<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.17 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-irtf-pearg-censorship-09" category="info" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.15.3 -->
  <front>
    <title abbrev="draft-irtf-pearg-censorship">A Survey of Worldwide Censorship Techniques</title>
    <seriesInfo name="Internet-Draft" value="draft-irtf-pearg-censorship-09"/>
    <author initials="J. L." surname="Hall" fullname="Joseph Lorenzo Hall">
      <organization>Internet Society</organization>
      <address>
        <email>hall@isoc.org</email>
      </address>
    </author>
    <author initials="M. D." surname="Aaron" fullname="Michael D. Aaron">
      <organization>CU Boulder</organization>
      <address>
        <email>michael.drew.aaron@gmail.com</email>
      </address>
    </author>
    <author initials="A." surname="Andersdotter" fullname="Amelia Andersdotter">
      <organization/>
      <address>
        <email>amelia.ietf@andersdotter.cc</email>
      </address>
    </author>
    <author initials="B." surname="Jones" fullname="Ben Jones">
      <organization/>
      <address>
        <email>ben.jones.irtf@gmail.com</email>
      </address>
    </author>
    <author initials="N." surname="Feamster" fullname="Nick Feamster">
      <organization>U Chicago</organization>
      <address>
        <email>feamster@uchicago.edu</email>
      </address>
    </author>
    <author initials="M." surname="Knodel" fullname="Mallory Knodel">
      <organization>Center for Democracy &amp; Technology</organization>
      <address>
        <email>mknodel@cdt.org</email>
      </address>
    </author>
    <date year="2023" month="January" day="10"/>
    <area>General</area>
    <workgroup>pearg</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document describes technical mechanisms employed in network censorship that regimes around
the world use for blocking or impairing Internet traffic. It aims
to make designers, implementers, and users of Internet protocols aware
of the properties exploited and mechanisms used for censoring
end-user access to information.  This document makes no suggestions on
individual protocol considerations, and is purely informational,
intended as a reference. This document is a product of the Privacy Enhancement and Assessment Research Group (PEARG) in the IRTF.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="intro">
      <name>Introduction</name>
      <t>Censorship is where an entity in a position of power -- such as a
government, organization, or individual -- suppresses communication
that it considers objectionable, harmful, sensitive, politically
incorrect or inconvenient <xref target="WP-Def-2020"/>. Although censors that engage in censorship
must do so through legal, military, or
other means, this document focuses largely on technical
mechanisms used to achieve network censorship.</t>
      <t>This document describes technical mechanisms that censorship regimes
around the world use for blocking or impairing Internet traffic.  See
<xref target="RFC7754"/> for a discussion of Internet blocking and filtering in
terms of implications for Internet architecture, rather than end-user
access to content and services. There is also a growing field of
academic study of censorship circumvention (see the review article of
<xref target="Tschantz-2016"/>), results from which we seek to make relevant here
for protocol designers and implementers.</t>
      <t>Censorship circumvention also impacts the cost of implementation of a censorship measure and we include mentions of tradeoffs in relation to such costs in conjunction with each technical method identified below.</t>
      <t>This document has seen extensive discussion and review in the IRTF Privacy Enhancement and Assessment Research Group (PEARG) and represents the consensus of that group. It is not an IETF product and is not a standard.</t>
    </section>
    <section anchor="terms">
      <name>Terminology</name>
      <t>We describe three elements of Internet censorship: prescription,
identification, and interference. The document contains three major
sections, each corresponding to one of these elements. Prescription is
the process by which censors determine what types of material they
should censor, e.g., classifying pornographic websites as undesirable.
Identification is the process by which censors classify specific
traffic or traffic identifiers to be blocked or impaired, e.g.,
deciding that webpages containing "sex" in an HTTP Header or that
accept traffic through the URL www.sex.example are likely to be
undesirable.  Interference is the process by which censors intercede
in communication and prevents access to censored materials by blocking
access or impairing the connection, e.g., implementing a technical
solution capable of identifying HTTP headers or URLs and ensuring they
are rendered wholly or partially inaccessible.</t>
    </section>
    <section anchor="tech-prescrip">
      <name>Technical Prescription</name>
      <t>Prescription is the process of figuring out what censors would like to
block <xref target="Glanville-2008"/>. Generally, censors aggregate information "to
block" in blocklists, databases of image hashes <xref target="ekr-2021"/>, or use real-time heuristic assessment of content
<xref target="Ding-1999"/>. Some national networks are designed to more naturally
serve as points of control <xref target="Leyba-2019"/>. There are also indications
that online censors use probabilistic machine learning techniques
<xref target="Tang-2016"/>. Indeed, web crawling and machine learning techniques
are an active research idea in the effort to identify content deemed
as morally or commercially harmful to companies or consumers in some
jurisdictions <xref target="SIDN2020"/>.</t>
      <t>There are typically a few types of blocklist elements: Keyword, domain
name, protocol, or Internet Protocol (IP) address. Keyword and domain name
blocking take place at the application level, e.g., HTTP; protocol blocking
often occurs using deep packet inspection to identify a forbidden protocol;
IP blocking tends to take place using IP addresses in IPv4/IPv6 headers.
