inspection to block websites</title>
          <author initials="G." surname="Grover" fullname="Gurshabad Grover">
            <organization/>
          </author>
          <author initials="K." surname="Singh" fullname="Kushagra Singh">
            <organization/>
          </author>
          <author initials="E." surname="Hickok" fullname="Elonnai Hickok">
            <organization/>
          </author>
          <date year="2019"/>
        </front>
      </reference>
      <reference anchor="Singh-2019" target="https://arxiv.org/abs/1912.08590">
        <front>
          <title>How India Censors the Web</title>
          <author initials="K." surname="Singh" fullname="Kushagra Singh">
            <organization/>
          </author>
          <author initials="G." surname="Grover" fullname="Gurshabad Grover">
            <organization/>
          </author>
          <author initials="V." surname="Bansal" fullname="Varun Bansal">
            <organization/>
          </author>
          <date year="2019"/>
        </front>
      </reference>
      <reference anchor="NA-SK-2019" target="https://www.newamerica.org/cybersecurity-initiative/c2b/c2b-log/analysis-south-koreas-sni-monitoring/">
        <front>
          <title>Analysis: South Korea's New Tool for Filtering Illegal Internet Content</title>
          <author initials="R." surname="Morgus" fullname="Robert Morgus">
            <organization/>
          </author>
          <author initials="J." surname="Sherman" fullname="Justin Sherman">
            <organization/>
          </author>
          <author initials="S." surname="Nam" fullname="Seonghyun Nam">
            <organization/>
          </author>
          <date year="2019"/>
        </front>
      </reference>
      <reference anchor="CitizenLab-2018" target="https://citizenlab.ca/2018/03/bad-traffic-sandvines-packetlogic-devices-deploy-government-spyware-turkey-syria/">
        <front>
          <title>Bad Traffic: Sandvine’s PacketLogic Devices Used to Deploy Government Spyware in Turkey and Redirect Egyptian Users to Affiliate Ads?</title>
          <author initials="B." surname="Marczak" fullname="Bill Marczak">
            <organization/>
          </author>
          <author initials="J." surname="Dalek" fullname="Jakub Dalek">
            <organization/>
          </author>
          <author initials="S." surname="McKune" fullname="Sarah McKune">
            <organization/>
          </author>
          <author initials="A." surname="Senft" fullname="Adam Senft">
            <organization/>
          </author>
          <author initials="J." surname="Scott-Railton" fullname="John Scott-Railton">
            <organization/>
          </author>
          <author initials="R." surname="Deibert" fullname="Ron Deibert">
            <organization/>
          </author>
          <date year="2018"/>
        </front>
      </reference>
      <reference anchor="OONI-2019" target="https://ooni.org/post/2019-china-wikipedia-blocking/">
        <front>
          <title>China is now blocking all language editions of Wikipedia</title>
          <author initials="S." surname="Singh" fullname="Sukhbir Singh">
            <organization/>
          </author>
          <author initials="A." surname="Filastò" fullname="Arturo Filastò">
            <organization/>
          </author>
          <author initials="M." surname="Xynou" fullname="Maria Xynou">
            <organization/>
          </author>
          <date year="2019"/>
        </front>
      </reference>
      <reference anchor="OONI-2018" target="https://ooni.org/post/2018-iran-protests-pt2/">
        <front>
          <title>Iran Protests: DPI blocking of Instagram (Part 2)</title>
          <author initials="L." surname="Evdokimov" fullname="Leonid Evdokimov">
            <organization/>
          </author>
          <date year="2018"/>
        </front>
      </reference>
      <reference anchor="Dada-2017" target="https://www.accessnow.org/keepiton-shutdown-tracker/">
        <front>
          <title>Launching STOP: the #KeepItOn internet shutdown tracker</title>
          <author initials="T." surname="Dada" fullname="Tinuola Dada">
            <organization/>
          </author>
          <author initials="P." surname="Micek" fullname="Peter Micek">
            <organization/>
          </author>
          <date year="2017"/>
        </front>
      </reference>
      <reference anchor="Verkamp-2012" target="https://www.usenix.org/system/files/conference/foci12/foci12-final1.pdf">
        <front>
          <title>Inferring Mechanics of Web Censorship Around the World</title>
          <author initials="J. P." surname="Verkamp" fullname="John-Paul Verkamp">
            <organization/>
          </author>
          <author initials="M." surname="Gupta" fullname="Minaxi Gupta">
            <organization/>
          </author>
          <date year="2012"/>
        </front>
      </reference>
      <reference anchor="Nabi-2013" target="http://0b4af6cdc2f0c5998459-c0245c5c937c5dedcca3f1764ecc9b2f.r43.cf2.rackcdn.com/12387-foci13-nabi.pdf">
        <front>
          <title>The Anatomy of Web Censorship in Pakistan</title>
          <author initials="Z." surname="Nabi" fullname="Zubair Nabi">
            <organization/>
          </author>
          <date year="2013"/>
        </front>
      </reference>
      <reference anchor="Tang-2016" target="https://www.cs.tufts.edu/comp/116/archive/fall2016/ctang.pdf">
        <front>
          <title>In-depth analysis of the Great Firewall of China</title>
          <author initials="C." surname="Tang" fullname="Chao Tang">
            <organization/>
          </author>
          <date year="2016"/>
        </front>
      </reference>
      <reference anchor="Aryan-2012" target="https://jhalderm.com/pub/papers/iran-foci13.pdf">
        <front>
          <title>Internet Censorship in Iran: A First Look</title>
          <author initials="S." surname="Aryan" fullname="Simurgh Aryan">
            <organization/>
          </author>
          <author initials="H." surname="Aryan" fullname="Homa Aryan">
            <organization/>
          </author>
          <author initials="J. A." surname="Halderman" fullname="J. Alex Halderman">
            <organization/>
          </author>
          <date year="2012"/>
        </front>
      </reference>
      <reference anchor="Husak-2016" target="https://link.springer.com/article/10.1186/s13635-016-0030-7">
        <front>
          <title>HTTPS traffic analysis and client identification using passive SSL/TLS fingerprinting</title>
          <author initials="M." surname="Husak" fullname="Martin Husak">
            <organization/>
          </author>
          <author initials="M." surname="Cermak" fullname="Milan Cermak">
            <organization/>
          </author>
          <author initials="T." surname="Jirsik" fullname="Tomas Jirsik">
            <organization/>
          </author>
          <author initials="P." surname="Celeda" fullname="Pavel Celeda">
            <organization/>
          </author>
          <date year="2016"/>
        </front>
      </reference>
      <reference anchor="Dalek-2013" target="http://conferences.sigcomm.org/imc/2013/papers/imc112s-dalekA.pdf">
        <front>
          <title>A Method for Identifying and Confirming the Use of URL Filtering Products for Censorship</title>
          <author initials="J." surname="Dalek" fullname="Jakub Dalek">
            <organization/>
          </author>
          <date year="2013"/>
        </front>
      </reference>
      <reference anchor="Jones-2014" target="http://conferences2.sigcomm.org/imc/2014/papers/p299.pdf">
        <front>
          <title>Automated Detection and Fingerprinting of Censorship Block Pages</title>
          <author initials="B." surname="Jones" fullname="Ben Jones">
            <organization/>
          </author>
          <date year="2014"/>
        </front>
      </reference>
      <reference anchor="Crandall-2010" target="http://www.cs.unm.edu/~crandall/icdcs2010.pdf">
        <front>
          <title>Empirical Study of a National-Scale Distributed Intrusion Detection System: Backbone-Level Filtering of HTML Responses in China</title>
          <author initials="J." surname="Crandall" fullname="Jedediah Crandall">
            <organization/>
          </author>
          <date year="2010"/>
        </front>
      </reference>
      <reference anchor="Senft-2013" target="https://citizenlab.org/2013/11/asia-chats-analyzing-information-controls-privacy-asian-messaging-applications/">
        <front>
          <title>Asia Chats: Analyzing Information Controls and Privacy in Asian Messaging Applications</title>
          <author initials="A." surname="Senft" fullname="Adam Senft">
            <organization/>
          </author>
          <date year="2013"/>
        </front>
      </reference>
      <reference anchor="Rushe-2015" target="http://www.theguardian.com/technology/2014/feb/11/bing-censors-chinese-language-search-results">
        <front>
          <title>Bing censoring Chinese language search results for users in the US</title>
          <author initials="D." surname="Rushe" fullname="Dominic Rushe">
            <organization/>
          </author>
          <date year="2013"/>
        </front>
      </reference>
      <reference anchor="Cheng-2010" target="http://arstechnica.com/tech-policy/2010/06/google-tweaks-china-to-hong-kong-redirect-same-results/">
        <front>
          <title>Google stops Hong Kong auto-redirect as China plays hardball</title>
          <author initials="J." surname="Cheng" fullname="Jacqui Cheng">
            <organization/>
          </author>
          <date year="2010"/>
        </front>
      </reference>
      <reference anchor="Boyle-1997" target="https://scholarship.law.duke.edu/faculty_scholarship/619/">
        <front>
          <title>Foucault in Cyberspace: Surveillance, Sovereignty, and Hardwired Censors</title>
          <author initials="J." surname="Boyle" fullname="James Boyle">
            <organization/>
          </author>
          <date year="1997"/>
        </front>
      </reference>
      <reference anchor="Whittaker-2013" target="http://www.zdnet.com/1168-keywords-skype-uses-to-censor-monitor-its-chinese-users-7000012328/">
        <front>
          <title>1,168 keywords Skype uses to censor, monitor its Chinese users</title>
          <author initials="Z." surname="Whittaker" fullname="Zach Whittaker">
            <organization/>
          </author>
          <date year="2013"/>
        </front>
      </reference>
      <reference anchor="BBC-2013" target="http://www.bbc.com/news/uk-24980765">
        <front>
          <title>Google and Microsoft agree steps to block abuse images</title>
          <author>
            <organization>BBC News</organization>
          </author>
          <date year="2013"/>
        </front>
      </reference>
      <reference anchor="Condliffe-2013" target="http://gizmodo.com/google-announces-massive-new-restrictions-on-child-abus-1466539163">
        <front>
          <title>Google Announces Massive New Restrictions on Child Abuse Search Terms</title>
          <author initials="J." surname="Condliffe" fullname="Jamie Condliffe">
            <organization/>
          </author>
          <date year="2013"/>
        </front>
      </reference>
      <reference anchor="Zhu-2011" target="http://arxiv.org/ftp/arxiv/papers/1107/1107.3794.pdf">
        <front>
          <title>An Analysis of Chinese Search Engine Filtering</title>
          <author initials="T." surname="Zhu" fullname="Tao Zhu">
            <organization/>
          </author>
          <date year="2011"/>
        </front>
      </reference>
      <reference anchor="Wagner-2009" target="http://advocacy.globalvoicesonline.org/wp-content/uploads/2009/06/deeppacketinspectionandinternet-censorship2.pdf">
        <front>
          <title>Deep Packet Inspection and Internet Censorship: International Convergence on an ‘Integrated Technology of Control'</title>
          <author initials="B." surname="Wagner" fullname="Ben Wagner">
            <organization/>
          </author>
          <date year="2009"/>
        </front>
      </reference>
