<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.17 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-irtf-pearg-censorship-08" category="info" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.15.3 -->
  <front>
    <title abbrev="draft-irtf-pearg-censorship">A Survey of Worldwide Censorship Techniques</title>
    <seriesInfo name="Internet-Draft" value="draft-irtf-pearg-censorship-08"/>
    <author initials="J. L." surname="Hall" fullname="Joseph Lorenzo Hall">
      <organization>Internet Society</organization>
      <address>
        <email>hall@isoc.org</email>
      </address>
    </author>
    <author initials="M. D." surname="Aaron" fullname="Michael D. Aaron">
      <organization>CU Boulder</organization>
      <address>
        <email>michael.drew.aaron@gmail.com</email>
      </address>
    </author>
    <author initials="A." surname="Andersdotter" fullname="Amelia Andersdotter">
      <organization/>
      <address>
        <email>amelia.ietf@andersdotter.cc</email>
      </address>
    </author>
    <author initials="B." surname="Jones" fullname="Ben Jones">
      <organization>Princeton</organization>
      <address>
        <email>bj6@cs.princeton.edu</email>
      </address>
    </author>
    <author initials="N." surname="Feamster" fullname="Nick Feamster">
      <organization>U Chicago</organization>
      <address>
        <email>feamster@uchicago.edu</email>
      </address>
    </author>
    <author initials="M." surname="Knodel" fullname="Mallory Knodel">
      <organization>Center for Democracy &amp; Technology</organization>
      <address>
        <email>mknodel@cdt.org</email>
      </address>
    </author>
    <date year="2022" month="December" day="21"/>
    <area>General</area>
    <workgroup>pearg</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document describes technical mechanisms employed in network censorship that regimes around
the world use for blocking or impairing Internet traffic. It aims
to make designers, implementers, and users of Internet protocols aware
of the properties exploited and mechanisms used for censoring
end-user access to information.  This document makes no suggestions on
individual protocol considerations, and is purely informational,
intended as a reference. This document is a product of the Privacy Enhancement and Assessment Research Group (PEARG) in the IRTF.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="intro">
      <name>Introduction</name>
      <t>Censorship is where an entity in a position of power -- such as a
government, organization, or individual -- suppresses communication
that it considers objectionable, harmful, sensitive, politically
incorrect or inconvenient <xref target="WP-Def-2020"/>. Although censors that engage in censorship
must do so through legal, military, or
other means, this document focuses largely on technical
mechanisms used to achieve network censorship.</t>
      <t>This document describes technical mechanisms that censorship regimes
around the world use for blocking or impairing Internet traffic.  See
<xref target="RFC7754"/> for a discussion of Internet blocking and filtering in
terms of implications for Internet architecture, rather than end-user
access to content and services. There is also a growing field of
academic study of censorship circumvention (see the review article of
<xref target="Tschantz-2016"/>), results from which we seek to make relevant here
for protocol designers and implementers.</t>
      <t>Censorship circumvention also impacts the cost of implementation of a censorship measure and we include mentions of tradeoffs in relation to such costs in conjunction with each technical method identified below.</t>
      <t>This document has seen extensive discussion and review in the IRTF Privacy Enhancement and Assessment Research Group (PEARG) and represents the consensus of that group. It is not an IETF product and is not a standard.</t>
    </section>
    <section anchor="terms">
      <name>Terminology</name>
      <t>We describe three elements of Internet censorship: prescription,
identification, and interference. The document contains three major
sections, each corresponding to one of these elements. Prescription is
the process by which censors determine what types of material they
should censor, e.g., classifying pornographic websites as undesirable.
Identification is the process by which censors classify specific
traffic or traffic identifiers to be blocked or impaired, e.g.,
deciding that webpages containing "sex" in an HTTP Header or that
accept traffic through the URL www.sex.example are likely to be
undesirable.  Interference is the process by which censors intercede
in communication and prevents access to censored materials by blocking
access or impairing the connection, e.g., implementing a technical
solution capable of identifying HTTP headers or URLs and ensuring they
are rendered wholly or partially inaccessible.</t>
    </section>
    <section anchor="tech-prescrip">
      <name>Technical Prescription</name>
      <t>Prescription is the process of figuring out what censors would like to
block <xref target="Glanville-2008"/>. Generally, censors aggregate information "to
block" in blocklists, databases of image hashes <xref target="ekr-2021"/>, or use real-time heuristic assessment of content
<xref target="Ding-1999"/>. Some national networks are designed to more naturally
serve as points of control <xref target="Leyba-2019"/>. There are also indications
that online censors use probabilistic machine learning techniques
<xref target="Tang-2016"/>. Indeed, web crawling and machine learning techniques
are an active research idea in the effort to identify content deemed
as morally or commercially harmful to companies or consumers in some
jurisdictions <xref target="SIDN2020"/>.</t>
      <t>There are typically a few types of blocklist elements: Keyword, domain
name, protocol, or Internet Protocol (IP) address. Keyword and domain name
blocking take place at the application level, e.g., HTTP; protocol blocking
often occurs using deep packet inspection to identify a forbidden protocol;
IP blocking tends to take place using IP addresses in IPv4/IPv6 headers.
Some censors also use the presence of certain keywords to enable more
aggressive blocklists <xref target="Rambert-2021"/> or to be more permissive with
content <xref target="Knockel-2021"/>.</t>
      <t>The mechanisms for building up these blocklists vary. Censors can purchase
from private industry "content control" software,
which lets censors filter traffic from broad categories they would like to
block, such as gambling or pornography <xref target="Knight-2005"/>. In these cases,
these private services attempt to categorize every semi-questionable
website as to allow for meta-tag blocking. Similarly, they tune real-time
content heuristic systems to map their assessments onto categories of
objectionable content.</t>
      <t>Countries that are more interested in retaining specific political control
typically have ministries or organizations that maintain blocklists. Examples
include the Ministry of Industry and Information Technology in China, Ministry of
Culture and Islamic Guidance in Iran, and specific to copyright in France <xref target="HADOPI-2020"/>
and across the EU for consumer protection law <xref target="Reda-2017"/>.</t>
      <t>Content-layer filtering of images and video require institutions or organizations to store hashes of images or videos to be blocked in databases, which can then be compared, with some degree of tolerance, to content that is sent, received or stored using centralized, content applications and services <xref target="ekr-2021"/>.</t>
    </section>
    <section anchor="tech-id">
      <name>Technical Identification</name>
      <section anchor="poc">
        <name>Points of Control</name>
        <t>Internet censorship takes place in all parts of the network
topology. It may be implemented in the network itself (e.g. local loop
or backhaul), on the services side of communication (e.g. web hosts,
cloud providers or content delivery networks), in the ancillary
services eco-system (e.g. domain name system or certificate
authorities) or on the end-client side (e.g. in an end-user device
such as a smartphone, laptop or desktop or software executed on such
devices).  An important aspect of pervasive technical interception is
the necessity to rely on software or hardware to intercept the content
the censor is interested in. There are various logical and physical
points-of-control censors may use for interception mechanisms,
including, though not limited to, the following.</t>
        <ul spacing="normal">
          <li>Internet Backbone: If a censor controls the gateways into a region,
they can filter undesirable traffic that is traveling into and out
of the region by packet sniffing and port mirroring at the relevant
exchange points. Censorship at this point of control is most
effective at controlling the flow of information between a region
and the rest of the Internet, but is ineffective at identifying
content traveling between the users within a region. Some national
network designs naturally serve as more effective chokepoints and
points of control <xref target="Leyba-2019"/>.</li>
          <li>Internet Service Providers: Internet Service Providers are
frequently exploited points of control. They
have the benefit of being easily enumerable by a censor -- often
falling under the jurisdictional or operational control of a censor
in an indisputable way -- with the additional feature that an ISP
can identify the regional and international traffic
of all their users. The censor's filtration mechanisms can be placed
on an ISP via governmental mandates, ownership, or voluntary/coercive influence.</li>
          <li>Institutions: Private institutions such as corporations,
schools, and Internet cafes can use filtration mechanisms.
These mechanisms are occasionally at the request of a
government censor, but can also be implemented to help achieve
institutional goals, such as fostering a particular moral outlook on
life by school-children, independent of broader society or
government goals.</li>
          <li>Content Distribution Network (CDN): CDNs seek to collapse network
topology in order to better locate content closer to the service's
users. This reduces content transmission latency and improves quality
of service. The CDN service's content
servers, located "close" to the user in a network-sense, can be
powerful points of control for censors, especially if the location
of CDN repositories allow for easier interference.</li>
          <li>Certificate Authorities (CAs) for Public-Key Infrastructures (PKIs):
Authorities that issue cryptographically secured resources can be a
significant point of control. CAs that issue certificates to domain
holders for TLS/HTTPS (the Web PKI) or Regional/Local Internet
Registries (RIRs) that issue Route Origination Authorizations (ROAs)
to BGP operators can be forced to issue rogue certificates that may
allow compromise, i.e., by allowing censorship software to engage in
identification and interference where not possible before. CAs may
also be forced to revoke certificates. This may lead to adversarial
traffic routing or TLS interception being allowed, or an otherwise
rightful origin or destination point of traffic flows being unable
to communicate in a secure way.</li>
          <li>Services: Application service providers can be pressured,
coerced, or legally required to censor specific content or data flows.
Service providers naturally face incentives to maximize their
potential customer base and potential service shutdowns or legal
liability due to censorship efforts may seem much less attractive
than potentially excluding content, users, or uses of their
service. Services have increasingly become focal points of
censorship discussions, as well as the focus of discussions of moral
imperatives to use censorship tools.</li>
          <li>Content sites: On the service side of communications lie many platforms that
publish user-generated content require terms of service compliance with all content
and user accounts in order to avoid intermediary liability for the web hosts.
In aggregate these policies, actions and remedies are known as content moderation.
Content moderation happens above the services or application layer, but
these mechanisms are built to filter, sort and block content and users
thus making them available to censors through direct pressure on the private entity.</li>
          <li>Personal Devices: Censors can mandate censorship software be
installed on the device level. This has many disadvantages in terms
of scalability, ease-of-circumvention, and operating system
requirements. (Of course, if a personal device is treated with
censorship software before sale and this software is difficult to
reconfigure, this may work in favor of those seeking to control
information, say for children, students, customers, or employees.)
The emergence of mobile devices exacerbate these feasibility
problems. This software can also be mandated by institutional actors
acting on non-governmentally mandated moral imperatives.</li>
        </ul>
        <t>At all levels of the network hierarchy, the filtration mechanisms used
to censor undesirable traffic are essentially the same: a censor
either directly identifies undesirable content using the identifiers
described below and then uses a blocking or shaping mechanism such as
the ones exemplified below to prevent or impair access, or requests
that an actor ancillary to the censor, such as a private entity,
perform these functions.  Identification of undesirable traffic can
occur at the application, transport, or network layer of the IP
stack. Censors often focus on web traffic, so the relevant protocols
tend to be filtered in predictable ways (see <xref target="http-req"/> and
<xref target="http-resp"/>). For example, a subversive image might make it past a
keyword filter. However, if later the image is deemed undesirable, a
censor may then blocklist the provider site's IP address.</t>
      </section>
      <section anchor="app-layer">
        <name>Application Layer</name>
        <t>The following subsections describe properties and tradeoffs of common
ways in which censors filter using application-layer information. Each
subsection includes empirical examples describing these common
behaviors for further reference.</t>
        <section anchor="http-req">
          <name>HTTP Request Header Identification</name>
          <t>An HTTP header contains a lot of useful information for traffic
identification. Although "host" is the only required field in an HTTP
request header (for HTTP/1.1 and later), an HTTP method field is necessary
to do anything
useful. As such, "method" and "host" are the two fields used
most often for ubiquitous censorship. A censor can sniff traffic and
identify a specific domain name (host) and usually a page name (GET
/page) as well. This identification technique is usually paired with
transport header identification (see <xref target="sec_thid"/>) for a more robust
method.</t>
          <t>Tradeoffs: Request Identification is a technically straight-forward
identification method that can be easily implemented at the Backbone
or ISP level. The hardware needed for this sort of identification is
cheap and easy-to-acquire, making it desirable when budget and scope
are a concern. HTTPS will encrypt the relevant request and response
fields, so pairing with transport identification (see <xref target="sec_thid"/>) is
necessary for HTTPS filtering. However, some countermeasures can
trivially defeat simple forms of HTTP Request Header Identification.
For example, two cooperating endpoints -- an instrumented web server
and client -- could encrypt or otherwise obfuscate the "host" header in
a request, potentially thwarting techniques that match against "host" header values.</t>
          <t>Empirical Examples: Studies exploring censorship mechanisms have found
evidence of HTTP header/ URL filtering in many countries, including
Bangladesh, Bahrain, China, India, Iran, Malaysia, Pakistan, Russia,
Saudi Arabia, South Korea, Thailand, and Turkey
<xref target="Verkamp-2012"/> <xref target="Nabi-2013"/> <xref target="Aryan-2012"/>. Commercial technologies are often purchased by
censors <xref target="Dalek-2013"/>.  These commercial technologies use a
combination of HTTP Request Identification and Transport Header
Identification to filter specific URLs. Dalek et al. and Jones et
al. identified the use of these products in the wild
<xref target="Dalek-2013"/> <xref target="Jones-2014"/>.</t>
        </section>
        <section anchor="http-resp">
          <name>HTTP Response Header Identification</name>
          <t>While HTTP Request Header Identification relies on the information
contained in the HTTP request from client to server, response
identification uses information sent in response by the server to
client to identify undesirable content.</t>
          <t>Tradeoffs: As with HTTP Request Header Identification, the techniques
used to identify HTTP traffic are well-known, cheap, and relatively
easy to implement. However, they are made useless by HTTPS because
HTTPS encrypts the response and its headers.</t>
          <t>The response fields are also less helpful for identifying content than
request fields, as "Server" could easily be identified using HTTP
Request Header identification, and "Via" is rarely relevant.  HTTP
Response censorship mechanisms normally let the first n packets
through while the mirrored traffic is being processed; this may allow
some content through and the user may be able to detect that the
censor is actively interfering with undesirable content.</t>
          <t>Empirical Examples: In 2009, Jong Park et al. at the University of New
Mexico demonstrated that the Great Firewall of China (GFW) has used this
technique <xref target="Crandall-2010"/>. However, Jong Park et al. found that the
GFW discontinued this practice during the course of the study. Due to
the overlap in HTTP response filtering and keyword filtering (see
<xref target="kw-filt"/>), it is likely that most censors rely on keyword
filtering over TCP streams instead of HTTP response filtering.</t>
        </section>
        <section anchor="tls">
          <name>Transport Layer Security (TLS)</name>
          <t>Similar to HTTP, censors have deployed a variety of techniques towards
censoring Transport Layer Security (TLS) (and by extension HTTPS). Most of
these techniques relate to the Server Name Indication (SNI) field,
including censoring SNI, Encrypted SNI, or omitted SNI. Censors can also
censor HTTPS content via server certificates. 
Note that TLS 1.3 acts as a security component of QUIC.</t>
          <section anchor="sni">
            <name>Server Name Indication (SNI)</name>
            <t>In encrypted connections using TLS, there
may be servers that host multiple "virtual servers" at a given network
address, and the client will need to specify in the
Client Hello message which domain name it seeks to connect to (so that
the server can respond with the appropriate TLS certificate) using the
Server Name Indication (SNI) TLS extension <xref target="RFC6066"/>. 
The Client Hello message is unencrypted for TCP-based TLS. 
When using QUIC, the Client Hello message is encrypted but its 
confidentiality is not effectively protected because the initial encryption 
keys are derived using a value that is visible on the wire. Since SNI is
often sent in the clear (as are the cert fields sent in response),
censors and filtering software can use it (and response cert fields)
as a basis for blocking, filtering, or impairment by dropping
connections to domains that match prohibited content (e.g.,
bad.foo.example may be censored while good.foo.example is not)
<xref target="Shbair-2015"/>. There are undergoing standardization efforts in the
TLS Working Group to encrypt SNI <xref target="I-D.ietf-tls-sni-encryption"/>
              <xref target="I-D.ietf-tls-esni"/> and recent research shows promising results in
the use of encrypted SNI in the face of SNI-based filtering
<xref target="Chai-2019"/> in some countries.</t>
            <t>Domain fronting has been one popular way to avoid identification by
censors <xref target="Fifield-2015"/>. To avoid identification by censors,
applications using domain fronting put a different domain name in the
SNI extension than in the Host: header, which is protected by
HTTPS. The visible SNI would indicate an unblocked domain, while the
blocked domain remains hidden in the encrypted application header.
Some encrypted messaging services relied on domain fronting to enable
their provision in countries employing SNI-based filtering. These
services used the cover provided by domains for which blocking at the
domain level would be undesirable to hide their true domain
names. However, the companies holding the most popular domains have
since reconfigured their software to prevent this practice.  It may be
possible to achieve similar results using potential future options to
encrypt SNI.</t>
            <t>Tradeoffs: Some clients do not send the SNI extension (e.g., clients
that only support versions of SSL and not TLS), rendering this method
ineffective (see <xref target="omitsni"/>). In addition, this technique requires deep packet
inspection (DPI) techniques that can be computationally and
infrastructurally expensive, especially when applied to QUIC where DPI requires key extraction and decryption of the Client Hello in order to read the SNI. Improper configuration of an SNI-based
block can result in significant overblocking, e.g., when a
second-level domain like populardomain.example is inadvertently
blocked. In the case of encrypted SNI, pressure to censor may
transfer to other points of intervention, such as content and application providers.</t>
            <t>Empirical Examples: There are many examples of security firms that
offer SNI-based filtering products <xref target="Trustwave-2015"/> <xref target="Sophos-2015"/>
              <xref target="Shbair-2015"/>, and the governments of China, Egypt, Iran, Qatar,
South Korea, Turkey, Turkmenistan, and the UAE all do widespread SNI
filtering or blocking <xref target="OONI-2018"/> <xref target="OONI-2019"/> <xref target="NA-SK-2019"/>
              <xref target="CitizenLab-2018"/> <xref target="Gatlan-2019"/> <xref target="Chai-2019"/> <xref target="Grover-2019"/>
              <xref target="Singh-2019"/>. SNI blocking against QUIC traffic has been first observed in Russia in March 2022 <xref target="Elmenhorst-2022"/>.</t>
          </section>
          <section anchor="esni">
            <name>Encrypted SNI (ESNI)</name>
            <t>With the data leakage present with the SNI field, a natural response is to 
encrypt it, which is forthcoming in TLS 1.3 with Encrypted Client Hello
(ECH).  Prior to ECH, the Encrypted SNI (ESNI) extension is available to
prevent the data leakage caused by SNI, which encrypts only the SNI field.
Unfortunately, censors can target connections that use the ESNI extension
specifically for censorship. This guarantees overblocking for the censor,
but can be worth the cost if ESNI is not yet widely deployed within the
country.  Encrypted Client Hello (ECH) is the emerging standard for protecting
the entire TLS Client Hello, but it is not yet widely deployed.</t>
            <t>Tradeoffs: The cost to censoring Encrypted SNI (ESNI) is significantly
higher than SNI to a censor, as the censor can no longer target
censorship to specific domains and guarantees over-blocking. In these
cases, the censor uses the over-blocking to discourage the use of
ESNI entirely.</t>
            <t>Empirical Examples: In 2020, China began censoring all uses of Encrypted
ESNI (ESNI) <xref target="Bock-2020b"/>, even for innocuous connections. The
censorship mechanism for China's ESNI censorship differs from how
China censors SNI-based connections, suggesting that new middleboxes
were deployed specifically to target ESNI connections.</t>
          </section>
          <section anchor="omitsni">
            <name>Omitted-SNI</name>
            <t>Researchers have observed that some clients omit the SNI extension
entirely. This omitted-SNI approach limits the information available
to a censor. Like with ESNI, censors can choose to block connections that
omit the SNI, though this too risks over-blocking.</t>
            <t>Tradeoffs: The approach of censoring all connections that omit the SNI field
is guaranteed to over-block, though connections that omit the SNI field
should be relatively rare in the wild.</t>
            <t>Empirical Examples: In the past, researchers have observed censors in Russia
blocking connections that omit the SNI field <xref target="Bock-2020b"/>.</t>
          </section>
          <section anchor="server-response-certificate">
            <name>Server Response Certificate</name>
            <t>During the TLS handshake after the TLS Client Hello, the server will respond
with the TLS certificate. This certificate also contains the domain
the client is trying to access, creating another avenue that censors
can use to perform censorship. This technique will not work in TLS 1.3, as the 
certificate will be encrypted.</t>
            <t>Tradeoffs: Censoring based on the server certificate requires DPI techniques that can be more computationally
expensive compared to other methods. Additionally, the certificate is
sent later in the TLS Handshake compared to the SNI field, forcing
the censor to track the connection for longer.</t>
            <t>Empirical Examples: Researchers have observed the Reliance Jio
ISP in India using certificate response fields to censor connections
<xref target="Satija-2021"/>.</t>
          </section>
        </section>
        <section anchor="kw-filt">
          <name>Instrumenting Content Distributors</name>
          <t>Many governments pressure content providers to censor themselves, or
provide the legal framework within which content distributors are
incentivized to follow the content restriction preferences of agents
external to the content distributor <xref target="Boyle-1997"/>. Due to the
extensive reach of such censorship, we define content
distributor as any service that provides utility to users, including
everything from web sites to storage to locally installed programs.</t>
          <t>A commonly
used method of instrumenting content distributors consists of keyword
identification to detect restricted terms on their platform. Governments
may provide the terms on such keyword lists. Alternatively, the content
provider may be expected to come up with their own list.</t>
          <t>An increasingly common method of instrumeting content distribution consists of hash matching to detect and action images and videos known to be restricted either by governments, institutions, organizations or the distributor themselves <xref target="ekr-2021"/>.</t>
          <t>A different
method of instrumenting content distributors consists of requiring a
distributor to disassociate with some categories of users. See also
<xref target="notice"/>.</t>
          <t>Tradeoffs: By instrumenting content distributors to identify
restricted content or content providers, the censor can gain new
information at the cost of political capital with the companies it
forces or encourages to participate in censorship. For example, the
censor can gain insight about the content of encrypted traffic by
coercing web sites to identify restricted content. Coercing content
distributors to regulate users, categories of users, content and
content providers may encourage users and content providers to exhibit
self-censorship, an additional advantage for censors (see <xref target="selfcensor"/>). The tradeoffs
for instrumenting content distributors are highly dependent on the
content provider and the requested assistance. A typical concern is
that the targeted keywords or categories of users are too broad, risk
being too broadly applied, or are not subjected to a sufficiently
robust legal process prior to their mandatory application (see p. 8 of
<xref target="EC-2012"/>).</t>
          <t>Empirical Examples: Researchers discovered keyword identification
by content providers on platforms ranging from instant messaging
applications <xref target="Senft-2013"/> to search engines <xref target="Rushe-2015"/>
            <xref target="Cheng-2010"/> <xref target="Whittaker-2013"/> <xref target="BBC-2013"/> <xref target="Condliffe-2013"/>. To
demonstrate the prevalence of this type of keyword identification, we
look to search engine censorship.</t>
          <t>Search engine censorship demonstrates keyword identification by
content providers and can be regional or worldwide.  Implementation is
occasionally voluntary, but normally it is based on laws and regulations
of the country a search engine is operating in. The keyword blocklists
are most likely maintained by the search engine provider. China is
known to require search engine providers to "voluntarily" maintain
search term blocklists to acquire and keep an Internet content provider
(ICP) license <xref target="Cheng-2010"/>.  It is clear these blocklists are
maintained by each search engine provider based on the slight
variations in the intercepted searches <xref target="Zhu-2011"/>
            <xref target="Whittaker-2013"/>. The United Kingdom has been pushing search engines
to self-censor with the threat of litigation if they do not do it
themselves: Google and Microsoft have agreed to block more than
100,000 queries in U.K. to help combat abuse <xref target="BBC-2013"/>
            <xref target="Condliffe-2013"/>.  European Union law, as well as US law, requires
modification of search engine results in response to either copyright,
trademark, data protection or defamation concerns <xref target="EC-2012"/>.</t>
          <t>Depending on the output, search engine keyword identification may be
difficult or easy to detect. In some cases specialized or blank
results provide a trivial enumeration mechanism, but more subtle
censorship can be difficult to detect. In February 2015, Microsoft's search
engine, Bing, was accused of censoring Chinese content outside of
China <xref target="Rushe-2015"/> because Bing returned different results for
censored terms in Chinese and English. However, it is possible that
censorship of the largest base of Chinese search users, China, biased
Bing's results so that the more popular results in China (the
uncensored results) were also more popular for Chinese speakers
outside of China.</t>
          <t>Disassociation by content distributors from certain categories of
users has happened for instance in Spain, as a result of the conflict
between the Catalunyan independence movement and the Spanish legal
presumption of a unitary state <xref target="Lomas-2019"/>. E-sport event
organizers have also disassociated themselves from top players who
expressed political opinions in relation to the 2019 Hong Kong
protests <xref target="Victor-2019"/>. See also <xref target="discon"/>.</t>
        </section>
        <section anchor="dpi">
          <name>DPI Identification</name>
          <t>DPI (deep packet inspection) technically is any kind of packet
analysis beyond IP address and port number and has become
computationally feasible as a component of censorship mechanisms
in recent years <xref target="Wagner-2009"/>. Unlike other
techniques, DPI reassembles network flows to examine the application
"data" section, as opposed to only headers, and is therefore often
used for keyword identification. DPI also differs from other
identification technologies because it can leverage additional packet
and flow characteristics, e.g., packet sizes and timings, when identifying
content. To prevent substantial quality of service (QoS) impacts, DPI
normally analyzes a copy of data while the original packets continue
to be routed. Typically, the traffic is split using either a mirror
switch or fiber splitter, and analyzed on a cluster of machines
running Intrusion Detection Systems (IDS) configured for censorship.</t>
          <t>Tradeoffs: DPI is one of the most expensive identification mechanisms
and can have a large QoS impact <xref target="Porter-2010"/>.  When used as a
keyword filter for TCP flows, DPI systems can cause also major
overblocking problems. Like other techniques, DPI is less useful
against encrypted data, though DPI can leverage unencrypted elements
of an encrypted data flow, e.g., the Server Name Indication (SNI) sent
in the clear for TLS, or metadata about an encrypted flow, e.g., packet
sizes, which differ across video and textual flows, to identify traffic.
See <xref target="sni"/> for more information about SNI-based filtration mechanisms.</t>
          <t>Other kinds of information can be inferred by comparing certain unencrypted elements
exchanged during TLS handshakes to similar data points from known sources.
This practice, called TLS fingerprinting, allows a probabilistic identification of
a party's operating system, browser, or application based on a comparison of the
specific combinations of TLS version, ciphersuites, compression options, etc.
sent in the ClientHello message to similar signatures found in unencrypted traffic <xref target="Husak-2016"/>.</t>
          <t>Despite these problems, DPI is the most powerful identification method
and is widely used in practice. The Great Firewall of China (GFW), the
largest censorship system in the world, uses DPI to identify
restricted content over HTTP and DNS and inject TCP RSTs and bad DNS
responses, respectively, into connections <xref target="Crandall-2010"/> <xref target="Clayton-2006"/> <xref target="Anonymous-2014"/>.</t>
          <t>Empirical Examples: Several studies have found evidence of censors
using DPI for censoring content and tools. Clayton et al., Crandal et al.,
Anonymous, and Khattak et al., all explored the GFW <xref target="Crandall-2010"/>
            <xref target="Clayton-2006"/> <xref target="Anonymous-2014"/>. Khattak et al. even probed the
firewall to discover implementation details like how much state it stores <xref target="Khattak-2013"/>.
The Tor project claims that China, Iran, Ethiopia, and others must have used
DPI to block the obfs2 protocol <xref target="Wilde-2012"/>.  Malaysia has
been accused of using targeted DPI, paired with DDoS, to identify and
subsequently attack pro-opposition material <xref target="Wagstaff-2013"/>.  It
also seems likely that organizations not so worried about blocking
content in real-time could use DPI to sort and categorically search
gathered traffic using technologies such as high-speed packet processing
<xref target="Hepting-2011"/>.</t>
        </section>
      </section>
      <section anchor="transport">
        <name>Transport Layer</name>
        <section anchor="sec_thid">
          <name>Shallow Packet Inspection and Transport Header Identification</name>
          <t>Of the various shallow packet inspection methods, Transport Header
Identification is the most pervasive, reliable, and predictable type
of identification.  Transport headers contain a few invaluable pieces
of information that must be transparent for traffic to be successfully
routed: destination and source IP address and port.  Destination and
Source IP are doubly useful, as not only does it allow a censor to
block undesirable content via IP blocklisting, but also allows a
censor to identify the IP of the user making the request and the IP
address of the destination being visited, which in most cases can be
used to infer the domain being visited <xref target="Patil-2019"/>. Port is useful
for allowlisting certain applications.</t>
          <t>Combining IP address, port and protocol information found in the transport header, shallow packet inspection can be used by a censor to identify specific TCP or UDP endpoints. UDP endpoint blocking has been observed in the context of QUIC blocking <xref target="Elmenhorst-2021"/>.</t>
          <t>Trade-offs: header identification is popular due to its simplicity,
availability, and robustness.</t>
          <t>Header identification is trivial to implement, but is difficult to
implement in backbone or ISP routers at scale, and is therefore
typically implemented with DPI. Blocklisting an IP is equivalent to
installing a specific route on a router (such as a /32 route for IPv4
addresses and a /128 route for IPv6 addresses). However, due to
limited flow table space, this cannot scale beyond a few thousand IPs
at most. IP blocking is also relatively crude. It often leads to
overblocking and cannot deal with some services like content
distribution networks (CDN) that host content at hundreds or thousands
of IP addresses. Despite these limitations, IP blocking is extremely
effective because the user needs to proxy their traffic through
another destination to circumvent this type of identification. 