      <reference anchor="Porter-2010" target="http://www.symantec.com/connect/articles/perils-deep-packet-inspection">
        <front>
          <title>The Perils of Deep Packet Inspection</title>
          <author initials="T." surname="Porter" fullname="Thomas Porter">
            <organization/>
          </author>
          <date year="2010"/>
        </front>
      </reference>
      <reference anchor="Clayton-2006" target="http://link.springer.com/chapter/10.1007/11957454_2">
        <front>
          <title>Ignoring the Great Firewall of China</title>
          <author initials="R." surname="Clayton" fullname="Richard Clayton">
            <organization/>
          </author>
          <date year="2006"/>
        </front>
      </reference>
      <reference anchor="Anonymous-2014" target="https://www.usenix.org/system/files/conference/foci14/foci14-anonymous.pdf">
        <front>
          <title>Towards a Comprehensive Picture of the Great Firewall's DNS Censorship</title>
          <author>
            <organization>Anonymous</organization>
          </author>
          <date year="2014"/>
        </front>
      </reference>
      <reference anchor="Khattak-2013" target="http://0b4af6cdc2f0c5998459-c0245c5c937c5dedcca3f1764ecc9b2f.r43.cf2.rackcdn.com/12389-foci13-khattak.pdf">
        <front>
          <title>Towards Illuminating a Censorship Monitor's Model to Facilitate Evasion</title>
          <author initials="S." surname="Khattak" fullname="Sheharbano Khattak">
            <organization/>
          </author>
          <date year="2013"/>
        </front>
      </reference>
      <reference anchor="Wilde-2012" target="https://blog.torproject.org/blog/knock-knock-knockin-bridges-doors">
        <front>
          <title>Knock Knock Knockin' on Bridges Doors</title>
          <author initials="T." surname="Wilde" fullname="Tim Wilde">
            <organization/>
          </author>
          <date year="2012"/>
        </front>
      </reference>
      <reference anchor="Wagstaff-2013" target="http://www.reuters.com/article/2013/05/04/uk-malaysia-election-online-idUKBRE94309G20130504">
        <front>
          <title>In Malaysia, online election battles take a nasty turn</title>
          <author initials="J." surname="Wagstaff" fullname="Jeremy Wagstaff">
            <organization/>
          </author>
          <date year="2013"/>
        </front>
      </reference>
      <reference anchor="Hepting-2011" target="https://en.wikipedia.org/wiki/Hepting_v._AT%26T">
        <front>
          <title>Hepting vs. AT&amp;T</title>
          <author>
            <organization>Wikipedia</organization>
          </author>
          <date year="2011"/>
        </front>
      </reference>
      <reference anchor="Hjelmvik-2010" target="https://www.iis.se/docs/hjelmvik_breaking.pdf">
        <front>
          <title>Breaking and Improving Protocol Obfuscation</title>
          <author initials="E." surname="Hjelmvik" fullname="Erik Hjelmvik">
            <organization/>
          </author>
          <date year="2010"/>
        </front>
      </reference>
      <reference anchor="Sandvine-2014" target="https://www.sandvine.com/downloads/general/technology/sandvine-technology-showcases/sandvine-technology-showcase-traffic-classification.pdf">
        <front>
          <title>Technology Showcase on Traffic Classification: Why Measurements and Freeform Policy Matter</title>
          <author>
            <organization>Sandvine</organization>
          </author>
          <date year="2014"/>
        </front>
      </reference>
      <reference anchor="Winter-2012" target="http://arxiv.org/pdf/1204.0447v1.pdf">
        <front>
          <title>How China is Blocking Tor</title>
          <author initials="P." surname="Winter" fullname="Phillip Winter">
            <organization/>
          </author>
          <date year="2012"/>
        </front>
      </reference>
      <reference anchor="Anonymous-2007" target="https://torrentfreak.com/how-to-bypass-comcast-bittorrent-throttling-071021">
        <front>
          <title>How to Bypass Comcast's Bittorrent Throttling</title>
          <author>
            <organization>Anonymous</organization>
          </author>
          <date year="2012"/>
        </front>
      </reference>
      <reference anchor="Anonymous-2013" target="https://en.greatfire.org/blog/2013/jan/github-blocked-china-how-it-happened-how-get-around-it-and-where-it-will-take-us">
        <front>
          <title>GitHub blocked in China - how it happened, how to get around it, and where it will take us</title>
          <author>
            <organization>Anonymous</organization>
          </author>
          <date year="2013"/>
        </front>
      </reference>
      <reference anchor="Ensafi-2013" target="http://arxiv.org/pdf/1312.5739v1.pdf">
        <front>
          <title>Detecting Intentional Packet Drops on the Internet via TCP/IP Side Channels</title>
          <author initials="R." surname="Ensafi" fullname="Roya Ensafi">
            <organization/>
          </author>
          <date year="2013"/>
        </front>
      </reference>
      <reference anchor="Weaver-2009" target="http://www.icir.org/vern/papers/reset-injection.ndss09.pdf">
        <front>
          <title>Detecting Forged TCP Packets</title>
          <author initials="N." surname="Weaver" fullname="Nicholas Weaver">
            <organization/>
          </author>
          <author initials="R." surname="Sommer" fullname="Robin Sommer">
            <organization/>
          </author>
          <author initials="V." surname="Paxson" fullname="Vern Paxson">
            <organization/>
          </author>
          <date year="2009"/>
        </front>
      </reference>
      <reference anchor="Netsec-2011" target="https://nets.ec/TCP-RST_Injection">
        <front>
          <title>TCP-RST Injection</title>
          <author>
            <organization>n3t2.3c</organization>
          </author>
          <date year="2011"/>
        </front>
      </reference>
      <reference anchor="Schoen-2007" target="https://www.eff.org/deeplinks/2007/10/eff-tests-agree-ap-comcast-forging-packets-to-interfere">
        <front>
          <title>EFF tests agree with AP: Comcast is forging packets to interfere with user traffic</title>
          <author initials="S." surname="Schoen" fullname="Seth Schoen">
            <organization/>
          </author>
          <date year="2007"/>
        </front>
      </reference>
      <reference anchor="VonLohmann-2008" target="https://www.eff.org/deeplinks/2008/08/fcc-rules-against-comcast-bit-torrent-blocking">
        <front>
          <title>FCC Rules Against Comcast for BitTorrent Blocking</title>
          <author initials="F." surname="VonLohmann" fullname="Fred VonLohmann">
            <organization/>
          </author>
          <date year="2008"/>
        </front>
      </reference>
      <reference anchor="Halley-2008" target="https://www.networkworld.com/article/2277316/tech-primers/tech-primers-how-dns-cache-poisoning-works.html">
        <front>
          <title>How DNS cache poisoning works</title>
          <author initials="B." surname="Halley" fullname="Bob Halley">
            <organization/>
          </author>
          <date year="2014"/>
        </front>
      </reference>
      <reference anchor="Zmijewski-2014" target="https://blogs.oracle.com/internetintelligence/turkish-internet-censorship-takes-a-new-turn">
        <front>
          <title>Turkish Internet Censorship Takes a New Turn</title>
          <author initials="E." surname="Zmijewski" fullname="Earl Zmijewski">
            <organization/>
          </author>
          <date year="2014"/>
        </front>
      </reference>
      <reference anchor="AFP-2014" target="http://www.businessinsider.com/chinas-internet-breakdown-reportedly-caused-by-censoring-tools-2014-1">
        <front>
          <title>China Has Massive Internet Breakdown Reportedly Caused By Their Own Censoring Tools</title>
          <author>
            <organization>AFP</organization>
          </author>
          <date year="2014"/>
        </front>
      </reference>
      <reference anchor="Anon-SIGCOMM12" target="http://www.sigcomm.org/sites/default/files/ccr/papers/2012/July/2317307-2317311.pdf">
        <front>
          <title>The Collateral Damage of Internet Censorship by DNS Injection</title>
          <author>
            <organization>Anonymous</organization>
          </author>
          <date year="2012"/>
        </front>
      </reference>
      <reference anchor="Albert-2011" target="https://opennet.net/blog/2011/06/dns-tampering-and-new-icann-gtld-rules">
        <front>
          <title>DNS Tampering and the new ICANN gTLD Rules</title>
          <author initials="K." surname="Albert" fullname="Kendra Albert">
            <organization/>
          </author>
          <date year="2011"/>
        </front>
      </reference>
      <reference anchor="Wikip-DoS" target="https://en.wikipedia.org/w/index.php?title=Denial-of-service_attack&amp;oldid=710558258">
        <front>
          <title>Denial of Service Attacks</title>
          <author>
            <organization>Wikipedia</organization>
          </author>
          <date year="2016"/>
        </front>
      </reference>
      <reference anchor="Schone-2014" target="http://www.nbcnews.com/feature/edward-snowden-interview/exclusive-snowden-docs-show-uk-spies-attacked-anonymous-hackers-n21361">
        <front>
          <title>Snowden Docs Show UK Spies Attacked Anonymous, Hackers</title>
          <author initials="M." surname="Schone" fullname="Mark Schone">
            <organization/>
          </author>
          <author initials="R." surname="Esposito" fullname="Richard Esposito">
            <organization/>
          </author>
          <author initials="M." surname="Cole" fullname="Matthew Cole">
            <organization/>
          </author>
          <author initials="G." surname="Greenwald" fullname="Glenn Greenwald">
            <organization/>
          </author>
          <date year="2014"/>
        </front>
      </reference>
      <reference anchor="CERT-2000" target="http://www.cert.org/historical/advisories/CA-1996-21.cfm">
        <front>
          <title>TCP SYN Flooding and IP Spoofing Attacks</title>
          <author>
            <organization>CERT</organization>
          </author>
          <date year="2000"/>
        </front>
      </reference>
      <reference anchor="Kravtsova-2012" target="http://www.themoscowtimes.com/news/article/cyberattacks-disrupt-oppositions-election/470119.html">
        <front>
          <title>Cyberattacks Disrupt Opposition's Election</title>
          <author initials="Y." surname="Kravtsova" fullname="Yekaterina Kravtsova">
            <organization/>
          </author>
          <date year="2012"/>
        </front>
      </reference>
      <reference anchor="Villeneuve-2011" target="http://access.opennet.net/wp-content/uploads/2011/12/accesscontested-chapter-08.pdf">
        <front>
          <title>Open Access: Chapter 8, Control and Resistance, Attacks on Burmese Opposition Media</title>
          <author initials="N." surname="Villeneuve" fullname="Nart Villeneuve">
            <organization/>
          </author>
          <date year="2011"/>
        </front>
      </reference>
      <reference anchor="Orion-2013" target="http://www.theinquirer.net/inquirer/news/2287433/zimbabwe-election-hit-by-hacking-and-ddos-attacks">
        <front>
          <title>Zimbabwe election hit by hacking and DDoS attacks</title>
          <author initials="E." surname="Orion" fullname="Egan Orion">
            <organization/>
          </author>
          <date year="2013"/>
        </front>
      </reference>
      <reference anchor="Muncaster-2013" target="http://www.theregister.co.uk/2013/05/09/malaysia_fraud_elections_ddos_web_blocking/">
        <front>
          <title>Malaysian election sparks web blocking/DDoS claims</title>
          <author initials="P." surname="Muncaster" fullname="Phil Muncaster">
            <organization/>
          </author>
          <date year="2013"/>
        </front>
      </reference>
      <reference anchor="Dobie-2007" target="http://news.bbc.co.uk/2/hi/asia-pacific/7016238.stm">
        <front>
          <title>Junta tightens media screw</title>
          <author initials="M." surname="Dobie" fullname="Michael Dobie">
            <organization/>
          </author>
          <date year="2007"/>
        </front>
      </reference>
      <reference anchor="Heacock-2009" target="https://opennet.net/blog/2009/07/china-shuts-down-internet-xinjiang-region-after-riots">
        <front>
          <title>China Shuts Down Internet in Xinjiang Region After Riots</title>
          <author initials="R." surname="Heacock" fullname="Rebekah Heacock">
            <organization/>
          </author>
          <date year="2009"/>
        </front>
      </reference>
      <reference anchor="Cowie-2011" target="https://archive.nanog.org/meetings/nanog51/presentations/Tuesday/LT-Cowie-Egypt%20Leaves%20The%20Internet.pdf">
        <front>
          <title>Egypt Leaves the Internet</title>
          <author initials="J." surname="Cowie" fullname="Jim Cowie">
            <organization/>
          </author>
          <date year="2011"/>
        </front>
      </reference>
      <reference anchor="Thomson-2012" target="http://www.theregister.co.uk/2012/11/29/syria_internet_blackout/">
        <front>
          <title>Syria Cuts off Internet and Mobile Communication</title>
          <author initials="I." surname="Thomson" fullname="Iain Thomson">
            <organization/>
          </author>
          <date year="2012"/>
        </front>
      </reference>
      <reference anchor="BBC-2013b" target="http://www.bbc.com/news/world-asia-china-2439695">
        <front>
          <title>China employs two million microblog monitors state media say</title>
          <author>
            <organization>BBC</organization>
          </author>
          <date year="2013"/>
        </front>
      </reference>
      <reference anchor="Calamur-2013" target="http://www.npr.org/blogs/thetwo-way/2013/11/29/247820503/prominent-egyptian-blogger-arrested">
        <front>
          <title>Prominent Egyptian Blogger Arrested</title>
          <author initials="K." surname="Calamur" fullname="Krishnadev Calamur">
            <organization/>
          </author>
          <date year="2013"/>
        </front>
      </reference>
      <reference anchor="AP-2012" target="http://www.huffingtonpost.com/2012/12/03/sattar-beheshit-iran_n_2233125.html">
        <front>
          <title>Sattar Beheshit, Iranian Blogger, Was Beaten In Prison According To Prosecutor</title>
          <author>
            <organization>Associated Press</organization>
          </author>
          <date year="2012"/>
        </front>
      </reference>
      <reference anchor="Hopkins-2011" target="http://readwrite.com/2011/03/03/communications_blocked_in_libya_this_week_in_onlin">
        <front>
          <title>Communications Blocked in Libya, Qatari Blogger Arrested: This Week in Online Tyranny</title>
          <author initials="C." surname="Hopkins" fullname="Curt Hopkins">
            <organization/>
          </author>
          <date year="2011"/>
        </front>
      </reference>
      <reference anchor="Guardian-2014" target="http://www.theguardian.com/world/2014/apr/17/chinese-blogger-jailed-crackdown-internet-rumours-qin-zhihui">
        <front>
          <title>Chinese blogger jailed under crackdown on 'internet rumours'</title>
          <author>
            <organization>The Gaurdian</organization>
          </author>
          <date year="2014"/>
        </front>
      </reference>
      <reference anchor="Bristow-2013" target="http://news.bbc.co.uk/2/hi/asia-pacific/7783640.stm">
        <front>
          <title>China's internet 'spin doctors‘</title>
          <author initials="M." surname="Bristow" fullname="Michael Bristow">
            <organization/>
          </author>
          <date year="2013"/>
        </front>
      </reference>
      <reference anchor="Fareed-2008" target="http://www.theguardian.com/media/2008/sep/22/chinathemedia.marketingandpr">
        <front>
          <title>China joins a turf war</title>
          <author initials="M." surname="Fareed" fullname="Malik Fareed">
            <organization/>
          </author>
          <date year="2008"/>
        </front>
      </reference>
      <reference anchor="Gao-2014" target="http://www.nytimes.com/2014/06/04/opinion/tiananmen-forgotten.html">
        <front>
          <title>Tiananmen, Forgotten</title>
          <author initials="H." surname="Gao" fullname="Helen Gao">
            <organization/>
          </author>
          <date year="2014"/>
        </front>
      </reference>
      <reference anchor="Murdoch-2011" target="http://access.opennet.net/wp-content/uploads/2011/12/accessdenied-chapter-3.pdf">
        <front>
          <title>Access Denied: Tools and Technology of Internet Filtering</title>
          <author initials="S. J." surname="Murdoch" fullname="Steven J. Murdoch">
            <organization/>
          </author>
          <author initials="R." surname="Anderson" fullname="Ross Anderson">
            <organization/>
          </author>
          <date year="2011"/>
        </front>
      </reference>
      <reference anchor="AFNIC-2013" target="http://www.afnic.fr/medias/documents/conseilscientifique/SC-consequences-of-DNS-based-Internet-filtering.pdf">
        <front>
          <title>Report of the AFNIC Scientific Council: Consequences of DNS-based Internet filtering</title>
          <author>
            <organization>AFNIC</organization>
          </author>
          <date year="2013"/>
        </front>
      </reference>
      <reference anchor="ICANN-SSAC-2012" target="https://www.icann.org/en/system/files/files/sac-056-en.pdf">
        <front>
          <title>SAC 056: SSAC Advisory on Impacts of Content Blocking via the Domain Name System</title>
          <author>
            <organization>ICANN Security and Stability Advisory Committee (SSAC)</organization>
          </author>
          <date year="2012"/>
        </front>
      </reference>
      <reference anchor="Ding-1999" target="http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.132.3302&amp;rep=rep1&amp;type=pdf">
        <front>
          <title>Centralized Content-Based Web Filtering and Blocking: How Far Can It Go?</title>
          <author initials="C." surname="Ding" fullname="Chen Ding">
            <organization/>
          </author>
          <author initials="C. H." surname="Chi" fullname="Chi-Hung Chi">
            <organization/>
          </author>
          <author initials="J." surname="Deng" fullname="Jing Deng">
            <organization/>
          </author>
          <author initials="C. L." surname="Dong" fullname="Chun-Lei Dong">
            <organization/>
          </author>
          <date year="1999"/>
        </front>
      </reference>
      <reference anchor="Trustwave-2015" target="https://www3.trustwave.com/software/8e6/hlp/r3000/files/1system_filter.html">
        <front>
          <title>Filter: SNI extension feature and HTTPS blocking</title>
          <author>
            <organization>Trustwave</organization>
          </author>
          <date year="2015"/>
        </front>
      </reference>
      <reference anchor="Sophos-2015" target="https://www.sophos.com/en-us/support/knowledgebase/115865.aspx">
        <front>
          <title>Understanding Sophos Web Filtering</title>
          <author>
            <organization>Sophos</organization>
          </author>
          <date year="2015"/>
        </front>
      </reference>
      <reference anchor="Shbair-2015" target="https://hal.inria.fr/hal-01202712/document">
        <front>
          <title>Efficiently Bypassing SNI-based HTTPS Filtering</title>
          <author initials="W. M." surname="Shbair" fullname="Wazen M. Shbair">
            <organization/>
          </author>
          <author initials="T." surname="Cholez" fullname="Thibault Cholez">
            <organization/>
          </author>
          <author initials="A." surname="Goichot" fullname="Antoine Goichot">
            <organization/>
          </author>
          <author initials="I." surname="Chrisment" fullname="Isabelle Chrisment">
            <organization/>
          </author>
          <date year="2015"/>
        </front>
      </reference>
      <reference anchor="RSF-2005" target="http://archives.rsf.org/print-blogs.php3?id_article=15013">
        <front>
          <title>Technical ways to get around censorship</title>
          <author>
            <organization>Reporters Sans Frontieres</organization>
          </author>
          <date year="2005"/>
        </front>
      </reference>
      <reference anchor="Marczak-2015" target="https://www.usenix.org/system/files/conference/foci15/foci15-paper-marczak.pdf">
        <front>
          <title>An Analysis of China’s “Great Cannon”</title>
          <author initials="B." surname="Marczak" fullname="Bill Marczak">
            <organization/>
          </author>
          <author initials="N." surname="Weaver" fullname="Nicholas Weaver">
            <organization/>
          </author>
          <author initials="J." surname="Dalek" fullname="Jakub Dalek">
            <organization/>
          </author>
          <author initials="R." surname="Ensafi" fullname="Roya Ensafi">
            <organization/>
          </author>
          <author initials="D." surname="Fifield" fullname="David Fifield">
            <organization/>
          </author>
          <author initials="S." surname="McKune" fullname="Sarah McKune">
            <organization/>
          </author>
          <author initials="A." surname="Rey" fullname="Arn Rey">
            <organization/>
          </author>
          <author initials="J." surname="Scott-Railton" fullname="John Scott-Railton">
            <organization/>
          </author>
          <author initials="R." surname="Deibert" fullname="Ron Deibert">
            <organization/>
          </author>
          <author initials="V." surname="Paxson" fullname="Vern Paxson">
            <organization/>
          </author>
          <date year="2015"/>
        </front>
      </reference>
      <reference anchor="Fifield-2015" target="https://petsymposium.org/2015/papers/03_Fifield.pdf">
        <front>
          <title>Blocking-resistant communication through domain fronting</title>
          <author initials="D." surname="Fifield" fullname="David Fifield">
            <organization/>
          </author>
          <author initials="C." surname="Lan" fullname="Chang Lan">
            <organization/>
          </author>
          <author initials="R." surname="Hynes" fullname="Rod Hynes">
            <organization/>
          </author>
          <author initials="P." surname="Wegmann" fullname="Percy Wegmann">
            <organization/>
          </author>
          <author initials="V." surname="Paxson" fullname="Vern Paxson">
            <organization/>
          </author>
          <date year="2015"/>
        </front>
      </reference>
      <reference anchor="Google-RTBF" target="https://support.google.com/legal/contact/lr_eudpa?product=websearch">
        <front>
          <title>Search removal request under data protection law in Europe</title>
          <author>
            <organization>Google, Inc.</organization>
          </author>
          <date year="2015"/>
        </front>
      </reference>
      <reference anchor="DMLP-512" target="http://www.dmlp.org/legal-guide/protecting-yourself-against-copyright-claims-based-user-content">
        <front>
          <title>Protecting Yourself Against Copyright Claims Based on User Content</title>
          <author>
            <organization>Digital Media Law Project</organization>
          </author>
          <date year="2012"/>
        </front>
      </reference>
      <reference anchor="Kopel-2013" target="http://dx.doi.org/doi:10.15779/Z384Q3M">
        <front>
          <title>Operation Seizing Our Sites: How the Federal Government is Taking Domain Names Without Prior Notice</title>
          <author initials="K." surname="Kopel" fullname="Karen Kopel">
            <organization/>
          </author>
          <date year="2013"/>
        </front>
      </reference>