In addition, IP blocking is effective against all protocols above IP, e.g. 
TCP and QUIC.</t>
          <t>Port-blocking is generally not useful because many types of content
share the same port and it is possible for censored applications to
change their port. For example, most HTTP traffic goes over port 80,
so the censor cannot differentiate between restricted and allowed web
content solely on the basis of port. HTTPS goes over port 443, with
similar consequences for the censor except only partial metadata may
now be available to the censor. Port allowlisting is occasionally
used, where a censor limits communication to approved ports, such as
80 for HTTP traffic and is most effective when used in conjunction
with other identification mechanisms. For example, a censor could
block the default HTTPS port, port 443, thereby forcing most users to
fall back to HTTP. A counter-example is that port 25 (SMTP) has long
been blocked on residential ISPs' networks to reduce the risk for
email spam, but in doing so also prohibits residential ISP customers
from running their own email servers.</t>
        </section>
        <section anchor="prot-id">
          <name>Protocol Identification</name>
          <t>Censors sometimes identify entire protocols to be blocked using a
variety of traffic characteristics.  For example, Iran impairs the
performance of HTTPS traffic, a protocol that prevents further
analysis, to encourage users to switch to HTTP, a protocol that they
can analyze <xref target="Aryan-2012"/>. A simple protocol identification
would be to recognize all TCP traffic over port 443 as HTTPS, but more
sophisticated analysis of the statistical properties of payload data
and flow behavior, would be more effective, even when port 443 is not
used <xref target="Hjelmvik-2010"/> <xref target="Sandvine-2014"/>.</t>
          <t>If censors can detect circumvention tools, they can block them, so
censors like China are extremely interested in identifying the
protocols for censorship circumvention tools. In recent years, this
has devolved into an arms race between censors and circumvention tool
developers. As part of this arms race, China developed an extremely
effective protocol identification technique that researchers call
active probing or active scanning.</t>
          <t>In active probing, the censor determines whether hosts are running a
circumvention protocol by trying to initiate communication using the
circumvention protocol. If the host and the censor successfully
negotiate a connection, then the censor conclusively knows that host
is running a circumvention tool. China has used active scanning to
great effect to block Tor <xref target="Winter-2012"/>.</t>
          <t>Trade-offs: Protocol identification necessarily only provides insight
into the way information is traveling, and not the information itself.</t>
          <t>Protocol identification is useful for detecting and blocking
circumvention tools, like Tor, or traffic that is difficult to
analyze, like VoIP or SSL, because the censor can assume that this
traffic should be blocked. However, this can lead to over-blocking
problems when used with popular protocols.  These methods are
expensive, both computationally and financially, due to the use of
statistical analysis, and can be ineffective due to their imprecise
nature.</t>
          <t>Censors have also used protocol identification in the past in an
'allowlist' filtering capacity, such as by only allowing specific,
pre-vetted protocols to be used and blocking any unrecognized
protocols <xref target="Bock-2020"/>. These protocol filtering approaches can also lead to
over-blocking if the allowed lists of protocols is too small or
incomplete, but can be cheap to implement, as many standard 'allowed' 
protocols are simple to identify (such as HTTP).</t>
          <t>Empirical Examples: Protocol identification can be easy to detect if
it is conducted in real time and only a particular protocol is
blocked, but some types of protocol identification, like active
scanning, are much more difficult to detect. Protocol identification
has been used by Iran to identify and throttle SSH traffic to make it
unusable <xref target="Anonymous-2007"/> and by China to identify and block Tor
relays <xref target="Winter-2012"/>. Protocol identification has also been used for
traffic management, such as the 2007 case where Comcast in the United
States used RST injection to interrupt BitTorrent Traffic
<xref target="Winter-2012"/>. In 2020, Iran deployed an allowlist protocol filter,
which only allowed three protocols to be used (DNS, TLS, and HTTP) on
specific ports and censored any connection it could not identify <xref target="Bock-2020"/>. 
In 2022, Russia seemed to have used protocol identification to block most
HTTP/3 connections <xref target="Elmenhorst-2022"/>.</t>
        </section>
      </section>
      <section anchor="residualcensorship">
        <name>Residual Censorship</name>
        <t>Another feature of some modern censorship systems is residual censorship, a
punitive form of censorship whereby after a censor disrupts a forbidden
connection, the censor continues to target subsequent connections, even if they
are innocuous <xref target="Bock-2021"/>. Residual censorship can take many forms
and often relies on the methods of technical interference described in the next
section.</t>
        <t>An important facet of residual censorship is precisely what the censor
continues to block after censorship is initially triggered. There are three
common options available to an adversary: 2-tuple (client IP, server IP),
3-tuple (client IP, server IP+port), or 4-tuple (client IP+port, server
IP+port). Future connections that match the tuple of information the censor
records will be disrupted <xref target="Bock-2021"/>.</t>
        <t>Residual censorship can sometimes be difficult to identify and can often complicate
censorship measurement.</t>
        <t>Trade-offs: The impact of residual censorship is to provide users with further
discouragement from trying to access forbidden content, though it is not
clear how successful it is at accomplishing this.</t>
        <t>Empirical Examples: China has used 3-tuple residual censorship in conjunction
with their HTTP censorship for years and researchers have reported seeing similar
residual censorship for HTTPS. China seems to use a mix of 3-tuple and 4-tuple
residual censorship for their censorship of HTTPS with ESNI. Some censors that
perform censorship via packet dropping often accidentally implement 4-tuple
residual censorship, including Iran and Kazakhstan <xref target="Bock-2021"/>.</t>
      </section>
    </section>
    <section anchor="tech-interference">
      <name>Technical Interference</name>
      <section anchor="application-layer">
        <name>Application Layer</name>
        <section anchor="dns-mangling">
          <name>DNS Interference</name>
          <t>There are a variety of mechanisms that censors can use to block or
filter access to content by altering responses from the DNS
<xref target="AFNIC-2013"/> <xref target="ICANN-SSAC-2012"/>, including blocking the response,
replying with an error message, or responding with an incorrect
address. Note that there are now encrypted transports for DNS queries
in DNS-over-HTTPS <xref target="RFC8484"/> and DNS-over-TLS <xref target="RFC7858"/> that can
mitigate interference with DNS queries between the stub and the
resolver.</t>
          <t>Responding to a DNS query with an incorrect address can be achieved
with on-path interception, off-path cache poisoning, and lying by
the nameserver.</t>
          <t>"DNS mangling" is a network-level technique of on-path interception where an incorrect IP
address is returned in response to a DNS query to a censored
destination. An example of this is what some Chinese networks do (we
are not aware of any other wide-scale uses of mangling). On those
Chinese networks, every DNS request in transit is examined (presumably
by network inspection technologies such as DPI) and, if it matches a
censored domain, a false response is injected. End users can see this
technique in action by simply sending DNS requests to any unused IP
address in China (see example below). If it is not a censored name,
there will be no response. If it is censored, a forged response
will be returned. For example, using the command-line dig utility to
query an unused IP address in China of 192.0.2.2 for the name
"www.uncensored.example"  compared with
"www.censored.example" (censored at the time of writing), we get a
forged IP address "198.51.100.0" as a response:</t>
          <artwork><![CDATA[
% dig +short +nodnssec @192.0.2.2 A www.uncensored.example
;; connection timed out; no servers could be reached

% dig +short +nodnssec @192.0.2.2 A www.censored.example
198.51.100.0
]]></artwork>
          <t>DNS cache poisoning happens off-path and refers to a mechanism where a censor interferes
with the response sent by an authoritative DNS name server to a recursive
resolver by responding more quickly than the authoritative name server
can respond with an alternative IP address <xref target="Halley-2008"/>.
Cache poisoning occurs
after the requested site's name servers resolve the request and
attempt to forward the true IP back to the requesting device; on the
return route the resolved IP is recursively cached by each DNS server
that initially forwarded the request. During this caching process if
an undesirable keyword is recognized, the resolved IP is "poisoned"
and an alternative IP (or NXDOMAIN error) is returned more quickly
than the upstream resolver can respond, causing a forged IP
address to be cached (and potentially recursively so). The alternative
IPs usually direct to a nonsense domain or a warning page.
Alternatively, Iranian censorship appears to prevent the communication
en-route, preventing a response from ever being sent <xref target="Aryan-2012"/>.</t>
          <t>There are also cases of what is colloquially called "DNS lying", where
a censor mandates that the DNS responses provided -- by an operator of
a recursive resolver such as an Internet access provider -- be
different than what authoritative name server would provide
<xref target="Bortzmeyer-2015"/>.</t>
          <t>Trade-offs: These forms of DNS interference require the censor to
force a user to traverse a controlled DNS hierarchy (or intervening
network on which the censor serves as a Active Pervasive Attacker
<xref target="RFC7624"/> to rewrite DNS responses) for the mechanism to be
effective. It can be circumvented by using alternative DNS resolvers
(such as any of the public DNS resolvers) that may fall outside of the
jurisdictional control of the censor, or Virtual Private Network (VPN)
technology. DNS mangling and cache poisoning also imply returning an
incorrect IP to those attempting to resolve a domain name, but in some
cases the destination may be technically accessible; over HTTP, for
example, the user may have another method of obtaining the IP address
of the desired site and may be able to access it if the site is
configured to be the default server listening at this IP address.
Target blocking has also been a problem, as occasionally users outside
of the censors region will be directed through DNS servers or
DNS-rewriting network equipment controlled by a censor, causing the
request to fail. The ease of circumvention paired with the large risk
of content blocking and target blocking make DNS interference a
partial, difficult, and less than ideal censorship
mechanism.</t>
          <t>Additionally, the above mechanisms rely on DNSSEC not being deployed
or DNSSEC validation not being active on the client or recursive
resolver (neither of which are hard to imagine given limited
deployment of DNSSEC and limited client support for DNSSEC
validation). Note that an adversary seeking to merely block resolution
can serve a DNSSEC record that doesn't validate correctly, assuming of
course that the client/recursive resolver validates.</t>
          <t>Previously, techniques were used for e.g. censorship that relied on
DNS requests being passed in cleartext over port 53
<xref target="SSAC-109-2020"/>. With the deployment of encrypted DNS (e.g.,
DNS-over-HTTPS <xref target="RFC8484"/>) these requests are now increasingly passed
on port 443 with other HTTPS traffic, or in the case of DNS-over-TLS
<xref target="RFC7858"/> no longer passed in the clear (see also <xref target="sec_thid"/>).</t>
          <t>Empirical Examples: DNS interference, when properly implemented, is
easy to identify based on the shortcomings identified above. Turkey
relied on DNS interference for its country-wide block of websites such
Twitter and YouTube for almost week in March of 2014 but the ease of
circumvention resulted in an increase in the popularity of Twitter
until Turkish ISPs implementing an IP blocklist to achieve the
governmental mandate <xref target="Zmijewski-2014"/>.  Ultimately, Turkish ISPs
started hijacking all requests to Google and Level 3's international
DNS resolvers <xref target="Zmijewski-2014"/>. DNS interference, when incorrectly
implemented, has resulted in some of the largest "censorship
disasters".  In January 2014, China started directing all requests
passing through the Great Fire Wall to a single domain,
dongtaiwang.com, due to an improperly configured DNS poisoning
attempt; this incident is thought to be the largest Internet-service
outage in history <xref target="AFP-2014"/> <xref target="Anon-SIGCOMM12"/>. Countries such as
China, Iran, Turkey, and the United States have discussed blocking
entire TLDs as well, but only Iran has acted by blocking all Israeli
(.il) domains <xref target="Albert-2011"/>. DNS-blocking is commonly deployed in
European countries to deal with undesirable content, such as child
abuse content (Norway, United Kingdom, Belgium, Denmark, Finland,
France, Germany, Ireland, Italy, Malta, the Netherlands, Poland, Spain
and Sweden <xref target="Wright-2013"/> <xref target="Eneman-2010"/>), online gambling (Belgium,
Bulgaria, Czech Republic, Cyprus, Denmark, Estonia, France, Greece,
Hungary, Italy, Latvia, Lithuania, Poland, Portugal, Romania,
Slovakia, Slovenia, Spain (see Section 6.3.2 of: <xref target="EC-gambling-2012"/>,
<xref target="EC-gambling-2019"/>)), copyright infringement (all European Economic Area countries),
hate-speech and extremism (France <xref target="Hertel-2015"/>) and terrorism
content (France <xref target="Hertel-2015"/>).</t>
        </section>
      </section>
      <section anchor="transport-layer">
        <name>Transport Layer</name>
        <section anchor="performance-degradation">
          <name>Performance Degradation</name>
          <t>While other interference techniques outlined in this section mostly
focus on blocking or preventing access to content, it can be an
effective censorship strategy in some cases to not entirely block
access to a given destination, or service but instead degrade the
performance of the relevant network connection.  The resulting user
experience for a site or service under performance degradation can be
so bad that users opt to use a different site, service, or method of
communication, or may not engage in communication at all if there are
no alternatives.  Traffic shaping techniques that rate-limit the
bandwidth available to certain types of traffic is one example of a
performance degradation.</t>
          <t>Trade offs: While implementing a performance degradation will not
always eliminate the ability of people to access a desire resource, it
may force them to use other means of communication where censorship
(or surveillance) is more easily accomplished.</t>
          <t>Empirical Examples: Iran has been known to shape the bandwidth available to
HTTPS traffic to encourage unencrypted HTTP traffic <xref target="Aryan-2012"/>.</t>
        </section>
        <section anchor="packet-dropping">
          <name>Packet Dropping</name>
          <t>Packet dropping is a simple mechanism to prevent undesirable
traffic. The censor identifies undesirable traffic and chooses to not
properly forward any packets it sees associated with the traversing
undesirable traffic instead of following a normal routing
protocol. This can be paired with any of the previously described
mechanisms so long as the censor knows the user must route traffic
through a controlled router.</t>
          <t>Trade offs: Packet Dropping is most successful when every traversing
packet has transparent information linked to undesirable content, such
as a Destination IP. One downside Packet Dropping suffers from is the
necessity of blocking all content from otherwise allowable IPs
based on a single subversive sub-domain; blogging services and github
repositories are good examples. China famously dropped all github
packets for three days based on a single repository hosting
undesirable content <xref target="Anonymous-2013"/>.  The need to inspect every
traversing packet in close to real time also makes Packet Dropping
somewhat challenging from a QoS perspective.</t>
          <t>Empirical Examples: Packet Dropping is a very common form of technical
interference and lends itself to accurate detection given the unique
nature of the time-out requests it leaves in its wake. The Great
Firewall of China has been observed using packet dropping as one of its primary
mechanisms of technical censorship <xref target="Ensafi-2013"/>. Iran has also used
Packet Dropping as the mechanisms for throttling SSH
<xref target="Aryan-2012"/>. These are but two examples of a ubiquitous censorship
practice. Notably, packet dropping during the handshake or working connection is the only interference technique observed for QUIC traffic so far, e.g. in India, Iran, Russia and Uganda <xref target="Elmenhorst-2021"/><xref target="Elmenhorst-2022"/>.</t>
        </section>
        <section anchor="rst-inject">
          <name>RST Packet Injection</name>
          <t>Packet injection, generally, refers to a man-in-the-middle (MITM)
network interference technique that spoofs packets in an established
traffic stream. RST packets are normally used to let one side of TCP
connection know the other side has stopped sending information, and
thus the receiver should close the connection. RST Packet Injection is
a specific type of packet injection attack that is used to interrupt
an established stream by sending RST packets to both sides of a TCP
connection; as each receiver thinks the other has dropped the
connection, the session is terminated.</t>
          <t>QUIC is not vulnerable to these types of injection attacks once the
connection has been setup. While QUIC implements a stateless reset mechanism, 
such a reset is only accepted by a peer if the packet ends in a previously 
issued stateless reset token which is hard to guess. 
During the handshake, QUIC only provides effective protection
against off-path attackers but is vulnerable to injection attacks by
attackers that have parsed prior packets.
(See <xref target="I-D.ietf-quic-transport"/> for more details.)</t>
          <t>Trade-offs: Although ineffective against non-TCP protocols (QUIC, IPSec), RST Packet Injection has a few advantages that make it
extremely popular as a technique employed for censorship. RST Packet Injection is
an out-of-band interference mechanism, allowing the avoidance of the the
QoS bottleneck one can encounter with inline techniques such as Packet
Dropping. This out-of-band property allows a censor to inspect a copy
of the information, usually mirrored by an optical splitter, making it
an ideal pairing for DPI and protocol identification
<xref target="Weaver-2009"/> (this asynchronous version of a MITM is often called a
Man-on-the-Side (MOTS)).
RST Packet Injection also has the advantage of only
requiring one of the two endpoints to accept the spoofed packet for
the connection to be interrupted.</t>
          <t>The difficult part of RST Packet Injection is spoofing "enough"
correct information to ensure one end-point accepts a RST packet as
legitimate; this generally implies a correct IP, port, and TCP
sequence number. Sequence number is the hardest to get correct, as
<xref target="RFC0793"/> specifies an RST Packet should be in-sequence to be
accepted, although the RFC also recommends allowing in-window packets
as "good enough". This in-window recommendation is important, as if it
is implemented it allows for successful Blind RST Injection attacks
<xref target="Netsec-2011"/>.  When in-window sequencing is allowed, it is trivial
to conduct a Blind RST Injection: while the term "blind" injection
implies the censor
doesn't know any sensitive sequencing information about
the TCP stream they are injecting into, they can simply enumerate all
~70000 possible windows; this is particularly useful for interrupting
encrypted/obfuscated protocols such as SSH or Tor <xref target="Gilad"/>.
Some censorship evasion systems work by trying to confuse the censor
into tracking incorrect information, rendering their RST Packet Injection
useless <xref target="Khattak-2013"/>, <xref target="Wang-2017"/>, <xref target="Li-2017"/>, <xref target="Bock-2019"/>,
<xref target="Wang-2020"/>.</t>
          <t>RST Packet Injection relies on a stateful network, making it useless against UDP
connections. RST Packet Injection is among the most popular censorship
techniques used today given its versatile nature and effectiveness
against all types of TCP traffic. Recent research shows that a TCP RST
packet injection attack can even work in the case of an off-path
attacker <xref target="Cao-2016"/>.</t>
          <t>Empirical Examples: RST Packet Injection, as mentioned above, is most
often paired with identification techniques that require splitting,
such as DPI or protocol identification. In 2007, Comcast was accused of
using RST Packet Injection to interrupt traffic it identified as
BitTorrent <xref target="Schoen-2007"/>, this later led to a US Federal
Communications Commission ruling against Comcast
<xref target="VonLohmann-2008"/>. China has also been known to use RST Packet
Injection for censorship purposes. This interference is especially
evident in the interruption of encrypted/obfuscated protocols, such as
those used by Tor <xref target="Winter-2012"/>.</t>
        </section>
      </section>
      <section anchor="routing-layer">
        <name>Routing Layer</name>
        <section anchor="discon">
          <name>Network Disconnection</name>
          <t>While it is perhaps the crudest of all techniques employed for censorship, there is
no more effective way of making sure undesirable information isn't
allowed to propagate on the web than by shutting off the network. The
network can be logically cut off in a region when a censoring body
withdraws all of the Border Gateway Protocol (BGP) prefixes routing
through the censor's country.</t>
          <t>Trade-offs: The impact to a network disconnection in a region is huge
and absolute; the censor pays for absolute control over digital
information by losing the benefits a globally-accessible Internet brings. Network disconnections are also politically expensive - citizens used to being able to access Internet platforms and services see such disconnections as a loss of civil liberty. 
Network disconnection is rarely a long-term solution for any censor and is normally only used
as a last resort in times of substantial unrest.</t>
          <t>Empirical Examples: Network Disconnections tend to only happen in
times of substantial unrest, largely due to the huge social,
political, and economic impact such a move has. One of the first,
highly covered occurrences was with the Junta in Myanmar employing
Network Disconnection to help Junta forces quash a rebellion in 2007
<xref target="Dobie-2007"/>. China disconnected the network in the Xinjiang region
during unrest in 2009 in an effort to prevent the protests from
spreading to other regions <xref target="Heacock-2009"/>. The Arab Spring saw the
the most frequent usage of Network Disconnection, with events in Egypt
and Libya in 2011 <xref target="Cowie-2011"/>, and Syria in 2012
<xref target="Thomson-2012"/>. Russia indicated that it would attempt to
disconnect all Russian networks from the global internet in April 2019
as part of a test of the nation's network independence. Reports also
indicate that, as part of the test disconnect, Russian telecommunications firms
must now route all traffic to state-operated monitoring points
<xref target="Cimpanu-2019"/>. India was the country that saw the largest number of
internet shutdowns per year in 2016 and 2017 <xref target="Dada-2017"/>.</t>
        </section>
        <section anchor="advroute">
          <name>Adversarial Route Announcement</name>
          <t>More fine-grained and potentially wide-spread censorship can be achieved with BGP hijacking, which adversarially re-routes BGP IP prefixes incorrectly within a region and beyond. This restricts and effectively censors the correctly known location of information that flows into or out of a jurisdiction and will similarly prevent people from outside your jurisdiction from viewing content generated outside your jurisdiction as the adversarial route announcement propagates. The first can be achieved by an adversarial BGP announcement of incorrect routes that are not intended to leak beyond a jurisdiction, where the latter attacks traffic by deliberately introducing bogus BGP announcements that reach the global internet.</t>
          <t>Trade-offs: A global leak of a misrouted website can overwhelm an ISP if the website gets a lot of traffic. It is not a permanent solution because incorrect BGP routes that leak globally can be fixed, though within a jurisdiction only the ISP/IXP is in a position to correct them for local users.</t>
          <t>Empirical examples: In 2008 Pakistan Telecom censored Youtube at the request of the Pakistan government by changing its BGP routes for the website. The new routes were announced to the ISP's upstream providers and beyond. The entire Internet began directing Youtube routes to Pakistan Telecom and continued doing so for many hours. In 2018 nearly all Google services and Google cloud customers like Spotify all lost more than one hour of service after it lost control of several million of its IP addresses. Those IP prefixes were being misdirected to China Telecom, a Chinese government-owned ISP <xref target="Google-2018"/>}, in a manner similar to the BGP hijacking of US government and military websites by China Telecom in 2010. ISPs in both Russia (2022) and Myanmar (2021) have tried to hijack the same Twitter prefix more than once <xref target="MANRS"/>.</t>
        </section>
      </section>
      <section anchor="multi-layer-and-non-layer">
        <name>Multi-layer and Non-layer</name>
        <section anchor="ddos">
          <name>Distributed Denial of Service (DDoS)</name>
          <t>Distributed Denial of Service attacks are a common attack mechanism
used by "hacktivists" and malicious hackers, but censors have used
DDoS in the past for a variety of reasons. There is a huge variety of
DDoS attacks <xref target="Wikip-DoS"/>, but at a high level two possible impacts
tend to occur; a flood attack results in the service being unusable
while resources are being spent to flood the service, a crash attack
aims to crash the service so resources can be reallocated elsewhere
without "releasing" the service.</t>
          <t>Trade-offs: DDoS is an appealing mechanism when a censor would like to
prevent all access to undesirable content, instead of only access in
their region for a limited period of time, but this is really the only
uniquely beneficial feature for DDoS as a technique employed for censorship. The
resources required to carry out a successful DDoS against major
targets are computationally expensive, usually requiring renting or
owning a malicious distributed platform such as a botnet, and
imprecise. DDoS is an incredibly crude censorship technique, and
appears to largely be used as a timely, easy-to-access mechanism for
blocking undesirable content for a limited period of time.</t>
          <t>Empirical Examples: In 2012 the U.K.'s GCHQ used DDoS to temporarily
shutdown IRC chat rooms frequented by members of Anonymous using the
Syn Flood DDoS method; Syn Flood exploits the handshake used by TCP to
overload the victim server with so many requests that legitimate
traffic becomes slow or impossible
<xref target="Schone-2014"/> <xref target="CERT-2000"/>. Dissenting opinion websites are
frequently victims of DDoS around politically sensitive events in
Burma <xref target="Villeneuve-2011"/>. Controlling parties in Russia
<xref target="Kravtsova-2012"/>, Zimbabwe <xref target="Orion-2013"/>, and Malaysia
<xref target="Muncaster-2013"/> have been accused of using DDoS to interrupt
opposition support and access during elections.
In 2015, China launched a DDoS attack using a true MITM system
collocated with the Great Firewall, dubbed "Great Cannon", that was
able to inject JavaScript code into web visits to a Chinese search
engine that commandeered those user agents to send DDoS traffic to
various sites <xref target="Marczak-2015"/>.</t>
        </section>
        <section anchor="censorship-in-depth">
          <name>Censorship in Depth</name>
          <t>Often, censors implement multiple techniques in tandem, creating
"censorship in depth". Censorship in depth can take many forms; some
censors block the same content through multiple techniques (such as
blocking a domain by DNS, IP blocking, and HTTP simultaneously), some deploy
parallel systems to improve censorship reliability (such as deploying
multiple different censorship systems to block the same domain), and others 
can use complimentary systems to limit evasion (such as by blocking
unwanted protocols entirely, forcing users to use other filtered protocols).</t>
          <t>Trade-offs: Censorship in depth can be attractive for censors to deploy,
as it offers additional guarantees about censorship: even if someone evades 
one type of censorship, they may still be blocked by another. The main
drawback to this approach is the cost to initial deployment, as it requires
the system to deploy multiple censorship systems in tandem.</t>
          <t>Empirical Examples: Censorship in depth is present in many large censoring
nation states today. Researchers have observed China has deployed
significant censorship in depth, often censoring the same resource across
multiple protocols <xref target="Chai-2019"/>, <xref target="Bock-2020b"/> or deploying additional
censorship systems to censor the same content and protocol <xref target="Bock-2021b"/>. 