      <reference anchor="Bortzmeyer-2015" target="https://labs.ripe.net/Members/stephane_bortzmeyer/dns-censorship-dns-lies-seen-by-atlas-probes">
        <front>
          <title>DNS Censorship (DNS Lies) As Seen By RIPE Atlas</title>
          <author initials="S." surname="Bortzmeyer" fullname="Stephane Bortzmeyer">
            <organization/>
          </author>
          <date year="2015"/>
        </front>
      </reference>
      <reference anchor="Wang-2017" target="https://www.cs.ucr.edu/~zhiyunq/pub/imc17_censorship_tcp.pdf">
        <front>
          <title>Your State is Not Mine: A Closer Look at Evading Stateful Internet Censorship</title>
          <author initials="Z." surname="Wang" fullname="Zhongjie Wang">
            <organization/>
          </author>
          <author initials="Y." surname="Cao" fullname="Yue Cao">
            <organization/>
          </author>
          <author initials="Z." surname="Qian" fullname="Zhiyun Qian">
            <organization/>
          </author>
          <author initials="C." surname="Song" fullname="Chengyu Song">
            <organization/>
          </author>
          <author initials="S." surname="Krishnamurthy" fullname="Srikanth V. Krishnamurthy">
            <organization/>
          </author>
          <date year="2017"/>
        </front>
      </reference>
      <reference anchor="Wang-2020" target="https://www.cs.ucr.edu/~zhiyunq/pub/ndss20_symtcp.pdf">
        <front>
          <title>SYMTCP: Eluding Stateful Deep Packet Inspection with Automated Discrepancy Discovery</title>
          <author initials="Z." surname="Wang" fullname="Zhongjie Wang">
            <organization/>
          </author>
          <author initials="S." surname="Zhu" fullname="Shitong Zhu">
            <organization/>
          </author>
          <author initials="Y." surname="Cao" fullname="Yue Cao">
            <organization/>
          </author>
          <author initials="Z." surname="Qian" fullname="Zhiyun Qian">
            <organization/>
          </author>
          <author initials="C." surname="Song" fullname="Chengyu Song">
            <organization/>
          </author>
          <author initials="S." surname="Krishnamurthy" fullname="Srikanth V. Krishnamurthy">
            <organization/>
          </author>
          <author initials="K." surname="Chan" fullname="Kevin S. Chan">
            <organization/>
          </author>
          <author initials="T." surname="Braun" fullname="Tracy D. Braun">
            <organization/>
          </author>
          <date year="2020"/>
        </front>
      </reference>
      <reference anchor="Li-2017" target="https://david.choffnes.com/pubs/liberate-imc17.pdf">
        <front>
          <title>lib•erate, (n) : A library for exposing (traffic-classification) rules and avoiding them efficiently</title>
          <author initials="F." surname="Li" fullname="Fangfan Li">
            <organization/>
          </author>
          <author initials="A." surname="Razaghpanah" fullname="Abbas Razaghpanah">
            <organization/>
          </author>
          <author initials="A." surname="Kakhki" fullname="Arash Molavi Kakhki">
            <organization/>
          </author>
          <author initials="A." surname="Niaki" fullname="Arian Akhavan Niaki">
            <organization/>
          </author>
          <author initials="D." surname="Choffnes" fullname="David Choffnes">
            <organization/>
          </author>
          <author initials="P." surname="Gill" fullname="Phillipa Gill">
            <organization/>
          </author>
          <author initials="A." surname="Mislove" fullname="Alan Mislove">
            <organization/>
          </author>
          <date year="2017"/>
        </front>
      </reference>
      <reference anchor="Bock-2019" target="https://geneva.cs.umd.edu/papers/geneva_ccs19.pdf">
        <front>
          <title>Geneva: Evolving Censorship Evasion Strategies</title>
          <author initials="K." surname="Bock" fullname="Kevin Bock">
            <organization/>
          </author>
          <author initials="G." surname="Hughey" fullname="George Hughey">
            <organization/>
          </author>
          <author initials="X." surname="Qiang" fullname="Xiao Qiang">
            <organization/>
          </author>
          <author initials="D." surname="Levin" fullname="Dave Levin">
            <organization/>
          </author>
          <date year="2019"/>
        </front>
      </reference>
      <reference anchor="Bock-2020" target="https://geneva.cs.umd.edu/papers/evading-censorship-in-depth.pdf">
        <front>
          <title>Detecting and Evading Censorship-in-Depth: A Case Study of Iran’s Protocol Filter</title>
          <author initials="K." surname="Bock" fullname="Kevin Bock">
            <organization/>
          </author>
          <author initials="Y." surname="Fax" fullname="Yair Fax">
            <organization/>
          </author>
          <author initials="K." surname="Reese" fullname="Kyle Reese">
            <organization/>
          </author>
          <author initials="J." surname="Singh" fullname="Jasraj Singh">
            <organization/>
          </author>
          <author initials="D." surname="Levin" fullname="Dave Levin">
            <organization/>
          </author>
          <date year="2020"/>
        </front>
      </reference>
      <reference anchor="Bock-2020b" target="https://geneva.cs.umd.edu/posts/china-censors-esni/esni/">
        <front>
          <title>Exposing and Circumventing China's Censorship of ESNI</title>
          <author initials="K." surname="Bock" fullname="Kevin Bock">
            <organization/>
          </author>
          <author initials="" surname="iyouport" fullname="iyouport">
            <organization/>
          </author>
          <author initials="" surname="Anonymous" fullname="Anonymous">
            <organization/>
          </author>
          <author initials="L." surname="Merino" fullname="Louis-Henri Merino">
            <organization/>
          </author>
          <author initials="D." surname="Fifield" fullname="David Fifield">
            <organization/>
          </author>
          <author initials="A." surname="Houmansadr" fullname="Amir Houmansadr">
            <organization/>
          </author>
          <author initials="D." surname="Levin" fullname="Dave Levin">
            <organization/>
          </author>
          <date year="2020"/>
        </front>
      </reference>
      <reference anchor="Rambert-2021" target="https://www.andrew.cmu.edu/user/nicolasc/publications/Rambert-WWW21.pdf">
        <front>
          <title>Chinese Wall or Swiss Cheese? Keyword filtering in the Great Firewall of China</title>
          <author initials="R." surname="Rampert" fullname="Raymond Rampert">
            <organization/>
          </author>
          <author initials="Z." surname="Weinberg" fullname="Zachary Weinberg">
            <organization/>
          </author>
          <author initials="D." surname="Barradas" fullname="Diogo Barradas">
            <organization/>
          </author>
          <author initials="N." surname="Christin" fullname="Nicolas Christin">
            <organization/>
          </author>
          <date year="2021"/>
        </front>
      </reference>
      <reference anchor="Knockel-2021" target="https://dl.acm.org/doi/10.1145/3473604.3474560">
        <front>
          <title>Measuring QQMail's automated email censorship in China</title>
          <author initials="J." surname="Knockel" fullname="Jeffery Knockel">
            <organization/>
          </author>
          <author initials="L." surname="Ruan" fullname="Lotus Ruan">
            <organization/>
          </author>
          <date year="2021"/>
        </front>
      </reference>
      <reference anchor="Bock-2021" target="https://geneva.cs.umd.edu/papers/woot21-weaponizing-availability.pdf">
        <front>
          <title>Your Censor is My Censor: Weaponizing Censorship Infrastructure for Availability Attacks</title>
          <author initials="K." surname="Bock" fullname="Kevin Bock">
            <organization/>
          </author>
          <author initials="P." surname="Bharadwaj" fullname="Pranav Bharadwaj">
            <organization/>
          </author>
          <author initials="J." surname="Singh" fullname="Jasraj Singh">
            <organization/>
          </author>
          <author initials="D." surname="Levin" fullname="Dave Levin">
            <organization/>
          </author>
          <date year="2021"/>
        </front>
      </reference>
      <reference anchor="Bock-2021b" target="https://geneva.cs.umd.edu/papers/foci21.pdf">
        <front>
          <title>Even Censors Have a Backup: Examining China’s Double HTTPS Censorship Middleboxes</title>
          <author initials="K." surname="Bock" fullname="Kevin Bock">
            <organization/>
          </author>
          <author initials="G." surname="Naval" fullname="Gabriel Naval">
            <organization/>
          </author>
          <author initials="K." surname="Reese" fullname="Kyle Reese">
            <organization/>
          </author>
          <author initials="D." surname="Levin" fullname="Dave Levin">
            <organization/>
          </author>
          <date year="2021"/>
        </front>
      </reference>
      <reference anchor="Satija-2021" target="https://sambhav.info/files/blindtls-foci21.pdf">
        <front>
          <title>BlindTLS: Circumventing TLS-based HTTPS censorship</title>
          <author initials="S." surname="Satija" fullname="Sambhav Satija">
            <organization/>
          </author>
          <author initials="R." surname="Chatterjee" fullname="Rahul Chatterjee">
            <organization/>
          </author>
          <date year="2021"/>
        </front>
      </reference>
      <reference anchor="Elmenhorst-2021" target="https://dl.acm.org/doi/pdf/10.1145/3487552.3487836">
        <front>
          <title>Web Censorship Measurements of HTTP/3 over QUIC</title>
          <author initials="K." surname="Elmenhorst" fullname="Kathrin Elmenhorst">
            <organization/>
          </author>
          <author initials="B." surname="Schuetz" fullname="Bertram Schuetz">
            <organization/>
          </author>
          <author initials="S." surname="Basso" fullname="Simone Basso">
            <organization/>
          </author>
          <author initials="N." surname="Aschenbruck" fullname="Nils Aschenbruck">
            <organization/>
          </author>
          <date year="2021"/>
        </front>
      </reference>
      <reference anchor="Elmenhorst-2022" target="https://www.opentech.fund/news/a-quick-look-at-quic/">
        <front>
          <title>A Quick Look at QUIC Censorship</title>
          <author initials="K." surname="Elmenhorst" fullname="Kathrin Elmenhorst">
            <organization/>
          </author>
          <date year="2022"/>
        </front>
      </reference>
      <reference anchor="Gilad" target="https://doi.org/10.1145/2597173">
        <front>
          <title>Off-Path TCP Injection Attacks</title>
          <author initials="Y." surname="Gilad" fullname="Yossi Gilad">
            <organization/>
          </author>
          <author initials="A." surname="Herzberg" fullname="Amir Herzberg">
            <organization/>
          </author>
          <date year="2014"/>
        </front>
      </reference>
      <reference anchor="MANRS" target="https://www.manrs.org/2022/03/lesson-learned-twitter-shored-up-its-routing-security/">
        <front>
          <title>Lesson Learned: Twitter Shored Up Its Routing Security</title>
          <author initials="A." surname="Siddiqui" fullname="Aftab Siddiqui">
            <organization/>
          </author>
          <date year="2022"/>
        </front>
      </reference>
      <reference anchor="Google-2018" target="https://status.cloud.google.com/incident/cloud-networking/18018">
        <front>
          <title>Google Cloud Networking Incident #18018</title>
          <author>
            <organization/>
          </author>
          <date year="2018"/>
        </front>
      </reference>
      <reference anchor="ekr-2021" target="https://educatedguesswork.org/posts/apple-csam-intro/">
        <front>
          <title>Overview of Apple's Client-side CSAM Scanning</title>
          <author initials="E." surname="Rescorla" fullname="Eric Rescorla">
            <organization/>
          </author>
          <date year="2021"/>
        </front>
      </reference>
    </references>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA9y9644b2bUm+D+eIqDCOSX14SWvklKGYedNUpZSUlrMsmw3
GkIwuEmGMhhBxyVTlFADP0YP0A0M5l//nVc4b+InmfWtta9BMlNluzHAuPtU
VW5G7NiXdb/2+/2oyZpcvYiP41Fb3apVXE7jj2WVT+6yiYpPVVGXVT3PlvG1
SudF9tdW1VEyHlfq9kU8qZJp08+qZtpfqqSa9VP7eDQp0yJZqHsf6u88i9Kk
UbOyWr2Is2JaRlG2rF7ETdXWzd7OztHOXpRUKnkRv1KFqpI8uiurm1lVtssX
Mc8W3agVjU1exBdFo6pCNf0zfDCK6iYpJp+SvCxoESta9TJ7Ef/Xpkx7MX2+
qdS0pv9aLfAf/y2KkraZl9WLKO5HMf0vK+oX8U+Dy0H8OslzHpLt/FTWajmP
L8tKFV9L92tZzZIi+5o0WVm4xcSjMs1Us+JH1CLJ8hfxnF75fVaX6YDeCb73
dnA2iI+Tqiy8D77N0nmi8jj4Kfza6c/xSdnmE1X531nIi4NJpe4GCV79/Qy/
DNJyEXz2mGYu6OV6UjaNnkO+fbxQeZas/xp83v9mwi8MaMvT3yfeW4M0DT55
MqCDLOhS3LdOVOGNhRu8qrIiVY3evP7W+PPT36f1YGl+G6hJG3zk3SB+qZJF
He7pXZbehOPht36OT+dZmsxK/1tT/fzv21R+XPvY20H8pignyoeVt3TTBNr+
D52LU4CTeFpW8ZlalGmVpKv43wXVyrycBXCzuOFpfp9OGoacqCirBU10q14Q
2hDyuL/iDy9Pnz07PHgh//V0T//X052nT+W/nh88N78+P3wu/7Xz7Gif/uui
f8YX2G/yul8XWV8VabVa6rsOflX0sz/21zZL+02VFPWSUIwX8vFkb2dvR4Ck
IYRVDWFA0yzrF8NhVU+xk6Eqhniofwe6019Wqq7700qpSbnoZwRFX/p8Tlkx
609UmtW0SfxHMlH9z2VbFUme1Yu++pKkqhoTPZn005LAPbnNiI7Il4XIPcJn
hLwRTNFn4pfyGUJY+syL+Fx/J05i86VYvsSX5L7Wi73PxeNV7H3xEX/SEpRY
3/uL+IPCsRBSxB8z+rFtCG0rIAk/NKGpXsRYIZ3b6+Oz91cX/e1nd3d3N5gn
k3KZDaYVThDAMdx/+vR5sOGr6j//V02nxwC3dWGvaUzFx21TVlnzn/8rXtI+
4zyJz7LptK3pTTqEOi5Ve0uHFhNZo9+uqrJRaWN+PKvKrKnjml40xM/bFe1o
NDo+7e/uHD2wJ8KuojBQUa8I6RbDaZarWv+zTlKeRRWD5WQa7JU+QL+8iK/n
Kr5YLHOaCsurwdLO3o3i8pZw7fX19dUoJtrkhq4vR1tP5uL0+N27eKTSlk5m
xe+NmmSc5fjreHJLdJwQ/LRcLDKic2r9InmCvZ3dvX98y7M2myRE4/oEqElW
9GuVfW3pIoh9LpJqd2/TWbzS7zDYEqgvEwbrM54hfkfkKX7PoNejzcl0IDzJ
DWHDXbEdhP+Z89jdo/O4Lqt7IIAeOhrgTAgSl1X5mQCMD4akiXq4zNvZLBnn
ypGYejBvFvlAFcHm6RvEM8zT8bV9euu2ADLXfFL8zfVr/HjVP1PTe1ZOd3CX
3WRLNSH+hyXfDZl0DZbz5e94Yb91wtS/l/kkm/z26GD/aP/54dFhsHr32Nbl
fjRfIrJTNFU2BuZuoCLnp/1ZshjnoJzbYVC1VT+nldK/y2VC/xrmapbkfcxN
pGN4/m54/afr4e/oyn97en55/qcXh5hsdLqzfxAu/X1Bn1Kx+SZxxrgBMjJB
SHJiiNWNarZu6xwLUEkh8FOD8KwDUGdPR1v2lHrbIYHxrpkPzX7UbZK3TBr6
lZq1eUKHt+o3ZQmOBj6aYu6S9+K+VbWEi30C+D6JVUWh8lz40QJDTXmXVJO6
v/upA4rn9lugQu5zMX+OsdN+Mi47x8efZBzTn8SgfDHWXxQAKPOcuFA5nRJC
/+OneySnew+g+IdqJY6y+FSLlDss1F1dleVimC2SmQLWtgucOE35rH+AC6jb
vNHvtAuiXqtPFTNFOrdP9NTOp4O9nWc766RdHsYZAqCIWtE8tfnzqqXzSmlf
bno6S/5p2jZE2/CgygmxiUfTgyQAL1RFxHEzfPKJYzwjJqIWhnuar51lFfge
SQY0tmnWx6S57Az3d4fnp0/+OVgnmbiZJ4v+7rOj3e38Y1aWs1xBrB+Oy/Km
HhJlwIKHn4bn6cH1Mf3vD8fHP/1unv+2A51XSVGSYEf3QtxAH0W91Fz9ddnW
atP6tSKkKrVYmSXqn7TaFIzKjrAFwFeet3l/9+jZ/vb9LFVBLK8gqk0Mb45V
eHs7eLq3fzBcAgpJkp4k/fGq/zlJoZf2FSYfduQf86AQ+ZcGZnGbb1XxYx0f
N/RwSzLMPXuVD8jqO1t1Y3qjtDcIvorWBrjfvM/PLelJFT0DVMJjw91dIsT9
OzWus0b1x3mZ3hC6h7t5p+7i859J+rqLISWnRPlpVfqd2LxjwBprxzZ/ZLwj
2KSXjMz24z2bxdJ4/Z2d2iELo89oo2+KbDZvaKs7h9uvFISBSETRZHXDl5lU
BHY5kYji2eHzo35Gl50lRR/6u2cfWJZ3BGUT3HFb9xurFoWnciEvx9C33cux
fhnC+c+j2L28fecfszzX+/G3/nHgD5rN7xxCqL04e7ddJsiTcT2oiFPT/pvh
W7UYE30ezrLyNinUpwUJ2clwovhGiJUwH0lumKuQDEYaUNJOiAMUDUPFvFwS
+2n6ST9Nm3wSnMCZmYRJ1zVPQrLeXUH6jZkk/qgniZOGwWNQ5HGaXl+ebT+Q
V7LU+C2W6h/Jq4E3Fogcp0Q0k6K9hzUDHr5O6EQCQCC9qc4SYqT9SVYTwBa0
IToC0gBpraQFauNOUvdJlG365ZQOYpmDK9KpqboJQeIDz0ZMMnazxZhN6Lqx
ziR1jNmAJEmsZ4sx2/YjOU0aUgALs0//UE4HwWjAV18rUvxynMo9WMIokqpa
NcmtKrIKmt2cAI8hf8j8hYCBxRBR1ei/lqSUYZSQn0hU1W9JPwABMXv8tH/4
fC/UCU9lopiFC6Pz0UnITLGeKW6LmMmKUee2n8n7PLvNoFvxJv0jeT/wB+2J
AHXOCwgyOJF7tMFZO6jVkASN+qYANVyC098wAR/+jv8QHe+ChOmnh0d7IV0Y
XZGEleVapadLTucZaf7JuGXFnhgB/ZLkMH4SKSU4JBGgUtNcM0B6ASqtIrGK
+X2h6nt4BMkOmdK78o/g7cAftEcAXHmVNLkcwT2oQhqMWtL66fqXLZvSCGtA
T4e11sKGdUnr6d+UlUr6Wa0JKOhIgDpEROuiLJci3LJlh/So6TRLQ9wZYbb4
DWaLs1qbgHGATlQi1CGqOtKzQQ4avbuAnoXZth/RSFWzrNXb9s9oNPAHA8S5
JI21vueIgBpp1RbpnA8GDw53SfraITrbzNsxifgL0vKJe9QtrSKDxA5DG902
odHypp9MaUdETBqt+/bZJCOkp16SthyeziueNdazxtcyqzbf/ef/RdP+/W//
JwkVV29inpkIi5k55pmFDI0w8/aTekdUpp4nsnv/pN4NvLHgoP6YpQ3r1vcB
U7FqsoWqg6PaORqy4W2YEMkcEkp9/UqaRX+uiDLO66YkJWheEszc0D9Y3Q7O
40Q/T5dLuPJ+Oo1PkvQmp9WL6UHBXvYVUPLaTUi3DXEkg5BJv7yhf2w/izPi
7irX+/PP4mzgDwaH8Ypg6Za4uYJc8nz9PPRxEETPWlo8SQ98JJrEZjWsj0O8
OizK2yFJZ55QkvnmLX0MEC1Psll8QpQFZAK04x1hidPlt4tbpVttR+AKx63g
8RzU8+XL7cIltkZUi80QYkJiCZN2s7M3FCMSqV0zksVI/7qbE5FfJkuiLF2t
6+M8S+cO5fUrGUyBUDWZIJAA2nhyJV+6fCImkCd553frN9vfpEi8TfK0zLuK
BI8uNrz1NmtobaOmzJuvHXLrDYbvvGrr+ENJkkFHlHFj4fN/pH3HV8mXugyo
1R8H/mAgDF/X0NSbr0DDp5svp0wIO4pJXd4MhEINsnLI518PG/063l7Xgcs3
BGha7X9VlW0xAVp5LrrTrCKFG0wcN0E3cL5YZlWWZvXioUswXqbTpMrtLjrn
GgyHr48SGKOOibQFLxFdd2PhG8dFWaxIBA6oG3ui/PF/5j6eQhpNynuuAnhC
2mWRfWFUCUyvJDQSiEMcG8ojhtvuPgXj3X36ie/sU5qUazdFVLB/lRATvT69
is+/LHOYxgnS8nJMEsYHWmB8mS2yhi0W2YS1FKJyM0WXukHCCA/hz63CtvwD
+PPAjoTP/mWerUiM+0MWstu/DNxQ9wUixZ9JjvlIy+m8YofCV65bUr3OwgVd
D+xIB04qkt4KOhm6szdVVs9puCWusOpAzfpv4TyXWZ0AJEnoug0lzvgyGA2g
4VKtxsk9HJJoF2nVzWCclRNVZ7NikNQtPH1DmiYZevImU9SjPmSypCaJa17e
qGVJnKFeAwbt4mHNjIQcdZesgE6Kpq6MxnZMTHLFTPIdT09QcjyKT92sDwHF
m6xqiLgRLeM9+gfyxh8L3zpRxWcSXohOTJiq+K+dDILR8MXTFd0hITy8Zx1x
l5Qgf7RL6icZEYp5/IEgFvYd4z13BD8Y7gAP8ak5hAFYcXBRHaDxRwNp4HSe
ZA8IRtvIwLRMM7pojes0z6d2ibnXcV6bEhewZrLnhUSAc/GckooK+fjxOf3z
CZTSbTT7oWv+S7YoeTcd1LRDHRq7yKo58TZFV/xqnkxJQ+lQW390/V2YAOki
62RSdd7r/BCcNlG+LL/nuBEKwgedFNWdSKH4L0aoaUawf3DQT1JCrBn9QWe3
QSxJiHQS1flz2RJsJ8QUWKamkYurB8WNUbYgEJNVdgDIjYWvvMtusiaBszar
y9uOOO6PBufwsdKGsd0tts5lSeRkVSnSne8GMKcbY0hNB0IEoc7qodXerB5L
Spsi8aGfZ2NExBh9JiWxDE5zUoTYkkTMBOq15+CYKDirQ3+4le2cmizTQ3rQ
X4i9L7wActMnhJrxJ3ynhv7EgxIfwaQ+ng72e4MdrkcnEp9UBMmT4NaI9fmj
9gJggiUZ6VbdpxGRYIT4Au2ws0c9w2sFcJi0oXI2rBDTAv/r56yEfg0Zf8b6
c2at5TBcsf3VWHDDc/6gp4h/ykoo1TwFK81uChAGnsIYdB88x1ct0ZBknEz0
VjtirTfY4RYtvTarEsKFYjbvMAs3Fr50npdFkWTx6yy9KW/8l84H/mCAAzzZ
PTeQVF+yWyEG43q4e7S7N9h5fni0Exze6/IO8RnEbzTdZEr7UY0f5Ir/yD7/
0UP9Y1KRqHUCqhhAKEk63mBwOu+O+6M3D2nsJDCQrkxyBx9TuoINWYuiBH9Z
k3HQzzDdG+P/+gBYQz36nmFIQnkWJb3B1pzQqnGs3yAy6Kw/P9YxHA7XZZmz
WvfS0oiLnD3ETjU8FdfqQxfyoaTVN/Fb2kko+H8Y+IMdatHWDVGj0ZzJTYdg
+KMdOq9IlJ1D/H0XuqeI0L8LXFNGSqCz/KqKy2SMK9lgNBCSwQ/lyXiQJmBe
pFPvDwlajC2tXxNpvIURgISG9EY1dCE0OiEqn9LYRJE2sNIkhs259XJFYpbq
N211o1b9elVlSXg5JwSL2rYGTUumZyvTFX/hEl+Iz+QL8c81bNgl/Y0vxa/s
l+KRfAmk/Zo/xlT8A8lkcGjG5zMEeRFBpxmAYyXpbsQWMqgrx5OH9fgTeE9I
9E6/JgF5OBkEo53LTW7aMSkLubrp3Kwb66qaFQmQb9M3baE61+oNdoSZSbIg
gCimAb8hOcaNdTnUnCAuLZum/yEhsC/X4G7tty6kk1KkwECbDpz7oxb+YNJ5
//7dxT3EoCTUZRKwLOtGqx9zkpD6Nuxki9PwFE+B6RRER62PkETsOCeNrk1m
KtYOYzZb2diSBwWp9mY+JiFxjbiOthPXY1JTqhKUJKmb//x/OrcRDHfsEySl
JvGfVkUZuFxIBXRjATab09yCx2un+Zx9kH22ZNUNIW+zt+5llKC3Gsr82dWF
O0w6touibsBrFvHjK7iU9ja6/rX2SqQpm8Tnt5PyhiT6QKIk9TUcD2DkLLnX
qwyGkaREBWq6a97eDZwHDcz987Zh8zbRKSIaVbi5ywQWdJZJrt9fvWAG+8Mb
eveieV84f5mZJNaTPAQi11nRlogjTEJnMtsHJptU0isFm/lbomQBPbgaeGOB
xe2PqrpJFst7ola+08rDmt6e/pcoIrtd1eMCTzMHfKtgC8tSQRk19lW6Y7bN
iZACw/qD0vC86F8lbW72EpIa2ro/3jXbFcmXjGSWZZN08MKNBSEl75JxtkUn
obPaGR8k06fpJN2b7qSHR0fPDw6JzOzsHRymh+nR/rP0cKImaZrsT3efPT1Q
aXo03psOqoP9QTrdGwAo0omY0nf39p8/6/Np7vcL+mj3LGEyJ7GjKRerDWeY
QUO7yRDEvxWN/tKOE6I/2JG/978M3FCgD1wnEjJ2jzUwrQdNO21qNvrAujPc
3X1KUirhBslYUyKaeH+Y0rJm68AB7t5ANxJhygQMvSJZqiHiVpEoR1SXRpkk
b90XafMlL9bf1enADQVGreNqJT7ELeD/eZ4gM2DBt7Jsx8bWzORO7mdNw3Zy
XXAjIIFwltJW6ia+LMub71C222o2l0V2eIQbC995XS6S9Rdeb3+B2PFxrr4g
F2OyQUY8HnR+CfDhdVsnN/dARZ4VN4MaSQYz7Xs1EQu7O4Pd3edPh/Xu/tP9
wz7N0N/Z2d/pP/OPUsKNtWzoIINj+nIExMTZBLafqTYsas0QVkW4qEejy+H1
5YjUc3weq0CUxwOH/hYrLGRnHaLgxrp0JEcoGs6o+4o32CHu8EOSQlvVWfAO
EXdvsEPek1s4GVTeiS66GviDAXyzHLidYjkKXg/qDF7yhWjzixRsfd+C+yLd
3d0jARzTHXch/pgIOh3nhPWcC7mRlbHOknIzzaqFcYGTeAwc/vnDpacRkWAw
adNGIjq/x+v3HXJvQLw4NQbHcPDQMextOocDcw7LvaOjtd23RIU5kUEHEhEc
YuMvA6hjwuXowQmbKq5IfKy37jLM6dmU+2P3eAANTNt+twSFOBrdFgum0P9H
qt8YZsSzary2Rsu0D4y01VHTTlYS62PM7P0R/YCQzlqiqOkIiPZVkvPgDmPE
MsMLdm2P4RC/VIDjl35syevrt5ekTNVLkqMV28+Yyt8XQDlRbAz/Hkt4EDfC
Wss9hkVPSQUIMBrs7rJ/H8HLDcKYtcOh74Xx9nUsMQm/VXabpKs+3ij6C5In
YYyd9ZOly6roGBAQbnWKuV943owLNzmbCDA5Q9aVfACnhDcLQj/9jfjY+8b2
w/sOjS5Anw9tPVdbwq+2BAN44YaMQFM1ximOcRA6HIA1MFWrvtGk+rWCsNDX
Acr+EZ1gczY0h4GD3nQ6mLxpQ5tBR1pWxHU058+jrYdxVhJxIvbCm/TP42zg
jQXncTpXIgxtxrOEGDzne6aJPYu+2KtxGDvDnadDCTvuN3cquam1LtqULlaE
DkEsC/2aVmmOJACbVzxFXDcIS7ShIByUZt9GkJ6osMs8WdXxnK5obNBia7Bu
JjvsopQdC/DppFzRRnaPjraoVXU6Jy2Gyd4gT+4Gk/ZGMf2ZJintafXJe2D4
dPcoRI2XZZuSdN8wSWDz3TJJWX+ublWW57AL9+IR7DQqmxXNqsco8pr2eZfB
NayJ7n3hyYSisovOht2YCU4+gtL0cZ41iEqqtvPVMEqTpODnfZ1qW/frm9VS
9Qk6a1y4wLQxLfazxqEFA3D/2Q79j/SBvefBwez2aNLYTBqPMClAnk1PMmkv
1rNyIJ5BGZ51u1aQEBbZDXYUg3A8wIiTk9P7T2M8Tl3sXUsiycHR851nTw83
ADTuj/TVqqzLKQHwrFIAcrWsnY0fQYjIMNjCPzlHgJYEC2y9AX3LYpJn06na
vuRZ9nVRTkpeskbVpChIM4UZciHyZZ/2AsQk5seMrkZgIAdJ9rG+/u7B06eH
+0e7T/c3bPLYzEYCp0irsBZ/8GZDYOAph1we825HQuKuSaLcfn8EzJlyG+xi
cDAenMlf5hx1vCFRInA0TJul/GUkot3dnWf8j8H+s6ODNdmoiI89fc7AoN7K
eTFDxo4VBLbu6ppUOlpgR042I3YfSJH4mMwKxsydDZZAbGVyW6bEPAczjie5
LWH2ldQhSTxb2sytdpmXyQTBCjtHINkTpZZilXZupwRhRNrz5aLc9tbkqDN6
Vxuc/SwRgPoGddGkwJtwBro3om8zxY5xvBX//W//HY/MKhY8Xcozn7LICvck
KUCylIPqiJbeoA2YY680Z97eL1nWK1IRidXpWECOGnc+WQKWLIcFXy21ad/z
/3UtG1f8MGeebjy37YAyZ7VKltsBF28w4F+nxBhh46OtbtBiNyqxJAYuaS5W
YncY/o8Onx0cHnwKQqgvZoUL/f21ZowPCCmrJmZ1/l4Q/uGN2otie4YJANui
7Pxak96B/hdRPz3xmiVKx9QlyMVaVoqEBCZnV0TGdPLY+v5/rDmB+F5Vj4l4
GNAW6DtvSF5uknuU23+tOe7ImONu5LvbzuEiz9sFYi8kEd7T+d4KN6a9v0Up
AnCzl0mK5F84ic5vk/o+0B7NFQHEmO7B7LxjEfJHA9L+kXiIusfGBTd9N2WY
Xfc3BVzy3j+zoj+usskMrrjS5Mzq/b/BA/4/s+JHEKsTeYHE7PIeueM6W8g6
O0jrxgK7E9Gpukmm0/tljkoh5L8O7E6szu0cDncOIIUsEkjFpNgpnbZgElez
yc9vTj6cHx3s7xy9wjs7hzsHAXIXiK7ll3sm9dRMEo/pJpAfAmGJYKBI6mYV
EzZsv10dxmv21eHbwXBwt6/VstG5vFtyHNdTq+mvoX7v0+3g0/H1v+09vQ7M
bvJjfFsP4uPrf7/ehpzW2bXOhl9/VvniNrt5IEMly2qkqHCC+ly/8mlMpAKO
oS6Gnehx4ZpEa8pbbTxqyrTM4/fjaVuL7rv1nM+r7MYuzj9lhGH4w6HJQLuN
HyCqxnnNAAdPj8gPM6m+46vE5kkvK69fz8u7NKm5SsP2X62nPM0hNxrL55rA
4YkEI/0qsFF7wsFAvLfpKucrHVXJKbtiZ0AoIkwQxDqhuxLAoxrN1qRcc0rr
pPojy0hbSFAgX9I2iNruHAx2Dg6e3a65kBDMYj2yJ8aBeK2TGDZd+BVJ0DkR
X1lCx2rqDQbkxeeiO1vU2gbxkkUzBVDyhdMpcxzTSoJaywWdedMfk8okT/ab
OUFqw4nvO892d/Z2uzsjhnDCb4OV4m1iFSf2fRJuzPu/klt2t7TN8kWkYgY2
PSUu7bgAU8zPSWFSglgDQ5UYtllg11nTJ4FoqZBNiL9nSDVkNx5+Qjzd3Zzo
G/64o9vgZKF+WFvmVda8bsexntva/+J+TBOS/hqbD/R4gE5qhgxE8RVmjSj9
/BU8jK8I8W23qodbzmqfk+vqZHqPn68Drvu7e4PDZ/tH6+DqMksvWKUQaV6L
s2cV7DZlEWaG3WYJAt+HF1fxiGuISe2C7ZzzQ7lK9Io7QqI3GMoDKrm9T0WS
qipZxTtE/IvR9SokV5LY/lnY3KCY1PXOmj3cbfolTQDt5PRK73l9F91QUTYF
1XqJ/n7eDfzBtcAohDhxBYHOGXiD/0Q2BOtA72j9Kr2H09L11QOVDmm//Q+j
608X5qACMVF+jMMfN8Bnsd/sDfbTddY6ojNSxT2UyU9ggr4F/YW12GdIWKNf
+hKkwZaVfrK0tIpoPRuqRT9j8xQTSGgEAXM5f/mSE31rbZ25I8oQH1+9MHQL
1FlPFuvJgLJ2MnkBlijj3Lsv7ZEelT13BF5v0F4UBzWUxWU5J2W02JK/du8h
PUem1zRNTcmSWULfa3x63jcE3USw+Gfz8vQ0/sCVR47lTXsmsEkTNb/W1PzE
f3nTxl/Ceun24m/+5aD7Q5DehrJ6avXA5glaUQ6QkxdDCXnv2bP93afaal1l
C86t8v5gGj8piMcl6Vz1l2VG+AK4wXz1WpIjOBuUPX46tk/H/PR2E0U51vvo
mCi8wUDG+Msi+6zu6pvsHiEN/KymK09SXfHD2G7wbxIT2MIyRCxhVs/7Gww7
zLoIKNj0ZwV6g9ry3iaDDteGgo7MIaH3KQLnSCGze+lIqOF4sP3jl1fb/Zts
gNXJlZkkTWk7BvHY2ktyhjDDcU5SV0ZN8hXdMiEqV5HwUqO53A++1w+kGGHa
rxNn1bSHcWLmNoXcaO74lOcmqQdmn6yK398VXso0Yme38++XVxtOgZh6f3Tx
6vT927dbZE0W1D0XL8eKEwmYwstgrCBpZXgexKfhT22+Gu7t7z7b33nW53/v
rvF62K1OyzxHWjwx+bMExmmJbVsHh/GKUeJBJnCfQJcjEPIedlSSvAQPBKpn
GEFul+2YhLpNslhKQgTEM0Az11Hrz5p8IpQvYOm01mvzhi3wQ2/pimaz68sz
oXpb4fqNKiZVolftg/WbgT8Y2nKhX/bPytH3arZrRcPOVJElOepdEK9BhO8n
2EjSm3+nzfxGyoiRJH54+HzvMKjyIO/h9kbyHurc0HtboXGLKvxU8+utqqMh
xuMUjhFGyilJ4KSGDRUnkKHqwN2E+D0jKZJdhupLmnMNBvsb9GfWEPvtTb9e
IplF9kl4aw13JKMj6rDuF3u7+08DtB3JPPEZzcPqYvzzm3iEefS+1cSBYo/w
myd6QJhDOSi9ef++3w78wY4gp42e5/WyJLwMsiIh0PrD3Y81BJJ3wMDu1+xQ
J1MhJ/SAWVIVd4kOM/QTFfzxMM7i/MM1eOs9MRYEzQyQ86xGvkBKyn8i1f3o
SIenx/CWPu3v7Q7S6aIjHMajP7+LX+ZlObGWDhpbluWU3fv3QyGWFooDsF68
qZLbpi5vk+0KuPbgL8o6Le9ckQN21hm5gJMnBKxqlJmp2mXTL5d8Jez9Muav
4cEzwt+jNUHg1JsAQSOYIH5vJ/gRFaIesO//Wd1w2RFiMnZX/s39edAZD0jm
H1ENoEChlntcXRwAPPCJ50aXEJFSYgzyNP9ac+VUcQz0d56vpzjSjPExP89B
inguft4z3hqdTVBz0CZc2vqq2YTaVgu4zdxZxW83x5i7ChhV4223o0h1fgho
7vsqY1/IPWZVApSs+GubVSRF4HzMHwIue3vPnx3s7w+/ZotxMr5TzrQ6z7iM
CsiQYTyTSWlIVcBw/qJfdiZVehlcU78sJUiJM8TJVozQ8tQsKWRTHVnKjQXK
8du2gLT+kHO/gakBBR1Ykhq0N86wfDQ0VuVPXITqk9lD/Qnb/XSnxp825hoY
e3Lhdl0viYhyjTIbLj/kbad5kt3jBobVy22lY/UKx4Pdn5EmrbaolqzhEo8S
Tz5vmQicxEWRkgdj4pAQ/+ne/vNB3QR07ae2aBL6YzYnLKrjBRffrNNK3W3d
gS3cjRV1KLobC/S+1ypJ4arYbNjYIhLBtftMBGGO8q+lfJgVib9kxecs4Xic
GYBYCt4Q7ITxSSL4jjCBlA6zUl9WxH/ScxB+Y474mEvbfLBzbDTrqDHRurnZ
VIcT+qOBkeK0vMu2UTdJGeRg7EFBYsGMedRCQf2Z1UMeOtwdojaeqdpYD69b
VU+S1fDyui9zc6LTv+3tXMIaU9N/kOBL/zT77dI9fjyWhwNL19ad/5QtZBv+
njl44S7bQLDg8q3LbTHc96HrHgLS9o6GnDT2yZb8GudEUMo2rIk2wjPxactl