Iran also has deployed a complimentary protocol filter to limit which
protocols can be used on certain ports, forcing users to rely on protocols
their censorship system can filter <xref target="Bock-2020"/>.</t>
        </section>
      </section>
    </section>
    <section anchor="nontechint">
      <name>Non-Technical Interference</name>
      <section anchor="manualfiltering">
        <name>Manual Filtering</name>
        <t>As the name implies, sometimes manual labor is the easiest way to figure
out which content to block.  Manual Filtering differs from the common
tactic of building up blocklists in that it doesn't necessarily target
a specific IP or DNS, but instead removes or flags content.  Given the
imprecise nature of automatic filtering, manually sorting through
content and flagging dissenting websites, blogs, articles and other
media for filtration can be an effective technique on its own, or combined with other automated techniques of detection that are then followed by an action that would require manual confirmation. This filtration
can occur on the Backbone/ISP level -- China's army of monitors is a
good example <xref target="BBC-2013b"/> -- but more commonly manual filtering
occurs on an institutional level.  Internet Content Providers such as
Google or Weibo, require a business license to operate in China.  One
of the prerequisites for a business license is an agreement to sign a
"voluntary pledge" known as the "Public Pledge on Self-discipline for
the Chinese Internet Industry".  The failure to "energetically
uphold" the pledged values can lead to the ICPs being held liable for
the offending content by the Chinese government <xref target="BBC-2013b"/>.</t>
      </section>
      <section anchor="selfcensor">
        <name>Self-Censorship</name>
        <t>Self-censorship is difficult to document, as it manifests primarily
through a lack of undesirable content. Tools which encourage
self-censorship are those which may lead a prospective speaker to
believe that speaking increases the risk of unfavourable outcomes for
the speaker (technical monitoring, identification requirements,
etc.). Reporters Without Borders exemplify methods of imposing
self-censorship in their annual World Press Freedom Index reports
<xref target="RWB2020"/>.</t>
      </section>
      <section anchor="serverko">
        <name>Server Takedown</name>
        <t>As mentioned in passing by <xref target="Murdoch-2011"/>, servers must have a
physical location somewhere in the world. If undesirable content is
hosted in the censoring country the servers can be physically seized
or -- in cases where a server is virtualized in a cloud infrastructure
where it may not necessarily have a fixed physical location -- the
hosting provider can be required to prevent access.</t>
      </section>
      <section anchor="notice">
        <name>Notice and Takedown</name>
        <t>In many countries, legal mechanisms exist where an individual or other
content provider can issue a legal request to a content host that
requires the host to take down content. Examples include the systems
employed by companies like Google to comply with "Right to be
Forgotten" policies in the European Union <xref target="Google-RTBF"/>,
intermediary liability rules for electronic platform providers
<xref target="EC-2012"/>, or the copyright-oriented notice and takedown regime of
the United States Digital Millennium Copyright Act (DMCA) Section 512
<xref target="DMLP-512"/>.</t>
      </section>
      <section anchor="dns-seizures">
        <name>Domain-Name Seizures</name>
        <t>Domain names are catalogued in so-called name-servers operated by
legal entities called registries. These registries can be made to cede
control over a domain name to someone other than the entity which
registered the domain name through a legal procedure grounded in either
private contracts or public law. Domain name seizures is increasingly
used by both public authorities and private entities to deal with
undesired content dissemination <xref target="ICANN2012"/> <xref target="EFF2017"/>.</t>
      </section>
    </section>
    <section anchor="future-work">
      <name>Future work</name>
      <t>In addition to establishing a thorough resource for describing censorship techniques this document implicates critical areas for future work.</t>
      <t>Taken as a whole the apparent costs of implementation of censorship techniques indicate a need for better classification of censorship regimes as they evolve and mature and specifying censorship circumvention techniques themselves. Censors maturity refers to the technical maturity required of the censor to perform the specific censorship technique. Future work might classify techniques by essentially how hard a censor must work, including what infrastructure is required, in order to successfully censor content, users or services.</t>
      <t>On circumvention, the increase in protocols leveraging encryption is an effective counter-measure against some forms of censorship described in this document, but that thorough research on circumvention and encryption be left for another document. Moreover the censorship circumvention community has developed an area of research on "pluggable transports," which collects, documents and makes agile methods for obfuscating the on-path traffic of censorship circumvention tools such that it appears indistinguishable from other kinds of traffic <xref target="Tor-2020"/>. Those methods would benefit from future work in the internet standards community, too.</t>
      <t>Lastly the empirical examples demonstrate that censorship techniques can evolve quickly, and experience shows that this document can only be a point-in-time statement. Future work might extend this document with updates and new techniques described using a comparable methodology.</t>
    </section>
    <section anchor="Contributors">
      <name>Contributors</name>
      <t>This document benefited from discussions with and input from
David Belson, Stephane Bortzmeyer, Vinicius Fortuna,
Gurshabad Grover, Andrew McConachie, Martin Nilsson, Michael
Richardson, Patrick Vacek and Chris Wood.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>Informative References</name>
      <reference anchor="RFC0793" target="https://www.rfc-editor.org/info/rfc793">
        <front>
          <title>Transmission Control Protocol</title>
          <author fullname="J. Postel" initials="J." surname="Postel">
            <organization/>
          </author>
          <date month="September" year="1981"/>
        </front>
        <seriesInfo name="RFC" value="793"/>
        <seriesInfo name="DOI" value="10.17487/RFC0793"/>
      </reference>
      <reference anchor="RFC7754" target="https://www.rfc-editor.org/info/rfc7754">
        <front>
          <title>Technical Considerations for Internet Service Blocking and Filtering</title>
          <author fullname="R. Barnes" initials="R." surname="Barnes">
            <organization/>
          </author>
          <author fullname="A. Cooper" initials="A." surname="Cooper">
            <organization/>
          </author>
          <author fullname="O. Kolkman" initials="O." surname="Kolkman">
            <organization/>
          </author>
          <author fullname="D. Thaler" initials="D." surname="Thaler">
            <organization/>
          </author>
          <author fullname="E. Nordmark" initials="E." surname="Nordmark">
            <organization/>
          </author>
          <date month="March" year="2016"/>
          <abstract>
            <t>The Internet is structured to be an open communications medium.  This openness is one of the key underpinnings of Internet innovation, but it can also allow communications that may be viewed as undesirable by certain parties.  Thus, as the Internet has grown, so have mechanisms to limit the extent and impact of abusive or objectionable communications.  Recently, there has been an increasing emphasis on "blocking" and "filtering", the active prevention of such communications.  This document examines several technical approaches to Internet blocking and filtering in terms of their alignment with the overall Internet architecture.  When it is possible to do so, the approach to blocking and filtering that is most coherent with the Internet architecture is to inform endpoints about potentially undesirable services, so that the communicants can avoid engaging in abusive or objectionable communications.  We observe that certain filtering and blocking approaches can cause unintended consequences to third parties, and we discuss the limits of efficacy of various approaches.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7754"/>
        <seriesInfo name="DOI" value="10.17487/RFC7754"/>
      </reference>
      <reference anchor="RFC7624" target="https://www.rfc-editor.org/info/rfc7624">
        <front>
          <title>Confidentiality in the Face of Pervasive Surveillance: A Threat Model and Problem Statement</title>
          <author fullname="R. Barnes" initials="R." surname="Barnes">
            <organization/>
          </author>
          <author fullname="B. Schneier" initials="B." surname="Schneier">
            <organization/>
          </author>
          <author fullname="C. Jennings" initials="C." surname="Jennings">
            <organization/>
          </author>
          <author fullname="T. Hardie" initials="T." surname="Hardie">
            <organization/>
          </author>
          <author fullname="B. Trammell" initials="B." surname="Trammell">
            <organization/>
          </author>
          <author fullname="C. Huitema" initials="C." surname="Huitema">
            <organization/>
          </author>
          <author fullname="D. Borkmann" initials="D." surname="Borkmann">
            <organization/>
          </author>
          <date month="August" year="2015"/>
          <abstract>
            <t>Since the initial revelations of pervasive surveillance in 2013, several classes of attacks on Internet communications have been discovered.  In this document, we develop a threat model that describes these attacks on Internet confidentiality.  We assume an attacker that is interested in undetected, indiscriminate eavesdropping.  The threat model is based on published, verified attacks.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7624"/>
        <seriesInfo name="DOI" value="10.17487/RFC7624"/>
      </reference>
      <reference anchor="RFC6066" target="https://www.rfc-editor.org/info/rfc6066">
        <front>
          <title>Transport Layer Security (TLS) Extensions: Extension Definitions</title>
          <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd">
            <organization/>
          </author>
          <date month="January" year="2011"/>
          <abstract>
            <t>This document provides specifications for existing TLS extensions.  It is a companion document for RFC 5246, "The Transport Layer Security (TLS) Protocol Version 1.2".  The extensions specified are server_name, max_fragment_length, client_certificate_url, trusted_ca_keys, truncated_hmac, and status_request.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6066"/>
        <seriesInfo name="DOI" value="10.17487/RFC6066"/>
      </reference>
      <reference anchor="RFC8484" target="https://www.rfc-editor.org/info/rfc8484">
        <front>
          <title>DNS Queries over HTTPS (DoH)</title>
          <author fullname="P. Hoffman" initials="P." surname="Hoffman">
            <organization/>
          </author>
          <author fullname="P. McManus" initials="P." surname="McManus">
            <organization/>
          </author>
          <date month="October" year="2018"/>
          <abstract>
            <t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS.  Each DNS query-response pair is mapped into an HTTP exchange.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8484"/>
        <seriesInfo name="DOI" value="10.17487/RFC8484"/>
      </reference>
      <reference anchor="RFC7858" target="https://www.rfc-editor.org/info/rfc7858">
        <front>
          <title>Specification for DNS over Transport Layer Security (TLS)</title>
          <author fullname="Z. Hu" initials="Z." surname="Hu">
            <organization/>
          </author>
          <author fullname="L. Zhu" initials="L." surname="Zhu">
            <organization/>
          </author>
          <author fullname="J. Heidemann" initials="J." surname="Heidemann">
            <organization/>
          </author>
          <author fullname="A. Mankin" initials="A." surname="Mankin">
            <organization/>
          </author>
          <author fullname="D. Wessels" initials="D." surname="Wessels">
            <organization/>
          </author>
          <author fullname="P. Hoffman" initials="P." surname="Hoffman">
            <organization/>
          </author>
          <date month="May" year="2016"/>
          <abstract>
            <t>This document describes the use of Transport Layer Security (TLS) to provide privacy for DNS.  Encryption provided by TLS eliminates opportunities for eavesdropping and on-path tampering with DNS queries in the network, such as discussed in RFC 7626.  In addition, this document specifies two usage profiles for DNS over TLS and provides advice on performance considerations to minimize overhead from using TCP and TLS with DNS.</t>
            <t>This document focuses on securing stub-to-recursive traffic, as per the charter of the DPRIVE Working Group.  It does not prevent future applications of the protocol to recursive-to-authoritative traffic.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7858"/>
        <seriesInfo name="DOI" value="10.17487/RFC7858"/>
      </reference>
      <reference anchor="I-D.ietf-tls-sni-encryption" target="https://www.ietf.org/archive/id/draft-ietf-tls-sni-encryption-09.txt">
        <front>
          <title>Issues and Requirements for Server Name Identification (SNI) Encryption in TLS</title>
          <author fullname="Christian Huitema" initials="C." surname="Huitema">
            <organization>Private Octopus Inc.</organization>
          </author>
          <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
            <organization>RTFM, Inc.</organization>
          </author>
          <date day="28" month="October" year="2019"/>
          <abstract>
            <t>This document describes the general problem of encrypting the Server Name Identification (SNI) TLS parameter. The proposed solutions hide a hidden service behind a fronting service, only disclosing the SNI of the fronting service to external observers. This document lists known attacks against SNI encryption, discusses the current "HTTP co-tenancy" solution, and presents requirements for future TLS-layer solutions.

 In practice, it may well be that no solution can meet every requirement and that practical solutions will have to make some compromises.
            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-tls-sni-encryption-09"/>
      </reference>
      <reference anchor="I-D.ietf-tls-esni" target="https://www.ietf.org/archive/id/draft-ietf-tls-esni-15.txt">
        <front>
          <title>TLS Encrypted Client Hello</title>
          <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
            <organization>RTFM, Inc.</organization>
          </author>
          <author fullname="Kazuho Oku" initials="K." surname="Oku">
            <organization>Fastly</organization>
          </author>
          <author fullname="Nick Sullivan" initials="N." surname="Sullivan">
            <organization>Cloudflare</organization>
          </author>
          <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
            <organization>Cloudflare</organization>
          </author>
          <date day="3" month="October" year="2022"/>
          <abstract>
            <t>   This document describes a mechanism in Transport Layer Security (TLS)
   for encrypting a ClientHello message under a server public key.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Source for this draft and an issue tracker can be found at
   https://github.com/tlswg/draft-ietf-tls-esni
   (https://github.com/tlswg/draft-ietf-tls-esni).

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-tls-esni-15"/>
      </reference>
      <reference anchor="I-D.ietf-quic-transport" target="https://www.ietf.org/archive/id/draft-ietf-quic-transport-34.txt">
        <front>
          <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
          <author fullname="Jana Iyengar" initials="J." surname="Iyengar">
            <organization>Fastly</organization>
          </author>
          <author fullname="Martin Thomson" initials="M." surname="Thomson">
            <organization>Mozilla</organization>
          </author>
          <date day="14" month="January" year="2021"/>
          <abstract>
            <t>This document defines the core of the QUIC transport protocol.  QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration.  QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances.  Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.
            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-quic-transport-34"/>
      </reference>
      <reference anchor="RWB2020" target="https://rsf.org/en/2020-world-press-freedom-index-entering-decisive-decade-journalism-exacerbated-coronavirus">
        <front>
          <title>2020 World Press Freedom Index: Entering a decisive decade for journalism, exacerbated by coronavirus</title>
          <author>
            <organization>Reporters Without Borders</organization>
          </author>
          <date year="2020"/>
        </front>
      </reference>
      <reference anchor="HADOPI-2020" target="https://www.hadopi.fr/en/node/3668">
        <front>
          <title>Présentation</title>
          <author>
            <organization>Haute Autorité pour la Diffusion des oeuvres et la Protection des Droits sur Internet</organization>
          </author>
          <date year="2020"/>
        </front>
      </reference>
      <reference anchor="SSAC-109-2020" target="https://www.icann.org/en/system/files/files/sac-109-en.pdf">
        <front>
          <title>SAC109: The Implications of DNS over HTTPS and DNS over TLS</title>
          <author>
            <organization>ICANN Security and Stability Advisory Committee</organization>
          </author>
          <date year="2020"/>
        </front>
      </reference>
      <reference anchor="ICANN2012" target="https://www.icann.org/en/system/files/files/guidance-domain-seizures-07mar12-en.pdf">
        <front>
          <title>Guidance for Preparing Domain Name Orders, Seizures &amp; Takedowns</title>
          <author>
            <organization>ICANN Security and Stability Advisory Committee</organization>
          </author>
          <date year="2012"/>
        </front>
      </reference>
      <reference anchor="Tor-2020" target="https://2019.www.torproject.org/docs/pluggable-transports.html.en">
        <front>
          <title>Tor: Pluggable Transports</title>
          <author>
            <organization>The Tor Project</organization>
          </author>
          <date year="2020"/>
        </front>
      </reference>
      <reference anchor="WP-Def-2020" target="https://en.wikipedia.org/w/index.php?title=Censorship&amp;oldid=943938595">
        <front>
          <title>Censorship</title>
          <author>
            <organization>Wikipedia contributors</organization>
          </author>
          <date year="2020"/>
        </front>
      </reference>
      <reference anchor="EC-gambling-2012" target="https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:52012SC0345">
        <front>
          <title>Online gambling in the Internal Market</title>
          <author>
            <organization>European Commission</organization>
          </author>
          <date year="2012"/>
        </front>
      </reference>
      <reference anchor="EC-gambling-2019" target="https://ec.europa.eu/growth/content/evaluation-regulatory-tools-enforcing-online-gambling-rules-and-channelling-demand-towards-1_en">
        <front>
          <title>Evaluation of regulatory tools for enforcing online gambling rules and channeling demand towards controlled offers</title>
          <author>
            <organization>European Commission</organization>
          </author>
          <date year="2019"/>
        </front>
      </reference>
      <reference anchor="EC-2012" target="https://ec.europa.eu/information_society/newsroom/image/document/2017-4/consultation_summary_report_en_2010_42070.pdf">
        <front>
          <title>Summary of the results of the Public Consultation on the future of electronic commerce in the Internal Market and the implementation of the Directive on electronic commerce (2000/31/EC)</title>
          <author>
            <organization>European Commission</organization>
          </author>
          <date year="2012"/>
        </front>
      </reference>
      <reference anchor="Bentham-1791" target="https://www.google.com/books/edition/_/Ec4TAAAAQAAJ?hl=en">
        <front>
          <title>Panopticon Or the Inspection House</title>
          <author initials="J." surname="Bentham" fullname="Jeremy Bentham">
            <organization/>
          </author>
          <date year="1791"/>
        </front>
      </reference>
      <reference anchor="Ellul-1973" target="https://www.penguinrandomhouse.com/books/46234/propaganda-by-jacques-ellul/">
        <front>
          <title>Propaganda: The Formation of Men's Attitudes</title>