Mz2ZnmNVCBxzxaUo2yJ7wAFxgdoues3+Bi8GwWhYyFIH14y/L7pGCoHreEXA
9d7B/tHTsE6uwKtaIMuN7uWujBewkxNwLhB5A+Qw0UN1XLODUmNtstomfdAy
1ynKKRG1RfsANS2WlbU310O6LFpQ/y5Z2eBLuqW9g2fP93YOd/ZRvnJBqmzR
9JVOuoMlZjZDISquYaCC+n5X5nGXo3cij8fH/uMbtRappDFRt2YjHdXFHw32
fXx1P0TO2ykkuqYskENlSkrtQaigLdZga1V/rOaqBttEusGn4tPe3v7+7t7h
mmQ14sfjE/14LzZFHfVGe/FHUslPSLFQoEwIIK1LlkbKaiKaNo4JmbHNRl+K
KKM1KtVywAmXf18H1NflklhUvV26qlQyuUPpPbPhXeyW/n/qI0/9SfsBCCk/
5dl4lXxqSJQmzqluMMTu1kC4CnBPe4bEjXCJ13vxHxJaSbZ28VDbM5ib1Q0e
1hWYr1d0fMU9pS5PWxKv9GZ9gDgdBKMBnXqlo2PvVwS7YbRSW4wjaJNlxbW0
dHSgAfnPCREfkjwRrxCyrqpFkcy6/9es6H+dZ/M261IACJV6nljmiVv0nYjt
bBA/f7QZbHrGH7dBCGwgr5KWl7+uOJ1UUIfutpOCh8WLZ8/3nx7sdMULJmY/
1i7T7kfSgYuYtGKQr7//7b8/KGXopXXkDH80QO6XCRof/LrqaEw+xcBcqyWJ
ySJ0QOtiA8aCqycTMhJLWVbrtPpzSctCPby2msZ3yXaPJ4mR2Y1eYmdD3mBg
MH4lhZ7usU+Ele8OYEbaORiigCEUPhDVBGnS7EJAz5JijUZdm2d67Bfih7bu
4TVJwAWW5W/g9cCOBHD1lgCuTOf/Wp1uoorMU+jWs7xElWNLEdOR0kTnh8F4
VlKwUY4PZn016haZHwOzMf8MRoPOeNcTRkuShjNrMWPBcECajl++u3ggfDeZ
EnVFRVUG1toWJ+eIsVpluS5QPEWPo+HotM/D9N8cMFtO+2fvRv1xAkOybTVk
q6asna1YiE3oGC8vHpkPoFQ5aTBo6nLqfUT3qZCPuGOfbj92a0im6ddxnC2b
fe67cX927Pf03Ng5fLql50ZMP73g9h6uAQTR3IsF0Typ0a6rQ7hwB7iIuZS6
145Ccmz+VY0n4sdY0JN1Bn8GxX336Giz4ziFKV2p6ssAhaqXuvoXbJYELjYg
5neTMvstIifx//b3Bvv7O3tsj63U8rf0f7v8R7Naqt92zwsdfypUxFQTcyz9
E75vJMC6hCLszxyXOKCI8nHRo4smflU+WIwBmQ681w5zt0Pdx7P+61bSUsI3
Xg/sWCfrkmtMr+dY2KHuF9qif6kyuvPuoi4HbtCmKUAVvEYbsLvkdlvijobf
/UFjHmTyjqB7FLoYPldPh/N8Oaz2UZBfYHlX4PuTYNV6PVO5ghdcm0d9gbLP
VS3Foi2JGZzSaYwZ21uKmDWFMMhVw8vlvKwfKgbND/GGiCu1hIXtEjQFMY13
JOfMFOgEqRaHz58eDpJ6+cXfx89MKptEakTKB0MQ27ZueXbDoufItr5n0fMk
H2QFKZlctjrJ+4RwO3vPdvcsqQ20avjMQQ/zlQ4Z0hWRNPmTU96+2hC6PiZf
Cd5hmOdV+vD1cRAOd5JY59mYk3NO52WuvvovXg/8wW71yqaEnP2qRLxHNwfN
Hw3fu6iTscqhas9JMrNn4jTocDy4gA+jl1uq7DurSD0wPbU4a7Mv7uLlfLn/
u2zySdvBf7t7CAbhXca1zvXKY1Qn7MQmpQ+GOLu+VqOkQE8tImyZqjopnlww
X1eCeQD2vze2+1D/S+rz9Rcy+XekcCRcPufvf/sfEtR9isyY4u9/+58PgNk/
VOLmHwwJ+vWVcb4rjip85Sy5zZDnO81U6EA6GwSj/4ISPBXc5kEoxPHAjvx/
Un3nnykuC1jWB3QPLC9VU68WcHm0C5OKe2j88jv7n/QMa2HCmrcgNYu9KU0c
WBdixGG2s7kptDxlhHuQSP5jl43wvVl8uVbl83JjLYYPJZHuVSfjG+ZeO9at
91KlK0KCWTdACLGt3ug/e1eSs9b/cH3yckuOp3BXv5kO1zjjrlEkyA7z6pNq
J8vkd0tJ9f8tqvRxFph/dSOTxbsob7mbAPrGNNomgSqyfq1s9HFB9VVuBbSN
uMrKe6QPpIP1fZ29vbzqH95jpZss8iWDnvT0Qi85NTRrIBBbwRyi8qkXJrZc
SeVK8dBonQehbkbh9Dd8ZadCOU6eyosb01MhWJumikXSLaXEmJF/t238LJtl
DZoysdX2ks5qU3c2Furf0Pnl29W/yZcBSey6kVz2ApL74bNnR8O/7D8/+MP+
20D+e7+Eh5eT/pXUrX/fosZVg+KXHOKMLkJqwiEyXnE14i2274pValyjx6sq
K6v4XUkM+J6eSm9Iai1kNz5cvxl4Y2HSKoHs14VaqfsEs81taGqppqs+je0c
HFfjhYrhzxyhGKQSFXB8okcDqgOU4059yzAVKn6Mvy/pzSfxMQkF9DYCpD5c
XJ3Hx5jinlhJvSpvZx0O0/khwIaPusLPPWGlqB6RVlI94iuXx/4rV8VBfZBn
n9zmPzXpck3bBYRD7WwU7ptuEwWYwNwIwEuANGrioL/O+W0igjeenbb5phCq
B4v9flct7jh4519dHDycndPnVy2pCGt6pR3qvPKPF/wOqnzpi72vcei2i0WI
997OJ+LDm2509Oe316dXqG7ahhe2Jd1V4oRdvZQMPuBlUhATw3+DHmywuv/z
Fzuao4rbrJtDPHI5xP//hYTORG/ULWLluep1sN433lDnnWvurHwGg3jSBi9d
+2NBJ6vL7B5SMoEsNSDBfjottFWZgK0eSs1k9F8CPVkDN/r573/7v/mJXvy4
eBKDdtBgheaG3AzyC6RFuujHm7OknnhNIZPbMpvo7NwF2hQZhfohAHxJQDZN
4FnyT+LlwAx0Du94TCJA/CH5mszmBOpJYM6FEN/5pSv4oxfMW9KAbjNicDfz
m24Rcm+w++UKLsDjm3lyS/9+lxGDjTsv8+Cmd0XaPdU31BF3g+HOizrfKolf
ZWFNHhJJ7VB3oSif9Tar8zIMVToeBKMBTTuRSI9t9T6Rc3ebMFlbTJisab1B
fviUpvXuWubKo1f8I9Gz2zK/7bQH0fm5ROMAf7Ps4QLTgmonneiNNwM31DmH
VwoJM/FrUk5CXe/VwB/svPWnLCmZ1AS05E8Db2z9clV8idV1LtaNBdVA9Vlv
4x9bz1oJH+8H7X+kzN+GAgl+Ez4jAZwGb57hTZYXkM1oC1LB2S0FfU0mqBi+
/uX382cUTHyZfOmwBTPSmX2VK9LQVa06s7uxzvQ/JXWVfF6vCPtTUBH2H75K
Isuxd5cbgkm2XGZZw83DkSSmchNa1w/5H8Elnhv6y4XfXG8GXbEJPloPo9Di
YfTu4l9+TRlpZdBG/ceDse/ppRM20gk/cFm2Wd1/rYoqI/2qyopAUEALFTe4
ka5+hxWhQyF/TT+JNbvFr4CQiPjRQicW7N3TNZcuuFIkNi7ExwP9dlhkKSx1
adjqxcz38ePHvbWkiUcmCuEjF8Ug9eAuQ/rrHDjyO7p6Lm/k9VfQ5by2VNN4
sIJ6QneKOFvOZehat/zRzvmjLBKEjI8qK2g3a3KnP9w5/qyclaS6V1UySbqM
NBjufPKdnKbYtJvw9t4NwmF7gbvcUhbBL/k9FzjJB0m6MBq9lOI8OBzuHzzb
f7pzMKB/Hxw+DbsIuI47f/jD2yRDAY/EyvGKVPbcbx67vXxft6MNOqGtzJI7
RM8fXcNANOz50IYi7OXADQVHYojelvPYysDuyrLZ2+3fqWRZFmzP6JMsleXa
c7pZwxUKBxX37Ur/8QKGajOFTwIviikJeE3VSq0UyLDH3gdMEPi/nEReEctM
buMTAupkcpd87ghq4XjXsv6/l0sF9/X9TEouDA6NDVTmHAEVpv3Faywm4WqU
7ZJkvS9o4mRZFAsSZyVRMKW9aH4Fl2wyydW4/PK/Q/hLxhU6Nb4jCAsw4dXA
G/tnZYxfexMjouKfk3twpybyTgqGdOARPxMR/2LS5HV/y22c4Pfry9GLjohA
Q4H7Mv1uY89IFqFX6+8MacJusHMYH5J5m3PdTeIun1VwiB8G3R+CcznPF6qg
1dT3McoOneViAZbWPn92eLg3wL+f7z8NzqdTzDsoy8GlUq+vhvsxjCXxH36+
OH0QEpOGeEXhLbkDLJ0fOod0QiwRhflH6bxVYVfDk0Ew2jVZZAs0Kz0hBbzs
XIkb6zr78jo+rtO5KsZEEwPUIZ7X/eWeG7knXgdhYEhnHkzbYqJTnPp/bTMi
OXlZ3qBLOP7qVGiN/4AnrIkSB/8rrJG/9g7szmCfJ7U5mWyBMG2YN2C1d3j0
bPdZ4J0O+ynajNPvZS1/RndPWYK/5D8PvLFNvc9U9bUrKB0PwuEwiO/43Yct
eZ64NJJvq1o7Afc4RJooDcL+c3QwQxfzO0QuVciCRM/7dsmlNKuyZT+NbfYc
nMwlTyFN0DiGT+ZABiRy738m/tyg5ynPYaOnHjqx42mTjFG8Y5L9te1aa4Lh
8JbFx7a3tekGovDbepDmZTvxHW1ZkXIV9CH/0td5/cgU2n2Ovhf+jnXxyVM8
iYIW+km4x3iO+Ad+54EtensKL1I+FsXqpvLI4nri7qRNITjOWroALMH2EiFU
XC7pFFJiKwhkrsqhnkI28P5WcmBBB1HqWEGj5Erw/ZqrpYyO3xJNSorCBm8F
fhKzDVcNKkXSXVpWuWEbNkEsHPdpTb/fj5NxjTYeTRRxBLkJ0okn9FaVjZHs
YsNCFtLuol7UOuNCQtP1TfmCc4PmfMhUgfdLIkgi6DscBo6CGSwius4pJGYu
lklWmRIz7CTRts8Bgt04S6wp4wWK4UhbTpKTengtZ5bCf0Fdl3LJfsTqUptT
aCUICIt0OOYS/taqQXKwku6stB3M4G2Ts/qxVFsyIFKFuEFjia+VeiC2wPUg
jsNzXHDBhKKM63Y2U7WpiBqh4xyp0C0dq1lfnOpGsKJxynZoriVxzXzlfyXJ
exGCxIsJloxo6krpkJhB5/toMxBrZ7UJRDV1t8+LOXI0+TluQFrXtCP+k4BG
fNhoMbyMH1+dH3949cSorRcfrl8OBH4WLEpGUYSK6fwVEOVvPzDQ/xL91vtf
FPmNJGpd5ghpgiQ3NVwGnJZqMkNprcvyjs6ZPlK3aDZIO4lcy6we/MN0TV/5
RHoMQ+5M+aUlUsBQSjiIm4gYOLPGHjfdx1hzk2QMJztpDYtpm/fiGoF/aKzW
i1H2ugEW5Cs6+hTFT3Cg+GiKqqYFt3H49u3jVf9MTdky9csvKAkAz+9sbpBD
MEMVMxRVoA17YVWLtia0I0ApbWQHe+t7SGnKiPassMmoRA4YwWgCCGmCuyY5
lSsn56BTOcffWuSNulBNcJuk80zdqg0IPPiV5IB35eG/Rv0ocU1w/jHUh9s4
+vbtw8vTZ88OD375hV9O4klW01ZrDSf2NdfXqgiNLVGDasN4FgTD5tdwnweb
AofgORhvCd16cZXwOdPGAJ+C8pFDeR0DwR/SJRlqoB4X7iJAzekWk3hWlXdY
ANvD6Os0QTJRCyLWtTH6eoeWBo27H9dK8cFJa9BYh+1hlm/fgg7jv/zypOcq
xqMH6h23bL9DOXl1ExuySVSEtE1aNFYZYe+W8liKKjTHI6qDAGvDJfIuMx3h
jaWmxPrMIfMEiUHlxN/oQjQBqXUGNEjzdoLEvML2HyMAmKhyOuXC97TwxPTG
ZFKA7/AvdA2f28JzyirU/fZBlPt5mO4qBPZjlZd3a+BdKZ0tavZRAPXb+p+m
mPiSQtcQSaT49gMDYkAXo+ijsvgF1FecLm71JAug7gRfxFguvbBk2heF3WM0
4zBFqjRTUG63HMyELBz52CL5THSl1sndPTlDpnBoYyG+xTKGDiSnUbv1DTiD
ziyEID/SnJXxZLzSkGiI3wR9vZDESONEMBAbz1tccDEEuq8GviESfdt8You/
q8Fs0Iu1A5TbsSzLqihnVbKkyW2bVPAHBFjVWQUqPoguwpY6WR3fuzbzgRhe
frwWmX49pa3u5QBJWiOOla30Z+kYSvvxkqMJzaM9s7RZWucSZd7N6eOHR7X6
8oj5XsHqMPKhESJWMuFpmN4sLTW0bIEbQXy4jDlAXH0ZqC8JEC5GW8c8uwHp
58VF/nnEAkgaIh48DgafVE1UxGjmxx0Cugj+bqW+piOJ/CYdhblNntXWFtMP
BvRe41ohoGeu2lIPqTzsWFhd5i2vIE2W2BOTGq9NDx/hnI+QP0RnJAQNuGw+
uIpwTGhvrLDYu3mZg1USMQSFBX+nvctiM4YjYLChJwG0A5m5mpiMhcKOh94d
FAnOnXYwzWayOESI3XmMlFgm8AA3SucbSceAb99e5Ulxi8oXnLcHIeOVFGbN
SUAwryazGfFgDlHyuq88MtMw0PF/5RmR0h4HJcJmpXkkpJN5UhOu0weNFvTL
LyxlgYVXKsn7SKWj427ZgJ8S/llaCL6mw/q+fbO5NljqqKR3bD14LXjUDLma
B7FksiBAwmMtbysCh1VA8GWZaaqou9TQ8rivPbvQ8QFhwZhPuBPRL83tRe7T
JY7NOWEziGRjQzVvY5FwZmrMCjnDDN8+IjjBeE33OHzrgmAI6I6yFmmV3OVG
9LhvjkRkXuKZKCtWGa5BcJwY8VpNp0gbg2ahodvKG/TBhZpEdBR0RImG3JSL
Q6YCvFp4FSGFMK2AgsMPERIsdCuZmq4h+oybm5guDd++jS7O3mm5FfzRnCNR
aZF7CRenJIhYqm3hx7KDF8bT1dNByRH0056VMxh+LD+zbu7HF1dP4mQygbQ+
sM4yHKQObcYskRXuuCDqMk+IioGJ0IF5HYnozG9VbkgJKMJvnJhjiVE5RQZ5
maZtZdpwo3iiLvII1dlrx20vIYHAOCaFh941c/4murhycmfDXdPpHW+NMj09
pXcobaEurm4PhvSPp4ZgDSLGDYvAgF5Ap1ALCCepEoGxAvtwLVPoa4oVF8aa
iDFfatY5BKfb9f2hJEeDxTADY1Rbgi3LSxCjIgNu3775XjjAPEOGL/qzNN9m
OXO6dqkFBO/Tt6S5DKzXIiXYJ4WWXq9JBoWwym2mmFBNSAOqVvEj83WN449i
k8vVi4RJ5SjEaU5K5HzLJHnOcVUmJEEgwIVrVTHh30RPe1a3nNH55FojcQLG
io+AA6GRuyJYr/fIRa57kfxhdmGUART0UYslY7FZx1dCbYQG0kOLrM8x4Vrn
jLQUg4VAMctJSOWTJQE26TfJzIIYTG+kDyYVqD3vqmkLjyDbq3OEWZJnatED
+IKyyqPWMEd4i2TcjgKN2FAf6AKkzzX6RJOG6QMDEIsLXIpABHYj4RhhyunP
5lYjR1fmcObAeVXL1GUV6Pb6W6AEDPkOtgbs9VqiXp9RIoAub2UqnbesoUpa
lDhe6KU3Gzdvz38zOiV9ymgpF3WeQG171WaThMUn6YMporbdJNNcE+1Oj7ys
+OFv314fn72/utBWgYjD9tAXSGSB85/FxKQJdDc3gFBX6X6/TJlNwmierOjh
qd99ThoJ8ZpuiWqVnHmQ8fUQJDStVq/WjrdE863Ksnw3Ez3KE3WlXVQlMBJD
z0iOCSNGgeeY87AozFoZ2A0RWK6xCx2izFUl1cE8VVrMMjWMLg302VQROWLB
mhc30YQ0dbmzPaeGe+3iAp08EF9CWa6jH2hpLptskeNYlIuurABi6p19+2FZ
pr/AFhb+jy1iXcWN+UKtGQPk/jxnudMqmloiippyybDJxs9FssKhOrV8YiQF
Y7nJGk65eAyuF9Md0fbyslxGoM3E0uZJmz/pmRrd9mzY1MyylC/eyySQaeZQ
s3sR2+NjblNgJGsnjuQZUzQjydFX9NISpLYTnRLpjb+n0rIvxEh/xGPvmkrx
5LDK8r0QN2Ord9ZwFgEAV0tIxaSvO6fyJmQ6UaSsgXai8NnIGg/jekFHvUTN
xh5h1pLOGFOS3Hmj/9PwmVh9QQkZyVLB+5HMVT8hNeq4wE2QgAZTSsKCAhsr
aZcJc1BnftBKVKAck7ID9tywjlZpM539MC0ClSP5v02ladEB55YM8zSpjc4I
SK8vABPjzcq2JkiY8WpYb5uvatalRJJGRQMjSRt+CmgzZrpgA47p9zS5JXwE
E2KltCgbYq0LtqI3JfMmmgKMDFwriv6LV0JXN9B8EV84y5DhC0ITobpwFmoG
3pTEUrWsF8XC80BrNN/3dFxPURZSQn+TMCgmQExDB0BKFk2isU1mhZqqBb+6
yLickZwVhPBFVlVSxVfLmsaKRrOoLziQmdJqycD3dvPTmdZYfIUlg+jO7lEE
DYkWkFhZJzdq8RQSAAixx7LGhGTIojHHQXOYGrYAALMrc849kssagZDgU57K
TDNY8mvPynwGc4k3BUQ8c9/tqHE0iaFDosPVTnWLrerGYoJbRzovb5RW52gT
NMeDul0AQ6ae7ZUhSy/u+Q3oQF+YciIeJ5s7j8/aZxmFEKHMYgkOYUz69TTj
8x0rnJAiRMckBfg1Q9545QC5349Zv8AXE7lRyfzDXL7SlXCoYGlyzZxs5FtM
o1jTNaiy9bJt+HuEG/gOc1emtpNJpucwVQpEQCM5ZYQC08AYq8g42NdkIQva
tGk0EjwBixKRkWFBTImytB9F+NaZcp5OgI+Ntf6Dq5Veb7QQrvnhfDiw0KK9
bQMporyDAZpwh7XE2zJHscVqNUxL6La3bMnIuUaKhgQn0rwQA23TEXQM5U/L
inBZe9VoOWjUSYSmF7atS5OpkqUz9du0MaReXrO4722WyXaaclS9qMmGUEjW
J86Q3nO7tpZNoCe+x7peh8ETuZqrfGl8NAwFdmt0brMywQ7MFqdlbWqGiCEr
bYn3ipEANA8RITFTjDybMrjKIUifxwrVjFBzegmzmNArVqEUeGKaqQZ2hnAT
vAC+CVPYxfZPxqFpp3z8+PTs3ZMXMf2ztt6IFOXFl7WTdoiqa3kHsE5ardLa
KYcxQJ5pLPeLU0myg5LthJkfEXtqAZRoXgXnvLa2avJW1KzjslhNY+nKODuI
TNCTf20TxCoK1OtpBdpp8e47lgvHQtvgd5YVTkhzxdoembWxFMJ0U2+0D68C
CR+CH0zz7lQFa8068XNeZ5jkWcUQ46QQef6k8AAIo7RClLpHVWlWoZwGCVql
qtAdwLfmpCykshkpiy7smEQtvHnF4c/9N8Rvw/hOeujqzUX9BMEI/qua7dYt
XVa1IvlK2+g1I0hbSPH0ekn6v7JUAsgBrsGLoZvqckxiq8fh3G7lrJdoUxMR
7DJnao/FX1+OhhJ+9xjHhVg0WjPLkB805RtesqDsFfL8wLU1+QAff7j4QOfg
fRbxMwrldmeZUEqzd6NGPf7wno6OgTk+eXWlCbsxeoxZokoFtWXGqpytbUc0
XUChXCE0KRR+BNhkAzXoMavRYpWvWVgRku1B2r8MshGqOV3XkPbCQ3pblmLy
pqXSSpWcu1mLUCi3g0rdEgMPFq8xD/JjrhLxME+AIAm8ATgXLZ7paKZYrikU
MoXB8gah4MHbSxQBvti7jENBWbkGypR8E1qCb8ydWOix9iCaqdbTtmJsibVx
VCs9oolpAAVnZfzQQgTCnTzroiYDnjZkeB2MbgDwHstU7Dvh5bMPn+Bfq+IT
5ypxdgNDpEpdHYDXDGYzWvuck6ymokNCH85ulTbvfCEJ/KsShs30hds1QbJo
SYuGdQE6uxZvzW9mU6gbjOpWtV038wsTxD1plVs8w5wYquXKibgv4kXL1rma
zV+V2LhZZofVz3yPxS+tPpit94R4GweD0Yd5E5YWmysRyYy2XoG4FbMc6nEK
kXTKGG2JKa7CrdYFDYD1oxo1iTZJrTWVVLy93kPsmQQDBRYtRErTBw0Jwdfq
IU7gvjxuWEuxgPeBzr1Z5SYVLYMbtlhBZGog8AslwA2CCNfSZKgvHfjAaQzE
GAOPjW8wHwLdoKtjDIeQCDHOcS4TKAX3HSx6dcB3OaVU0JLL5JF+76BgWoog
aw0E2PdF4XmctEEUvfYyCHZJ6uwyFVeJVCI1oYZVIQKa7GZRmugnTHq6Nqq7
p9Hb41LL5ta4AErhuwFgHWMRS3TGdZkNRms2z4oiSbIU9D0sUjxtfoiHaTbe
zFtA+43Nt9VpFLmPGa4wi7SuN6TBGC+MqVjCnpjYXHFFQ7RbUZro+PZyLSNv
pPZjIxqindDEfELMFeIL0WR5Dh0MIEYQTmSZOC1b+GCt0Z24AT2EPvqiEQdQ
KzYQ+EEfIjRrnQUGXjbbgC4LJOqwgMfvAeOoBNKDxJLAPCI71Etj7VwxLLPH
Id6yO3CiuE50O3VWqe2viOCAvp62fJG8CBSHgkNV6eAokCYxkRVEMW+hb4Gy
kJjG4qgObjA26djXt3soEi1ymBWSEbeDHfYsQRWapeMhiQk+ER2BRmyna5AR
Lq2trUhE/oh2V2OHLFMQMjl34DwKV6uFYah2v76uoGFiAnEg1AwSrhYLJJc8
VAIJdBPytS4imPZ9URE8+kYAedwwvWDw6ZomY9JHKrgsV9rGs1EDRIhZ5Djd
JiMN29nq2vIExmYOZ7Wqr8o4CEvwCLKvCb8IQj0spoqBGPN4cRqRCa3RsT/G
ZFIIn0mCULSaCAz+0+7EKFhscysLvjvctRdMBPjR4RAuukHHRTBsaEVQO6DF
98tyjTaQGnXBqIXOYBlSil5Ed8R9TDXQ6MinGrEdoZRHV7bpyAmAInZ6bnCc
9kRFgtGLV22uW9wMxrR0FdUIt3f+PPGkavZZMFfQX+tJJKMXd2YDcSP4SbVL
QaivmLTpGGEaMRaOWoLgvn1DwHWfjvGXX9hWZAfq5S+/PBmgDm+sY2B6EOTa
MaRONhlwJMOC/TEcA5fRKtDELolugpxMJJ/ewTnH5IqbXwkg8QQgNOx490+V
PhVp8AaREdeHdYnrIA+W2lgWIM3R+YDhifDFyks+5G8/0H2IX2ejQ+HaN6li
myZmy4WPeUHNDOc2jE7LHKQwarNqJ97HWFMl7dktTbuZghDn8ySdR+7zJoCP
o8IzbhNkrsOuTCNmrcwqxoqEuKzU2toUdT5U5YUxR9EPP/wgET0ftCFFB0et
+W0sdNCZFn4QkAt0S0hfZq2AcB66g29Vnbr4rk4gnRe++wiiziMTvVMWvkAv
0Z0uiisylh+9isf4Amc77Q52+VoYvp70bNiXDlPUE9XaRwDfCau39NwKBthZ
JMtHBhFTiV78SF59xNPqRbISSKtENwSeUpPjhURnCr7SVY+RwNHAQ+AF/sbH
1h5Pq2N7uKPYhHteMIRVX3w3zmOs4YkWmlodNoLAN/3zq/PraIi/nxgRXHO5
jp5qI2ZwHmYmia8TgcFSK3PMnQk06SAYRdH9CREKHTvMhmjisMS/Izk9hLsY
RHlhwW09ftCLRYNBg1bAgQE0LTqcdYDHXKqERouSqO3Gvp1PE2LjEoHHDnZS
K7kp5w8qlJrodAQtB0lt6ay70CilI1lK5FtSr9D/NEkZWHtGeM04pFuzhzsm
Xe1kphuB1Ckq0XGgElCIRBVCBTGmcEdiQlCYd0LiboBepHxEjiLAg8GPOYGJ
+ROTtb28h2+N9mPxITaoNHKOb490s5+ZFRpoLhxkzBI0AUt2K1LGRME+ThSZ
IyZF1dLJiPcTmkEUsBkgV1o6OZgYmlY7kVRTsExWtfqSwRXFWMi+f+25pAdT
jkgx5wnh1Fg64lJ3gRdc1qhtQL2IEnPgvUCxbuZ3sP4GIWfGqNRArNBF+cL5
bpO8ZcHv3BJwE1jxguuT2CSZqmN18kQ+VsqnnOqjwPa06OvR4yFHrQZFEFgj
SU1QSS+2fsXoJCHFnt6qicqdJHPCNRJRdJjGRUFaaU9HYJh2U734imAbhTJ7
8Qeo8EkvGiU0GYoPjfH7qGwJ9t4Q/tMf13NobsVEFBr0PFUrkiz+qKob2jnX
Sidx49u3d/QuFxXkv46rlbS+2EMo0KkNvItti3uj3AqhNaFOkNMjw2u/fePi
rXrWgfEppFtmg7GBRI1yMTZGri7AXqzb+K4thgk0d8Ohrd7ryDjCZXVd2RiU
gOgPZvpJxN4mwoAXSa8t3C4oXGcZ1SYCgGgFZDV/r7R1no67NEhAhsfmhWhs
4fOO0ZPUF0Uf55nObH9APiACxTFFsiaP8UdaOnDRFDyboWMcR6YxFQEyjL49
R9o6hKuVuD4nVtScfVXYF6CoGYMFm1kiN7llqhu0mpA5HYsz9js2LtqZF3hq
sn7sx3gOXxsDN+6zUYbUW7CQnqbmOWuG+SoCO+E5DAfziC875jkgjFaD88h1
YLkula64AW8kf2mSVxvntRwRG6dp0IZEsshrf9bCjA3u5Q/ASwaRjsMVvGBw
L6yosBKZ4Uckejwa8UU8MjRYWPNY+SAu0jDLdJ2z3pRx8eiPWcIiIqnHigVE
YY2E4HoKvY/N9LMA6ICG56rRmnVFHyxM5/HImJXuGPTxhAQnqInLTzCWbh1f
ria/cWYQNqpHmkeaw5EpTRgB2wR1uJGxak24opUwEXomcpEnYt/lgHlxKFj+
vhmON3GXi4JbvvVAZmZEwStHe+QUfi4y1uYaDud7p+6it+pLlmJdpEfUjdhD
zeq2VdQhwfPlxydsBBM8mCMcx8qY376dVjCI5Fw/ljP3LFyvLWyqc9r0edDE
bDXm6sutnpsuAKdDLHDSeqkOMIgZXZpTwIjeslVd7Av0vTzhsjOaFFnA9ztC
3KxVE4LUFP3X//b4h5s77kbyBGFYHPph0kFYAoD8b3iQiTzSk0VeHCHIE3Ls
axjoFjWLMvDnGK6zvixDxx3TEYXWNup4fH05eoIQu7wm2q0jWAFcmNBlLbAI
MVE6tTjhCCYlF++LMyXE7TqyObkPffcxG3VXXicHJkJPBvFbUYl0DK/3DaZ5
ylhmhFRIh5ILm1EQPx69u3giNMWLiHK5wmhk0IvPhdTRhvhPCHncnYT/DgOj
QdUMfunaIRpRETehOUfocovelY2O9YAvbXewH3M6ngS8mXOAN6AstGcfNR/0
jf1w/9a+/UAK4C+IZDQEW1wPhbE7CIGkDzP5r1SkaYf2jMu6IGrGizZvMojc
j26zqmm114meeQRET+JZhto2JiBAm0l6ljBpXsnqB/QgZsksuKw0944kfx4t
l/KS6CrpCzOljRy+gkp4AcOvyeIsmLaVhEKluFw8Ho0r0UlwXqTNEjaWCv3j
+MS963jiLJDRveeK9xwwcnrr052nnFPCHG/jVqAHF+4a2Ml9eqUrzdCM9O5H
MWtyeSu6ZBEBtk3mpuIwMYKZiI3nE1EmOCO7ZsewjdqCCi7ByWz8ZIauxaqM
PYl6TuwKBjaT2FNxJK+2LYm2YWP0bjNxOpdGaITneQS/JndfITItkrSRpwQa
FJGPx0ltbR24BSMfdCWvJz0reYd5wYFhHVsh2Hjs66/+tE8iRik67qwOUph7
bsaeMwBzjAzRnAkBC0zKkY82Nmgh0M3oaOfZOPPde48lk3CcTAbTsrSJfhrL
bMadSASzsgwfk+t7QjK417YlTJLiwLRZyaeBPjFo9CbxDNa5q9ELMPtRl9mQ
FFcONBDNFTf17dtF/2xA9HraR9Ekohx9Bw6//BJ1fkfVRbHncqw3WxB0LhQ6
wIODIuwBnzO5zcjjdkqH8umqgQx2iqPdvW0hYy+HFnBKOp+OJjRZUE75JJJ4
FnZSYHFhjFBIJL8uyyXHVCH0zjlJQy0gUPL8zhB86ltfsoE+URDIrhOTOota
tg1nwE/ZVNqExE3uKmxbxN53o+IQLX6h5WsTuM/SisXqlUjoYnsyyIkJJXtG
J9RxDltbmHwAWUPPiaZR+Av8vgzuc8meMolu9gp9162sTudDuUeEdDGkGp8v
63bs9Owekk2KiiR2kU3xtRir3ZVrt10W9BzyDEusl7v4dS05AmZuVWXM+yxa
GHQGYZBTdbUIREzUK2TDnj7LsQq9NCWORwdvkEjfKj+Lrg5VLS+5D2FPRsRk
Gc9AqlkUxKqoZpLqOUgn+kN+4JDxYwUiLNxLJgkhskFCXv2IWstzBk8Fbl18
ybTlgNRyaahf5NGNUL+VHDjmWEjPZ/ZTKy0EhGD92CSG88M2u3MV6yYeMasN
Oo5jNLpkUoP5IBP2dAawnBsUJLbWRn6otLZFQlpjWvWEc79MpK32LzsdQvsD
aj+TMPIyCR+fXRHr75rltGUYt9k2OgA3X4mp3Q+602EziH7geiReRCCbbxmB
RC7iml4S1kWfdOsihozjqyQeQ/IrleXXWisJpAU/KKTikC65hQH6+rGnKTbg
5Co9FA6XdM6ylqPgpQfV9WL9gEeOj8qFynZQj4Dkrr7gi0EepO5p6JYhn9eR
modws4YjvA0BMvl6nK23xjZ6LjjDOasR8sYG6qnsXCquuAhN1nZtOIQLMnbh
Ij41s6FbWxRgx4vZFmodZxzLo8X3aWYjgkqQ/U3Uypnfvn0LW+ax2c3rNse8
OJAInJztogRcl6yeNJw29lZuQdyLQmMqm0/l3/SytsKaSX8+Pud4AsLnOzqK
esmwRHvwtU6vJsy3b+/fv7vgEmK8dvPXkRhkj/ujN/pP8HTCxq+quEzG7oVX
aFFSuFd8vk+/It63cjNwuU+bQA4i42i3NpczShkji5UKxEBTjlldYCui2J3x
X29ZkkFNNPpip6afNXz+ECqH8eNzrXYp0bs+GqWDowJJ6L2B7K5LlTiVBK+K
FopQYwkQdDJsxvKmJbloq235PiS8eYq+4myNNxokz+yW5tOE6PH56WukQUkv
G5qZ/haOtHEvjl7DYORFS0WO13T2x2oFc1XGUFmsNRgyiQ92PYh+ht21aWnr
yi+CwBmJXLMtUFqZ7hrN5TxgKpExhkuEpQvBZtco+ynRDJlIlwKKetTLxsXp
KI7IBPePufSRvikukJNJvXCjXa1Uw2jBzilt+tAJN2xuY2FlRSe++UJivhDj
meaoI1+aj02dH6lKH4nY1SBmELftz6TzhZp7Fsb5345bX5stWeKJT2+EA/gr
HeEn+jzPZrbAEp7jNC8TAqOjMj1PdFHGeVmgwbfcaOQZUa0twPqiRdPrXFXf
5VCbHO5Icrj9j7Eh31jj+i6zvxQjH+HWTHm+j0gAiE80X91n5Nzb0f4rAolZ
UngHBtpogl7t4cnEhiJ8c/XuQa65s7Ik6BVl2rIP30E4C67RJiszv2NK2PMH
gvhY8BZdQopUsEhWa7DJ8RzvUz1b187UuSnUnS4Kx/WFoztVeTa9AL+4TgKj
pyzF34EhkO/FVtZnDfMHI4tFkSm3pIzZ0JJhXkXty5F4a12AjOylCWKX3pfY
yIMySJzRWHddR46QRR7YonPKjQ63PWfS5RMipNvULGbY8NKAIkX+Km1WpciY
JYlfWX2zBsZryGjXbSuLGfhaI4DBoUjBfp+6sSTpPmcX9D3z6AJOY+W5jtgp
4nsGsfotuMKxU0nNWeDbbtnVKdJM19UH+Y4ldhCqaw21nhovSSaKzpwlH6ST
MGpSzxFUlkxNuNg6SfXMiWy81PbEyDLvjg1RA6M3Ir4ur2aXVQs9wyiH0640
oTKxh4iP161IRIalEyyM6U0fYGRsX9D+dHjhGs9zSo4YYIk5mJhaLTJYkh35
K+enx54SHyp7pxZCx6YloG999SayOgwUmi0qFMf1dPSoyGpMtiSBk+hF5SNa
c2yTJ3VRjeDbWR2xuCVBgRqCse3XFgD8uTsCGTJmDN/VHAYPkRJ2oyUCA6xM
m4XHbWEj99E81E/X8f4/ZWWEGCLUqECghC2c4J9n6FJ1yo+HPBCNXdl0562/
sKEtmHYt+4+NX8YTRZT6LdQaX6+wKpdRmVx2i1sH7WhRq/yWM0OrSD/CG+XM
FOJSyUIxFGphScczmsoE/nKQ/msyZbjpOqIfOJDS3IFOpsA7qVbbTCgis2Vi
+jAygHlUnCJbBm96X2PSssoVSl6hYId28LEsp3kP133SVFrqGVqEQzEpxChx
jSqdruFPDht0sbJZHgz/+mzquG0kRUMSVKognIYLz3AQoS4RiZCkTGfQocAG
izWlFI/IV15KAU0/o7PmuHAdvUmIxSK6DnFjndiHiY2XwOVWa9ErjdexG/Rn
vc3mKnBXktpSaHOVyZAZeH03a/Y7+TBiX+LzNR5TXTTmONfZzrfKIrw+axuy
q03soB+pzsflDKN2afUuWgzyVzDpgENPg4wkOakNR7T5hLB9/4RQikX8Akb6
lIOR2jES6Nep9lLrhBqJq/ZOUIfRjwM07AW50mE13TrWyowPeg4ju0VVjp01
OvqHQUJIPHOrAOJF8Eah/TQTnmIKygQVi0zy70gJwyTiVXCfValm5pjOyep7
VubFyUTeSXqJemvEK9AiwJNmbJZXd1EgOZpSHpIZ7pVFSpbc6NYKBs7AmzUR
J17ytRBJEiWEFym53tlSZzH6nDsMV3SBG3ZpdAwcGJ+MUXnQJ2eBmcyYPeDb
4FR8BHn41MMGFK0fFELk9CsbqFktdsVZy752TbI23KpX54ckp3WuAVy1x6JL
VnCc5Sb+or6wky3idsc+4U0Kv4qCTZHyrQAuPDWfyhBbhSF520j7SNSyByEM
4jB0YNGuTd690fnDhXtlPjgKiat+S1NwmOePTY0+E60rtWY0qImKpSauYhwD
wdopiy+VVA3O/O+xxhFJNJEdhWVaDM2Smqszh+uWy4XpqtL0p+tCGUmktWba
puzl0hiPhIxKMlJZrQLLKR82AfJzqXl8fqrjLp98h3g00W1Y3bY7XrdovNoA
H2D8NgOTFKGZ5ZfMD5GMaLxQoauORCVVTBsT5sgBg2wBVJiDSSapKXPlDLDc
PFVHG6Fu+Jy0T5IlKxcpeXJy6v4gMWuSg8raqNHrMvJCoERpqtRtkpvIW9Ed
V0vlcdy1wLU7FXFtiO6Kw2Lgoy0/+UFY9ZZvCOHonjTjpwjuthIJfGeoEg6j
E5xOYRVpRAL4ZTZshRCxW9nwOTFgWY0iT+5M6ikTGpZstbND29Y4UsbfIKwB
NrJbF1Wyu3Pl5yIpfwfoljArU6JOrJeiy/jzmu0PtCGItmRZtsnk3fwGk65H
ZstZvnpkPxbpNyDy+HUXWRGUOSVqTC25Coutd9K5k+jxxenVE9oKrpdD4jwI
FR8gFFMOvWi6RR4Tjv3xd88C7ubNdNS9HFwoQqyXRqbMxOrqugCwGwlmA4/+
Mm+xqF3Goi7ayFX9XHAUxRu6vglsWcZgvyQUFAeyj5sRw77lBo4Dozx2wtwQ
THqmwZBBZ2Wck/SvjIOGtGz0QjdA4TN/m6HKXzltRF1LUABv4kxArLFyfOru
zk5vZ2cnJurONJlO4OfBm4GtAoPgb4RJjVu+GUcZok2UIT5v4Zyjy6aDEBQI
Et5/HsmQ0aqjRTkJcgfDa3PhF05vBCMVqdIWPOxFzAMXSXUj9YT9QoZcpWGa
aCFIsyncpqXqCL9gPqhzVtkE2zakzfc669lCZrSD2mUES/GTlROe2e6rRUeY
W7ULlTVC9j8lxU1kdmu0iSTWySOm3FOY6irEh2+SuGCTB3ZXTeD8JGV/KS/V
uGqR1QKm0HPQ8mOtdxzJjnvxCftH7xKut82qV2DgM90nrfzWNrrQgLbhhtzH
hm6dSHRN06JvkBdSYpsJkOZtg4xEpdK1MpWO1j4nXSer5376JJMJFyYA06Z3
JJrycosKIpxj7ZU1c+qb1mKfdj+OM3YmY7U/1nZxOmBPhz1ULkDHg1cd+wuZ
qi3sTvQDT2K2TbN5LZjAGMl5QYRHN0gjdmcqswJenV5i4ng2SXqSSaDL9oZl
VkXwAn2SygY6rk+EDSkROVpyZI3u8sJOdMu9iilR6ybyC7adEuIRk1hJwTAt
WKY4oVvXtoBtVFAuat1jBM64ul3YSIAkbgtuOQI/UgOSc1kukto6Sc/7Em7L
HrxIq47WLMUn6ittE1955ONAwcUlp5aiD0wJOx3XRp54GlG5zArDD/wWEFg9
FkIwR+D7Bp3mmdJIneM/Zsiudu5crQ/SLxKkzZQGZiyYEtdySSdLOBfw0+PN
BaGfBDmAmZhjbrKCMVIHfSQkoKxqjsVfIXbU5f26uoJES8ZasBf2BOtC1A0D
kboAuZLrD6J4NyYRRHxUHE23IkzCeXxM0NgD1Yv5PH4uOIiCLaAuAJ5wTUJF
UBZ4MUb8gcn/lvo5rDgl3LqhCfPGo0eg9Y/i2hTxTyA8Ef5rUyvctTqfw3Y0
4lhhruwghfJsm6XNpH3Ai9NQ5fmoZBObEkdN6pQhdJlYiRFMwjqip+jZO5tI
zUU0yE1SRCWgeHJtolJMgUgCc51ancFrXut4Fb+motV9r11AFbKloT+Aj+hC
Y361lsd/KEdPTCsVvovIyrMMTfxV5rVcpAbc1aWBSCUkuxeJRUEuQqRNQahc
NaH1mIrLOjfIJY3UdJ2mfoLm64nOLolqkodgq0St4THni+XcXk5uU6+OpTla
YN6iDp309OAa+HVUtdzFDIJn1XIkgO6Rjib0ujT144sz2r8XmtZxvQcWHAAD
JHTbkERkcGfqX0vEtehhtA4hU8KFYjp7ffSELleEnCJNitSrQ6p1n61O1QAT
hC1IIjhkqm2zz4+BTxgMN1kJIgZcmY9Li5JxFyWRwwHCIZnfkQlIceYZwIL1
zuGNAND9iHFTpT+SKK1wCt6CAfbmoZwHOESiIBhb11xjswCKlvOcYlkKvuV/
RqMe45SJ8xAEN+WxpYo1o5v6wlkD+qR9s5NpFhWNxDjDccVcPF0qk3vGN15P
GDy1ochj9J6vAlS97tZg1SIdDamqEk1HvD/GxQImv/HUTbXYiUkJCpyIYofX
gZQiPUvAGVM60RJ14byBNC8y4ZkwmbGhHvOheK2qljR/wyIj53zpFnBek4sO
hqAzFZsSVz/Wa7V9ejD93NVA+E6NJavGJeYMahtIGHnFzWziKp8mlqlDM2np
2RL2mjbjEqBc7E7pvl5LbZhWDV2tH/0vDtYwn8E7PISZJFKmUDK1OhdiyN63
b6/bOrkx3TygftTLzNWv0thp0dALr9VFGzcm/Eeax+nIGSYdXNrEBNNeP5Sl
JtZaIyH7ZZGkRLZxosNU0pPAEXaLPmCyBjZz/hYWePZupEsBwnDHNOzD6Fo4
2zjh3yOj7NWS9WpSQHpSTNn3sq+lz2GEpLumRBDezlNJnS7KYrUoWy/5d2O6
OZOunNPjMuWnlcd+WrlxXwvPwv6DNo1BOKaUZ4v1inQaH2kXsmbzd2QXKJzt
DdomJzf2cVyU5MBrhysS/9Z2Hn3PzjtzSzgPAE5mjqYGMEzUEe6u01Rtgh4L
uWT4IVpHau+JuI4cJ9TMx83oTxnjAOcXXUtMGF99mqO3pqhSJr2e4zzPm3lG
IniiK341bFflJoV8JVxSRMOdmDNYFBlP6z3XcIXEzyyfKJswb5P1IfRGbJPx
FFqdPWXs1TR5zy/5EZ+dlaOQ9MMfwIVoTF3nhLsBYwF9FkIzbRrQ/cVYHKYz
mk6dseQCme11yQUMw4TJ0CXGhu4SaFch0Fp4ie0oY+CNBXDTHElSiyED6IOy
JeaMGmhqo7K2P+Oegx6J0gfiS7Qm3BiuA1LCYE/Soqm2rUumy2uU0xTrnWl8
0MmR/PaDLcKxVmxIFKTRXEqQXsn8Fy6UfVOBgXVdyhbxIIYqcpqpSF/rmdfb
7eiYjN6D9QsCgmxK7/c4I0QXZ5IuZbaeFAzh0Vq1FBRf6BSSsR3adL+jrEDC
Gs+xzFCIJOqIBJLCBcQYK13ZJGEzildZSDtl6fZwR8Q82DMCsfxFUL6Uy68w
m9+kNdJqz8KHEYZtHkacXdmOhelw/9JEoJZ1sEnJnkRdVjZxwSg6SH9TQTVk
nZr2Riw5QKSAvUv6W2rZInJxLUGFcXpTy+c6rdyUTQxqxciTJuPTvOGfifig
kL7TcEcRCV4udD4zW/J0QWVb4qCY6oAsnTgQTAEpn2bOrY3gigvRWBmbywRh
b3rLVqzzPT7ciAWCTRY0d+qJdi/Ap4lgWGxKSyRaAQsgr3cPYmi500RGe/fn
Dt2KXGDn6H93duXq0gyCP12Iu8tx8+LYrTP4i80Y9sPzw3j2Xedi74uGtrki
E5sFdWaSxMQgtLKWjqxc306HVer6k+y0Ye9hISXTNtZekNA3sdD6lSls94Og
RKT9Gbsc66JLsS66xAgJ31TDhTDVur3Ca1rkF3ES7nR1MYhPPFRhb8sVp9r+
tc3YMSdrkNAaSYa1d8YfF2Fa1hE/doUAh/t7+gFuWXt1exC5bmKshsfD3b3n
4TNPXcexJ56BVs4+Mr062OghJJLoVmrqZqL3eKnPwdixdP83UjVrrpx/RQq1
lBUYxH4XNNMA14v+TKsWPr0LU4AMBaI5EyzQiLV6zn4VZWIh2GBvc/BY3FmL
JQAc2GaCXHI+dqnnVhSkvwn7iCfo+BbZB9Nzvz3bIA41AT4p3T2gu0/kUxEU
INLQ5o35idFM+ZCwLtEaVfllpX3enaaekYnR9CkfxGxbfDX053bZWBSkpnVX
6dp/aPsBNx5yfdG5nO7FlSjmcQT6gbvQlQJAH/v+fDPTcJLZi66pZ7bNaUy2
SaC5KqJsOlUbNT4dley4C5wQHyaFMqzobis6Doz5YRDkwgwhqGozK3Xsv3zw
+U4vqv1imxbajOuDQ4yMPd3TohjHpCg5gl+suFeXuem0TZNKcjiH9WBxUsKh
s4aDg33pihUZhZW7Df+1lVjDMI0EhbLR/Yc5uG5Q6swrSFQrCHtRrMWvQ+ze
17wt4GZYoedHZ6bZM83YzXd13HvYGQoe5SV3SxBxxPWfiJ7v2NJsfrlA0+3G
g8A7a1AL+zdLRLTgwFYD3lqtTxu1SoJ25NQQ+BpB8eUGpKapO30m5+OVic2V
FYorhqAMPVuYNZj6JFwTUYrK9b10Q4m9xKR7h/Hj0dvrK6kvgxBeUW1sb2AG
JVNYAaym/tGRK/b9o1mFiEZZfcN+NyRM5yDJ2sWIlmuSp18KdTXlAuru5K40
sTRYNAZYF7Ko55YCHNodYrtxrsnxoBPcF810AmeSDAWndrKHzilyNCVsGKdr
P0R+RRdTlDY0uJOMG9wxlFFdU4EZsSmCm3j15Uau5mzi5C4dHKsbFesSo9Y5
09P1C4KoMahoYu62tWm6E8L5z0Hz2vK9VhTu2BQXdAJgGHlkk7/55tNyBt8Z
U2TQXdt12qcYkAJ4o87dTIRsOecjS4RAaZ+TrS5EH6vFkeYVhWUn1SpHd0yQ
EOf2MPVYey43PezYpJOOGH3tsiRTTORuUjo/q3xxm904I9CI5r/NCuVMPhfW
dMMirY5qDfvKN9KdpzGdvixeL1Di0VZYYFFA7GbSs02z4rAjWlAUjOHHgmjo
ZNi0CHbT+w41kY4i4PlE3Za5yMvcW4wWwUFjqWMgftmR9dnRVE7luJqaK7qC
vtu4LTuZSRozD0/Ynr5B7NgCbl7yBsOvn1IDSTZK7OtjnYirR2owR6nudGEb
FuvHgmBX29YdvlzFFJw7A/C1GOpDamJwAq4p78pLXZFCMo3qcB5XV2fzJAN0
ksOKWOCzRYN0mw1f6S7UrJQvJJ4Jk7dTBIJBidD5WqRXmN+9YkZIlLLb2nCx
JrzLVhvrHCi4zIwtwHJ7zoR2zfkDHxmAXVyMr1pdbbllUyI1Y2kkt9HwtQnz
jRhM2XCcrAKd1G+U17NVEppOypu0mIQ0uGUFVoFmvBLENkK9M5NtQnRG5OtS
HAzdHn6B+qZprn7lj+UF67mj0WUvkLq9SOekRlNVQ7oRF6vnd0lqtlKAV19D
NCDbxybIu4uMa8CTZVh4MdqtpTAD1y6MzVocJucVcRiTuLOp9APcOCgPL77a
iU0gMTmnPnF3/MwLqfTLWLjXMzYiEzlDJx3xkQwcU3ehG7yjbeQkc/l5UvM6
+tGKlz965QjShLRJ1uONGjvWkGm7Fxndt4fwk/6t4qJoXQlCEMiDIY64aAvL
OSceRffS+nQsYO0RRq+Mns6TVK7umrnrKMz71e22jOyfm3QF902doFkv2JNT
IdEIvVcI/l2HN1T44JrMoYXCtOSwydo/6u/8GHubAhXVIoVv7bHmAQgG22Ki
tyGrK0jtxcfRZiPRx1B6o01tN2eYVmDPZkdAoUt62yZzDlJqU3VDds6au9UE
twCUxmXdK8iQyJ5UxMAOWQzZGEK3ZXORNWkZaxnLkB2/ASveTYPiRqPXvplW
9wmI2qKtWaMKHTg7z3TVKppXyHx3YkvKIxhAVvUaRd96K1i4bvBhVg9VwCyO
YIVEVQEdc/kSDLXzTOqbiBZ3Wi5SjZ6NjYaNRg0HafOsH0bX2vWn9TpeX9WS
qnmSNbR0tl9f66r4a+u3+ex8sK5gY+E0zS7WmdbtjgKwrwsdoTdi/OOzdyTs
ckQBzpRhPPYKNIgCKjTP2gu4lrTNp0TQD9N4sDN7Qx0SEcle9kzNaHYDiRXZ
urm2i1YukpekAi7xv99xjG4p/YFkhWyCgAavZ+y3Hyo96qRSbmogWrFp7Im4
IWAW90Uq1h3ETJLMTEFuYRItEdeX3Url804Y2Z1WiyWd2erWk6wGYMAMSS+N
uYBX1BGd/B6+CDyqvdx+558LCwewOqGjqSNJDje1DNwdwbbszqoTWovAbyGg
nLDByoyYF8Oiz4b72jKitjezaYLnesTYxtpfkCKUauNaFDR9RpG5RnLW1hfG
kRnMYrk0k8n3koY2wfkI6MhphxPocorwQ1bZbAafoF+0j9Em0gmGpqpWYAHi
XCZpvbd6Ee/1mxbc47FOFoehTydZX1w96UX79/3+H9j1ExbNDtae+w8xreja
9ubhQfxSKn6tZeJLoUP2ffBMa540e1Jg78hVMinkGgrVpAMcXAliI3Q4I0U3
BDug1nhUgEZapnGufxBcyX0EuNh1KIrDk67jxrbDglh9OZLc9VK2xghXUoR9
EhIa28njd1jnmuXpcC9bqyWSICyEAThtR/+MvIFU9ibZD5But4gLHb3FAMbG
vW2w3omMyUZA70moAxKNqmtrhkns6FtaSY4He+m0WTTa9FHb/sGoWOK0l4Rn
Dln8grsw68b3NNBunU7WHEaom14XupCH7nft2rslTbReK4G9pdpxZ6p+asii
82eYCx1H9y3NS90WJssRKcnX5GYOYXENCaJrS9gufML27QdQvL5P7H6Jfrvh
fxv6Ea23IDKRAYge6nxmUtT9BVo20Ip/ibhwu6ZWQRlnr965X4Ui9qpQCFkk
EqBjLDUWSMgRG925A6qW5G2QkkYewknELpHM9vLdhZc/d3F6/O5dfzQ6Nvkm
/gm7Kj9zVxuhR/eyzBkXpYNiESsExJqYM93bi8t5+A9B/q/QsMy46Aaxq9Hc
2GOB4T4IShNXsFilcMA6FwhhlvRnn9USAUwuGPz84PmBlkTtzwit4x+fPT9E
JTRTHiNaSP6S6rR+Zbel+1TQ+b1u2rGxpABCYeuqhNyaHXOyp3l/tX4ANn7B
dPqVepG6+ElZ9JdJMw/av9KZTqcynEI9QxBkXRbWMCHXMV5xOQ2uismch5b1
COswAPhIuvWYrstSQ9DZwQgON33c+ED8HXiRCSxU6VSZTiqUfwpeQSDaqefN
G8THhTFrWzMfAgVtvSKTc2JdA5MyfnwnnXggwyZ30liEBV2RCRFl2Bcnrakg
ZQ6B2PB7XGVJyn53Zpa+aLFYtgnGgOQDKBSuoaP9SRCX1BCSLFbImTVpAV5o
wsb4JC52ye1VSMTLNOdXLlrEKxpLciUpPV5REpaAJKF4EJ+b9pvC1JWKO7X7
s8IUREBXc1DXFZcM5bhAtz9JiGTTAfM2/2ZtohCmN1fEzf2esGXR1URzV8vg
14sEoY2UUpR2F96L5pWeiNAz5XVIMm8a0Op4uFxLQ4h7CQpiIgdjks28ah+R
QB5X5NV7i9f2RpCxe7Q32BnsDfaslxF7iB7d3d0NXHqUKan5KHZ1bdhfyc+t
P/XY6V864RymAvrcHdqCExxyTRPuLRXp3Xvre7R79HxwuDvY3dkZ7DyyaU58
OC+iKKb//Rtv9z/qObwO/1GUxGpIMo9/77ZzHG/eAr/+m9/4SiEWN0GC3G9w
WaZOfeoKVoHsTH7dhzd+1t9XFAEQOxTNNrO1JE/Eo6l2RCVe2baOd9ZS8drV
kbLYUxsWSXihm7NzFAYjA1eJti1o+KzTlnslWhqPdz229v82dnXdbRtZ8r1/
BY/yEOkcUklmJpPJ5Em2YsczlqO1lGR230ASkhBTAIcgpDA6u799u6ru7W5Q