          <author initials="J." surname="Ellul" fullname="Jacques Ellul">
            <organization/>
          </author>
          <date year="1973"/>
        </front>
      </reference>
      <reference anchor="Reda-2017" target="https://juliareda.eu/2017/11/eu-website-blocking/">
        <front>
          <title>New EU law prescribes website blocking in the name of 'consumer protection'</title>
          <author initials="J." surname="Reda" fullname="Julia Reda">
            <organization/>
          </author>
          <date year="2017"/>
        </front>
      </reference>
      <reference anchor="Knight-2005" target="https://www.newscientist.com/article/dn7589-iranian-net-censorship-powered-by-us-technology/">
        <front>
          <title>Iranian net censorship powered by US technology</title>
          <author initials="W." surname="Knight" fullname="Will Knight">
            <organization/>
          </author>
          <date year="2005"/>
        </front>
      </reference>
      <reference anchor="SIDN2020" target="https://labs.ripe.net/Members/giovane_moura/detecting-and-taking-down-fraudulent-webshops-at-a-cctld">
        <front>
          <title>Detecting and Taking Down Fraudulent Webshops at the .nl ccTLD</title>
          <author initials="G." surname="Moura" fullname="Giovane Moura">
            <organization/>
          </author>
          <date year="2020"/>
        </front>
      </reference>
      <reference anchor="Cimpanu-2019" target="https://www.zdnet.com/article/russia-to-disconnect-from-the-internet-as-part-of-a-planned-test/">
        <front>
          <title>Russia to disconnect from the internet as part of a planned test</title>
          <author initials="C." surname="Cimpanu" fullname="Catalin Cimpanu">
            <organization/>
          </author>
          <date year="2019"/>
        </front>
      </reference>
      <reference anchor="Hertel-2015" target="https://www.sciencesetavenir.fr/high-tech/comment-les-autorites-peuvent-bloquer-un-site-internet_35828">
        <front>
          <title>Comment les autorités peuvent bloquer un site Internet</title>
          <author initials="O." surname="Hertel" fullname="Olivier Hertel">
            <organization/>
          </author>
          <date year="2015"/>
        </front>
      </reference>
      <reference anchor="Eneman-2010" target="https://www.gu.se/forskning/publikation/?publicationId=96592">
        <front>
          <title>ISPs filtering of child abusive material: A critical reflection of its effectiveness</title>
          <author initials="M." surname="Eneman" fullname="Marie Eneman">
            <organization/>
          </author>
          <date year="2010"/>
        </front>
      </reference>
      <reference anchor="Gatlan-2019" target="https://www.bleepingcomputer.com/news/security/south-korea-is-censoring-the-internet-by-snooping-on-sni-traffic/">
        <front>
          <title>South Korea is Censoring the Internet by Snooping on SNI Traffic</title>
          <author initials="S." surname="Gatlan" fullname="Sergiu Gatlan">
            <organization/>
          </author>
          <date year="2019"/>
        </front>
      </reference>
      <reference anchor="Lomas-2019" target="https://techcrunch.com/2019/10/30/github-removes-tsunami-democratics-apk-after-a-takedown-order-from-spain/">
        <front>
          <title>Github removes Tsunami Democràtic’s APK after a takedown order from Spain</title>
          <author initials="N." surname="Lomas" fullname="Natasha Lomas">
            <organization/>
          </author>
          <date year="2019"/>
        </front>
      </reference>
      <reference anchor="Victor-2019" target="https://www.nytimes.com/2019/10/09/world/asia/blizzard-hearthstone-hong-kong.html">
        <front>
          <title>Blizzard Sets Off Backlash for Penalizing Hearthstone Gamer in Hong Kong</title>
          <author initials="D." surname="Victor" fullname="Daniel Victor">
            <organization/>
          </author>
          <date year="2019"/>
        </front>
      </reference>
      <reference anchor="Glanville-2008" target="http://www.theguardian.com/commentisfree/2008/nov/17/censorship-internet">
        <front>
          <title>The Big Business of Net Censorship</title>
          <author initials="J." surname="Glanville" fullname="Jo Glanville">
            <organization/>
          </author>
          <date year="2008"/>
        </front>
      </reference>
      <reference anchor="EFF2017" target="https://www.eff.org/files/2017/08/02/domain_registry_whitepaper.pdf">
        <front>
          <title>Which Internet registries offer the best protection for domain owners?</title>
          <author initials="J." surname="Malcom" fullname="Jeremy Malcolm">
            <organization/>
          </author>
          <author initials="M." surname="Stoltz" fullname="Mitch Stoltz">
            <organization/>
          </author>
          <author initials="G." surname="Rossi" fullname="Gus Rossi">
            <organization/>
          </author>
          <author initials="V." surname="Paxson" fullname="Vern Paxson">
            <organization/>
          </author>
          <date year="2017"/>
        </front>
      </reference>
      <reference anchor="Tschantz-2016" target="https://oaklandsok.github.io/papers/tschantz2016.pdf">
        <front>
          <title>SoK: Towards Grounding Censorship Circumvention in Empiricism</title>
          <author initials="M." surname="Tschantz" fullname="Michael Carl Tschantz">
            <organization/>
          </author>
          <author initials="S." surname="Afroz" fullname="Sadia Afroz">
            <organization/>
          </author>
          <author initials="A." surname="Anonymous" fullname="Anonymous">
            <organization/>
          </author>
          <author initials="V." surname="Paxson" fullname="Vern Paxson">
            <organization/>
          </author>
          <date year="2016"/>
        </front>
      </reference>
      <reference anchor="Cao-2016" target="https://www.usenix.org/system/files/conference/usenixsecurity16/sec16_paper_cao.pdf">
        <front>
          <title>Off-Path TCP Exploits: Global Rate Limit Considered Dangerous</title>
          <author initials="Y." surname="Cao" fullname="Yue Cao">
            <organization/>
          </author>
          <author initials="Z." surname="Qian" fullname="Zhiyun Qian">
            <organization/>
          </author>
          <author initials="Z." surname="Wang" fullname="Zhongjie Wang">
            <organization/>
          </author>
          <author initials="T." surname="Dao" fullname="Tuan Dao">
            <organization/>
          </author>
          <author initials="S." surname="Krishnamurthy" fullname="Srikanth V. Krishnamurthy">
            <organization/>
          </author>
          <author initials="L." surname="Marvel" fullname="Lisa M. Marvel">
            <organization/>
          </author>
          <date year="2016"/>
        </front>
      </reference>
      <reference anchor="Leyba-2019" target="https://forrest.biodesign.asu.edu/data/publications/2019-compass-chokepoints.pdf">
        <front>
          <title>Borders and Gateways: Measuring and Analyzing National AS Chokepoints</title>
          <author initials="K." surname="Leyba" fullname="Kirtus G. Leyba">
            <organization/>
          </author>
          <author initials="B." surname="Edwards" fullname="Benjamin Edwards">
            <organization/>
          </author>
          <author initials="C." surname="Freeman" fullname="Cynthia Freeman">
            <organization/>
          </author>
          <author initials="J." surname="Crandall" fullname="Jedidiah R. Crandall">
            <organization/>
          </author>
          <author initials="S." surname="Forrest" fullname="Stephanie Forrest">
            <organization/>
          </author>
          <date year="2019"/>
        </front>
      </reference>
      <reference anchor="Chai-2019" target="https://www.usenix.org/system/files/foci19-paper_chai_update.pdf">
        <front>
          <title>On the Importance of Encrypted-SNI (ESNI) to Censorship Circumvention</title>
          <author initials="Z." surname="Chai" fullname="Zimo Chai">
            <organization/>
          </author>
          <author initials="A." surname="Ghafari" fullname="Amirhossein Ghafari">
            <organization/>
          </author>
          <author initials="A." surname="Houmansadr" fullname="Amir Houmansadr">
            <organization/>
          </author>
          <date year="2019"/>
        </front>
      </reference>
      <reference anchor="Patil-2019" target="https://irtf.org/anrw/2019/anrw2019-final44-acmpaginated.pdf">
        <front>
          <title>What Can You Learn from an IP?</title>
          <author initials="S." surname="Patil" fullname="Simran Patil">
            <organization/>
          </author>
          <author initials="N." surname="Borisov" fullname="Nikita Borisov">
            <organization/>
          </author>
          <date year="2019"/>
        </front>
      </reference>
      <reference anchor="Wright-2013" target="https://policyreview.info/articles/analysis/internet-filtering-trends-liberal-democracies-french-and-german-regulatory-debates">
        <front>
          <title>Internet filtering trends in liberal democracies: French and German regulatory debates</title>
          <author initials="J." surname="Wright" fullname="Joss Wright">
            <organization/>
          </author>
          <author initials="Y." surname="Breindl" fullname="Yana Breindl">
            <organization/>
          </author>
          <date year="2013"/>
        </front>
      </reference>
      <reference anchor="Grover-2019" target="https://cis-india.org/internet-governance/blog/reliance-jio-is-using-sni-inspection-to-block-websites">
        <front>
          <title>Reliance Jio is using SNI inspection to block websites</title>
          <author initials="G." surname="Grover" fullname="Gurshabad Grover">
            <organization/>
          </author>
          <author initials="K." surname="Singh" fullname="Kushagra Singh">
            <organization/>
          </author>
          <author initials="E." surname="Hickok" fullname="Elonnai Hickok">
            <organization/>
          </author>
          <date year="2019"/>
        </front>
      </reference>
      <reference anchor="Singh-2019" target="https://arxiv.org/abs/1912.08590">
        <front>
          <title>How India Censors the Web</title>
          <author initials="K." surname="Singh" fullname="Kushagra Singh">
            <organization/>
          </author>
          <author initials="G." surname="Grover" fullname="Gurshabad Grover">
            <organization/>
          </author>
          <author initials="V." surname="Bansal" fullname="Varun Bansal">
            <organization/>
          </author>
          <date year="2019"/>
        </front>
      </reference>
      <reference anchor="NA-SK-2019" target="https://www.newamerica.org/cybersecurity-initiative/c2b/c2b-log/analysis-south-koreas-sni-monitoring/">
        <front>
          <title>Analysis: South Korea's New Tool for Filtering Illegal Internet Content</title>
          <author initials="R." surname="Morgus" fullname="Robert Morgus">
            <organization/>
          </author>
          <author initials="J." surname="Sherman" fullname="Justin Sherman">
            <organization/>
          </author>
          <author initials="S." surname="Nam" fullname="Seonghyun Nam">
            <organization/>
          </author>
          <date year="2019"/>
        </front>
      </reference>
      <reference anchor="CitizenLab-2018" target="https://citizenlab.ca/2018/03/bad-traffic-sandvines-packetlogic-devices-deploy-government-spyware-turkey-syria/">
        <front>
          <title>Bad Traffic: Sandvine’s PacketLogic Devices Used to Deploy Government Spyware in Turkey and Redirect Egyptian Users to Affiliate Ads?</title>
          <author initials="B." surname="Marczak" fullname="Bill Marczak">
            <organization/>
          </author>
          <author initials="J." surname="Dalek" fullname="Jakub Dalek">
            <organization/>
          </author>
          <author initials="S." surname="McKune" fullname="Sarah McKune">
            <organization/>
          </author>
          <author initials="A." surname="Senft" fullname="Adam Senft">
            <organization/>
          </author>
          <author initials="J." surname="Scott-Railton" fullname="John Scott-Railton">
            <organization/>
          </author>
          <author initials="R." surname="Deibert" fullname="Ron Deibert">
            <organization/>
          </author>
          <date year="2018"/>
        </front>
      </reference>
      <reference anchor="OONI-2019" target="https://ooni.org/post/2019-china-wikipedia-blocking/">
        <front>
          <title>China is now blocking all language editions of Wikipedia</title>
          <author initials="S." surname="Singh" fullname="Sukhbir Singh">
            <organization/>
          </author>
          <author initials="A." surname="Filastò" fullname="Arturo Filastò">
            <organization/>
          </author>
          <author initials="M." surname="Xynou" fullname="Maria Xynou">
            <organization/>
          </author>
          <date year="2019"/>
        </front>
      </reference>
      <reference anchor="OONI-2018" target="https://ooni.org/post/2018-iran-protests-pt2/">
        <front>
          <title>Iran Protests: DPI blocking of Instagram (Part 2)</title>
          <author initials="L." surname="Evdokimov" fullname="Leonid Evdokimov">
            <organization/>
          </author>
          <date year="2018"/>
        </front>
      </reference>
      <reference anchor="Dada-2017" target="https://www.accessnow.org/keepiton-shutdown-tracker/">
        <front>
          <title>Launching STOP: the #KeepItOn internet shutdown tracker</title>
          <author initials="T." surname="Dada" fullname="Tinuola Dada">
            <organization/>
          </author>
          <author initials="P." surname="Micek" fullname="Peter Micek">
            <organization/>
          </author>
          <date year="2017"/>
        </front>
      </reference>
      <reference anchor="Verkamp-2012" target="https://www.usenix.org/system/files/conference/foci12/foci12-final1.pdf">
        <front>
          <title>Inferring Mechanics of Web Censorship Around the World</title>
          <author initials="J. P." surname="Verkamp" fullname="John-Paul Verkamp">
            <organization/>
          </author>
          <author initials="M." surname="Gupta" fullname="Minaxi Gupta">
            <organization/>
          </author>
          <date year="2012"/>
        </front>
      </reference>
      <reference anchor="Nabi-2013" target="http://0b4af6cdc2f0c5998459-c0245c5c937c5dedcca3f1764ecc9b2f.r43.cf2.rackcdn.com/12387-foci13-nabi.pdf">
        <front>
          <title>The Anatomy of Web Censorship in Pakistan</title>
          <author initials="Z." surname="Nabi" fullname="Zubair Nabi">
            <organization/>
          </author>
          <date year="2013"/>
        </front>
      </reference>
      <reference anchor="Tang-2016" target="https://www.cs.tufts.edu/comp/116/archive/fall2016/ctang.pdf">
        <front>
          <title>In-depth analysis of the Great Firewall of China</title>
          <author initials="C." surname="Tang" fullname="Chao Tang">
            <organization/>
          </author>
          <date year="2016"/>
        </front>
      </reference>
      <reference anchor="Aryan-2012" target="https://jhalderm.com/pub/papers/iran-foci13.pdf">
        <front>
          <title>Internet Censorship in Iran: A First Look</title>
          <author initials="S." surname="Aryan" fullname="Simurgh Aryan">
            <organization/>
          </author>
          <author initials="H." surname="Aryan" fullname="Homa Aryan">
            <organization/>
          </author>
          <author initials="J. A." surname="Halderman" fullname="J. Alex Halderman">
            <organization/>
          </author>
          <date year="2012"/>
        </front>
      </reference>
      <reference anchor="Husak-2016" target="https://link.springer.com/article/10.1186/s13635-016-0030-7">
        <front>
          <title>HTTPS traffic analysis and client identification using passive SSL/TLS fingerprinting</title>
          <author initials="M." surname="Husak" fullname="Martin Husak">
            <organization/>
          </author>
          <author initials="M." surname="Cermak" fullname="Milan Cermak">
            <organization/>
          </author>
          <author initials="T." surname="Jirsik" fullname="Tomas Jirsik">
            <organization/>
          </author>
          <author initials="P." surname="Celeda" fullname="Pavel Celeda">
            <organization/>
          </author>
          <date year="2016"/>
        </front>
      </reference>
      <reference anchor="Dalek-2013" target="http://conferences.sigcomm.org/imc/2013/papers/imc112s-dalekA.pdf">
        <front>
          <title>A Method for Identifying and Confirming the Use of URL Filtering Products for Censorship</title>
          <author initials="J." surname="Dalek" fullname="Jakub Dalek">
            <organization/>
          </author>
          <date year="2013"/>
        </front>
      </reference>
      <reference anchor="Jones-2014" target="http://conferences2.sigcomm.org/imc/2014/papers/p299.pdf">
        <front>
          <title>Automated Detection and Fingerprinting of Censorship Block Pages</title>
          <author initials="B." surname="Jones" fullname="Ben Jones">
            <organization/>
          </author>
          <date year="2014"/>
        </front>
      </reference>
      <reference anchor="Crandall-2010" target="http://www.cs.unm.edu/~crandall/icdcs2010.pdf">
        <front>
          <title>Empirical Study of a National-Scale Distributed Intrusion Detection System: Backbone-Level Filtering of HTML Responses in China</title>
          <author initials="J." surname="Crandall" fullname="Jedediah Crandall">
            <organization/>
          </author>
          <date year="2010"/>
        </front>
      </reference>
      <reference anchor="Senft-2013" target="https://citizenlab.org/2013/11/asia-chats-analyzing-information-controls-privacy-asian-messaging-applications/">
        <front>
          <title>Asia Chats: Analyzing Information Controls and Privacy in Asian Messaging Applications</title>
          <author initials="A." surname="Senft" fullname="Adam Senft">
            <organization/>
          </author>
          <date year="2013"/>
        </front>
      </reference>
      <reference anchor="Rushe-2015" target="http://www.theguardian.com/technology/2014/feb/11/bing-censors-chinese-language-search-results">
        <front>
          <title>Bing censoring Chinese language search results for users in the US</title>
          <author initials="D." surname="Rushe" fullname="Dominic Rushe">
            <organization/>
          </author>
          <date year="2013"/>
        </front>
      </reference>
      <reference anchor="Cheng-2010" target="http://arstechnica.com/tech-policy/2010/06/google-tweaks-china-to-hong-kong-redirect-same-results/">
        <front>
          <title>Google stops Hong Kong auto-redirect as China plays hardball</title>
          <author initials="J." surname="Cheng" fullname="Jacqui Cheng">
            <organization/>
          </author>
          <date year="2010"/>
        </front>
      </reference>
      <reference anchor="Boyle-1997" target="https://scholarship.law.duke.edu/faculty_scholarship/619/">
        <front>
          <title>Foucault in Cyberspace: Surveillance, Sovereignty, and Hardwired Censors</title>
          <author initials="J." surname="Boyle" fullname="James Boyle">
            <organization/>
          </author>
          <date year="1997"/>
        </front>
      </reference>
      <reference anchor="Whittaker-2013" target="http://www.zdnet.com/1168-keywords-skype-uses-to-censor-monitor-its-chinese-users-7000012328/">
        <front>
          <title>1,168 keywords Skype uses to censor, monitor its Chinese users</title>
          <author initials="Z." surname="Whittaker" fullname="Zach Whittaker">
            <organization/>
          </author>
          <date year="2013"/>
        </front>
      </reference>
      <reference anchor="BBC-2013" target="http://www.bbc.com/news/uk-24980765">
        <front>
          <title>Google and Microsoft agree steps to block abuse images</title>
          <author>
            <organization>BBC News</organization>
          </author>
          <date year="2013"/>
        </front>
      </reference>
      <reference anchor="Condliffe-2013" target="http://gizmodo.com/google-announces-massive-new-restrictions-on-child-abus-1466539163">
        <front>
          <title>Google Announces Massive New Restrictions on Child Abuse Search Terms</title>
          <author initials="J." surname="Condliffe" fullname="Jamie Condliffe">
            <organization/>
          </author>
          <date year="2013"/>
        </front>
      </reference>
      <reference anchor="Zhu-2011" target="http://arxiv.org/ftp/arxiv/papers/1107/1107.3794.pdf">
        <front>
          <title>An Analysis of Chinese Search Engine Filtering</title>
          <author initials="T." surname="Zhu" fullname="Tao Zhu">
            <organization/>
          </author>
          <date year="2011"/>
        </front>
      </reference>
      <reference anchor="Wagner-2009" target="http://advocacy.globalvoicesonline.org/wp-content/uploads/2009/06/deeppacketinspectionandinternet-censorship2.pdf">
        <front>
          <title>Deep Packet Inspection and Internet Censorship: International Convergence on an ‘Integrated Technology of Control'</title>
          <author initials="B." surname="Wagner" fullname="Ben Wagner">
            <organization/>
          </author>
          <date year="2009"/>
        </front>
      </reference>
      <reference anchor="Porter-2010" target="http://www.symantec.com/connect/articles/perils-deep-packet-inspection">
        <front>
          <title>The Perils of Deep Packet Inspection</title>
          <author initials="T." surname="Porter" fullname="Thomas Porter">
            <organization/>
          </author>
          <date year="2010"/>
        </front>
      </reference>
      <reference anchor="Clayton-2006" target="http://link.springer.com/chapter/10.1007/11957454_2">
        <front>
          <title>Ignoring the Great Firewall of China</title>
          <author initials="R." surname="Clayton" fullname="Richard Clayton">
            <organization/>
          </author>
          <date year="2006"/>
        </front>
      </reference>
      <reference anchor="Anonymous-2014" target="https://www.usenix.org/system/files/conference/foci14/foci14-anonymous.pdf">
        <front>
          <title>Towards a Comprehensive Picture of the Great Firewall's DNS Censorship</title>
          <author>
            <organization>Anonymous</organization>
          </author>
          <date year="2014"/>
        </front>
      </reference>
      <reference anchor="Khattak-2013" target="http://0b4af6cdc2f0c5998459-c0245c5c937c5dedcca3f1764ecc9b2f.r43.cf2.rackcdn.com/12389-foci13-khattak.pdf">
        <front>
          <title>Towards Illuminating a Censorship Monitor's Model to Facilitate Evasion</title>
          <author initials="S." surname="Khattak" fullname="Sheharbano Khattak">
            <organization/>
          </author>
          <date year="2013"/>
        </front>
      </reference>
      <reference anchor="Wilde-2012" target="https://blog.torproject.org/blog/knock-knock-knockin-bridges-doors">
        <front>
          <title>Knock Knock Knockin' on Bridges Doors</title>
          <author initials="T." surname="Wilde" fullname="Tim Wilde">
            <organization/>
          </author>
          <date year="2012"/>
        </front>
      </reference>
      <reference anchor="Wagstaff-2013" target="http://www.reuters.com/article/2013/05/04/uk-malaysia-election-online-idUKBRE94309G20130504">
        <front>
          <title>In Malaysia, online election battles take a nasty turn</title>
          <author initials="J." surname="Wagstaff" fullname="Jeremy Wagstaff">
            <organization/>
          </author>
          <date year="2013"/>
        </front>
      </reference>
      <reference anchor="Hepting-2011" target="https://en.wikipedia.org/wiki/Hepting_v._AT%26T">
        <front>
          <title>Hepting vs. AT&amp;T</title>
          <author>
            <organization>Wikipedia</organization>
          </author>
          <date year="2011"/>
        </front>
      </reference>
      <reference anchor="Hjelmvik-2010" target="https://www.iis.se/docs/hjelmvik_breaking.pdf">
        <front>
          <title>Breaking and Improving Protocol Obfuscation</title>
          <author initials="E." surname="Hjelmvik" fullname="Erik Hjelmvik">
            <organization/>
          </author>
          <date year="2010"/>
        </front>
      </reference>
      <reference anchor="Sandvine-2014" target="https://www.sandvine.com/downloads/general/technology/sandvine-technology-showcases/sandvine-technology-showcase-traffic-classification.pdf">
        <front>
          <title>Technology Showcase on Traffic Classification: Why Measurements and Freeform Policy Matter</title>
          <author>
            <organization>Sandvine</organization>
          </author>
          <date year="2014"/>
        </front>
      </reference>
      <reference anchor="Winter-2012" target="http://arxiv.org/pdf/1204.0447v1.pdf">
        <front>
          <title>How China is Blocking Tor</title>
          <author initials="P." surname="Winter" fullname="Phillip Winter">
            <organization/>
          </author>
          <date year="2012"/>
        </front>
      </reference>
      <reference anchor="Anonymous-2007" target="https://torrentfreak.com/how-to-bypass-comcast-bittorrent-throttling-071021">
        <front>
          <title>How to Bypass Comcast's Bittorrent Throttling</title>
          <author>
            <organization>Anonymous</organization>
          </author>
          <date year="2012"/>
        </front>
      </reference>
      <reference anchor="Anonymous-2013" target="https://en.greatfire.org/blog/2013/jan/github-blocked-china-how-it-happened-how-get-around-it-and-where-it-will-take-us">
        <front>
          <title>GitHub blocked in China - how it happened, how to get around it, and where it will take us</title>
          <author>
            <organization>Anonymous</organization>
          </author>
          <date year="2013"/>
        </front>
      </reference>
      <reference anchor="Ensafi-2013" target="http://arxiv.org/pdf/1312.5739v1.pdf">
        <front>
          <title>Detecting Intentional Packet Drops on the Internet via TCP/IP Side Channels</title>
          <author initials="R." surname="Ensafi" fullname="Roya Ensafi">
            <organization/>
          </author>
          <date year="2013"/>
        </front>
      </reference>
      <reference anchor="Weaver-2009" target="http://www.icir.org/vern/papers/reset-injection.ndss09.pdf">
        <front>
          <title>Detecting Forged TCP Packets</title>
          <author initials="N." surname="Weaver" fullname="Nicholas Weaver">
            <organization/>
          </author>
          <author initials="R." surname="Sommer" fullname="Robin Sommer">
            <organization/>
          </author>
          <author initials="V." surname="Paxson" fullname="Vern Paxson">
            <organization/>
          </author>
          <date year="2009"/>
        </front>
      </reference>
      <reference anchor="Netsec-2011" target="https://nets.ec/TCP-RST_Injection">
        <front>
          <title>TCP-RST Injection</title>
          <author>
            <organization>n3t2.3c</organization>
          </author>
          <date year="2011"/>
        </front>
      </reference>
      <reference anchor="Schoen-2007" target="https://www.eff.org/deeplinks/2007/10/eff-tests-agree-ap-comcast-forging-packets-to-interfere">
        <front>
          <title>EFF tests agree with AP: Comcast is forging packets to interfere with user traffic</title>
          <author initials="S." surname="Schoen" fullname="Seth Schoen">
            <organization/>
          </author>
          <date year="2007"/>
        </front>
      </reference>
      <reference anchor="VonLohmann-2008" target="https://www.eff.org/deeplinks/2008/08/fcc-rules-against-comcast-bit-torrent-blocking">
        <front>
          <title>FCC Rules Against Comcast for BitTorrent Blocking</title>
          <author initials="F." surname="VonLohmann" fullname="Fred VonLohmann">
            <organization/>
          </author>
          <date year="2008"/>
        </front>
      </reference>
      <reference anchor="Halley-2008" target="https://www.networkworld.com/article/2277316/tech-primers/tech-primers-how-dns-cache-poisoning-works.html">
        <front>
          <title>How DNS cache poisoning works</title>
          <author initials="B." surname="Halley" fullname="Bob Halley">
            <organization/>
          </author>
          <date year="2014"/>
        </front>
      </reference>
      <reference anchor="Zmijewski-2014" target="https://blogs.oracle.com/internetintelligence/turkish-internet-censorship-takes-a-new-turn">
        <front>
          <title>Turkish Internet Censorship Takes a New Turn</title>
          <author initials="E." surname="Zmijewski" fullname="Earl Zmijewski">
            <organization/>
          </author>
          <date year="2014"/>
        </front>
      </reference>
      <reference anchor="AFP-2014" target="http://www.businessinsider.com/chinas-internet-breakdown-reportedly-caused-by-censoring-tools-2014-1">
        <front>
          <title>China Has Massive Internet Breakdown Reportedly Caused By Their Own Censoring Tools</title>
          <author>
            <organization>AFP</organization>
          </author>
          <date year="2014"/>
        </front>
      </reference>
      <reference anchor="Anon-SIGCOMM12" target="http://www.sigcomm.org/sites/default/files/ccr/papers/2012/July/2317307-2317311.pdf">
        <front>
          <title>The Collateral Damage of Internet Censorship by DNS Injection</title>
          <author>
            <organization>Anonymous</organization>
          </author>
          <date year="2012"/>
        </front>
      </reference>
      <reference anchor="Albert-2011" target="https://opennet.net/blog/2011/06/dns-tampering-and-new-icann-gtld-rules">
        <front>
          <title>DNS Tampering and the new ICANN gTLD Rules</title>
          <author initials="K." surname="Albert" fullname="Kendra Albert">
            <organization/>
          </author>
          <date year="2011"/>
        </front>
      </reference>
      <reference anchor="Wikip-DoS" target="https://en.wikipedia.org/w/index.php?title=Denial-of-service_attack&amp;oldid=710558258">
        <front>
          <title>Denial of Service Attacks</title>
          <author>
            <organization>Wikipedia</organization>
          </author>
          <date year="2016"/>
        </front>
      </reference>
      <reference anchor="Schone-2014" target="http://www.nbcnews.com/feature/edward-snowden-interview/exclusive-snowden-docs-show-uk-spies-attacked-anonymous-hackers-n21361">
        <front>
          <title>Snowden Docs Show UK Spies Attacked Anonymous, Hackers</title>
          <author initials="M." surname="Schone" fullname="Mark Schone">
            <organization/>
          </author>
          <author initials="R." surname="Esposito" fullname="Richard Esposito">
            <organization/>
          </author>
          <author initials="M." surname="Cole" fullname="Matthew Cole">
            <organization/>
          </author>
          <author initials="G." surname="Greenwald" fullname="Glenn Greenwald">
            <organization/>
          </author>
          <date year="2014"/>
        </front>
      </reference>
      <reference anchor="CERT-2000" target="http://www.cert.org/historical/advisories/CA-1996-21.cfm">
        <front>
          <title>TCP SYN Flooding and IP Spoofing Attacks</title>
          <author>
            <organization>CERT</organization>
          </author>
          <date year="2000"/>
        </front>
      </reference>
      <reference anchor="Kravtsova-2012" target="http://www.themoscowtimes.com/news/article/cyberattacks-disrupt-oppositions-election/470119.html">
        <front>
          <title>Cyberattacks Disrupt Opposition's Election</title>
          <author initials="Y." surname="Kravtsova" fullname="Yekaterina Kravtsova">
            <organization/>
          </author>
          <date year="2012"/>
        </front>
      </reference>
      <reference anchor="Villeneuve-2011" target="http://access.opennet.net/wp-content/uploads/2011/12/accesscontested-chapter-08.pdf">
        <front>
          <title>Open Access: Chapter 8, Control and Resistance, Attacks on Burmese Opposition Media</title>
          <author initials="N." surname="Villeneuve" fullname="Nart Villeneuve">
            <organization/>
          </author>
          <date year="2011"/>
        </front>
      </reference>
      <reference anchor="Orion-2013" target="http://www.theinquirer.net/inquirer/news/2287433/zimbabwe-election-hit-by-hacking-and-ddos-attacks">
        <front>
          <title>Zimbabwe election hit by hacking and DDoS attacks</title>
          <author initials="E." surname="Orion" fullname="Egan Orion">
            <organization/>
          </author>
          <date year="2013"/>
        </front>
      </reference>
      <reference anchor="Muncaster-2013" target="http://www.theregister.co.uk/2013/05/09/malaysia_fraud_elections_ddos_web_blocking/">
        <front>
          <title>Malaysian election sparks web blocking/DDoS claims</title>
          <author initials="P." surname="Muncaster" fullname="Phil Muncaster">
            <organization/>
          </author>
          <date year="2013"/>
        </front>
      </reference>
      <reference anchor="Dobie-2007" target="http://news.bbc.co.uk/2/hi/asia-pacific/7016238.stm">
        <front>
          <title>Junta tightens media screw</title>
          <author initials="M." surname="Dobie" fullname="Michael Dobie">
            <organization/>
          </author>
          <date year="2007"/>
        </front>
      </reference>
      <reference anchor="Heacock-2009" target="https://opennet.net/blog/2009/07/china-shuts-down-internet-xinjiang-region-after-riots">
        <front>
          <title>China Shuts Down Internet in Xinjiang Region After Riots</title>
          <author initials="R." surname="Heacock" fullname="Rebekah Heacock">
            <organization/>
          </author>
          <date year="2009"/>
        </front>
      </reference>
      <reference anchor="Cowie-2011" target="https://archive.nanog.org/meetings/nanog51/presentations/Tuesday/LT-Cowie-Egypt%20Leaves%20The%20Internet.pdf">
        <front>
          <title>Egypt Leaves the Internet</title>
          <author initials="J." surname="Cowie" fullname="Jim Cowie">
            <organization/>
          </author>
          <date year="2011"/>
        </front>
      </reference>
      <reference anchor="Thomson-2012" target="http://www.theregister.co.uk/2012/11/29/syria_internet_blackout/">
        <front>
          <title>Syria Cuts off Internet and Mobile Communication</title>
          <author initials="I." surname="Thomson" fullname="Iain Thomson">
            <organization/>
          </author>
          <date year="2012"/>
        </front>
      </reference>
      <reference anchor="BBC-2013b" target="http://www.bbc.com/news/world-asia-china-2439695">
        <front>
          <title>China employs two million microblog monitors state media say</title>
          <author>
            <organization>BBC</organization>
          </author>
          <date year="2013"/>
        </front>
      </reference>
      <reference anchor="Calamur-2013" target="http://www.npr.org/blogs/thetwo-way/2013/11/29/247820503/prominent-egyptian-blogger-arrested">
        <front>
          <title>Prominent Egyptian Blogger Arrested</title>
          <author initials="K." surname="Calamur" fullname="Krishnadev Calamur">
            <organization/>
          </author>
          <date year="2013"/>
        </front>
      </reference>
      <reference anchor="AP-2012" target="http://www.huffingtonpost.com/2012/12/03/sattar-beheshit-iran_n_2233125.html">
        <front>
          <title>Sattar Beheshit, Iranian Blogger, Was Beaten In Prison According To Prosecutor</title>
          <author>
            <organization>Associated Press</organization>
          </author>
          <date year="2012"/>
        </front>
      </reference>
      <reference anchor="Hopkins-2011" target="http://readwrite.com/2011/03/03/communications_blocked_in_libya_this_week_in_onlin">
        <front>
          <title>Communications Blocked in Libya, Qatari Blogger Arrested: This Week in Online Tyranny</title>
          <author initials="C." surname="Hopkins" fullname="Curt Hopkins">
            <organization/>
          </author>
          <date year="2011"/>
        </front>
      </reference>
      <reference anchor="Guardian-2014" target="http://www.theguardian.com/world/2014/apr/17/chinese-blogger-jailed-crackdown-internet-rumours-qin-zhihui">
        <front>
          <title>Chinese blogger jailed under crackdown on 'internet rumours'</title>
          <author>
            <organization>The Gaurdian</organization>
          </author>
          <date year="2014"/>
        </front>
      </reference>
      <reference anchor="Bristow-2013" target="http://news.bbc.co.uk/2/hi/asia-pacific/7783640.stm">
        <front>
          <title>China's internet 'spin doctors‘</title>
          <author initials="M." surname="Bristow" fullname="Michael Bristow">
            <organization/>
          </author>
          <date year="2013"/>
        </front>
      </reference>
      <reference anchor="Fareed-2008" target="http://www.theguardian.com/media/2008/sep/22/chinathemedia.marketingandpr">
        <front>
          <title>China joins a turf war</title>
          <author initials="M." surname="Fareed" fullname="Malik Fareed">
            <organization/>
          </author>
          <date year="2008"/>
        </front>
      </reference>
      <reference anchor="Gao-2014" target="http://www.nytimes.com/2014/06/04/opinion/tiananmen-forgotten.html">
        <front>
          <title>Tiananmen, Forgotten</title>
          <author initials="H." surname="Gao" fullname="Helen Gao">
            <organization/>
          </author>
          <date year="2014"/>
        </front>
      </reference>
      <reference anchor="Murdoch-2011" target="http://access.opennet.net/wp-content/uploads/2011/12/accessdenied-chapter-3.pdf">
        <front>
          <title>Access Denied: Tools and Technology of Internet Filtering</title>
          <author initials="S. J." surname="Murdoch" fullname="Steven J. Murdoch">
            <organization/>
          </author>
          <author initials="R." surname="Anderson" fullname="Ross Anderson">
            <organization/>
          </author>
          <date year="2011"/>
        </front>
      </reference>
      <reference anchor="AFNIC-2013" target="http://www.afnic.fr/medias/documents/conseilscientifique/SC-consequences-of-DNS-based-Internet-filtering.pdf">
        <front>
          <title>Report of the AFNIC Scientific Council: Consequences of DNS-based Internet filtering</title>
          <author>
            <organization>AFNIC</organization>
          </author>
          <date year="2013"/>
        </front>
      </reference>
      <reference anchor="ICANN-SSAC-2012" target="https://www.icann.org/en/system/files/files/sac-056-en.pdf">
        <front>
          <title>SAC 056: SSAC Advisory on Impacts of Content Blocking via the Domain Name System</title>
          <author>
            <organization>ICANN Security and Stability Advisory Committee (SSAC)</organization>
          </author>
          <date year="2012"/>
        </front>
      </reference>
      <reference anchor="Ding-1999" target="http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.132.3302&amp;rep=rep1&amp;type=pdf">
        <front>
          <title>Centralized Content-Based Web Filtering and Blocking: How Far Can It Go?</title>
          <author initials="C." surname="Ding" fullname="Chen Ding">
            <organization/>
          </author>
          <author initials="C. H." surname="Chi" fullname="Chi-Hung Chi">
            <organization/>
          </author>
          <author initials="J." surname="Deng" fullname="Jing Deng">
            <organization/>
          </author>
          <author initials="C. L." surname="Dong" fullname="Chun-Lei Dong">
            <organization/>
          </author>
          <date year="1999"/>
        </front>
      </reference>
      <reference anchor="Trustwave-2015" target="https://www3.trustwave.com/software/8e6/hlp/r3000/files/1system_filter.html">
        <front>
          <title>Filter: SNI extension feature and HTTPS blocking</title>
          <author>
            <organization>Trustwave</organization>
          </author>
          <date year="2015"/>
        </front>
      </reference>
      <reference anchor="Sophos-2015" target="https://www.sophos.com/en-us/support/knowledgebase/115865.aspx">
        <front>
          <title>Understanding Sophos Web Filtering</title>
          <author>
            <organization>Sophos</organization>
          </author>
          <date year="2015"/>
        </front>
      </reference>
      <reference anchor="Shbair-2015" target="https://hal.inria.fr/hal-01202712/document">
        <front>
          <title>Efficiently Bypassing SNI-based HTTPS Filtering</title>
          <author initials="W. M." surname="Shbair" fullname="Wazen M. Shbair">
            <organization/>
          </author>
          <author initials="T." surname="Cholez" fullname="Thibault Cholez">
            <organization/>
          </author>
          <author initials="A." surname="Goichot" fullname="Antoine Goichot">
            <organization/>
          </author>
          <author initials="I." surname="Chrisment" fullname="Isabelle Chrisment">
            <organization/>
          </author>
          <date year="2015"/>
        </front>
      </reference>
      <reference anchor="RSF-2005" target="http://archives.rsf.org/print-blogs.php3?id_article=15013">
        <front>
          <title>Technical ways to get around censorship</title>
          <author>
            <organization>Reporters Sans Frontieres</organization>
          </author>
          <date year="2005"/>
        </front>
      </reference>
      <reference anchor="Marczak-2015" target="https://www.usenix.org/system/files/conference/foci15/foci15-paper-marczak.pdf">