VHafElMk0Gh09/2qW8X0y7+HZvFJsEhZh/GVi6uGZ6T5zAokwpXy3T89/QDk
+g5Zlb/BjXm9N0PUqoxxXeLXyvwHJqlY3JkxL55gH2IWqm2MitfS+pVWm8Gv
Bg7Ha73Fz3BzibV+55wM2qCGsLEJV/1HGJ80kUC7cBGlLmhMvM2OstopvLPh
1CN2B1AGZWLiRSUKGKdOaG4CN3pG66WmqT6XE5fTQ2M80tTWy6Og3p39N3Mc
F9eHf53/eHH27oO8nZOR3SsXQ0iLYVhLKmSSllCxCKbsglGpJG3/dPQq42Pz
dTySJaeCTp7TvjOmjWLIMeLM4oCmtsxV3WInYDMY/o/Cf3GmuaqgPnga9kiA
4GQ31Sibgu1ZbSyEy1ylo8pUqNsZl8TUv6MnzQRb8EprbitFN7jMXsl45C2T
7K0yW/5oRZAFyKrivPNBrd2DHg8doiODb4R0QJi6b5+cTrOE7isn6vLZzI4K
dX1QHjkUp0J+pQmMVlAImGue+vpxNXVgq4+YK4TP8OJ5YeVmu0RAXLPZ/n5f
7+okV/As6u4L4T4818ipTYroJeGa+HPQ1trXTsCGI8OqgNB+xpTiYknemJvB
uZ5R9nHXp3OusbLGiG+Z6sqZ6i6XjkqenBGUHne/fPO//ukvogjZ1DCRe+/m
JBnnfPxzl+RSL3F0XlZIBTUdOLbVim1tV+db7EMGFbY7xwpQY34x/uKJJ2x2
EwJiivZnnIa/xhOqX4orTbwzmMPUmWw0rvFBfja1l0uTMv5gk3j88+WHk5Bc
RwghFQ68ZWbG1oBbQ/6dDiR9MZTeus5xEG3aoW9xipuGqpRLSMCanr23lTO/
lhA84wErm3616gFX+y531UwF2in4lrKYliprbck6yBhkDlSx+3fZLjo7CU94
M3WckD1hLtt9zdaLVPwi5D8Lin+eryUkyrYdcvS1ZtCQhaU68bVStyOQcC5M
VN4cpWbfkpRFnrotljBaDr0RvRQpvY2RBpkKWbaTAGjCZ5ppi2AIvvuwvdf3
lk32jVsgorO9kdWWGwDTXzWmqFob6cAelqDoNNk6RYFYkDKOcTLCqm73poml
o2cnUhUMuTfNaUgLZ2kCKc9BvGs2PiFtfvCrPeOnFGCzSKa4nFe8+dX3rxmq
yN54cSYoq4A/PlSrZmmogfQ9gyh4ElYJXiY4nvmHx621CNNA4SAklxXdqo6s
dAhRJOhkKOOgYdxb77oNhFNgMGS7o2s33KThhjzckzKTUqa4qehkO/2+5lwo
i8QxEx4cFD1ueAbY/ZVj1uXQHtF+vvXJgZnfSHV+KgyBsnnBNNySXdW4vzhg
MP1KPTET0Znshp7vL9OXkn8iNb8Te1vSWguuYxInYRTLmspf1TuQEvlfwfUT
buzrP4PBExmvr778NhW8Mqf86JXkVBTuY7pDL+edTgwbnQbkKa0RB6LGF7oC
MVagPPeQe10iV3WphjKvFcq8ViYDzzOwTa3IjOKN86EQEn4h5b2/Xa2hX5i5
Mc5/isM1SWB6EWFMZoRYUYT6WdJa3WKw2yYzm3Vrnh0WpP8g8pbUVDMkeDwl
egPosWj3YMXD9SMb8bmP/rMbroe5fl+tiGh9jJsiSxHEXwOER5O3zYfgHiJH
DCO1y5nb20zEzYZwMfYCu3+II21WfDYQigDemmct90GkLiLZLknH4IzOpJQA
N8tzBc/TffNr/dh/alLX5OSnVQzfjeS/vB0AMSwh3DW/VnY8k2s5Z34KVqb3
TAf++fNeM98a9CaM/J+DA3hhrSQHJAZFo+UCs1nOKLN8eww4R8WhT84UtKAc
oS+xnfyjap0f6C+OA/RHlfXcf9SADSHjtzEC8bLbePKLdZXG62CLeoA0Dcu4
n6I78hgdsNO4fhPqSOBb3wyFZ4G5SL6Zh9imNhonhGtfMGmMY1t4Iv7kHkbM
rLkDFDvUpmsnALaCDhBp/EubfsNhzK7evX3948WFKzC7lJMj0Uc9rK5LkpRI
RAxmUAjJTTb9YuAhkvBdtesjnPdOmyVXkeAFlmPoEJlgVuETxMl912+quL3D
8WmzOklyBHHsq3m92XpDJs+2sqXCiXUzmqJpQ+LxyopVhL94a8yBnr1CkOYO
+suiDEt6ch+QcIgTMmZIm05e1avbZoj/c163YvB607SUxw5vNhWX+tsaoGuG
yrWEs9/FDbujALcoKOjd30HDtEUL52Wnr5HBiAmHq8caZcynp1/IGJarM9+3
9b3i4WijUGxumea8re7nDAeOfXzh1bC6BVNc3A6/R0M6+Vgreon/3q036N1O
T/B9XEMtvpmeYFPX8b/hh6G9JW+gPcD7avuA772PczpU/ImPHe0Twy1ct4/x
TbbUFF91D9Un6onH/6v5dT6iDM+VJRr/evrn0z/Fzf53kZz5o3j1KTz79Nv4
5CfTzKeGyjjSQKoVHmNtpfXwfXyh0cgsJmdxa+fVcTIN0Weo2Re8UD5RSGEE
kceaBmTdIJK0svD6xOg1kOyJX0udLS99/UAv8aFCYaoVXhZw/fP6dlPJlwsu
4W0dH6UNLDykeCSsskQ3mGq8UThauHjc3nRx88KQpr3E1vacidkvHk6dCwiB
VFvAp0sYDfksb3dZI1ChoRj/apON0C1DvoOLmBbhI70aJ/lRsCkt3SVnoj7U
0KC8naSjU9STM9jClJpZwSMi5CKoNK4A9yAqxYLFzSn0OClvtcwvw/tnEeBV
5hBbJKe0qarrObGDq0/92s75orA2jPJj+lu1s5m7tfN9jO6u1I+mKFZ5sNB2
ZRKjV5+2AXerdWqLL2QA8M5mDCc4q/O4rKPzhAR0iYzxXt4ESyxYkNAKWhTo
qvDCdHlGaqKMlNbx2ON5caZdQCFUq0dgA2uMuHUCV+t9JVyy7tajOL+yhAB9
FDR9YymT+FzJLfRH+LvyVEPVWhNeOd0qJhRuxzFB8jE0imPDgE/UtrWpXRU9
40co4XBQtsOtIjMEidUUL0uPdvh9hFEQsNeSU5C2jBrLnqVPec4IeXHueqsx
6NrDYrAmbEDaUW7Ns7uFOXXMpRIGXnZxf74f6zYW/W5SefGzIiTHyesOyLo5
S5eUiOFiJJq8TD2q/CQe5NCtCklu6Rho0YkzjDUKw6lbd8S1A9rn9SjPUSYB
U4ia0XChyDD0irn2pJm8M8KzXWBBsBKJgUeTxHyZr1GH894+2nuDqXewQDTR
3VbpupghA91g9ZX0CyWyLBqRT0qHvegzSd+35Fd4d4kSOnzkx5bJz/0Rgug6
sdGpTzyoEcM28cgzdMuauesem96g5RwOGqoLTiXz0Pthzgd94P/O5FF+h0vf
jtVQKXkFF2YO5Aq4T8QzidAc2sBJW9DBUzfVvb1wPFDNDle/gi9SJaMB013i
uHo+vHSrHXtj9lesP/QeC46oV66JtHTOBgIK9HZDfruZCyGG96agVCDSxa0G
/qz9AwCWm7WHBUgV6oLLuyLlG/qujNToJfD88wVZTbj4DHvpINqUHQ7jxB9T
fCARU/OMHeYD+bqXiQRPXgP3EO2ZtWb4xsRzzsA1k8LZBnTq1YN4gpEseIwT
UBBLhefEUs9ZHoZyctMZWSVevYYcuDHcjm+jOAZGGNrCZ4IP31c3TXq5OUzy
lpKwP592lBRXt9UGXD6+cHX1Q9hvr1T9B2uamYzHbiSZWU2GeZzDuB6HvjRx
mX7rQweyg9302aMvs7xTlnYSJfmerJSTzzBeO+y55nnGI43kI3ukojfWau8a
PR6wGggdK+enW6RCDrFtvCwoSWB/4utxfP/TZ/iiIDX/nQ1jagCY5ob+6RiA
EOe9aWfxWWeSdJscX7y7vjgJGQV08OElwbbuups+WzsmlOL6jbNPRyJ3YrF4
fMqx+7eVTjQGTKd1WQF13aLOoULU9evLAohOW6T3Qu+H38ICjGEgTzcHBRV2
gZmBaKKG3tzuRd2w2KnmMDtw7uqR/31wjps+FGQeztKw3ptp56fy5rZMWGPt
F2E8RzY3RDbZ6MtZQk4FLWQ9G/24/Mdz8h32GDEI6dGgAfSpL+aJvaxmALYS
nxhB+3sj5KMO2EbOKrxALmqDRT0MKyygzD/QF40/+0+PI0b+avn20gnV19th
fWpetW7irjUdOORuWDgBknhbMnEHpT7sD41phcJ9Xm+9SBQj443Xy+zt6IRW
WSv5QKHp+4EvYHy7bfepbrOAqlc9bgcCPUuNuHSITPUU467Mcd+u5iCxe2ZE
kFWOeyezGU/085md70L+jRpWkeSKHpH6WCC7YavnNByLMPPd7Py0qbc3MwA7
ZpkVrCDRNLK505NxLf5s5UD09jnFCHJ1aGjP7T3HmAeQk1zVi5Pp4X1Ei0Ge
maTAknoH1JeV+7y935I/yaePRN3rZySyL2/cFnmG+EyzuTgRi0OtWF6pb5GR
2kPXLMuQHcsZbsWcTWVxVX/iWbUQ+6noI+R0N0puFfGrp+w0uOAG0oUpi7FZ
K/8uE3sWPFDmQYkn2Iuvo9POsTKi9rU9oR4S2PNM7WtkXQ0PJBUnETfQhUJp
DnzM7YuNUegYg4PitNNgYIfz1O/aRbTuLYyzUYDq1IJV4YZVI4YALhWk42ad
7M8VTvPjix+vr05OTsPBN0lH486ciqzfQ7Qv6NaSwFTBHEz/wSmyPNheq0JC
A5b59diJNzIFltNOh7f0De/KbhPv6X9h6ekeGNNR3WInHQXHMoz6YjBISuYx
RdEuZyLx0mCxCrJVQA58VUcvnpUSS8hnwh6ybRmZtIMmpsaQQlq/aD+cjcZI
ykGiPvrA/R8cflZcl8YyL4h6qap1X37zLdK7ZhUZoZQTkTuwo4+R7imsix/a
2HVJCrWexIs6tRRccJ7caVvGq8T/LhN9Wo+I7kiRjybXNlT+YrpMamFPXV7E
NhC7HJp+xPblJHpyV4vo9NUKPPB4wnf7B3OckA9xRPUiFQDELJ2HYhPgcYY6
JF1OwQjOgvKYaM2NL/DA7f5esIJTD+YI6eXlUbYUwRdA0WvltW86UJIXBAyc
EWcxqn0iZe4GnPDmpKCRb6JGvl+tNAXOgYLIw9DZLqTB2Df8zzdfQvokUUBp
PnovJfVFq3GiNjSVBNt3qtlYquiLbn4z9CJFyabHT1j0+oKpmjwLb5tVtYTv
XLb3IJipH4hoSf2U9HVHPBUohI3ZBoxfYWP1xwxKGh3AG+gxuIvQbA6eC6BT
WQkfOyZvnZK/VNWCb/TP903xD2sJQiUB9QX7Ksv+4fCRmfskzbHC3JpzXxiB
iY/IbftP56WX2b9oWifVfWcG06iTZbGLyKwwg+YNL6udxcSIQQnx2GJRW1jM
qoZ7G2AGDCWpWfI6Cy4ddJCSwsV7z3D0OKFH5eTH4SVnnSac3DemeVtiFNg9
KG8teV5gBa66TCx9UKzswISJEECVeMcMTD0NFmQby+zdS0QvnhB3RSladfTQ
hKI7Y9JtXjLf1uD95TfT1Eo+lp4x1uWDL33UTJ7yldsRGKIPRZf509PV4q6r
W+utN/YNqe2uapOU++lq8qZewoaBdjMns3uM8L5RhLIZhB205WBjjzvh5659
393FaLZ1qHmRFsm4tpS1xs7ODxfyw+0xBq2HDYQu+mRXCscRPTQmMASangcr
iBfSVjy65AH98emVadYEbXRag8NsMeGj0r//R22O6QJHY55TGsXdmqfPTCol
FemMpa/e3FVrMx0gdJSGJbddXnsvuN9GuwZ/u+32uKVIScPWpU9Kq27qUZ52
zFYTTVVIDAJsr11XbG4zDA7EKQmqQ9R8N3DpY5Oq40VPzDxSSmNYZhwtTIJ4
LgYGYYoKHbZ4R+hjphifd8sd+y+WG2rMrRL+9VW3QbXtbRwUnizRPRy/ent5
Qmnh5rc4U56nL7EauvznCQD0cs+xgO72BMvRCyyHjSB1uK0F+J8TDkevMKXw
18jrsmhof81oXuQLls0tdElHIqZxYldd6kyax1P4pqEbervq5pjAWcbIZrT4
HLOGbshDY+4z+j0pAMFVSKIes8kifvo7GmY8a2LIxTEcNt0uCzmSVNmz5KjR
czvt3x7jX3WiIF5Ed2s1WUHvZLuLYf3BIbMzomIpuGJtZEaXyxGHmlNQUmie
jQ4xZbWYD2BeVLfGMYvS3kanBDvXKRCdlWPAekOx4UMW5eBeRs6mLYR42HIE
aMkfXH8qhA7qApl5CGtowjrVahrSG1LMUDsawVampWEgOYUTVkUU2xo3zSbe
IZjyqWt0stHH1LZhalId7B/QOySIbVcB1mGnC3bN4bNra4p5+qHJ5v57gJoy
tsS8Xq1sh8DcRNtw3s2b2myPm4X8mq0zJ+c7+c9/RR+hqdh9jD0WLHWs6bNr
f+sZz5sbvNK9JpIkWIWCROjjnypvqVVWTldmj1RdLeTYScEJR8BZPBcnV2ve
ta+Y9QzJybrZGN3G0Fv8e3CqxEI6MXrEONjvb3drCSG9b+a7Ss/x1VcUH33k
HCFy0Su/2m0a/8af4ixe33X3fZez9JbHbiQcUxumIJoRtXvkjqyQ55onqH5Y
sPmmtm6dLYbZU0HoLM7Ailpg2EMeayMX1CeVNNXyPu+Ld5hl0eAZGpEMNKN9
uBwtvbHMyVfrqnm40zRWJAgXY68kLvP7PrAciqBKJVEaylzppsM9U+MNe6ta
VuxQlWE6AlIS2FHtkJjKWSvgDlEmQvKlSrdrGSR0nYXq0VlLMwZjyFomLDkp
GewN/pXvFIFEfNnn1bKyoMKrCmcGtMYZ8ZGPctbGiDpOILFJT59Vywc+IjyG
C5h2CNjPbjdSA91v61LTMtf8PmlH0SWu5RktZkZ1Ovl7lcfDZhC1YPX88rvL
bGALYCavVtpFMjWR19q8N2f77ccRxmqX+hc0535BeYurLstmPhMFkHYaA0N0
Vg22PMvmGd6MoBDjvWCSWAeFQUBUL7b+m103bMYX4J8fmvrRilQstyrhs1Wr
6ws/zJmy9HJtnZYvN7lXvY4eHuDP3pX1mxaXwrsYXYgT5EGxvTBFYNbejnXa
Lr3UU33KtOPlsJ2qWGtd+GdLfmel8smypvEmVhgX3nTLYSGn7Xbonw0uRUyV
tXXtHTZ7XtiZ/53D5DuNMYj0HByjLWKZOB9xuKt7YqCvLr3y4N+5Za0rLqJt
AUU6Nald9ZuvCbs0rmk5FknVLk0nnqecUo7LnTF/WdgTy8Qdk/bDaE3QS2A7
0tXlF+/+dalefAzDtVSY/NBdiTiCl4NNsBJiDGRJ2TupMz6IRvFvMaT6RN3y
ybUOzdxP/59x/ECwW2OFd+7Y4Zt+l9Hi1N66M5Fu+J/FLHgPnU30qUENHv3v
Uv60FbB0Jyc+dDQUqZ11rFadD4va2Y6za1vfgggtQbL9WfyddM+f2wXqQQe1
zNTON+reBJhi2PQWiX/1tzh2Hg0wIQZlH+E+7LPFqhuWmf9Z1HpX8ewl21H8
7QoOQtIdZjoZNyq1CNVtDYyBk+dbZ19vykzxmFr5ibft96jzrxmhlocwp1qu
+j0Wmjd9deZs2YSAHMFpKvI7nsUzFh3Dces8PekhYZtiCE8CF9WoW1Z7RaZu
b3JkNjDSn67KlcNuOkDtgK5PTRWJ0c/fkazjl6fW09Cq2mq+zTEq70LPunOK
j746UcltS5UguKMchioK6Hv1rg1N0OhlEG57cfbh45Vs7wUgnjPKpPI+H6KH
tfqDqD4H9ueujACkPjDKfINXLjcJJaUTxPnLrofN/uOv+/kqNh/DvlhyLNXH
gmclju7i59FyginzyPoWIfCBos+dKpNGjFkSj0pO6hxSjAXBqLCsBX8QulGY
cLy2ZEL8M0OT/B1dxceM/MinZj2Ln2HJULwGxyoCkIkRwzx2OftsGpwhhU2I
TL6bUB+xW/pTFxLDKpEbwrdWGCDiyKBcvMM1NX/WBb6WFohdtbgGSe03DFd4
qyB1rs4+LO/Wd8W17YwHMoouSQ3lwb5WXzjOengfR8AVsznrqLzSnnXTW2C1
hi3wTKqNuChyHsT8eZ4z0Zl3zwVHTQZGH4TcFRDGVKYnX0lQZtzcNK0A7xIE
yFnNs4hfp9bM1Bg5jxjzDJgTBKYCTpv5CUSuiUKRNUwuk/9n6fjaSJA02ZZZ
5QJZVJt4hlDnsqwF6eqWiZT4p7pFtQz2SX8LUmCv0eZ65cZQxRAQfTTW6byn
lsXe9ZxH7tbHkRUtlIAuif33tHzJbPJaNnOXaRn1IPrU6AIFJYLnCBJFL2ey
uWdzFprkZtvO0kDF4kERNYEiD+EE/+h9vwQ9VhSqBp/Tf55GE/729Q//oWHx
OWEUahT2yI8dPA6avPv4Gh4E3NEO6DMLnHWO3dcIoJgjSdDFgoj8atdO3nD3
8hbCv383yR9TK7DZeqnUEWUpeYv6hNiGScePbz3AC7tPzAhSv5E7kHvZ5N95
gTehqKQg3U96sPl3ZHq2My0ow55Y+BHQf//xGgkFdoTGw7/3FSbJ7WwSAcX3
aYkvWwMU8QIX+IZ6VmXGLtcOU2YhvBqiD0ttbgAx6+GhTmXQ1wYKFhhRIgXx
VJWNjSP/56Z62PbdQ5Vo2/6ruZ9X80eYyh/j6mhTcYyW2PQF4y8vomvHbjpv
M6KdOaw56Ksk47AK9UDvSWYGVQvaEj5wE1QAE43sV197l96qincHgKuaFObI
2RlEPUPQg0qMgQQfizEGfCwSio68ORhKj/T5a3iv7dFUC+Kx6sMYFTT5R/VQ
XS02zRpO3LJWGIrcOGXQDOGXZO6lQEiUrOH3jHCqliKhFx7i7rytDSsBSJpN
XcpqhKTxx/UTX0O88O8qYX6dMwoF6y347er19g4qgfEImCa/IBMl3sMPYjdE
LjPA9GJ40XFEjyoT6UUvJf6+xGWPTvduxk8P8cd+ZzwQdvusJkO3zQ8oT9Yf
GpOTa+QjLvFNzEm2NlJmyszG8F7j5WKYR/DZyVRtR2oFBHsAADGrVI4WiTh0
eMqjWtKH6h9JLB+6BOYmjTd38RxgDt52+8+t8Z+MVECD0zWqLYStu+jCzxdR
H47X0Y8LCvjUZTm0j1U7rtJ7a9U0SfMkWZbc1SJayPJ3J3sOzEvvm8HldmNU
B4WJV1clZmqKRGLD4g/jvqwTfzvE1xDHW/cm/Zln7++JyxivjRCdhwogv4D/
dyzoXilsx7aofmtkGC6Uw0QKH1SRJiY/oMCUWapgtY2/3pE4i04wHGOWKnr7
BWNJxeCeaWITEk5PnRfzITJp32gvccYemG2RILtoM7eY6DRS9SxYj0WvVlxW
/cn0PCaHTTDqXK9NjBYQembNeryUfRBTR5Olgl1a0+7Jmcx43hulksDru6px
NEXJGj6PpoQCF7azikUSDu8oh+jtHyUjBF3B6DoXMfmmKjBtmWR9b9Pt8azn
zcdUaSEjUCpIouXPGuFMyOvZhnNGkXQB88uf61HjwnbzMbl6CAhYX2SmbTEN
IDfbHqakFS0tQIAgEHqTxBuePrvnR0nO4Zl+bYyCz3rL/t/XjnmbFpTQukJc
lPMuwdkQGdXEOpDgQY3uaEq3rHOyAHZGUs54b2w6XIuqhaLl6Puj/YAtQUOz
YqlnWGdKBIskVSJxOFYp6aLYoYSYS/qENqVsLN3UKLtR4PBmVd32Puo42Lfe
Z5LjgEluNamGbYfc9SLLZExtmsi+ttkWtAKhXMK4z60ePjmS7kBO2acEcRJg
uFaWreL5Fu5rFDNwDOOOm5EwhQpnhg4ouiqECYq+OxtLJS3vPpPMgz0HfJai
jfim6LdJSectIln1z+UUdvEdxbYOo7ElQwoEy/Jb5SAPn4aRKQMHI7wyjdEv
kMJSvmE202n2OVWeBHxQ7YdxbBXKZi1sqVfiMcbBA4Y1EwDLlAE2svTegngT
CetquTKa7WBmjEMgu4SlLl/bm7xMyU53YiynGOf5l7qZd9M0EzGohCMLRzgG
obWR4FohKzGOxpv82CYOqLjg+HO5hYrynl3Fkg63m1p+H3zMeMjHKTl66FaD
HXirenlbH1n9xYoYR5fiMLvkH/HkV/XqZoZqXTzY4dM6fNc93jQB79rlECPo
3ZE1pIEnCnsi3vwIVZS47xTahGF9162WSp1oFEuw/Az1WCyImeTXl07Sc1cz
QVKZvCUHAfdC7RwFp3U5uiJXOVoA8Uzlg41UI9BbpmP5gJI3vz7mpB+LqXSL
oXQUwHJww0hT3V8NmR69h3NViYjmQOgeNwPknOywTG28od8bgHZeR7USfBNu
EKeOtGLekoeDrvpUS6AaKMWH1FZUV46wJDeNte5AN5EDu6kecGeMLJ7dCop9
3v2ix7mHLZddp/uAOlvvLBBNQ71dnJ54wRj75BfLqgntA8pkpI+QaS8EJxiG
sx1x/z20BgGNcRx27y/dJq6TS7JivokbIPrdWJr1b0aQT0z1L6+Sab1SkuA6
Pg9zGVgG+ORTd2ARnJW4Qhh9Y4mZg2LlYtjERXCX6vtOwcbqtbjrwvouRtWY
rlTvVHslk7AGu8IDkPX4UF4HonmdS/Jl9JG2gJexM5Wr9yrbbZlXoNZTR5ZJ
NIPy1TsxrqVM0CEjwkF8WQUC1URAplHFbT4sYPCCjXybuAlKY6tnVr1s8vzJ
4/1hRK3bNbNfphRsTg6mfCjTBgh+P3TbxlpDi1fX8tPnfgxf3jvzoBPNxxT5
HwrBpsbJ+jcQKxUE5svmQZoCKDzT3PqbGI2XXU7Y17xgwZZXpTdHST1qHngM
oYyWhRwMovkY6Rzw2GAihn2T/ZU/HFKKdb4Tv3TbuKyzGRxWGAkUp1k/+tgk
/qDwptvcdtt4myMmnRaWLsINEjnKT0xhpXLRx+tXbwCIZm6HPkdcazlU3gwr
M0jM5mzicbDIedRUAhRfi+egXKTXuVpm6LRmMNvm97v194tUNomfeAaNOYjO
Ba+bXDA11jbDfbTIzgBztthOjs8vXp+dJFqZrwm3Ob94fzn72gCf54zQZx/g
6l7FXTLgFUmRobd/HlxZM/+pmPSVl67iYLrbwfmqZtaLg2/MEjejQ1bmu6CF
g7OFqTv7Op6451r1ht38ie+Te/KfIDpashEwQw5HJJ10AiysloeXeId5150F
OrqBJavq8RWy+eJoSaW8hI2/Zf5SDytSwxgwiaiUI0IpiEBpeRer6vF0UszZ
xOdXZfLMfJeKYSwY2q+dA7cxL9jvlCav5HbyJvp6mTYi3et7JycwSQutSHQJ
v3mTQDsmv0O409NnN/zXDP8aB1qhFA1nk5F3nlqWMg6XE5fiZSk7kh2CJ/eB
QkGvDIW7FQq+Flzri01jmoWYKHn+eaRI4lRormQl4TG6WsaJsjY+h0Vn2nsp
MZiQN4cHkuBclVgGcMN5zeLrYgULmCz9+BLar735lruJhF6tlJl6EBSJ7fbm
YU/gspyVePrVK3LZuOQir8ZDKDVdC2iWnJP8BTMqI0pVmhgTojH3RsHhoflI
qkxcFvc8YGwaduVAwVquOI52F5pC7HLN5NLwC9QhkiVUxFQ9MrIqymncLNYL
FY39XCiyltJhdEONeChRF8Fs/tiOJ3ZqKPrMTpjzHCvCFBiQGqzee1HKmNIF
vU3eKZXqmHhN7NLFPO5JhBVL3MuQBK7kHaNOk25v5AKX5XEBdl7fWN3LKIL9
wqcTYOm6h7qUhD+wygx7uN1ZpqgQCsZOM3WqNJ6j9Wq4vXU+GZOdmR6lLMcK
djA6GT6M3lY+SDbivK6yoBoG7Q0LnmBzZZWkY33zB9ujS71ZnvzwCiP2Lv2r
GDLeKXZKtCmT6P8vR+RNT0/X3aaQ/ewKzVXXsyZIXVcpTp1RRwZBkqbF2edp
hVR4F1fh+wqcYzI9zyBOcd5jKCHqsEmpbbR3KKmbiAeKEekbiDozeBXdSeOz
lNmFVkXXSihR8jPAu2AiVavm+T6vfxOeYXQ1UQiuRRRP2d/6sRxpXvFetpIe
CN+GZlfU3SGwiocaNE61p8/Kf+6bnOvRGOy14HDGizEyRkJojaAI+2096MWF
8yp6YyAr7HEGXG3rdfQF2G9hnPHTyc9NPDqboYeOynZoq2l4O2ywhGKE+RY1
k/ids3a5ic96sYgDJYQRJIZIcE0+NKue176Ie6GqV+Ej/htXAz67rAAQ/TT5
uVrUnzi013cx7oyhW4fO3xmSM4Bs/C9tdxz4UZMBAA==

-->

</rfc>