        <front>
          <title>An Analysis of China’s “Great Cannon”</title>
          <author initials="B." surname="Marczak" fullname="Bill Marczak">
            <organization/>
          </author>
          <author initials="N." surname="Weaver" fullname="Nicholas Weaver">
            <organization/>
          </author>
          <author initials="J." surname="Dalek" fullname="Jakub Dalek">
            <organization/>
          </author>
          <author initials="R." surname="Ensafi" fullname="Roya Ensafi">
            <organization/>
          </author>
          <author initials="D." surname="Fifield" fullname="David Fifield">
            <organization/>
          </author>
          <author initials="S." surname="McKune" fullname="Sarah McKune">
            <organization/>
          </author>
          <author initials="A." surname="Rey" fullname="Arn Rey">
            <organization/>
          </author>
          <author initials="J." surname="Scott-Railton" fullname="John Scott-Railton">
            <organization/>
          </author>
          <author initials="R." surname="Deibert" fullname="Ron Deibert">
            <organization/>
          </author>
          <author initials="V." surname="Paxson" fullname="Vern Paxson">
            <organization/>
          </author>
          <date year="2015"/>
        </front>
      </reference>
      <reference anchor="Fifield-2015" target="https://petsymposium.org/2015/papers/03_Fifield.pdf">
        <front>
          <title>Blocking-resistant communication through domain fronting</title>
          <author initials="D." surname="Fifield" fullname="David Fifield">
            <organization/>
          </author>
          <author initials="C." surname="Lan" fullname="Chang Lan">
            <organization/>
          </author>
          <author initials="R." surname="Hynes" fullname="Rod Hynes">
            <organization/>
          </author>
          <author initials="P." surname="Wegmann" fullname="Percy Wegmann">
            <organization/>
          </author>
          <author initials="V." surname="Paxson" fullname="Vern Paxson">
            <organization/>
          </author>
          <date year="2015"/>
        </front>
      </reference>
      <reference anchor="Google-RTBF" target="https://support.google.com/legal/contact/lr_eudpa?product=websearch">
        <front>
          <title>Search removal request under data protection law in Europe</title>
          <author>
            <organization>Google, Inc.</organization>
          </author>
          <date year="2015"/>
        </front>
      </reference>
      <reference anchor="DMLP-512" target="http://www.dmlp.org/legal-guide/protecting-yourself-against-copyright-claims-based-user-content">
        <front>
          <title>Protecting Yourself Against Copyright Claims Based on User Content</title>
          <author>
            <organization>Digital Media Law Project</organization>
          </author>
          <date year="2012"/>
        </front>
      </reference>
      <reference anchor="Kopel-2013" target="http://dx.doi.org/doi:10.15779/Z384Q3M">
        <front>
          <title>Operation Seizing Our Sites: How the Federal Government is Taking Domain Names Without Prior Notice</title>
          <author initials="K." surname="Kopel" fullname="Karen Kopel">
            <organization/>
          </author>
          <date year="2013"/>
        </front>
      </reference>
      <reference anchor="Bortzmeyer-2015" target="https://labs.ripe.net/Members/stephane_bortzmeyer/dns-censorship-dns-lies-seen-by-atlas-probes">
        <front>
          <title>DNS Censorship (DNS Lies) As Seen By RIPE Atlas</title>
          <author initials="S." surname="Bortzmeyer" fullname="Stephane Bortzmeyer">
            <organization/>
          </author>
          <date year="2015"/>
        </front>
      </reference>
      <reference anchor="Wang-2017" target="https://www.cs.ucr.edu/~zhiyunq/pub/imc17_censorship_tcp.pdf">
        <front>
          <title>Your State is Not Mine: A Closer Look at Evading Stateful Internet Censorship</title>
          <author initials="Z." surname="Wang" fullname="Zhongjie Wang">
            <organization/>
          </author>
          <author initials="Y." surname="Cao" fullname="Yue Cao">
            <organization/>
          </author>
          <author initials="Z." surname="Qian" fullname="Zhiyun Qian">
            <organization/>
          </author>
          <author initials="C." surname="Song" fullname="Chengyu Song">
            <organization/>
          </author>
          <author initials="S." surname="Krishnamurthy" fullname="Srikanth V. Krishnamurthy">
            <organization/>
          </author>
          <date year="2017"/>
        </front>
      </reference>
      <reference anchor="Wang-2020" target="https://www.cs.ucr.edu/~zhiyunq/pub/ndss20_symtcp.pdf">
        <front>
          <title>SYMTCP: Eluding Stateful Deep Packet Inspection with Automated Discrepancy Discovery</title>
          <author initials="Z." surname="Wang" fullname="Zhongjie Wang">
            <organization/>
          </author>
          <author initials="S." surname="Zhu" fullname="Shitong Zhu">
            <organization/>
          </author>
          <author initials="Y." surname="Cao" fullname="Yue Cao">
            <organization/>
          </author>
          <author initials="Z." surname="Qian" fullname="Zhiyun Qian">
            <organization/>
          </author>
          <author initials="C." surname="Song" fullname="Chengyu Song">
            <organization/>
          </author>
          <author initials="S." surname="Krishnamurthy" fullname="Srikanth V. Krishnamurthy">
            <organization/>
          </author>
          <author initials="K." surname="Chan" fullname="Kevin S. Chan">
            <organization/>
          </author>
          <author initials="T." surname="Braun" fullname="Tracy D. Braun">
            <organization/>
          </author>
          <date year="2020"/>
        </front>
      </reference>
      <reference anchor="Li-2017" target="https://david.choffnes.com/pubs/liberate-imc17.pdf">
        <front>
          <title>lib•erate, (n) : A library for exposing (traffic-classification) rules and avoiding them efficiently</title>
          <author initials="F." surname="Li" fullname="Fangfan Li">
            <organization/>
          </author>
          <author initials="A." surname="Razaghpanah" fullname="Abbas Razaghpanah">
            <organization/>
          </author>
          <author initials="A." surname="Kakhki" fullname="Arash Molavi Kakhki">
            <organization/>
          </author>
          <author initials="A." surname="Niaki" fullname="Arian Akhavan Niaki">
            <organization/>
          </author>
          <author initials="D." surname="Choffnes" fullname="David Choffnes">
            <organization/>
          </author>
          <author initials="P." surname="Gill" fullname="Phillipa Gill">
            <organization/>
          </author>
          <author initials="A." surname="Mislove" fullname="Alan Mislove">
            <organization/>
          </author>
          <date year="2017"/>
        </front>
      </reference>
      <reference anchor="Bock-2019" target="https://geneva.cs.umd.edu/papers/geneva_ccs19.pdf">
        <front>
          <title>Geneva: Evolving Censorship Evasion Strategies</title>
          <author initials="K." surname="Bock" fullname="Kevin Bock">
            <organization/>
          </author>
          <author initials="G." surname="Hughey" fullname="George Hughey">
            <organization/>
          </author>
          <author initials="X." surname="Qiang" fullname="Xiao Qiang">
            <organization/>
          </author>
          <author initials="D." surname="Levin" fullname="Dave Levin">
            <organization/>
          </author>
          <date year="2019"/>
        </front>
      </reference>
      <reference anchor="Bock-2020" target="https://geneva.cs.umd.edu/papers/evading-censorship-in-depth.pdf">
        <front>
          <title>Detecting and Evading Censorship-in-Depth: A Case Study of Iran’s Protocol Filter</title>
          <author initials="K." surname="Bock" fullname="Kevin Bock">
            <organization/>
          </author>
          <author initials="Y." surname="Fax" fullname="Yair Fax">
            <organization/>
          </author>
          <author initials="K." surname="Reese" fullname="Kyle Reese">
            <organization/>
          </author>
          <author initials="J." surname="Singh" fullname="Jasraj Singh">
            <organization/>
          </author>
          <author initials="D." surname="Levin" fullname="Dave Levin">
            <organization/>
          </author>
          <date year="2020"/>
        </front>
      </reference>
      <reference anchor="Bock-2020b" target="https://geneva.cs.umd.edu/posts/china-censors-esni/esni/">
        <front>
          <title>Exposing and Circumventing China's Censorship of ESNI</title>
          <author initials="K." surname="Bock" fullname="Kevin Bock">
            <organization/>
          </author>
          <author initials="" surname="iyouport" fullname="iyouport">
            <organization/>
          </author>
          <author initials="" surname="Anonymous" fullname="Anonymous">
            <organization/>
          </author>
          <author initials="L." surname="Merino" fullname="Louis-Henri Merino">
            <organization/>
          </author>
          <author initials="D." surname="Fifield" fullname="David Fifield">
            <organization/>
          </author>
          <author initials="A." surname="Houmansadr" fullname="Amir Houmansadr">
            <organization/>
          </author>
          <author initials="D." surname="Levin" fullname="Dave Levin">
            <organization/>
          </author>
          <date year="2020"/>
        </front>
      </reference>
      <reference anchor="Rambert-2021" target="https://www.andrew.cmu.edu/user/nicolasc/publications/Rambert-WWW21.pdf">
        <front>
          <title>Chinese Wall or Swiss Cheese? Keyword filtering in the Great Firewall of China</title>
          <author initials="R." surname="Rampert" fullname="Raymond Rampert">
            <organization/>
          </author>
          <author initials="Z." surname="Weinberg" fullname="Zachary Weinberg">
            <organization/>
          </author>
          <author initials="D." surname="Barradas" fullname="Diogo Barradas">
            <organization/>
          </author>
          <author initials="N." surname="Christin" fullname="Nicolas Christin">
            <organization/>
          </author>
          <date year="2021"/>
        </front>
      </reference>
      <reference anchor="Knockel-2021" target="https://dl.acm.org/doi/10.1145/3473604.3474560">
        <front>
          <title>Measuring QQMail's automated email censorship in China</title>
          <author initials="J." surname="Knockel" fullname="Jeffery Knockel">
            <organization/>
          </author>
          <author initials="L." surname="Ruan" fullname="Lotus Ruan">
            <organization/>
          </author>
          <date year="2021"/>
        </front>
      </reference>
      <reference anchor="Bock-2021" target="https://geneva.cs.umd.edu/papers/woot21-weaponizing-availability.pdf">
        <front>
          <title>Your Censor is My Censor: Weaponizing Censorship Infrastructure for Availability Attacks</title>
          <author initials="K." surname="Bock" fullname="Kevin Bock">
            <organization/>
          </author>
          <author initials="P." surname="Bharadwaj" fullname="Pranav Bharadwaj">
            <organization/>
          </author>
          <author initials="J." surname="Singh" fullname="Jasraj Singh">
            <organization/>
          </author>
          <author initials="D." surname="Levin" fullname="Dave Levin">
            <organization/>
          </author>
          <date year="2021"/>
        </front>
      </reference>
      <reference anchor="Bock-2021b" target="https://geneva.cs.umd.edu/papers/foci21.pdf">
        <front>
          <title>Even Censors Have a Backup: Examining China’s Double HTTPS Censorship Middleboxes</title>
          <author initials="K." surname="Bock" fullname="Kevin Bock">
            <organization/>
          </author>
          <author initials="G." surname="Naval" fullname="Gabriel Naval">
            <organization/>
          </author>
          <author initials="K." surname="Reese" fullname="Kyle Reese">
            <organization/>
          </author>
          <author initials="D." surname="Levin" fullname="Dave Levin">
            <organization/>
          </author>
          <date year="2021"/>
        </front>
      </reference>
      <reference anchor="Satija-2021" target="https://sambhav.info/files/blindtls-foci21.pdf">
        <front>
          <title>BlindTLS: Circumventing TLS-based HTTPS censorship</title>
          <author initials="S." surname="Satija" fullname="Sambhav Satija">
            <organization/>
          </author>
          <author initials="R." surname="Chatterjee" fullname="Rahul Chatterjee">
            <organization/>
          </author>
          <date year="2021"/>
        </front>
      </reference>
      <reference anchor="Elmenhorst-2021" target="https://dl.acm.org/doi/pdf/10.1145/3487552.3487836">
        <front>
          <title>Web Censorship Measurements of HTTP/3 over QUIC</title>
          <author initials="K." surname="Elmenhorst" fullname="Kathrin Elmenhorst">
            <organization/>
          </author>
          <author initials="B." surname="Schuetz" fullname="Bertram Schuetz">
            <organization/>
          </author>
          <author initials="S." surname="Basso" fullname="Simone Basso">
            <organization/>
          </author>
          <author initials="N." surname="Aschenbruck" fullname="Nils Aschenbruck">
            <organization/>
          </author>
          <date year="2021"/>
        </front>
      </reference>
      <reference anchor="Elmenhorst-2022" target="https://www.opentech.fund/news/a-quick-look-at-quic/">
        <front>
          <title>A Quick Look at QUIC Censorship</title>
          <author initials="K." surname="Elmenhorst" fullname="Kathrin Elmenhorst">
            <organization/>
          </author>
          <date year="2022"/>
        </front>
      </reference>
      <reference anchor="Gilad" target="https://doi.org/10.1145/2597173">
        <front>
          <title>Off-Path TCP Injection Attacks</title>
          <author initials="Y." surname="Gilad" fullname="Yossi Gilad">
            <organization/>
          </author>
          <author initials="A." surname="Herzberg" fullname="Amir Herzberg">
            <organization/>
          </author>
          <date year="2014"/>
        </front>
      </reference>
      <reference anchor="MANRS" target="https://www.manrs.org/2022/03/lesson-learned-twitter-shored-up-its-routing-security/">
        <front>
          <title>Lesson Learned: Twitter Shored Up Its Routing Security</title>
          <author initials="A." surname="Siddiqui" fullname="Aftab Siddiqui">
            <organization/>
          </author>
          <date year="2022"/>
        </front>
      </reference>
      <reference anchor="Google-2018" target="https://status.cloud.google.com/incident/cloud-networking/18018">
        <front>
          <title>Google Cloud Networking Incident #18018</title>
          <author>
            <organization/>
          </author>
          <date year="2018"/>
        </front>
      </reference>
      <reference anchor="ekr-2021" target="https://educatedguesswork.org/posts/apple-csam-intro/">
        <front>
          <title>Overview of Apple's Client-side CSAM Scanning</title>
          <author initials="E." surname="Rescorla" fullname="Eric Rescorla">
            <organization/>
          </author>
          <date year="2021"/>
        </front>
      </reference>
    </references>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA9y96Y4cybUm+N+fwsHCvUX2jSVXkklBkHIjmcUkmWJkiZIa
DcLDwyLCmR7uIV8yGSRqoMfoAbqBwfzrv/MK9030JHO+c2z1iMhkSWoMMOq+
VZUW7uZmx46dfen3+1GTNbl6ER/Ho7a6Vau4nMYfyyqf3GUTFZ+qoi6rep4t
42uVzovsr62qo2Q8rtTti3hSJdOmn1XNtL9USTXrp/bxaFKmRbJQ9z7U33ke
pUmjZmW1ehFnxbSMomxZvYibqq2bvZ2do529KKlU8iJ+pQpVJXl0V1Y3s6ps
ly9ini26USsam7yIL4pGVYVq+mf4YBTVTVJMPiV5WdAiVrTqZfYi/q9NmfZi
+nxTqWlN/7Va4D/+WxQlbTMvqxdR3I9i+l9W1C/inwaXg/h1kuc8JNv5qazV
ch5flpUqvpbu17KaJUX2NWmysnCLiUdlmqlmxY+oRZLlL+I5vfL7rC7TAb0T
fO/t4GwQHydVWXgffJul80TlcfBT+LXTn+OTss0nqvK/s5AXB5NK3Q0SvPr7
GX4ZpOUi+OwxzVzQy/WkbBo9h3z7eKHyLFn/Nfi8/82EXxjQlqe/T7y3Bmka
fPJkQIAs6FDct05U4Y2FG7yqsiJVjd68/tb489Pfp/VgaX4bqEkbfOTdIH6p
kkUd7uldlt6E4+G3fo5P51mazEr/W1P9/O/bVH5c+9jbQfymKCfKx5W3dNKE
2v4PnYNTwJN4WlbxmVqUaZWkq/jf5aqVeTkL8GZxw9P8Pp00jDlRVJTVgma6
VS/o3tDtcX/FH16e7jw72n/B//Xs2eGB/q+ne/q/nu48fSr/9fzgufn1+eFz
+q+L/hmfYL/J635dZH1VpNVqqQ87+FXRz/7YX9ss7TdVUtRLumO8kI8nezt7
O4IlDd1Y1dAVaJpl/WI4rOoptjJUxRAP9e9AePrLStV1f1opNSkX/YzQ6Euf
AZUVs/5EpVlNm8R/JBPV/1y2VZHkWb3oqy9JqqoxEZRJPy0J35PbjAiJfFmo
3CN8RugbIRV9Jn4pn6EbS595EZ/r78RJbL4Uy5f4lNzXerH3uXi8ir0vPuJP
WooS64N/EX9QAAvdivhjRj+2Dd3bCreEH5rQVC9irJDg9vr47P3VRX877O7u
7gbzZFIus8G0AgSBHcP9p0+fBxu+qv7zf9UEPca4rQt7TWMqPm6bssqa//xf
8ZL2GedJfJZNp21NbxIQ6rhU7S0BLSa6Rr9dVWWj0sb8eFaVWVPHNb1oqN/6
rkaj49P+7s7RA/uiK1YUBjPqFd28xXCa5arW/6yTlGdRxWA5mQb7pQ/QLy/i
67mKLxbLnKbCEmvwtbN3o7i8pQv3+vr6ahQTgXJD15ejrdC5OD1+9y4eqbQl
6Kz4vVGTjLMcfx1PbomY0y0/LReLjIidWt82T7C3s7v3j2951maThAhdn5A1
yYp+rbKvLR1Gf+fZIql29zbB4pV+h1GX0H2ZMGqf8QzxO6JR8XtGvx5tTqYD
9Ulu6EbcFdvR+J+Bx+4eweO6rO7BAHroaACYEDYuq/IzIRkDhkSKerjM29ks
GefKkZl6MG8W+UAVwebpG8Q4zNPxtX1667aAMtcMKf7m+jF+vOqfqek9K6cz
uMtusqWaEBPEku+GTL4Gy/nyd7yw3zqJ6t/LfJJNfnt0sH+0//zw6DBYvXts
63I/mi8R6SmaKhvj9m6gJOen/VmyGOegnttxULVVP6eV0r/LZUL/GuZqluR9
zE3kY3j+bnj9p+vh7+jIf3t6fnn+pxeHmGx0urN/EC79fUGfUrH5JrHHuMFl
ZKKQ5MQVqxvVbN3WORagkkLwpwbxWUegzp6Otuwp9bZDUuNdMx+a/ajbJG+Z
NPQrNWvzhIC36jdlCa4GXppi7pL34r5VtXQX+4TwfZKtikLlufCkBYaa8i6p
JnV/91MHFc/tt0CF3Odi/hzfTvvJuOyAjz/Jd0x/EoPyxVh/URCgzHPiROV0
Shf6H4fukUD3HkTxgWqljrL4VIuoOyzUXV2V5WKYLZKZwq1tF4A4Tfmsf4AD
qNu80e+0C6Jeq08VM0aC2yd6aufTwd7Os5110i4PA4ZAKKJWNE9t/rxqCV4p
7ctNT7Dkn6ZtQ7QND6qcLjbxaXqQpOCFqog4bsZPhjjGM2IiamE4qPnaWVaB
95F0QGObZn1M6svOcH93eH765J/DdRKMm3my6O8+O9rdzj9mZTnLFWT74bgs
b+ohUQYsePhpeJ4eXB/T//5wfPzT7+b5bzvYeZUUJQl3dC7EDTQo6qXm7K/L
tlab1q+1IVWpxcosUf+kdadgVHaELQC/8rzN+7tHz/a372epCmJ5BVFtYnhz
rMLb28HTvf2D4RJYSOL0JOmPV/3PSQrltK8w+bAjA5kHhci/NDiL03yrih/r
+Lihh1uSY+7Zq3xAVt/ZqhvTG6W9QfhVtDbg/eZ9fm5JWaroGVwlPDbc3SVC
3L9T4zprVH+cl+kNXfdwN+/UXXz+M0lgdzEk5ZQoP61KvxObdwxaY+3Y5o98
7wg36SUjt/14z2axNF5/Z6d2yOLoM9romyKbzRva6s7h9iMFYSASUTRZ3fBh
JhWhXU4konh2+Pyon9FhZ0nRhxLvGQmW5R1h2QRn3Nb9xupGIVQu5OUYSrd7
OdYvQ0D/eRS7l7fv/GOW53o//tY/DvxBs/mdQwi1F2fvtssEeTKuBxVxatp/
M3yrFmOiz8NZVt4mhfq0IEE7GU4UnwixEuYjyQ1zFZLBSAtK2glxgKJhrJiX
S2I/TT/pp2mTTwIInJlJmHRd8yQk690VpOOYSeKPepI4aRg9BkUep+n15dl2
gLySpcZvsVQfJK8G3lggcpwS0UyK9h7WDHz4OiGIBIhAulOdJcRI+5OsJoQt
aEMEAtICaa2kCWoLT1L3SZRt+uWUALHMwRUJaqpuQpT4wLMRk4zdbDFmE7pu
TDRJHWM2XJIk1rPFmG07SE6ThpTAwuzTB8rpIBgN+OprRcpfDqjcc0v4iqSq
Vk1yq4qsgnY3J8RjzB8yfyFkYDFE1DX6ryUpZhily08kquq3pB+AgJg9fto/
fL4X6oWnMlHMwoXR+wgSMlOsZ4rbImayYlS67TB5n2e3GXQr3qQPkvcDf9BC
BFfnvIAgA4jcow3O2kGthiRo1DcFqOESnP6GCfjwd/yH6HgXJEw/PTzaC+nC
6IokrCzXaj0dcjrPSPtPxi0r98QI6JckhwWUSCnhIYkAlZrmmgHSC1BrFYlV
zO8LVd/DI0h2yJTelQ+CtwN/0IIAd+VV0uQCgnuuCmkwaknrp+NftmxPo1sD
ejqstRY2rEtaT/+mrFTSz2pNQEFHgqtDRLQuynIpwi1bd0iPmk6zNLw7I8wW
v8FscVZrOzAA6EQlujpEVUd6NshBo3cX0LMw23YQjVQ1y1q9bR9Go4E/GFyc
S9JY63tAhKuRVm2RzhkweHC4S9LXDtHZZt6OScRfkJZP3KNuaRUZJHZY2+i0
6Rotb/rJlHZExKTRum+fzTJCeuolacshdF7xrLGeNb6WWbUN7z//L5r273/7
P0mouHoT88xEWMzMMc8sZGiEmbdD6h1RmXqeyO59SL0beGMBoP6YpQ3r1vch
U7FqsoWqA1DtHA3Z+DZMiGQO6Up9/UqaRX+uiDLO66YkJWheEs7c0D9Y3Q7g
caKfp8Olu/J+Oo1PkvQmp9WL6UHBZvYVWPLaTUinDXEkg5BJv7yhf2yHxRlx
d5Xr/fmwOBv4gwEwXhEu3RI3V5BLnq/DQ4ODMHrW0uJJemCQaBKb1bBADvHq
sChvhySdeUJJ5pu4NBggWp5ks/iEKAvIBGjHO7olTpffLm6VbrUdgSsct4LH
c1DPly+3C5fYGlEtNkOICYklTNrNzt5QjEikds1IFiP9625ORH6ZLImydLWu
j/Msnbsrr1/JYA6EqskEgQTQxpMr+dDlEzGhPMk7v1s/2f4mReJtkqdl3lUk
eHSx4a23WUNrGzVl3nztkFtvMHznVVvHH0qSDDqijBsLn/8j7Tu+Sr7UZUCt
/jjwBwNh+LqGpt58xTV8uvlwyoRuRzGpy5uBUKhBVg4Z/vWw0a/j7XUduHxD
iKbV/ldV2RYTXCvPT3eaVaRwg4njJOgEzhfLrMrSrF48dAjG1XSaVLndRQeu
wXD4+iiBMeqYSFvwEtF1Nxa+cVyUxYpE4IC6sTvKH/9nzuMppNGkvOcocE9I
uyyyL3xVAtMrCY2E4hDHhvKI4ba7T8F4d59+4jP7lCbl2kkRFexfJcREr0+v
4vMvyxzmccK0vByThPGBFhhfZousYYtFNmEthajcTNGhbpAwQiD8uVXYlg+A
Pw/sSPjsX+bZisS4P2Qhu/3LwA11XyBS/JnkmI+0nM4rdih85bol1essXND1
wI508KQi6a0gyNCZvamyek7DLXGFVQdr1n8L57nM6gQoSULXbShxxpfBaIAN
l2o1Tu7hkES7SKtuBuOsnKg6mxWDpG7h7hvSNMnQkzeZoh71IZMlNUlc8/JG
LUviDPUaMmg3D2tmJOSou2SF66Ro6spobMfEJFfMJN/x9IQlx6P41M36EFK8
yaqGiBvRMt6jD5A3/lj41okqPpPwQnRiwlTFf+1kEIyGL56u6AzpwsOD1hF3
SQnyR7ukfpIRoZjHHwhjYd8xLnRH8IPhDvIQn5pDGIAVBwfVQRp/NJAGTudJ
9oBgtI0MTMs0o4PWd53m+dQuMff6ndemxAWsmex5IRHgXLynpKJCPn58Tv98
AqV0G81+6Jj/ki1K3k3natqhDo1dZNWceJuiI341T6akoXSorT+6/i5MgHSQ
dTKpOu91fgigTZQvy+8BN+JBGNBJUd2JFIr/4gs1zQj3Dw76SUoXa0Z/EOw2
iCUJkU6iOn8uW8LthJgCy9Q0cnH1oLgxyhaEYrLKDgK5sfCVd9lN1iRw2GZ1
edsRx/3RAA4fK20Y291i61yWRE5WlSLd+W4Ac7oxhtQEECIIdVYPrfZm9VhS
2hSJD/08GyMsxugzKYllcJyTIsSWJGImUK89B8dEwWEd+sStbOfUZJke0oP+
Qux94QUuN31CqBl/wndq6E88KPERTmrwdG6/N9jhegSR+KQiTJ4Ep0aszx+1
BwATLMlIt+o+jYgEI8QYaIedBfUMrxW4w6QNlbNhhcAW+F8/ZyX0a8j4M9af
M2sth+GK7a/GghvC+YOeIv4pK6FU8xSsNLspQBh4CmPQfRCOr1qiIck4meit
dsRab7DDLVp6bVYldBeK2bzDLNxY+NJ5XhZFksWvs/SmvPFfOh/4g8Ed4Mnu
OYGk+pLdCjEY18Pdo929wc7zw6OdAHivyzvEaBC/0XSTKe1HNX6QK/4j+/xH
gfrHpCJR6wRUMcBQknS8wQA67477ozcPaewkMJCuTHIHgyldwYasRVHCv6zJ
OPBnmO6N8X99IKyhHn3PMCThPIuS3mBrTmjVONZvEBl01p8f6xgOh+uyzFmt
e2lpxEXOHmKnGp6Ka/WhA/lQ0uqb+C3tJBT8Pwz8wQ61aOuGqNFozuSmQzD8
0Q6dVyTKziH+vgvdU0To3wWuKSMlECy/quIyGeNINhgNhGTwQ3kyHqQJmBfp
1PtDwhZjS+vXRBpvYQQgoSG9UQ0dCI1OiMqnNDZRpA2sNIlhc269XJGYpfpN
W92oVb9eVVkSHs4J4aK2rUHTkunZynTFX7jEF+Iz+UL8cw0bdkl/40vxK/ul
eCRfAmm/5o8xFf9AMhkcmvH5DIFeRNBpBtyxknQ3YgsZ1JXjycN6/Am8JyR6
p1+TgDycDILRzuEmN+2YlIVc3XRO1o11Vc2KBMi36Zu2UJ1j9QY7wswkWRBC
FNOA35Ac48a6HGpOGJeWTdP/kBDal2t4t/ZbF9NJKVJgoE0Hz/1Ri38w6bx/
/+7iHmJQ0tVlErAs60arH3OSkPo27GSL0/AUT4HpFERHrY+QROw4J42uTWYq
1g5jNlvZ2JIHBan2Zj4mIXGNuI62E9djUlOqEpQkqZv//H86pxEMd+wTJKUm
8Z9WRRm4XEgFdGPBbTbQ3HKP16D5nH2QfbZk1Q1d3mZv3csogW81lPmzqwsH
TALbRVE34DWL+PEVXEp7G13/Wnsl0pRN4vPbSXlDEn0gUZL6Go4HOHKW3OtV
BsNIUqICNZ01b+8GzoMG5v5527B5m+gUEY0q3NxlAgs6yyTX769eMIP94Q29
e9G8L5y/zEwS60keQpHrrGhLxBImoTOZ7QOTTSrplYLN/C1RsoAeXA28scDi
9kdV3SSL5T1RK99p5WFNb0//SxSR3a7qcYGnmQO+VbCFZalcGTX2Vbpjts2J
kALD+oPS8LzoXyVtbvYSkhrauj/eNdsVyZeMZJZlk3TuhRsLQkreJeNsi05C
sNoZHyTTp+kk3ZvupIdHR88PDonM7OwdHKaH6dH+s/RwoiZpmuxPd589PVBp
ejTemw6qg/1BOt0bACnSiZjSd/f2nz/rMzT3+wV9tAtLmMxJ7GjKxWoDDDNo
aDcZIvm3XqO/tOOE6A925O/9LwM3FOgD14mEjN1jDUzrQdNOm5qNPrDuDHd3
n5KUSneDZKwpEU28P0xpWbN15AB3b6AbiTBlAoZekSzVEHGrSJQjqkujTJK3
7ou0+ZIX6+/qdOCGAqPWcbUSH+IW9P88T5AesOBTWbZjY2tmcifns6ZhO7ku
OBGQQDhLaSt1E1+W5c13KNttNZvLIjs8wo2F77wuF8n6C6+3v0Ds+DhXX5CQ
MdkgIx4POr8E9+F1Wyc392BFnhU3gxqZBjPtezURC7s7g93d50+H9e7+0/3D
Ps3Q39nZ3+k/80Ep4cZaNnSYwTF9OQJi4mwC289UGxa1ZgirIlzUo9Hl8Ppy
ROo5Po9VIMrjAaC/xQoL2VmHKLixLh3JEYoGGHVf8QY7xB1+SFJoqzoL3iHi
7g12yHtyCyeDyjvRRVcDfzDAb5YDt1MsR8HrQZ3BS74QbX6Rgq3vW3RfpLu7
eySAY7rjLsYfE0EncE5Yz7mQE1kZ6ywpN9OsWhgXOInHuMM/f7j0NCISDCZt
2khE5/d4/b5D7g2IF+fHAAwHD4FhbxMcDgwclntHR2u7b4kKczKDDiQiPMTG
XwZYx4TL0YMTNlVckfhYb91lmNizKQHI7vEAGpi2/W4JCnE0ui0WTKH/j1S/
McyIZ9V4bY2WaR8Yaaujpp2sJNbHmNn7I/oBIZ21RFETCIj2VZL34IAxYpnh
Bbu2x3CIXyrg8Us/tuT19dtLUqbqJcnRiu1nTOXvC6CcKDaGf48lPIgbYa3l
HsOip6QCBfga7O6yfx/Byw3CmLXDoe+F8fZ1LDEJv1V2m6SrPt4o+guSJ2GM
nfWTpcuq6BgQEG51irlfeN6MCzc5mwgwOWPWlXwAUMKbBV0//Y342PvGduB9
h0YXXJ8PbT1XW8KvtgQDeOGGfIGmagwojgEIHQ7AGpiqVd9oUv1aQVjo6wBl
H0Qn2JwNzWHkoDedDiZv2tBm0JGWFXEdzfnzaCswzkoiTsReeJM+PM4G3lgA
j9O5EmFo8z1LiMFz0meaWFj0xV4NYOwMd54OJey439yp5KbWumhTulgRAoJY
Fvo1rdKAJECbVzxFXDcIS7ShIByUZt9GkJ6osMs8WdXxnI5obK7F1mDdTHbY
vVJ2LLhPJ+WKNrJ7dLRFrarTOWkxTPYGeXI3mLQ3iunPNElpT6tP3gPDp7tH
4dV4WbYpSfcNkwQ23y2TlPXn6lZleQ67cC8ewU6jslnRrHp8RV7TPu8yuIY1
0b0vPJmuqOyis2E3ZoKTj6A0fZxnDaKSqu18NYzSJCn4eV/n29b9+ma1VH3C
zhoHLjhtTIv9rHHXghG4/2yH/kf6wN7zADC7PZo0NpPGI0wKlGfTk0zai/Ws
HIhnrgzPul0rSOgW2Q12FINwPLgRJyen90NjPE5d7F1LIsnB0fOdZ08PNyA0
zo/01aqsyykh8KxSQHK1rJ2NH0GIyDDYwj85R4CWBAtsveH6lsUkz6ZTtX3J
s+zropyUvGR9VZOiIM0UZsiFyJd92gsuJjE/ZnQ1AgM5SLKP9fV3D54+Pdw/
2n26v2GTx2Y2EjhFWoW1+IM3GwIDTznk8ph3OxISd00S5fbzI2TOlNtg9wYH
4wFM/jLnqOMNiRKBo2HaLOUvIxHt7u48438M9p8dHazJRkV87OlzBgf1Vs6L
GTJ2rCCwdVfXpNLRAjtyshmx+0CKxMdkVvDN3NlgCcRWJrdlSsxzMON4ktsS
Zl9JHZLEs6XN3GqXeZlMEKywcwSSPVFqKVZp53ZKEEakPV8uym1vTY46o3e1
wdnPEgGqb1AXTR68CWegcyP6NlPsGMdb8d//9t/xyKxiwdPlPTOURVa4J0kB
kqUAqiNaeoM2YI690px9e79kWa9IRSRWp2MBOWrc+WQJWbIcFny11KZ9z//X
tWxc8cOceboRbtsRZc5qlSy3gy7eYMC/TokxwsZHW92gxW5UYkkMXNJcrMTu
MP4fHT47ODz4FIRQX8wKF/r7a80YHxBSVk3M6vy9IPzDG7UHxfYMEwC2Rdn5
tSa9A/0von564jVLlI6pS5CLtawUCQlMzq6IjOnksfX9/1hzAvG9qh4T8TCg
LdB33pC83CT3KLf/WnPckTHH3ch3t8HhIs/bBWIvJBne0/neCjemvb9FPQJw
s5dJiuRfOInOb5P6PtQezRUhxJjOwey8YxHyRwPS/pF4iLrHxgU3fTdlmF33
NwVc8t4/s6I/rrLJDK640uTM6v2/wQP+P7PiRxCrE3mBxOzyHrnjOlvIOjuX
1o0FdieiU3WTTKf3yxyVQsh/HdidWJ3bORzuHEAKWSSQikmxUzptwSSuZpOf
35x8OD862N85eoV3dg53DoLLXSC6ll/umdRTM0k8ppNAfgiEJcKBIqmbVUy3
Yfvp6jBes68O3w6Gg7N9rZaNzuXdkuO4nlpNfw31e59uB5+Or/9t7+l1YHaT
H+PbehAfX//79bbLaZ1d62z49WeVL26zmwcyVLKsRooKJ6jP9SufxkQq4Bjq
3rATPS5ck2hNeauNR02Zlnn8fjxta9F9t8L5vMpu7OJ8KCMMwx8OTQbabfwA
UTXOa0Y4eHpEfphJCR5fJTZPell5/Xpe3qVJzVUatv9qPeVpDrnRWD7XBA5P
JBjpV3EbtSccDMR7m45yvtJRlZyyK3YGhCLCBEGsE7orITxK0mxNyjVQWifV
H1lG2kKCAvmStkHUdudgsHNw8Ox2zYWEYBbrkT0xDsRrncSw6cCvSILOifjK
EjpWU28wIC8+F93ZotY2iJcsmimQkg+coMxxTCsJai0XBPOmPyaVSZ7sN3PC
1IYT33ee7e7s7XZ3RgzhhN8GK8XbxCpO7Psk3Jj3fyW37G5pm+WLSMUMbHpK
XNpxAaaYn5PCpASxBoZKMWyzwK6zpk8C0VIhmxB/z5BqyG48/IR4urs50Tf8
cUenwclC/bC+zKused2OYz23tf/F/ZgmJP01Nh/o8QBBaoYMRPEVZo0o/fwV
PIyvCPFtt6qHW2C1z8l1dTK9x8/XQdf93b3B4bP9o3V0dZmlF6xSiDSvxdmz
Cnabsggzw26zBIHvw4ureMSFxKR2wXbO+aFcJXrFHSHRGwzlAZXc3qciSVWV
rOIdIv7F6HoVkitJbP8sbG5QTOp6Z80e7jb9kiaAdnJ6pfe8votuqCibgmq9
RH8/7wb+4FpgFEKcuIJABwbe4D+RDcE60Dtav0rv4bR0fPVApUPab//D6PrT
hQFUICbKj3H44wb8LPabvcF+us5aRwQjVdxDmfwEJuhb0F9Yi32GhDX6pS9B
GmxZ6SdLS6uI1rOhWvQzNk8xgYRGEDCX85cvOdG31taZO6IM8fHVC0O3QJ31
ZLGeDFfWTiYvwBJlnHv3pT3So7LnjsDrDdqD4qCGsrgs56SMFlvy1+4F0nNk
ek3T1JQsmSX0vcan531D0E0Eiw+bl6en8QeuPHIsb1qYwCZN1PxaU/MT/+VN
G38J66Xbi7/5l4PuD0F6G2rrqdUDmydsRU1ATl4MJeS9Z8/2d59qq3WVLTi3
yvuDafykIB6XpHPVX5YZ3RfgDear15Icwdmg7PHTsX065qe3myjKsd5Hx0Th
DQYyxl8W2Wd1V99k9whp4Gc1HXmS6oofxnaDf5OYwBaWIWIJs3re32DYYdZF
SMGmPyvQm6st720y6HBtKOjIHBJ6nyJwjhQyu5eOhBqOB9s/fnm13b/JBlid
XJlJ0pS2YxCPrb0kZwgzHOckdWXUJF/RKdNF5SoSXmo0l/vB9/qBFCNM+3Xi
rJoWGCdmblPMjeaOT3luknpg9smq+P1d4aVMI3Z2O/9+ebUBCsTU+6OLV6fv
377dImuyoO65eDlWnEjAFF4GYwVJK8PzID4Nf2rz1XBvf/fZ/s6zPv97d43X
w251WuY50uKJyZ8lME5LbNs6OoxXfCUeZAL3CXQ5AiHvYUclyUvwQKB6hhHk
dtmOSVe3SRZLSYiAeAZs5jpq/VmTT4TyBSyd1npt3rAFfugtXdFsdn15JlRv
K16/UcWkSvSqfbR+M/AHQ1su9Mv+WTn6Xs12rWjYmSqyJEe9C+I1iPD9BBtJ
evPvtJnfSBkxksQPD5/vHQZVHuQ9nN5I3kOdG3pvKzZuUYWfan69VXU0xHic
wjHCl3JKEjipYUPFCWSoOnA3IX7PlxTJLkP1Jc25BoP9Dfoza4j99qZfL5HM
Ivuke2sNdySjI+qw7hd7u/tPg2s7knniM5qH1cX45zfxCPPofauJQ8Ue3W+e
6AFhDuWg9Ob983478Ac7gpw2ep7Xy5LuZZAVCYHWH+5+rCGUvMMN7H7NDnUy
FXK6HjBLquIu0WGGfqKCPx7GWZx/uAZvvSfGgrCZEXKe1cgXSEn5T6S6H4F0
eHoMb+nT/t7uIJ0uOsJhPPrzu/hlXpYTa+mgsWVZTtm9fz8WYmmhOADrxZsq
uW3q8jbZroBrD/6irNPyzhU5YGedkQs4eULQqkaZmapdNv1yyUfC3i9j/hoe
PKP7e7QmCJx6EyBoBBPE7+0EP6JC1AP2/T+rGy47QkzG7so/uT8POuMByfwj
qgEUKNRyj6uLA4AHPvHc6BIiUkqMQZ7mX2uuniqOgf7O8/UUR5oxPubnOUgR
z8XPe8Zbo7MJag7ahEtbHzWbUNtqAbeZg1X8dnOMuauAUTXedjuKVOeHgOa+
rzL2hdxjViVEyYq/tllFUgTgY/4QdNnbe/7sYH9/+DVbjJPxnXKm1XnGZVRA
hgzjmUxKQ6oChvMX/bIzqdLL4Jr6ZSlBSpwhTrbeCC1PzZJCNtWRpdxYoBy/
bQtI6w859xuYGlDQgSWpQXvjDMtHQ2NV/sRFqD6ZPdSfsN1Pd2r8aWOugbEn
F27X9ZKIKNcos+HyQ952mifZPW5gWL3cVjpWr3A82P0ZadJqi2rJGi7xKPHk
85aJwElcFCl5MCYO6eI/3dt/PqibgK791BZNQn/M5nSL6njBxTfrtFJ3W3dg
q3djRR2K7sYCve+1SlK4KjYbNraIRHDtPhNBmKP8aykfZkXiL1nxOUs4HmcG
JJaCN4Q7YXySCL4jTCClw6zUlxXxn/QcdL8xR3zMpW0+2Dk2mnXUmGjd3Gyq
wwn90cBIcVreZduom6QMcjD2oCCxYMY8aqGg/szqIQ8d7g5RG89UbayH162q
J8lqeHndl7k50enf9nYuYY2p6T9I8KV/mv126R4/HsvDgaVr685/yhayDX/P
HLxwl20gWHD51uW2GO77ruseAtL2joacNPbJlvwa50RQyjasiTbCM/Fpy2Uz
PZmeY1UIHXPFpSjbInvAAXGB2i56zf4GLwbBaFjIUgfXjL8vukaKget4ReD1
3sH+0dOwTq7gq1ogy43O5a6MF7CTE3IuEHmDy2Gih+q4ZgelvrXJapv0Qctc
pyinRNQW7QPUtFhW1t5cD+mwaEH9u2Rlgy/plPYOnj3f2znc2Uf5ygWpskXT
VzrpDpaY2QyFqLiGgQrq+12Zx12O3ok8Hh/7j2/UWqSSxkTdmo10VBd/NNj3
8dX9GDlvp5DomrJADpUpKbUHoYK2WIOtVf2xmqsabBPpBp+KT3t7+/u7e4dr
ktWIH49P9OO92BR11BvtxR9JJT8hxUKBMiGAtC5ZGimriWjaABMyY5uNvhRR
RmtUquWAEy4Bv46or8slsah6u3RVqWRyh9J7ZsO72C39/9S/PPUn7QegS/kp
z8ar5FNDojRxTnWDIXa3BsJVcPe0Z0jcCJd4vRf/IaGVZGsHD7U9g7lZ3eBh
XYH5ekXgK+4pdXnaknilN+sjxOkgGA3o1CsdHXu/ItgNo5XaYhxBmywrrqWl
owMNyn9OiPiQ5Il4hZB1VS2KZNb9v2ZF/+s8m7dZlwJAqNTzxDJP3KL5RGxn
g/j5o81g0zP+uA1DYAN5lbS8/HXF6aSCOnS3nRQ8LF48e77/9GCnK14wMfux
dpl2P5IOXMSkFYN8/f1v//1BKUMvrSNn+KPB5X6ZoPnBr6uOxuRTDMy1WpKY
LEIHtC42YCy4ejJdRmIpy2qdVn8uaVmoh9dW0/gu2e7xJDEyu9FL7GzIGwwM
xq+k0NM99omw8t0BzEg7B0MUMITCB6KaIE2aXQhoXFKs0ahr80yP/UL80NY9
vCYJuMCy/A28HtiRAK/eEsKV6fxfq9NNVJF5Ct16lpeocmwpYjpSmuj8MBjP
Sgo2yvHBrK9G3SLzY2A25sNgNOiMdz1htCTpOrMWMxYMB6Tp+OW7iwfCd5Mp
UVdUVGVkrW1xco4Yq1WW6wLFUzQ6Go5O+zxM/80Bs+W0f/Zu1B8nMCTbfkO2
asoabMVCbELHeHnxyHwApcpJg0Fnl1PvI7pPhXzEgX26HezWkEzTr99xtmz2
ue/G/dmx39NzY+fw6ZaeGzH99ILbe7gGEERzLxZE86RGu64O4cId4CLmUupe
OwrJsflXNZ6IH2NBT9YZ/BkU992jo82O4xSmdKWqLwMUql7q6l+wWRK62ICY
303K7LeInMT/298b7O/v7LE9tlLL39L/7fIfzWqpftuFF9r+VKiIqSYGLP0T
Pm8kwLqEIuzPgEscUET5uOjRRRO/Kh8sxoBMB95rh7nboe7jWf91K2kp4Ruv
B3ask3XJNabXcyzsUPcLbdG/VBmdeXdRlwM3aNMUoApeoxfYXXK7LXFH4+/+
oDEPMnlH0D0KXQyfq6fDeb4cVvsoyC+4vCv4/Ulu1Xo9UzmCF1ybR32Bss9V
LcWiLYkZnNJpjBnbW4qYNYU4yFXDy+W8rB8qBs0P8YaIK7V0C9slaApiGu9I
zpkp0AlSLQ6fPz0cJPXyi7+Pn5lUNonUiJQPhii2bd3y7IZFz5Ftfc+i50k+
yApSMrlsdZL36cLt7D3b3bOkNtCq4TMHPcxXOmRIV0TS5E+gvH21IXZ9TL4S
vsMwz6v08evjIBzuJLHOszEn55zOy1x99V+8HviD3eqVTQk5+1WJeI9uDpo/
Gr53USdjlUPVnpNkZmHiNOhwPDiAD6OXW6rsO6tIPTB9tThrsy/u4uV8uf+7
bPJJ28F/u3sIBuEdxrXO9cpjVCfsxCalD4Y4u95Wo6RAXy0ibJmqOimeXDBf
V4J5APe/N7b7UP9L6vP1FzL5d6RwJFw+5+9/+x8S1H2KzJji73/7nw+g2T9U
4uYfDAn69ZVxviuOKnzlLLnNkOc7zVToQDobBKP/ghI8FdzmQSjE8cCO/H9S
feefKS4LXNYAugeXl6qpVwu4PNqFScU9NH75nf1Peoa1MGHNW5Caxd6UJg6s
CzHiMNvZ3BRanvKFe5BI/mOHjfC9WXy5VuXzcmMthg8lke5VJ+Mb5l471q33
UqUrugSzboAQYlu90X/2rCRnrf/h+uTllhxP4a5+Mx2uccZdo0iQHebVJ9VO
lsnvlpLq/1tU6eMsMP/oRiaLd1HecjcB9I1ptE0CVWT9Wtno44Lqq9wKaBtx
lZX3SB9IB+v7Ont7edU/vMdKN1nkS0Y96emFXnJqaNZAKLaCOUTlUy9MbLmS
ypXiodE6D0LdjMLpb/jKToVynDyVFzemp0KwNk0Vi6RbSokxI/9u2/hZNssa
NGViq+0lwWpTdzYW6t8Q/PLt6t/ky4Akdt1ILnsByf3w2bOj4V/2nx/8Yf9t
IP+9X8LDy0n/SurWv29R46pB8UsOcUYXITXhEBmvuBrxFtt3xSo1rtnjVZWV
VfyuJAZ8T0+lNyS1FrIbH6/fDLyxMGmVUPbrQq3UfYLZ5jY0tVTTVZ/Gdg6O
q/FCxfBnjlAMUokKOD7RowHVAcpxp75lmAoVP8bfl/Tmk/iYhAJ6GwFSHy6u
zuNjTHFPrKRelbezDofp/BDcho+6ws89YaWoHpFWUj3iK5fH/itXxUF9kGef
3OY/NelyTdsFhkPtbBTOm04TBZjA3AjBS6A0auKgv875bSKCN56dtvmmEKoH
i/1+Vy3uOHjnX10cPJyd0+dXLakIa3qlHeq88o8X/A6qfOmDva9x6LaDRYj3
3s4n4sObTnT057fXp1eobtqGB7Yl3VXihF29lAw+4GVSEBPDf4MebLC6//MH
O5qjitusm0M8cjnE///FhM5Eb9QtYuW56nWw3jfeUOeda26vfAaDeNIGL137
Y0Enq8vsHlIygSw1IMF+Oi20VZmQrR5KzWT0XwI9WUM3+vnvf/u/+Yle/Lh4
EoN20GCF5obcDPILpEU66Mebs6SeeE0hk9sym+js3AXaFBmF+iEEfElINk3g
WfIh8XJgBjrAOx6TCBB/SL4mszmhehKYcyHEd37pCv7oBfOWNKDbjBjczfym
W4TcG+x+uYIL8PhmntzSv99lxGDjzss8uOldkXZP9Ql1xN1guPOizrdK4ldZ
WJOHRFI71F0oyme9zeq8DEOVjgfBaEDTTiTSY1u9T+Tc3SZM1hYTJmtab5Af
PqVpvbuWufLoFf9I9Oy2zG877UF0fi7ROODfLHu4wLRctZNO9MabgRvqwOGV
QsJM/JqUk1DXezXwBztv/SlLSiY1AS3508AbWz9cFV9idZ2DdWNBNVAN6238
YyuslfDxftD+R8r8bSiQ4DfhMxLAafDmGd5keQHZjLYgFZzdUtDXZIKK4etf
fj5/RsHEl8mXDlswI53ZV7kiDV3VqjO7G+tM/1NSV8nn9YqwPwUVYf/hoySy
HHtnuSGYZMthljXcPBxJYio3oX39kP8RHOK5ob9c+M31ZtAVm+Cj9W4UWjyM
3l38y48pI60M2qj/eDD2Pb10wkY64Qcuyzar+69VUWWkX1VZEQgKaKHiBjfS
1e+wInQo5K/pJ7Fmt/gVGBIRP1roxIK9e7rm0gFXisTGhfh4oN8OiyyFpS4N
W72Y+T5+/Li3ljTxyEQhfOSiGKQe3GVIf53jjvyOjp7LG3n9FXQ5ry3VNB6s
oJ7QmSLOlnMZutYtf7QDf5RFgpDxUWUF7WZN7vSHO+DPyllJqntVJZOky0iD
4c4n3wk0xabdhKf3bhAO2wPc5ZayCH7J7znAST5I0oXR6KUU58HhcP/g2f7T
nYMB/fvg8GnYRcB13PnDH94mGQp4JFaOV6Sy537z2O3l+7odbdAJbWWW3CF6
/ujaDUTDng9tKMJeDtxQABJD9LbAYysDuyvLZm+3f6eSZVmwPaNPslSWa8/p
Zg1XKBxU3Lcr/ccLGKrNFD4JvCimJOA1VSu1UiDDHnsfMEHg/3ISeUUsM7mN
Twipk8ld8rkjqIXjXcv6/14uFZzX9zMpOTA4NDZQmXMEVJj2F6+xmISrUbZL
kvW+oImTZVEsSJyVRMGU9qL5FVyyySRX4/LL/w7hLxlX6NT4jjAsuAmvBt7Y
Pytj/NqTGBEV/5zcc3dqIu+kYEgHHvEzEfEvJk1e97ecxgl+v74cveiICDQU
uC/T7zb2jGQRerX+zpAm7AY7wPiQzNuc624Sd/msAiB+GHR/COByni9UQaup
72OUHTrLxQIsrX3+7PBwb4B/P99/GsCnU8w7KMvBpVKvr4b7MYwl8R9+vjh9
EBOThnhF4S25gyydHzpAOiGWiML8o3TeqrCr4ckgGO2aLLIFmpWekAJedo7E
jXWdfXkdH9fpXBVjoonB1SGe1/3lnhO5J14HYWBIZx5M22KiU5z6f20zIjl5
Wd6gSzj+6lRojf+AJ6yJEoD/FdbIX3sGdmewz5PanEy2YJg2zBu02js8erb7
LPBOh/0Ubcbp97KWP6O7pyzBX/KfB97Ypt5nqvraFZSOB+FwGMR3/O7DljxP
HBrJt1WtnYB7HCJNlAZh/zk6mKGL+R0ilypkQaLnfbvkUppV2bKfxjZ7DiBz
yVNIEzSO4ZM5kAGJ3PufiT836HnKc9joqYcgdjxtkjGKd0yyv7Zda00wHJ6y
+Nj2tjbdQBR+Ww/SvGwnvqMtK1Kugj7kX/o6rx+ZQrvP0ffC37EuPnmKJ1HQ
Qj8J9xjPEf/A7zywRW9P4UHKx6JY3VQeWVxP3J20KQTHWUsHgCXYXiJ0FZdL
gkJKbAWBzFU51FPIBt7fSg4s6CBKHStolFwJvl9ztZTR8VuiSUlR2OCtwE9i
tuGqQaVIukvLKjdswyaIheM+ren3+3EyrtHGo4kijiA3QTrxhN6qsjGSXWxY
yELaXdSLWmdcSGi6PilfcG7QnA+ZKvB+SQRJBH2Hw8BRMINFRNc5hcTMxTLJ
KlNihp0k2vY5QLAbZ4k1ZbxAMRxpy0lyUg+v5cxS+C+o61Iu2Y9YXWpzCq0E
AWGRDsdcwt9aNUgOVtKdlbaDGbxtclY/lmpLBkSqEDdoLPG1Ug/EFrgexHEI
xwUXTCjKuG5nM1WbiqgROs6RCt0SWM364lQ3ghWNU7ZDcy2Ja+Yr/ytJ3osQ
JF5MsGREU1dKh8QMOt9Hm4FYO6tNIKqpu31ezJGjyc9xA9K6ph3xn4Q04sNG
i+Fl/Pjq/PjDqydGbb34cP1yIPizYFEyiiJUTOevgCh/+4GR/pfot97/oshv
JFHrMkdIEyS5qeEy4LRUkxlKa12WdwRn+kjdotkg7SRyLbN68A/TMX1liPQY
hxxM+aUlUsBQSjiIm4gYObPGgpvOY6y5STKGk520hsW0zXtxjcA/NFbrxSh7
3eAW5CsCfYriJwAoPpqiqmnBbRy+fft41T9TU7ZM/fILSgLA8zubm8shN0MV
MxRVoA17YVWLtqZrR4hS2sgO9tb3kNKUEe1ZYZNRiRwwwtEEGNIEZ01yKldO
zkGnco6/tZc36mI14W2SzjN1qzZc4MGvJAe8K+/+66sfJa4Jzj929eE2jr59
+/Dy9Nmzw4NffuGXk3iS1bTVWuOJfc31tSpCY0vUoNowngXBsPk13OfBpsAh
eA7GW7puvbhKGM60MeCnXPnIXXkdA8Ef0iUZalw9LtxFiJrTKSbxrCrvsAC2
h9HXaYJkohZErGtj9PWAlgaNux/XSjHgpDVorMP2MMu3b0GH8V9+edJzFePR
A/WOW7bfoZy8uokN2SQqQtomLRqrjLB3S3ksRRWa4xHVQXBrwyXyLjMd4Y2l
psT6DJB5gsRc5cTf6EI0Aal1hmuQ5u0EiXmF7T9GCDBR5XTKhe9p4Ynpjcmk
AN/hX+gYPreF55RVqPvtoyj38zDdVQjtxyov79bQe07EBeENJtiXLoWHYlin
PgWPAP4TZFQm1AmqBnQFqE2r+wXRdZrhFWZ+3LWt4c625/RdQ801e+CfYo7y
TaqJRAdFqK6d6eyNbz8w9gfEOIo+KnupQW8U56hb5czeCndsL2IsmF5YMsGN
wpY1mluZyliaEykHYo6gQuqPfGyRfCZiVuuM8p4cHJNV9M4Qh2YZQ/ESplW7
9Q04bc8shEAQaXbOl3O80uhvKO4EzcSQOUnjBFYE5PMWF1yBgZCkgUOK5O02
n9iK82owG/Ri7XXlHjDLsirKWZUsaXLbmxVMCVFddVaBdQyii7CPT1bH967N
fCBGaAFei0yToNKWFHPYK/0Yx8qWF7TEE/UEecnRhObR7mDaLK1zidryBvr4
4VGtvjxiZluwDo4kbMSllUztGiZyS0uCLS/i7hMfLmOOSldfBupLglseo5dk
nt2A3/DiIh8esSCSxogHwcHok6qJivhu+8GOwC7Cv1sp6unoML9JoDCnybPa
gmb6wYDJ6NtWCOqZo7YkS8odO75Zl3nLK0iTJfbE9M3rDcQgnDMI+UMEI6Gi
uM3mg6sIYEJPZYXF3s3LHPyZKDDIOoQK2rssNmM8IgJliViA7bjMXMJMxkIJ
y7venSsSwJ12MM1msjiEpd153Jv4NO4BTpTgG0mbgm/fXuVJcYtyG5wsCMnm
lVSDzUkqMa8msxkxfo6L8lq+PDLTMNLxf+UZ0e8eR0LCUKYZM0QiIsR01+mD
RvX65RcW7SA3VCrJ+8jfI3C37DVI6f5ZWgtmqmMJv32zCT5Y6qikd2wRei3t
1Iy5mvGxOLQgRMJjLW8rAltXuODLMtNUUbfGoeVdqtWY69DwB4TvYz5hiUS/
tIghwqauq2zghM0gfI6t47yNRcLpsDFbARhn+PQRNgpub1rW4VsXhEO47qil
kVbJXW7knfvmSETQJkYN1lYZrkR4nBiWpqZT5KpBndHYbYUc+uBCTSICBYEo
0ZibckXKVJBXS8wiGdFNK6BV8UN0CRa6f01NxxB9xslNTGuIb99GF2fvtLAM
pmzgSFRahG26i1Piu5ZqW/yx7OCFca/1dCR0BKW4Z4Ubxh/Lz6xv/fHFFTHi
yQQqwsB66ABIHU+NWSIrUXIV1mWeEBUDEyGAeW2QCOa3KjekBBThN062ssSo
nCJtvUzTtjK9v1GxUVeWhL7u9QC3h5BASh2TlkXvmjl/E11cOWG34Vbt9I63
RpmentI7lF5UF1e3B0P6x1NDsAYR3w17gYG9wE6hFhBPUiVSagX24fq00NcU
a0t8ayK++VIoz11wOl3fCUvCO1gMMzC+akuwZXkJsltk0O3bN9/1B5xnzPD1
DVYh2ixnTtcutYDgffqW1KWBdZWkhPukRdPrNQm+kJC5txUTqgmpXdUqfmS+
ru/4o9gkkPUiYVI5qn8aSIlyYZkkzzmuyoQkCETVcIEsJvyb6GnPKrQzgk+u
1SAnYKwYBBx9jYQZufV6j1xZuxfJH2YXRgNBFSG1WPItNuv4Slcb8Yj00CLr
cyC6VnQjLcVgIdAGc5KMGbIkNSf9JplZFIO9j5TQpAK15101beERZHt0jjBL
xk4tygcfUFZ51Bo2EG+RfLejQA031AcKCCmRjYZo0jB9YARicYHrH4iWYCQc
I0w5pd2cauToyhweJHjMapm6rAKDgv4WKAFjvsOtAbvaligSaDQXXJe3MpVO
ltZYJX1RHC/0cqqNb7nnvxmdkhJnVKOLOk+gK75qs0nC4pM03xRR226Saa4J
sadHXlb88Ldvr4/P3l9daFNExLGCaEYkssD5z2LX0gS6m5BAV1fpJsNMmU2W
ap6s6OGp3/JOuhfxmm6JapWc7pDx8RAmNK3W6dbAW6LjV2VZvpuJHuWJutIu
SiEYiaFnJMeEL0aB55jzsCjMqiDYDRFYLuwLHaLMVSUlyTz9XWxBUP5gUapU
qogcsWDNi5toQpq6hN2e0/29HnWBISAQX0JZrqMfaGkum2yR41iUi66sAGKK
rH37YVmmv8AAF/6PzXBdxY35Qq0ZA+T+PGe507am1RJR1JRLxk1WOhfJCkB1
toCJkRSMuShrOM/jMbheTGdE28vLchmBNhNLmydt/qRnCoNb2LB9m2UpX7yX
SSDTzKHb9yJ2AsTcG8FI1k4cyTOmaEaSo6/opSXIpyc6JdIbf0+lZV+Ikf6I
x941leLJYQrmcyFuxqb2rOHUBSCulpCKSV+3a+VNyHSiSFmr8EThs5G1WMb1
gkC9RKHIHt2sJcEYU5LceaP/0/CZWH1B3RpJjcH7kcxVPyE16rjASZCABvtN
woICW0hplwlzUGfz0EpUoByTsgP23LCOVmnboP0wLQLlKvm/TXlr0QHnlgzz
NKkNCQlIry8AE+PNyrYmTJjxalhvm69q1qVEkkYZBSNJG34KbDO2wWADjun3
NLml+wgmxEopbB85saaGJXjmTTQFGBm4VhT9F69ur+7a+SK+cOYowxeEJkJ1
4dTXDLwpiaVUWi+KheeB1mi+7+m4nqIspIT+JmFQ7I6YhgBAShZNom+bzAo1
VQt+dZFxDSWBFYTwRVZVUjpYy5rGdEezqC8AyExptWTgu9j56UxrLL7CkkF0
Z58sIpVEC0isrJMbtXgKCQCE2GNZY7pksIwZcNAcpnAuEMDsysC5R3JZIxgS
fMpTmWkGS34trMxnMJe4cEDEM/fdjhpHkxg6JDpc7VS32KpuLCa4daTz8kZp
dY42QXM8qNsFOGSK6F4ZsvTint9wHegLU87+4wx352Za+yxfIYRFs1gCIIxJ
v55mDN+xAoQUXXRMUoBfM+aNVw6R+/2Y9Qt8MZETlXRDzOUrXQnHJ5Ymwc3J
Rr6ZNoo1XYMqWy/bhr9HdwPfYe7K1HYyyfQcpjSCCGgkp4xQ1Ro3xioyDvc1
WciC3nD6Gsk9AYsSkZFxQUyJsrQfRfjW6XmeToCPjbX+g6OVBnO0EC404hxH
MAvDVtpAiijvYPWmu8Na4m2Zo8JjtRqmJXTbW7Zk5FyYRWOCE2leiAG46Qg6
hvKnZUV3WbvyaDnoDkqEphf2ykuTqZKlM/XbtDFYdK9Z3Pc2y2Q7TTmUX9Rk
Qygk1RQwpPfcrq1lE9cT32Ndr8PgiVzNVb40jiHGArs1gtusTLADs8VpWZtC
JWLISlvivWIkAM1DGErMFCPPpoyuAgRpLlmhhBIKXS9hFhN6xSqUAk9MM9XA
zhBughfAJ2GqydimzQCajgSIH5+evXvyIqZ/1tYFkqKm+bJ20g5RdS3vANdJ
q1VaO+XYCcgzjeV+cSqZfVCynTDzIwJeLYISzasQEaCtrZq8FTXruCxW01i6
Mh4WIhP05F/bBAGSgvV6WsF2Wrz7juXCsdA2OLtlhRPSXLG2R2ZtLIUw3dQb
7cOvQMKH3A+meXeqgrVmnfg5VzdM8qxiiHFSiDx/UngAhFFaIerro5Q1q1BO
gwStUlXoDuBTc1IW8ueMlEUHdkyiFt684pjr/hvit2FQKT109eaifoIICP9V
zXbrlg6rWpF8pW30mhGkLaR4er0k/V9ZKoHLAa7Bi6GT6nJMYqvH4dxu5ayX
aFMTEewyZ2qPxV9fjoYS8/cY4EIAHK2ZZcgPmvINL1lQ9qqHfuCCngzAxx8u
PhAcvM8iaEehxu8sE0pp9m7UqMcf3hPoGJnjk1dXmrAbo8eYJapUrrbMWJWz
te2IpgsslCOEJoVqk0CbbKAGPWY1WqzyNQsrQrI9SDu1QTZCNafrGtKuf0hv
y1JM3rRUWqkSuJu1CIVyO6jULTHwYPH65kF+zFUibu0JLkgCbwDgosUzHUIV
yzGFQqYwWN4gFDy4mIkiwAF8l3H8KSvXuDIln4SW4BtzJhZ7rD2IZqr1tK0Y
W2JtHNVKj2hiGkHBWfl+aCECMVaedVGTAU8bMrwORjcgeI9lKvad8PI5cIDw
X6viE+cqcXYDQ6RKXZKA1wxmM1r7nJOspqJDQh/ObpU273whCfyrEobN9IV7
REGyaEmLhnUBOrsWb81vZlMoVoySWrVdN/MLEzk+aZVbPOOcGKrlyIm4L+JF
y9a5ms1fldi4WWaH1c98j8UvrT6YrfeEeBsHg9GHeROWFpsjEcmMtl6BuBWz
HOpxCpF0yjfaElMchVutcyOD9aMENok2Sa01lVT8vd5D7JkEA8UtWoiUpgEN
CcHX6iFO4Lw8blhLhYL3gc69WeUmFS2DG7ZYQWRqIPALJcAJggjX0tmoL23/
wGkMxhgDjw2qMB8C3aCj4xsOIRFinONcJjoL7jtY9OqA73Ieq1xLrs1H+r3D
gmkpgqw1EGDfF4XncdIGUTT4yyDYJamzy1RcmlKJ1ITCWYUIaLKbRWlCrjDp
6dqobtlGb49LLZtb4wIohe8GgHWMRSzRGddlNhit2TwriiTJUtD3sEjxtPlx
JabDeTNvge03NslX527k/s1w1WAyjkwypMEYL4ypWGKtmNhccRlF9HhRmuj4
9nItI2+k9mMjGqKH0cR8QswV4gvRZBlxFYxihOFElonTsoUP1hrd/hvYQ9dH
HzTiAGrFBgI/0kSEZq2zwMDLZhvQZcFEHRbw+D1wHOVHepBYEphHZId6aayd
K8Zl9jjEW3YHThTXie7hziq1/RVhI9DX05YPkheBilRwqCodkQXSJCaygijm
LfQtUBYS01gc1cENxiYd+/p2D5WpRQ6zQjKChbDDniWoQrN0ECYxwSeiI9CI
ba8NMsL1vLUVicgf0e5q7C7LFIRM4I47j2rZamEYqt2vrytonJhAHAg1g4RL
1OKSS/IroQRaGPlaFxFM+76oCB59I4Q8bpheMPp0TZMx6SMVXJYrbePZqAEi
ri1ynG6TkYbtbHVteQLfZo6htaqvyjjyS+4RZF8TfhGEetibKgZizOPFaUQm
tEYHHBmTSSF8Jgni32oiMPhPuxOjYLHNrSz47HDWXgQT8EeHQ7joBh0Xwbih
FUHtgBbfL8s12kBq1AWjFjqDZUgpehGdETdP1Uijw61qxHaEUh4d2SaQEwJF
7PTc4DjtiYoEoxev2hy3uBmMaekqqhHj7/x54knV7LNgrqC/1pPwSS/YzUb/
RvCTapeCUF8xaRMYYRoxFo5aIu++fUOUd5/A+MsvbCuyA/Xyl1+eDFD8N9Yx
MD0Icu0YUiebDDiSYcH+GA68y2gV6JyXRDdBIigyXu/gnGNyxR23BJF4AhAa
drz7UKVPRRq9QWTE9WFd4jrIg6U2lgVIc3Q+YHgifLHykoH87Qc6D/HrbHQo
XPsmVWzTxGy58DEvkprx3MbuaZmDFEZtVu3E+xhrquRau6VpN1MQV32epPPI
fd5EDXIoesa9icxx2JXpi1krs4qxIiEuK7W2NkVxEVV5sdNR9MMPP0hEzwdt
SNHBUWt+G4sdBNPCDwJygW4J6cusFdCdh+7gW1WnLr6rE0jnxQw/gqjzyETv
lIUv0EtIqYviiozlR6/iMb7AKVa7g10+FsavJz0b9qVjI/VEtfYRwHfC6i09
t4IBdhbJ8pG2xFSiFz+SVx/xtHqRrATSKtGCgafU5HghIaFyX+mox8gaaeAh
8KKN42Nrj6fVsT3cUWy6e14whFVffDfOY6zhiRaaWh02gsA3/fOr8+toiL+f
GBFcc7mOnmojZgAPM5PE14nAYKmVAXNnAk06CEdR6X9ChEIHLLMhmjgs8e9I
oIdwF3NRXlh0W48f9GLRYNCgFXBgAE2Ltmod5DGHKvHYoiRqu7Fv59OE2LhE
4LGDndRKbsr5gwqlJjoHQstBUtA66y40SgkkS4l8S+oVmq4mKSNrzwivGceR
a/Zwx6Srncx095E6Rfk7DlTCFSJRha6CGFO4DTJdUJh3QuJukF6kfESOIsCD
0Y85gYn5E5O1PbyHT432Y+9DbK7SyDm+PdLNfmZWaKC5cGQzS9CELNmtSBkT
Bfs4UWSOmBRVS2dA3k9oBlHAZnC50tLJwcTQtNqJTJ6CZbKq1YcMrijGQvb9
a88lPZhyRIqBJ4RTY+mIS916Xu6yvtoG1YsoMQDvBYp1M7+D9TcIOTNGpQZi
ha4EGM53m+QtC37nloCbwIoXXBTFZuZUHauTJ/KxUj7l/CIFtqdFX48eDzlq
Nai8wBpJaoJKerH1K0YnCSn29FZNVO4kmdNdIxFFh2lcFKSV9nQEhulx1Yuv
CLcRfN2LP0CFT3rRKKHJUPFojN9HZUu494buP/1xPYfmVkxEoUGjVbUiyeKP
qrqhnXOBdhI3vn17R+9yJUP+67haSb+NPYQCndrAOwE3TNhGuRVCa0KdIKdH
htd++8YVY/WsA+NTSLfMBmMDiRrlYmyMXF2EvVi38V3bGybY3A2HtnqvI+MI
l9XFbGNQAqI/mOknEXubCANe+L62cLugcB0MX5sIAKIVkNX8vdLWeTpuDSEB
GR6bF6Kxhc87Rk9SXxR9nGc6nf4B+YAIFMcUyZo8xh9p6cBFU/Bsho5xHJm+
qQiQ4evbc6StQ7haietzYkXNKV+FfQGKmjFYsJklcpNbprpBqwmZ07E4Y79j
46KdeYGnJtXIfozn8LUxcOM+G2VIvQUL6WlqnrNmmK8isBOew3Awj/iyY54D
wmg1gEeuA8t1fXbFXX8j+UuTvNo4rwVEbJymQRsSySKv/VkLMza4lz8ALxlE
Og5X8ILBvbCiwkpkhh+R6PFoxAfxyNBgYc1j5aO4SMMs03VgvSnj4tEfs4RF
RFKPFQuIwhrpgusp9D42088CqAManqtGa9YVfbAw7c4jY1a6Y9THExKcoCYu
P8FYunV8uZr8xplB2KgeaR5pgCNTmjACtgnqcCNj1ZpwGS1hIvRM5CJPxL7L
AfPiULD8fTMeb+IuFwX3meuBzMyIgleO9ggUfi4y1uYaDud7p+6it+pLlmJd
pEfUjdhDzeq2lfEhwfPlxydsBJN7MEc4jpUxv307rWAQybloLacLWrxeW9hU
J9JpeNDEbDXmks+tnpsOANAhFjhpvVQHGMSMLs15Z0Rv2aou9gX6Xp5wrRtN
iizi+20obtZKGEFqiv7rf3v8w80dt0B5gjAsDv0w6SAsAUD+NzzIRB7pySIv
jhDkCYn9NQx0i5pFGfhzDNdZX5ah447piEJru4M8vr4cPUGIXV4T7dYRrEAu
TOiyFliEmCidz5xwBJOSg/fFmRLidh3ZROCHvvuYjborr30EE6Eng/itqEQ6
htf7BtM8ZSwzQiqkLcqFzSiIH4/eXTwRmuJFRLkEZXRP6MXnQupoQ/wnhDxu
icJ/h4HRoGrmfumCJfqiIm5Cc47Q5Ra9Kxsd6wFf2u5gP+YcQAl4M3CAN6As
tGcfhSb0if1w/9a+/UAK4C+IZDQEW1wPhbE7CIGkDzP5r1SkaYf2jMu6IGrG
izZvMojcj26zqmm114meeYSLnsSzDAV1TECANpP0LGHSvJLVD+hBzJJZcFlp
7h1J0j76POUl0VXSF2ZKGzl8BZXuBQy/JnW0YNpW0hUqxeXi8WgciU6C8yJt
lrCxVGhaxxD3juOJs0BG98IV7zlk5JzapztPOaeEOd7GrUAPLtwxsJP79EqX
t6EZ6d2PYtbkmlp0yCICbJvMTcVhYoQzERvPJ6JMcBq4pDTaqC2o4BKczMZP
ZuharMrYk6jnxK5gYDOJPRVH8mrbkmgbNkbvNhOnc2mERnieR/BrcssXItMi
SRt5SrBBEfl4nNTW1oFTMPJBV/J60rOSd5iMHBjWsRXCjce+/upP+yTiK0Xg
zuogb7rnZuw5AzDHyBDNmRCywKQc+dfGBi0EuhmBdp6NM9+991gyCcfJZDAt
S5vop2+ZzbgTiWBWluFjcnxPSAb3esWESVIcmDYrGRo6bVXHM1jnrr5ewNmP
uraHpNByoIForjipb98u+mcDotfTPio1EeXoO3T45Zeo8ztKPYo9l2O92YKg
c6HQdh4cFGEP+JxJqEbyuFM6lE9XDWawU5x+dH1r7OHQAk5J59PRhCYLyimf
RBLPwvYNLC6MEQqJ5NdlueSYKoTeOSdpqAUESp7fjoKhvvUlG+gTBYHsOjGp
s6hl23Da/ZRNpU1I3OSswl5J7H03Kg7R4hdavjaB+yyt2Fu9EgldbE/mcmJC
yZ7RCXWcw9YWJh9A1tBzomkU/gK/L6P7XLKnTKKbPULfdSur0/lQ7hEhXYyp
xufLuh07PbtAsklRkcQusim+FmO1O3LttsuCRkeeYYn1che/riVH4Mytqox5
n0ULc51BGASqrgCCiIl6hWzY07Acq9BLUwI8OniDRPpW+Vl0dahqecl9CHsy
IibLeAZTzaIgVkU1k1TPQTrRH/IDh4wfKxBh4V4ySQiRDRLyilbUWp4z91Tw
1sWXTFsOSC2XhvpFHt0I9VvJgWOOhZoAzH5qpYWAEK0fm8Rwfthmd65i3Tkk
ZrVBx3GMRpdMajAfZMKezgAWuEFBYmtt5IdKa1skpDWmVU8498tE2mr/stMh
tD+g9jMJIy+T8PHZFbH+rllOW4Zxmm2jA3DzlZja/aA7HTazlJIIQUQgm2/5
AolcxIXEJKyLPunWRQwZ4KskHkPyK5Xl11orCaQFPyik4pAuOYUBmgmypyk2
6OTKSxTuLumcZS1HwUsPquvF+uEeOT4qByrbQT0Ckrv6cl/M5UHqnsZuGfJ5
Hal5CDdrOMLbECCTr8fZemtso+eCM5yzGiFvbKCeys6lzIuL0GRt14ZDuCBj
Fy7iUzMburVFAXa8mG2h1nHGsTxafJ9mNiKoBNnfRK2c+e3bt7BPH5vdvBZ3
zIsDicDJ2S5KwLXm6kmXa2Nv5b7HvSg0prL5VP5NL2srrJn05+Nzjieg+3xH
oKiXjEu0B1/r9ArRfPv2/v27C65bxms3fx2JQfa4P3qj/wRPp9v4VRWXydi9
8Ap9UQr3is/36VfE+1ZuBq4xahPIQWQc7dbmcr5SxshipQIx0JRjVhfYiih2
Z/zXW5ZkUIiNvtgpJGgNnz+EymH8+FyrXUr0ro9G6eCoQBJ6byC762IlTiXB
q6KFItRYAgSdDJuxvGlJLnp5W74PCW+eopk5W+ONBskzu6X5NCF6fH76GmlQ
0kCHZqa/hSNt3Iuj1zAYedFSkeM1nf2xWsFclW+oLNYaDJnEB7seRD/D7tq0
tHXlF0HgjEQuFBcorUx3jeZyHjCVyBjDJcLShWCza5T9lOjATKRL4Yp61MvG
xekojsgE94+53pI+Ka7Kk0mRcqNdrVTD14KdU9r0oRNu2NzGwsqKIL75QGI+
EOOZ5qgjX5qPTXEhKYUfidjVIGYQp+3PpPOFmnsWxvnfjltfmy1Z4olPb8QD
+Csd4Sf6PM9mtqoTnuM0LxMCo6MyPU90UcZ5WaCruJxo5BlRrS3A+qJF0+sc
Vd/lUJsc7khyuP2PsSHfWOP6LrO/FCMf3a2Z8nwfkSAQQzRf3Wfk3NvR/itC
iVlSeAADbTRBrxZ4MrGhCN9ckX2Qa27nLAl6RZm27MN3GM6Ca7TJyszvmLr5
/IEgPha8RdetIhUsktWa2+R4jvepni2mZ+rcFOpOV6LjosbRnao8m15wv7hO
Al9PWYq/A0Mg34utrM8a5g9GFosiU85JGbOhJcO8itqXI/HWugAZ2UOTi116
X2IjD8ogcUZj3XUdOUIWeWiLdi03Otz2nEmXT4iQblOzmGHDSwOKFPmrtFmV
ImOWJH5l9c0aGq9dRrtuW87M4NcaAQyAIl0CfOrGkqT7nF3Q98yjCziNlec6
YqeI7xnE6rfcFY6dSmrOAt92yq5OkWa6rj7Idyyxc6G61lDrqfGSZKLozFny
QTrpRk3qOYLKkqkJF1snqZ45kY2X2p4YWebdsSFqZPRGxNfl1eyyaqFnGOVw
2pUmVCb2EPHxuv+JyLAEwcKY3jQAI2P7gvanwwvXeJ5TcsQAS8zBxNRqkcGS
7MhfOT899pT4UNk7tRg6Nn0IfeurN5HVYaDQbFGhOK6no0dFVmOyJQmcRC8q
H9GaY5s8qYtqBN/O6ojFLQkK1BiMbb+2CODP3RHIkDFj+K7mMHiIlLAbLREY
ZGXaLDxuCxu5j+ahaLuO9/8pKyPEEKFGBQIlbOEEH56hS9UpP97lgWjsarU7
b/2FDW3BtGvZf2z8Mp4ootRvodb4eoVVuYzK5LJb3DpoR4ta5becGVpF+hHe
KGemEJdKFoqxUAtLOp7RVCbwl4P0X5Mpw53eEf3AgZTmDHQyBd5JtdpmQhGZ
LRPTh5EBzKPiFNkyeNP7GpOWVa5Q8goFO7SDj2U5V9KwUppKSxFFe+FQTAox
SlyjSqdr+JPDBl2sbJYH47+GTR23jaRoSIJKFYTTcOEZDiLUdSkRkpTpDDoU
2GCxppTiEfnKSymg6WcEa44L19GbdLFYRNchbqwT+zix8RC4xmsteqXxOnaD
/qy32RwFzkpSWwptrjIZMgOv2WfNficfR+xLDF/jMdVFY45zne18q+yF17C2
IbvaxA76kep8XM4wapdW76LFIH8Fkw449DTISBJIbQDRZghh+z6EUIpF/AJG
+hTASO0YCfTrVHupdUKNxFV7ENRh9OPgGvaCXOmwhG8da2XGRz13I7tFVY6d
NTr6h1FCSDxzqwDjRfBGdf80E55iCsoEFYtM8u9ICcMk4lVwc1epZuaYzsnq
e1bmxclEHiS9RL014hVoEeBJMzbLq7sokBxNKQ/JDPfKIiVL7q5rBQNn4M2a
iBMv+ViIJIkSwouUXO9sqbMYfc4dhiu6wA27NAIDB8YnY1Qe9MlZYCYzZg/4
NjgVH0EePvWwAUXrgEKInH5lAzWrxa44a9nXrknWhlP16vyQ5LTONXBXLVh0
yQqOs9zEX9QXdrJF3GPZJ7xJ4VdRsClSvhXAhafmUxliqzAkbxtpH4la9iCG
QRyGDizatcm7Nzp/uHCvzAdHIXGpcelEDvP8sanRZ6J1pdaMRjVRsdTEVYxj
JFiDsvhSSdXgzP8eaxyRRBPZUVimxdAsqbk6c7huuVyYLmVNf7rWl5FEWmum
bcpeLo3xSMioJCOV1SqwnDKwCZGfS6Hl81Mdd/nkO8Sjie796rbd8bpF49UG
/ADjtxmYpAjNLL9kfohkROOFCl11JCqpYtqYMEcOGGQLoMIcTDJJTZkrZ4Dl
jq062gjFyuekfZIsWblIyZOTU/cHiVmTHFTWRo1el5EXAiVKU6Vuk9xE3oru
uFoqj+OuBa7dqYhrQ3RXHFYgH235yQ/Cqrd8QwhHF9J8P0Vwt5VI4DtDaXIY
neB0CktXIxLAL7NhK4SI3cqGz4kBy2oUeXJnUk+Z0LBkq50d2rbGkTL+BmEN
sJHduqiS3Z0rPxdJ+Ttgt4RZmRJ1Yr0UXcaf12x/oA1BtCXLsk0m7+Y3mHQ9
MlvO8tUj+7FIvwGRx6+7yIqgzClRY2rJVVhsvZPOmUSPL06vntBWcLwcEudh
qPgAoZhy6EXTLfKYcOyPv3sWcDdvpqPu5eBCEWK99GXKTKyurgsAu5HcbNyj
v8xbLGqXb1H32shR/VxwFMUbOr4JbFnGYL+kKygOZP9uRoz7lhs4Dozy2Alz
QzDpmUZDRp2VcU7SvzIOGtKy0QvddYVh/jZDlb9y2oi6lqAA3sSZgFhj5fjU
3Z2d3s7OTkzUnWkyQeDnwZuBrQKD4G+ESY1bPhlHGaJNlCE+b+Gco8MmQMgV
CBLefx7JkNGqo0U5CXIHw2Nz4RdObwQjFanSFjzsRcwDF0l1I/WE/UKGXKVh
mmghSLMpnKal6gi/YD6oc1bZBNs2pM33OuvZQma0g9plBEvxk5UTntnuq0VH
mFu1C5U1QvY/JcVNZHZrtIkk1skjptxTmOoqxIdPkrhgkwd2V03g/CRlfykv
1bhqkdUCptBz2PJjrXccyY578Qn7R+8SrrfNqldg4DMtL6381ja60IC24Ybc
x4ZunUh0TdOiWZEXUmI7GJDmbYOMRKXStTKVjtY+J10nq+d++iSTCRcmANOm
BxJNebkvBhHOsfbKmjn1SWuxT7sfxxk7k7HaH2u7OB2wp8MeKheg4+Grjv2F
TNUWdif6gScx26bZvBZMYIzkvCC6RzdII3YwlVmBr04vMXE8myQ9ySTQZXvD
MqsieIE+SWUDHdcnwoaUiBwtObJGt5ZhJ7rlXsWUqHUT+QXbTuniEZNYScEw
LVimgNCta4vANiooF7VubAJnXN0ubCRAErcF9zmBH6kBybksF0ltnaTnfQm3
ZQ9epFVHa5ZiiPpK28RXHhkcKLi45NRSNJ8pYafj2sgTTyMql1lh+IHfdwKr
x0II5wh936C9PVMaqXP8xwzZ1c6dq/VB+kWCtJnSwIwFU+JaLulkCecCfnq8
uSD0kyAHMBNzzE1W8I3UQR8JCSirmmPxV4gddXm/rq4g0ZKxFuyFPcG6EHXD
QKQuQK7k+IMo3o1JBBGDiqPpVnSTAI+PCbqJoHoxw+PngoMo2ALqAuDprkmo
CMoCL8aIPzD531I/hxWnhFs3NGHeePQItP5RXJsi/gmEJ7r/2tQKd63O57Bt
lDhWmCs7SKE829tpM2kf8OI0Vnk+KtnEpsRRkzplCF0mVmIEk7CO6Cl69swm
UnMRXXmTFFEJKJ5cm6gUUyCS0FynVmfwmtc6XsWvqWh132sXUIVsaegP4CO6
0JhfreXxH8rRE9O/hc8isvIsYxN/lXktF6kBd3VpIFIJye5FYlGQixBpUxAq
V01oPabiss4NckkjNR2nqZ+g+Xqis0uimuQh2CpRa3jM+WI597ST09SrY2mO
Fpi3qEMnPT24Bn4dVS23ToPgWbUcCaAbs9N/jXRp6scXZ7R/LzSt43oPLDhA
BkjotiGJyODO1L+WiGuvh9E6hEwJF4oJ9hr0dF2u6HKKNClSrw6p1s29OlUD
TBC2XBK5Q6baNvv8GPmEwXCTlSBiwJX5uLRXMu5eSeRwgHBI5ndkAlKceQa4
YL1zeCNAdD9i3FTpjyRKK5yCt2CQvXko5wEOkSgIxtY119gsgKLlPKdYloJv
+Z/RV4/vlInzkAtuymNLFWu+buoLZw1oSPtmJ9OhKhqJcYbjirl4ulQm94xv
vJ4weGpDkcfoPR8FqHrdrcGqRToaUlUlmo54f4yLBUx+I9RNtdiJSQkKnIhi
h9eBlCI9S8AZUzrREnXhvIF0TDLhmTCZsaEe86F4raqWNH/DIiPnfOm+c16T
i84NQTssNiWufqzXavv0YPq5q3HhOzWWrBqXGBjUNpAw8oqb2cRVhiaWqUMz
aenZEvaaNuMSoFzsTulmYkttmFYNHa0f/S8O1jCfwQMewkwSKVMomVqdAzFk
79u3122d3JhuHlA/6mXm6lfp22mvoRdeq4s2bkz4jzSP05EzTDq4tIkJpr1+
KEtNrLVGQvbLIkmJbONEh6mkJ4Ej7BZ9wGSN28z5W1jg2buRLgUIwx3TsA+j
a+Fs44R/j4yyV0vWq0kB6UkxZd/LvpY+hxGS7poSQXg7TyV1uiiL1aJsveTf
jenmTLpyTo/LlJ9WHvtp5cZ9LTwL+w96QwbhmFKeLdYr0ml8pF3Ims3fkV2g
cLY36NWc3NjHcVCSA68drkj8W9t59D0778wt4TxAOJk5mhrEMFFHOLtOJ7cJ
eizkkuGHaB2pvSfiOnKcUDMfJ6M/ZYwDnF90LTFhfPRpjoaeokqZ9HqO8zxv
5hmJ4Imu+NWwXZU7I/KRcEkRjXdizmBRZDyt91zDFRI/s3yibMK8TdaH0Bux
TcZTaHX2lLFX0+Q9v+RHfHZWjkLSD38AF6IxdZ0TbkGMBfRZCM20aUD3F2Nx
mGA0nTpjyQUy2+uSCxiGCZOhS4wN3SWuXYVAa+EltqOMwTcWwE1zJEkthgyg
AWVLzBk10NRGZW1/xo0OPRKlAeJLtCbcGK4DUsJgT9KiqbatS6bLa5TTFOud
aXzQyZH89oMtwrFWbEgUpNFcSpBeyfwXLpR9U4GBdV3KFvEghipymqlIX+uZ
19vt6JiM3oP1CwKCbErv9zgjRBdnki5ltp4UDOHRWrUUFF/oFJKxHdp0v6Os
QMIaz7HMUIgk6ogEksKFizFWurJJwmYUr7KQdsrS6eGMiHmwZwRi+YugfCmX
X2E2v0lrpNWehQ8jDNs8jDi7sh0L0+GmqYlgLetgk5I9ibqsbOKCUXSQ/qaC
asg6Ne2NWHKASAF7lzTV1LJF5OJaggrj9KaWz3VauSmbGNSKkSdNxqd5w4eJ
+KCQvtNwRxEJXi50PjNb8nRBZVvioJjqgCydOBBMASmfZs6tjeCKC9FYGZvL
BGFvestWrPM9PtyIBYJNFjR36ol2L8iniWBYbEpLJFoBCzCvd8/F0HKniYz2
zs8B3YpcYOfof3d25erSDII/XYi7y3Hz4titM/iLzRj2w/PDePZd52Lvi4a2
uSITmwV1ZpLExCC0spY2sFzfTodV6vqT7LRh72EhJdM21l6Q0Dex0PqVKWz3
g6BEpP0ZuxzrokuxLrrEFxK+qYYLYap1e4XXtMgv4iTc6epiEJ94V4W9LVec
avvXNmPHnKxBQmskGdaeGX9chGlZR/zYFQIc7u/pB7hP7tXtQeS6ibEaHg93
956Hzzx1HceeeAZagX1kenWw0UNIJNGt1NTNRMPzUsPB2LF0/zdSNWuunH9F
CrWUFRjEfhc003XXi/5MqxY+vQtTgAwFojkTLNCItXrOfhVlYiHYYG9z8Fjc
WYslAB7YZoJccj52qedWFKS/6fYRT9DxLbIPpud+e7ZBHGoCDCndPaC7T+RT
ERYg0tDmjfmJ0Uz5kLAu0RpV+WWlfd6dpp6RidH0KR/EbFt8NfTndtlYFKSm
dVfp2n9o+wE3HnLN2Lmc7sWVKOZxBPqBs9CVAkAf+/58M9NwktmLrqlnts1p
TLZJoDkqomw6VRs1Ph2V7LgLnBAfJoUyruhuKzoOjPlhEOTCDCGoajMrdey/
fPD5Ti+q/WKbFtuM64NDjIw93dOi+I5JUXIEv1hxry5z096bJpXkcA7rweKk
hENnDQcH+9IVKzIKK/cb/msrsYZhGgkKZaP7D3Nw3aDUmVeQqFbQ7UWxFr8O
sXtf87aAm2GFnh+dmWbPdIA339Vx72FnKHiUl9wtQcQR138ier5jS7P55QJN
txsPA++sQS1sGi0R0XIHthrw1mp92qhVErQjp4bA1wiKLycgNU0d9Jmcj1cm
NldWKK4YwjL0bGHWYOqTcE1EKSrX99INJfYSk+4dxo9Hb6+vpL4MQnhFtbG9
gRmVTGEFsJr6R0eu2PePZhUiGmX1DfvdkDCdgyRrFyNarkmefinU1ZQLqLuT
u9LE0mDRGGBdyKKeWwpwaHeI7ca5JseDTnBfNNN+nEkyFJzayR46p8jRlLBh
nK79EPkVXUxR2tDgTjJucMZQRnVNBWbEpghu4tWXG7mas4mTu3RwrG5UrEuM
WudMT9cvCKLGoKKJudvWpulOCOc/B81ry/daUbhjU1zQCYBh5JFN/uaTT8sZ
fGdMkUF3bddpn2JACuCNOnczEbLlnEGWCIHSPidbXYg+VosjzSsKy06qVY7u
mCAhzu1h6rH2XG562LFJJx3x9bXLkkwxkbtJ6fys8sVtduOMQCOa/zYrlDP5
XFjTDYu0Oqo1bGbfSHeexnT6svd6gRKPtsICiwJiN5OebZoVhx3RgqJgjD8W
RUMnw6ZFsJved6iJdBThnk/UbZmLvMy9xWgRHDSWOgbilx1Znx1N5VSOo6m5
oivou43bspOZpDHz8ITt6RvEji3o5iVvMP76KTWQZKPEvj7Wibh6pAZzlOpO
F7ZhsX4sCHa1bd3hy1VMwbkzAB+LoT6kJgYQcE15V17qihSSaVSH87i6Opsn
GaCTHFbEAp8tGqTbbPhKd6FmpXwh8UyYvJ0iEAxKhM7XIr3C/O4VM0KilN3W
hoM14V222lgHoOAyM7YAy+k5E9o15w98ZAR2cTG+anW15ZRNidSMpZHcRsPX
Jsw3YjRlw3GyCnRSv1Fez1ZJaDopb9JiEtLglhVYBZrvlVxsI9Q7M9mmi84X
+boUB0O3h1+gvmmaq1/5Y3nBeu5odNkLpG4v0jmp0VTVkG7Exer5XZKarRTg
1dcQDcj2sQny7iLjGvBkGRZejHZrKczAtQtjsxaHyXlFHMYk7mwq/QA3DsrD
i692YhNITM6pT9wdP/NCKv0yFu71jI3IRM7QSUd8JAPH1F3oBu9oGznJXH6e
1LyOfrTi5Y9eOYI0IW2S9Xijxo41ZtruRUb37SH8pH+ruChaV4KQC+ThEEdc
tIXlnBOPontpfToWsPYIo1dGT+dJKld3zZx1FOb96nZbRvbPTbqC+6ZO0KwX
7MmpkGiE3iuE/67DGyp8cE3m0EJhWnLYZO0f9Xd+jL1NgYpqkcK39ljzAASD
bTHR2y6rK0jtxcfRZiPRx1B6o01tN2eYVmDPZkdAoUt62yZzDlNqU3VDds6a
u9UEtyCUvsu6V5AhkT2piIEdshiyMYRuy+Yia9Iy1jKWITt+A1a8mwbFjUav
fTOt7hMQtUVbs0YVOnB2numqVTSvkPnuxJaURzCArOo1ir71VLBw3eDDrB6q
gFkc4QqJqoI65vAlGGrnmdQ3ES3utFyk+no2Nho2GjUcpM2zfhhda9ef1ut4
fVVLquZJ1tDS2X59ravir63f5rMzYF3BxsJpmt1bZ1q3OwrAvi50hN544x+f
vSNhlyMKAFPG8dgr0CAKqNA8ay/gWtI2nxJBP0zjwc7sCXVIRCR72TM1o9kN
JFZk6+baLlq5SF6SCrjE/37HMbql9AeSFbIJAhq8nrHffqj0qJNKuamBaMWm
sSfihnCzuC9Sse4gZpJkZgpyC5Noibi+7FYqn3fCyO60WizpzFa3nmQ1EANm
SHppzAW8oo7o5PfwReBR7eX2O/9cWDiA1QkdTR1JcripZeDOCLZlB6tOaC0C
v4WAcsIGKzNiXgyLPhvua8uI2t7Mpgme6xFjG2t/QYpQqo1rUdD0GUXmGslZ
W18YR2Ywi+XSTCbfSxraBPAR1BFohxPocorwQ1bZbAafoF+0j69NpBMMTVWt
wALEuUzSem/1It7rNy24x2OdLA5Dn06yvrh60ov27/v9P7DrJyyaHaw99x9i
WtG17c3Dg/ilVPxay8SXQofs++CZ1jxpFlJg78hVMinkGgvVpIMcXAliI3Y4
I0U3BDug1nhUkEZapnGufxBcyX0EuNh1KIrDk67jxrbjglh9OZLc9VK2xghX
UoR9EhIa28njd7fONcvT4V62VkskQVgIA3Dajv4ZeQOp7E2yHyDdbhEXOnqL
QYyNe9tgvRMZk42A3pNQByQaVdfWDJPY0be0khwP9tJps2i06aO2/YNRscRp
LwnPHLL4BWdh1o3vaaTdOp2sOYxQN70udCEP3e/atXdLmmi9VgJ7S7XjzlT9
1JhF8GecCx1H9y3NS90WJssRKcnX5GYOYXHtEkTXlrBd+ITt2w+geH2f2P0S
/XbD/zb0I1pvQWQiAxA91PnMpKj7C7RsoBX/EnHhdk2tgjLOXr1zvwpF7FWh
ELJIJEDHWOpbICFHbHTnDqhakrdBSvry0J1E7BLJbC/fXXj5cxenx+/e9Uej
Y5Nv4kPYVfmZu9oIPTqXZc53UTooFrFCQKyJOdO9vbich/8Q5P8KDcuMi24Q
uxrNjQULDPdBUJq4gsUqBQDrXCCEWdKffVZLBDG5YPDzg+cHWhK1PyO0jn98
9vwQldBMeYxoIflLqtP6ld2W7lNB5/e6acfGkgIMha2rEnJrdszJnub91ToA
bPyC6fQr9SJ18ZOy6C+TZh60fyWYTqcynEI9QxBkXRbWMCHHMV5xOQ2uismc
h5b1COswCPhIuvWYrstSQ9DZwQgPN33c+ED8HXiRCSxU6VSZTiqUDwWvIBDt
1PPmDeLjwpi1rZkPgYK2XpHJObGugUkZP76TTjyQYZM7aSzCgq7IhIgy7IuT
1lSQMkAgNvweR1mSst+dmaUvWiyWbYIxIPkAC4Vr6Gh/EsQlNYQkixVyZk1a
gBeasDE+iYtdcnsVEvEyzfmVixbxisaSXElKj1eUhCUgSSgexOem/aYwdaXi
Tu3+rDAFEdDVHNR1xSVDOS7Q7U8SItl0wLzNP1mbKITpzRFxc78nbFl0NdHc
0TL69SK50EZKKUq7C+9F80pPROiZ8jokmTcNanU8XK6lIcS9BAUxkYMxyWZe
tY9IMI8r8uq9xWt7I8zYPdob7Az2BnvWy4g9RI/u7u4GLj3KlNR8FLu6Nuyv
5OfWn3rs9C+dcA5TAX3uDm3BCQ+5pgn3lor07r31Pdo9ej443B3s7uwMdh7Z
NCcGzosoiul//8bb/Y96Dq/DfxQlsRqSzOPfu+0cx5u3wK//5je+UojFTZAg
9xsclqlTn7qCVSA7k1/34Y2f9fcVRUDEDkWzzWwtyRPx6P9t7Oq6Gzeu5Hv/
Ch75wdI5pGwncRxnnjQjz3ic0Vg7ku1k30ASomBBAAMQkmmd7G/frrof3YAo
7z7ZQ5FAo9Hd96tu1Y0WooqMtm1SnfVTvE88Ur57ejORcV+oODtRGNwMZIl2
CRrO9WqgVqKf8fhtZtaYfvn3UK3uBBYp1mF85eyq4RlpPrMCTriSv/unp++B
XN8jq/I3uDFvJjNErcoY1zm/VuI/UEnF7M6MefEEU4hZKHYxKt6K1q9otSn8
auBwrNab/Qw3F7HWV8bJIBtUETY64VL/EYyPTyTQLlxE3gWNidfZkay2h3c6
nHLE7gDKoERMvCqEAsaoE6qbwI2e0HreNNWncuJ6fmiMRzK15fooSO/O9M0c
x8X18Z/nP16cvf8o3s7JyO7liyH4Yhi2IhUy8yWULYI5u2CkVOLb349eyfjo
fB2PZMmpoJPmtG+VaSMbcow4kzigqi1zVTfYCdgMiv+j8F+caa4qqA+ehgkJ
EJzsqhhlU7A9i05DuMRVOqpMhbJZcEnM7TvypIlgC15pyW0l0Q0uMykZj7xl
kr0VassftQiyAllVnHc+qLZ70OOhQ3Sk8I3gB4Sq+/budKolNF/ZqcsXCz0q
pOuD8sghOxXSK3UwWkYhoK659/XjatKBLX3EXCF8hhfPCy036yUC4ppu9/t9
uS9druBZ1N1nwn14rpFT64roOeGa8OegrbUvjYANR4ZWAaH9jCnFxVzemJvB
uJ5R9jHXpzWusbzGiG+p6sqZ1F0uDZU8OyMoPe5+8c3/+qe/CEVIV8JETt7N
iRvndPxzl6RSL3F0VlbwgpocOLrVsm2tV+db7EMCFTZ7wwpQY341/uKJJWz2
MwJisvZnnIa/xhOqXwtXmvDOYA69M1lpXOOD/KxqL5cqZfxRJ/H458uPJ8Fd
RwghZQ68ZmbG1oBbQ/w7OZDkiyH31uUcB9GmHvoap5hpKHK5BAfW9Oy9LYz5
NYfgKQ9Y3vQrqx5wtVepq2YuoJ2MbymJaUllrclZBxmDLIEqNv8u2UVjJ+EJ
r6aOEzIR5tLdV+2sSMUvQv4zo/jn+ZpDonTbIUdfygwqsjBXJ76W1O0IJJwK
E4U1R0mzb07KIp66LpYwWg69Er1kKb1OSYNUhSzZSQA04TMtZItgCLb7sL23
95pNto2bIaKTvRGrLW4ATH9RqaJqqaQDEyxB1mmyM4oCYUFKOMbZCKu6m0wT
S0fPTqQiKHJvntKQGs7SBFKeg3jXZHyCb37wqz3jpxTAZpZMMTmvePOr794w
VBF7Y8WZIFkF/PGhqKu1ogb8ewpRsCSsJHiZ4HjmHx432iJMA4WDkFxWdKta
stIhRBFBJ0UZBxnGvfau60A4BQpD1juadsONDzek4Z7kmZQ8xU1FJ93p9yXn
QrJIHDPhwUGix45ngN5fcsxyObRHNJ/vbHJg5jtRnZ8LhkCyeUE13Nyuyri/
OGAw7Uo9MRPRmWyHnu8v0ZeSf8Kb34m9zWmtBa6jEidhFMuqyl/RG5AS+V+B
6ztu7Os/g8ETGa+vvvzWC16JU370SlIqCvdR3aGX804nio32AVlKa8SBKOML
bYYYy1CeE+Re6+SqJtWQ57VCntdKZOBpBnbeiswoXjkfMiHhF1Le0+2qDf2C
mRvj/Oc4XF0C04oIYzIjxIpCqJ8kraVbDHZbZWaTbs2zw4L0H0TekppqgQSP
pURvAD0W2j1Y8XD9yEZ87qN/tcP1sJTfFzURrY9xUyQpgvhrgPBo8nbpEJwg
coRhpDQ5c32bTtysCBdlL9D7hzjSquazgVAE8NY0a6kPwruIxHaJdAzO6ERK
CXCzeK7gebqvfi0f+7vKuyZnP9UxfFeS//x2AMSwhHBb/Vro8Uyu5ZT5yViZ
PjAd+OfPe5n5RqE3YeT/HBzAC2vFHZAYFI2WC8xmPqPM8k0YcI6yQ5+cKWhB
OUJfYjP7oWiMH+gvhgO0RxXrOX3UgA0hxq9TAvG823j2i3aVxutgi1qANA/r
uJ+iO/IYHbDTuH4ddSTgW9sMmWeBuXDfzEJsVRuNE8K1LzBpjGOXeSL25BZG
LLS5AxQ71KZrZgC2gg4QafxLnX7FYSyu3r978+PFhSkwm5STIdFHPaymS+JK
JEIMplAIkZus+tXAQ8TxXaXpI5z3RpslriLBCyzH0CFSwazMJ4iT+77viri9
w/FpVZ+4HEEce70su501ZPJsy1sqjFg3oSmqJjiPV1KsIvzFWmMO9OxlgjS3
0F8WyjDXk/uIhEOckDFD2nz2uqw31RD/57xshMHrbdVQHju87Qou9XclQNcM
lUsRzn4fN+yeAtxCQUHv/hYapg1aOC9b+RoZjJhwuHosUcZ8evqFjGGpOvNd
U95LPBxtFIrNDdOcm+J+yXDg2MYXXg/1BkxxcTv8Hg3p7FMp0Uv8937boXfb
n+C7uIYafNOfoCvL+N/w/dBsyBuoD/Ch2D3gex/inA4Ff2JjR/vEsIHr9im+
yYaa4nX7UNxRTzz+X8mv8xHF8FxpovGvp38+/VPc7H8XkjN7FKs+hWeffhuf
/GSe+NRQGUcaSGqFx1hbvh6+iy80GpnV7Cxu7bQ6TuYh+gwl+4JXkk8UpDCC
yGOZBmTdIJJUa3h9ovQaSPbEr3lny0tfP9BLfKhQ6LXCywyuf15uukJ8uWAS
3trxkdvAzEOKR0KdJLrBVGONwtHCxeP2po2bF4bU9xJb21MmZlo8nBsXEAKp
JoNP5zAa8llu9kkjUEJDYfwrVTZCbhnSHUzENAsf6dUYyY8Em6Klu+ZMlIca
GiRvJ9LRHvWkDLZgStWs4BERchFUGleAeRCFxILZzSn0OMtvtU4vw/pnEeAV
6hBrJCdpU6mup8QOrj63axvni4S1YZQfk78Ve525jZ7vY3R3If1oEsVKHiw0
bZ7E6KVPW4G7xdbb4jMZALyzBcMJzuoyLuvoPCEBnSNjrJfXYYkZCxJaQbMC
XRFemC7LSM0kIyXreOzxvDjTJqAQivoR2MASI26MwFV7XwmXLNvtKM4vNCFA
HwVN31jKJD6X5Bb6I+xdWaqhaLQJL59uKSZkbscxQfIxNIpjw4BPpG2rK00V
PeFHKOFwULbDrCIzBM5qipclj3b4fYRREDBpyclIW0aNZc/SpzxnBHlxbnqr
MeiaYDFYE1Yg7Si3ZtndzJwa5lISBlZ2MX++H+s2Zv1uovJiZ0Vwx8nqDsi6
GUuXKBHDxXCavEQ9KvlJPMihW2WS3KJjIItOOMNYo1CcunZHXBugfVmO8hx5
EtBD1ISGC1mGoZeYayLNZJ0Rlu0CC4KWSBQ86hLzeb5GOpwn+2jyBr13MEM0
0d2W0nU2Qwq6werL6RdyZFk0IneSDnvRZxJ935xf4f0lSujwkR8bJj+nIwTR
tbPRSZ94kEYM3cQjz9Asa+Kue6x6hZZzOGiozjiV1EPvhyUf9IH/uxCP8hUu
vRmroVLyCi7MEsgVcJ8IzyRCc2gDu7aggaduint94Xigkh2udgVbpJKMBkx3
jePq+fD8Vnv2xkxXrD30hAVHqFeuibQ0zgYCCuTthvR2ExdCDO9VQSlDpAu3
GvizpgcALDdrDyuQKpQZl3dByjf0XSmp0Uvg+ecLsphx8Sn20kC0nh0O48Qf
U3wgEZPmGT3MB/J1r50ET7wG7iHaM23NsI2J51yAa8bD2Qp06sWD8AQjWfAY
JyAjlgrPiaWeszwM+eT6GVk4r15FDtwYbse3kR0DIwxt5jPBh++Lm8pfbgqT
rKUkTOdTj5Ls6rragMvHF66uvg/T9kqp/2BNM5Px2I4kM4vZsIxzGNfj0Ocm
LtFvfWxBdrCfP3v0dZJ3StJOQkk+kZUy8hnGa4c91zTPeKSRfGSPVHSnrfam
0WMBq4LQsXJ+2iAVcoht42VBSQL7na/H8P1Pn+GLAqn5TzKM3gAwTw398zEA
Ic571Szisy5E0m12fPH++uIkJBTQwYcXCbZt2970ydoxoRTXb5x9OhKpE4vF
41OO3b4t6URlwDRalxqo6wZ1DilEXb+5zIDotEXyXuj98FtYgDEM5OlmoKDM
LjAzEE3U0KvbvSorFjulOUwPnNty5H8fnOOqDxmZh7E0bCczbfxU1tyWCGu0
/SKM50jnhsgmHX0+S8ipoIWsZ6Mfl/94Tl5hjxGD4I8GDaC7Ppsn9rKqAdiJ
+MQI2t8rIR91wDpxVuEFclErLOphqLGAEv9AnzX+TJ8eR4z4q/nb8xOqL3fD
9lS9armJudZ04JC7YeEESOJdzsQdJPWhf6hUKxTu83ZnRaIYGXdWL9O3Iye0
lLXcBwpV3w98AePb7dq7skkCqlb12AwEeuYacX6IzOUpxl2Z475dmQNn90yI
IK0c90ZmM57o5zO73If0G2lYRZIrekTSxwLZDV09p+FYCDPfL85Pq3J3swCw
Y5FYwTISTSWbOz0Z1+LPagOiN88pRpCrQ0N7au85xjyAnOSqXJ3MD+8jWgzy
zLgCi/cOSF9W6vO2fkv+JJ0+IupePiORfXnjNsgzxGdaLIUTMTvUsuXlfYuM
1B7aap2H7FjOcCuWbCqLq/qOZ9VK2E+FPkKc7kqSW1n8aik7GVwwA2nClNnY
tJV/n4g9Mx4o9aCEJ9iKr6PTzrAyQu2re0J6SGDPE7WvknVVPJCkOIm4gS4U
SnPgY25ebIxCxxgcFKOdBgM7nKd+36yidW9gnJUCVE4tWBVuWGnEEIBLAem4
RSv25wqn+fHFj9dXJyen4eCbpKNxq05F0u8h2hd0ay4wlTEH038wiiwLtrdS
IaEBS/x67MQbmQLNafvhLfqGt3m3ifX0v7D05B4Y01HZYCcdBcMyjPpiMEhK
5jFF0awXQuIlg8UqSFYBOfC6jF48KyWakE+EPWTbUjJpA03MlSGFtH7Rfhgb
jZKUg0R99IH5Pzj8tLguGsu8IOqlUq378ptvkd5Vq8gIJZ+I1IEdfQy/p2Bd
7NDGrnMp1HIWL2rUUnDBeXL7toxXif9dO31aj4juSCIfmVzdUOmLfhlvYfcu
L2IbiF0OVT9i+zISPXFXs+j0dQ0eeDzh++nBHCfkYxxRufICgDBLp6HoBFic
IR2SJqegBGdB8phozY0v8MDt/p6xglMP5gjp5fVRshTBFkDWa2W1bzpQIi8I
GDgjzmxUUyJl7gac8OqkoJFvJo18v2ppCpwDGZGHorNNSIOxb/ifb76E9IlT
QMl89FZK6rNWY6c2VJUE3XdSs9FU0Rft8mbohRQlmR47YdHrC6Zq8iy8q+pi
Dd85b+9BMFM+ENHi/ZT0dUc8FSiEjdkGlF+h0/pjAiWNDuAOegzmIlTdwXMB
dCq14GPH5K1z8pdKteAb+eeHKvuHtgShkoD6gn6VZf9w+MhMfZLqWGFu1bnP
jMDMRmS2/afz3MvsXzSts+K+VYOp1MlisbPILDOD6g2vi73GxIhBCfHYYVFr
WMyqhnkbYAYMOamZe50Zlw46SEnhYr1nOHqM0KMw8uPwkrNOE07uG9W8zTEK
7B4Ub809L7ACF20ilj4oVnZgwoQQQCrxhhmYWxosiG3Ms3cvEb1YQtwUpWjV
0UMTsu6MWdu9ZL61wfvLb+beSj6WnlHW5YMvfdRM7vnK3QgM0Yesy/zp6Wp1
25aN9tYr+4ao7dalSsr9dDV7W65hw0C7mZLZPUZ4X0mE0g2CHdTloGOPO+Hn
tvnQ3sZotjGoeZYWSbg2z1pjZ6eHC+nhJoxB26GD0EXvdiVzHNFDowJDoOl5
0IJ4Jm3Fo0s8oD8+vRLNmkAbjdbgMFtM+CTp3/+jNsd0gaExzymNYm7N02cq
leJFOmXpK7vbYqumA4SOomHJbZfW3gvut9Kuwd9u2gm3FClp2Lp0J2nVrhzl
acdsNdFUBWcQYHvttmBzm2JwIE5JUB2i5tuBSx+bVDpe5ImZR/I0hmbG0cIk
EM/VwCBMokKDLd4S+pgoxpftes/+i3VHjbna8a+v2w7VtndxUHgyp3s4fv3u
8oTSwtVvcaYsT59jNeTynzsA6OWeYwG66xOsRy8wHzaC1GFTCuB/STgcvUJP
4W+R12XRUP+a0LzIF6yrDXRJRyKmcWLr1juTlvEUvqnohm7qdokJXCSMbEKL
LzFr6IY8NOY+od9dAQiugot6LGar+OnvaJixrIkiF8dwWL9dEnIkqbJlyVGj
53aa3h7jr1uhIF5Fd6ue1dA72e1jWH9wyOyMKFgKLlgbWdDlMsShzCkoKWSe
lQ7Rs1rMBzAvKrfGMYvSXienBDvXKRCdlGPAekOx4UMW5eBeRs6myYR42HIE
aMkfXH8uCB3UBRLzENbQjHWqeh78DUnMUBoaQVempmEgOYUTVoooujVuqi7e
IajyqWl0stFH1bZharwO9gP0Dgli2xeAdejpgl1z+OzaqWKe/FBlc/89QE0Z
W2JZ1rXuEJibaBvO22VVqu0xs5Bes3bmpHwn//nP6CNUBbuPsceCpo5l+vTa
31rG8+YGr3TSROKCVShIhD7+qbCWWsnKyZXZI1UWK3HsRMEJR8BZPBdnV1ve
tS+Y9QzuZN10Srcx9Br/HpwqYSGdKT1iHOx3m/1WhJA+VMt9Ic/x1VcUH33k
HCFykVd+te8q+8af4ixe37b3fZuy9JrHrkQ4plRMQTQj0u6ROrJCmmueoPLD
jM3X27rlbFHMnhSEzuIM1NQCwx6yWBu5oN5V0qSW93mfvcMkiwbPUIlkoBlt
w+Vo6Y0lTr5SrpqGO/exIkG4GnslcZnf94HlUARVUhKloUyVbjrcC2m8YW9V
w4odqjJMR0BKAjuqGZypnLUC7hDJRIh8qaTbZRk4uk5D9eis+YzBGLKWCUtO
SgZ9g3/lO0UgEV/2ebEuNKiwqsKZAq1xRnzio5w1MaKOE0hs0tNnxfqBjwiP
4QKmHQL2i00naqDTti5pWuaan5J2ZF3isjyjxUyoTiN/L9J42AwiLVg9v/z+
MhnYDJjJq+V2kUxN5LVW783YfvtxhFHvvX9B5twuKN5i3SbZzGeiAKKdxsAQ
nVWDLs+8eYY3IyhEeS+YJJaDQiEgUi/W/pt9O3TjC/DPD1X5qEUqllsl4bOT
VtcXfpgyZf5ydZ3mL9fdq16OHh7gz96V9ptml8K7GF2IE2RBsb4wicC0vR3r
tFlbqae4S7Tj+bCNqljWuuCfNfmdlMpn65LGm1hhXLhr18NKnLbN0D8bnEdM
hbZ1TQ6biRd2Zn/nMPlOYwwieg6G0RZimTgfcbj1PTHQV5dWebDvbFjrioto
l0GRTlVqV/rNt4RdKte0OBauaufTiefJp5TjMmfMXhb2xNq5Y3w/jNYEvQS2
I11dfvH+n5fSi49hmJYKkx9yVyKO4OVgE9SCGANZUvJOyoQPolH8Wwyp7qhb
PruWQzP10/8rjh8Idm2ssM4dPXz9dwktTu2tWxXphv+ZzYL10OlEnyrU4NH+
LsqfugLW5uTEh46GwttZx2rV6bAoje04ubblBkRoDsm2Z7F30j5/bhOoBx3U
OlE730j3JsAUQ9drJP7V3+LYeTTAhCiUfYT70M9WdTusE/+zUOtdxbOXbEfx
tzUcBNcdZjoZN8q1CKXbGhgDI8/Xzr5elZniMVXbibfrJ9T514xQ80OYUy2u
+j0WmjV9teps6YSAHMFoKtI7XsQzFh3Dces8PclDwjbFEJ4ELlKjbljtFTJ1
fZMjs4GR/nSVrxx20wFqB3S9N1U4o5+9I7GOX55qT0Mj1Vb1bY5ReRf0rDmn
+OirEym57agSBHeUw5CKAvperWtDJmj0Mgi3vTj7+OlKbO8FIJ4LyqTyPh+j
h1X/QVSfAvtzU0YAUh8YZb7BK5ObhJLSCeL8ddvDZv/x1+18FTYfxb5ocszr
Y8GyEke38fNoOcGUeaR9ixD4QNHnViqTSoyZE4+KnNQ5pBgzglHBsmb8QehG
YcLxWpMJ8c8MTdJ35Co2ZuRH7qrtIn6GJUPxGhyrCEBmSgzz2Kbss2pwBg+b
EJm8mlEfsV3bU2cSw1IiV4RvKWGAEEcGycUbXFPmT7vAt6IFolfNrkFS+47h
Cm8VRJ2r1Q/zu/Vtdm0944GMoktSQnmwL6UvHGc9vI8j4IrZnHWUX2li3eQt
sFrDFngm1UZcFCkPov48z5nozJvngqMmAaMPQu4yCKOX6clXEiQzrm6arADr
EgTIWZpnEb/OtZmpUnIeYcxTYE4QMBVw2sxPIHJ1CkXWMLlM/p+l42slQZLJ
1swqF8iq6OIZQp3LvBYkV9dMpIh/SreoLIMp6W9GCmw12lSv7BRVDAHRR2Wd
Tntqne1dy3mkbn0cWdFCCdDF2X9P85fMJq91tTSZllEPok2NXCCjRLAcgVP0
ciarezZnoUlusWs1DZQtHhRRHRR5CCf4R+/7JeixRKHS4HP6j9Nowt+9+f6/
ZFh8ThiFEoU98mMHi4Nm7z+9gQcBd7QF+kwDZznH7ksEUMyROHQxIyK/2jez
t9y9vIXg31/N0sfUCqx2Vio1RJknb1GfELZh0vHjWw/wwu6dGUHUb8QdSL1s
4t9ZgddRVKIg3c96sPm3ZHrWMy1Iht1Z+BHQf/fpGgkFdoTGw7+3FSaS28kk
Aopv0xJftgxQiBe4wDvqWeUZu1Q79MxCeD1EH5ba3ABilsND6WXQNwoKFjCi
iBTEU1VsbBz5P7riYde3D4XTtv13db8slo8wlT/G1dF4cYyWWPUF4y8vomvH
bjprM6KdOaw5aKsk4bAy9UDrSWYGVRa0JnzgJkgBTGhkv/rauvTqIt4dAK5i
lpkjY2cQ6hmCHqTEGEjwsRpjwMcioejIW4Kh9Eg+fwPvtTmay4J4LPowRgXN
figeiqtVV23hxK1LCUORG6cMmiL8XOZeFAiJklX8nhJOlaJIaIWHuDs3pWIl
AEnTqfOsRnCNP66f+BrihX+XEubXKaOQsd6C367c7m6hEhiPgLn7BYko8R5+
ELshUpkBphfDi44jelSZSM96KfH3NS57dDq5GT89xB/7Snkg9PZJTYZumx1Q
lqw/NCYj10hHnPNNLEm2NlJmSszG8F7j5WKYR/DZyVzajqQVEOwBAMTUXo4W
EnHo8ORHtUgfSv+Is3zIJTA3Pt7UxXOAOXjXTp9bxn8yUgENRtcobSFs3UUX
frqI9OFYHf04o4D3LsuheSyacZXeWqvmLs3jsiypq0VoIfPfnUwcmJfeN4PL
XadUB5mJl65KzNQcicSKxR/GfUknfjPE1xDHW/Yq/Zlm7+/OZYzXRojOQwGQ
X8D/GxZ0Ugrbsy2q3ykZhgnlMJHCB5VIE5MfUGBKLFWw2spfb0icVSswHGWW
ynr7BcbixeCeaWIVEvanTov5EJm0bbSXOGMPzLaQIJtoM7eY0Gl49Sxoj0Uv
rbis+pPpeUwO6zDqVK91RgsIPbNmPV7KNoi5ocm8YOdr2jw5lRlPeyNXEnhz
W1SGpshZw5fRlFDgQndWtkjC4R1lEL3pUTJC0GWMrkshJu+KDNOWSNYnm27C
s542H1OlmYxAriCJlj9thFMhr2cbzhhF/ALqlz/Xo8aF9eZjcvUQELC+yEzb
YBpAbrY7TEkrtLQAAYJA6K2LNzx9ds+PXM7hmX5tjILPes3+35eGeZtnlNBy
hbgol63D2RAZlcQ6kOBBGt3RlK5ZZ7cAekZSzngyNjlcs6qFRMvR90f7AVuC
hqpmqWfYJkoEjSSlRGJwrFzSRWKHHGIu0ie0KXljaVei7EaBw5u62PQ26jjY
d9ZnkuKAWWo1KYZdi9z1KslkzHWayL7W7TJagZAvYdxnIw/vjqQ5kHP2KUGc
BBiuWrNVPN/CfYliBo5h3LEbCVNI4UzRAVlXhWCCou/OxlKRljefScyDPgd8
lqyN+Cbrt/Gk8w6RrPTPpRR29h2JbQ1Go0uGFAia5dfKQRo+DSNTBgZGeK0a
o18ghSX5hsVCTrPPqfIkwAep/TCOLULerIUt9Vp4jHHwgGFNBcASZYCOzN9b
EN5EwroaroxqN6gZ4xDILqGpyzf6Ji892WlOjOYU4zz/UlbLdu4zEYNKOLJw
hGMQWioJrhaynHE03uTHxjmg4oLjz8UtlCjv2VU06bDpSvH74GPGQz5OydFD
Ww964NXlelMeaf1FixhHl8Jhdsk/4smvyvpmgWpdPNjh0xp81zxen4D3zXqI
EfT+SBvSwBOFPRFvfoQqStx3EtqEYXvb1mtJncgo1mD5GcqxWBAzyW8ujaTn
tmSCpFB5Sw4C7oW0c2Sc1vnoslzlaAHEM5UPNlKNQG+ZHMsHlLz59TEn/VhM
pV0NuaMAloMbRprS/VWR6dF6OOtCiGgOhO5xM0DOSQ9Lb+MN/WQAsvNaqpXg
m3CDOHWkFbOWPBx0xV0pAtVAKT54W1FZGMKS3DTaugPdRA7spnjAnTGyeHZL
UGzzbhc9Tj1sqew6nwLqdL2zQDQP5W51emIFY+yTXzSrJmgfUCYjfYRMeyY4
wTCc7YjT99AoBDTGcdi9v7RdXCeXZMV8GzdA9LuxNMvflCCfmOpfXrtpvZIk
wXV8HuYysAzwyV17YBGc5bhCGH1liVmCYuVi6OIiuPX6vlGwsXot3HVhexuj
akyX1zulvZJJWIVd4QHIenworwPRvNYk+RL6SLaAlbETlav1KuttmVeg1lNL
lkk0g/LVGzGupkzQISOEg/iyFAikJgIyjSJu82EFgxd05DvnJsiNrTyz1Mtm
z5883h9GVLtdE/ulp2BTctDzoUwbIPj92O4qbQ3NXl3DT5/7MXx579WDdpqP
OfI/FIL1xsnyNxArZQTm6+pBNAVQeKa5tTcxGi+7nLCvecGMLa/wN0dJPWoe
WAwhGS0NORhE8zH8HLDYYCYM+yr7K/5w8BTrci/80k1lss5qcFhhJFCcZv3o
U+X8QeFt223aXbzNEZNOK00X4QZOjvITU1heLvp0/fotANHM7dDniGsthcrd
UKtBYjani8fBKuVRvQQofC2WgzKRXuNqWaDTmsFsk97vzt4vUtkkfuIZNOYg
Ohd43eyCqbGmGu6jRTYGmLPVbnZ8fvHm7MRpZb4m3Ob84sPl4msFfJ4zQl98
hKt7FXfJgFckigy9/vPgylrYT4VJX/LSRRxMuxmMr2qhvTj4xsK5GQ2ystwH
WTg4W5i606/jiXuuVWvYTZ/YPrkn/wmiozUbARPkcETSSSdAw2rx8Jx3mHfd
a6AjN9BkVTm+QjJfHC2plNew8RvmL+VhhdQwBkxCVMoRoRREoLR4F3XxeDrL
5mxm8ytl8sR858UwFgz118aBW6kXbHfyycu5nayJvlz7RqR7fW/kBCppISsS
XcJv3zpoR+V3CHd6+uyG/1rgX+NAK+Si4Wwyss5TzVLG4XLiPF4WZUeyQ/Dk
PlAo6CVDYW6FBF8rrvVVV6lmISZKPP80UiRxCjRXspLwGF0t5UTZKp/DqlXt
PU8MOvLm8EAczlUIywBuuCxZfF3VsIBu6ceXkP3aq2+5n4nQq5YyvQdBIrH9
ZB4mApf5rMTTr6zJZWOSi7waDyFvuhagmTsn6QtqVEaUqjQxKkSj7o0Eh4fm
w1WZuCzuecDoNOzzgYK1XOI42l1oCrHLNZFLwy+QDpEkoSJM1SMjK0U5GTeL
9YKKxn7OFFlz6TC6oUo85NRFMJs/NuOJnSuKPrETpjxHTZgCA1KF1VsvSh5T
mqC3yjt5qY6JV2eXzuZxIhGWLXErQxK4knaMdJq0k5ELuCyNC7Dz8kbrXkoR
bBc+nQFL1z6UuST8gVWm2MPdXjNFmVAwdpqqU/l4jrb1sNkYn4zKzsyPPMtR
ww5GJ8OG0evKB8lGnNc6Caph0NawYAk2U1ZxHeubP9gerfdmWfLDKozYu/Sv
Ysh4K7GT06bMov+/HpE3PT1dt10m+9lmmqumZ02QulwlO3VGHRkESaoWZ5+m
FVLhbVyFHwpwjonpeQZxivMeQwmhDpvl2kaTQ0m6iXigKJG+gqgTg1fWnTQ+
S5ldaKToWghKlPwM8C6YSJVV83yfl78JnmF0NaEQ3ApRPGV/y8d8pGnFW9lK
9ED4NmR2hbo7BFbxUIPGqfb0Wf7Pqcm5Ho1BXwsOZ7wYJWMkhFYJirDftoO8
uHBeRG8MZIU9zoCrXbmNvgD7LZQzfj77uYpHZzX00FHZDU0xD++GDksoRpjv
UDOJ3zlr1l181otVHCghjCAxRIJr9rGqe177Iu6FoqzDJ/w3rgZ8dlkAIHo3
+7lYlXcc2pvbGHfG0K1F5+8CyRlANv4XRxHcqMuTAQA=

-->

</rfc>