Some censors also use the presence of certain keywords to enable more
aggressive blocklists <xref target="Rambert-2021"/> or to be more permissive with
content <xref target="Knockel-2021"/>.</t>
      <t>The mechanisms for building up these blocklists vary. Censors can purchase
from private industry "content control" software,
which lets censors filter traffic from broad categories they would like to
block, such as gambling or pornography <xref target="Knight-2005"/>. In these cases,
these private services attempt to categorize every semi-questionable
website as to allow for meta-tag blocking. Similarly, they tune real-time
content heuristic systems to map their assessments onto categories of
objectionable content.</t>
      <t>Countries that are more interested in retaining specific political control
typically have ministries or organizations that maintain blocklists. Examples
include the Ministry of Industry and Information Technology in China, Ministry of
Culture and Islamic Guidance in Iran, and specific to copyright in France <xref target="HADOPI-2020"/>
and across the EU for consumer protection law <xref target="Reda-2017"/>.</t>
      <t>Content-layer filtering of images and video require institutions or organizations to store hashes of images or videos to be blocked in databases, which can then be compared, with some degree of tolerance, to content that is sent, received or stored using centralized, content applications and services <xref target="ekr-2021"/>.</t>
    </section>
    <section anchor="tech-id">
      <name>Technical Identification</name>
      <section anchor="poc">
        <name>Points of Control</name>
        <t>Internet censorship takes place in all parts of the network
topology. It may be implemented in the network itself (e.g. local loop
or backhaul), on the services side of communication (e.g. web hosts,
cloud providers or content delivery networks), in the ancillary
services eco-system (e.g. domain name system or certificate
authorities) or on the end-client side (e.g. in an end-user device
such as a smartphone, laptop or desktop or software executed on such
devices).  An important aspect of pervasive technical interception is
the necessity to rely on software or hardware to intercept the content
the censor is interested in. There are various logical and physical
points-of-control censors may use for interception mechanisms,
including, though not limited to, the following.</t>
        <ul spacing="normal">
          <li>Internet Backbone: If a censor controls the gateways into a region,
they can filter undesirable traffic that is traveling into and out
of the region by packet sniffing and port mirroring at the relevant
exchange points. Censorship at this point of control is most
effective at controlling the flow of information between a region
and the rest of the Internet, but is ineffective at identifying
content traveling between the users within a region. Some national
network designs naturally serve as more effective chokepoints and
points of control <xref target="Leyba-2019"/>.</li>
          <li>Internet Service Providers: Internet Service Providers are
frequently exploited points of control. They
have the benefit of being easily enumerable by a censor -- often
falling under the jurisdictional or operational control of a censor
in an indisputable way -- with the additional feature that an ISP
can identify the regional and international traffic
of all their users. The censor's filtration mechanisms can be placed
on an ISP via governmental mandates, ownership, or voluntary/coercive influence.</li>
          <li>Institutions: Private institutions such as corporations,
schools, and Internet cafes can use filtration mechanisms.
These mechanisms are occasionally at the request of a
government censor, but can also be implemented to help achieve
institutional goals, such as fostering a particular moral outlook on
life by school-children, independent of broader society or
government goals.</li>
          <li>Content Distribution Network (CDN): CDNs seek to collapse network
topology in order to better locate content closer to the service's
users. This reduces content transmission latency and improves quality
of service. The CDN service's content
servers, located "close" to the user in a network-sense, can be
powerful points of control for censors, especially if the location
of CDN repositories allow for easier interference.</li>
          <li>Certificate Authorities (CAs) for Public-Key Infrastructures (PKIs):
Authorities that issue cryptographically secured resources can be a
significant point of control. CAs that issue certificates to domain
holders for TLS/HTTPS (the Web PKI) or Regional/Local Internet
Registries (RIRs) that issue Route Origination Authorizations (ROAs)
to BGP operators can be forced to issue rogue certificates that may
allow compromise, i.e., by allowing censorship software to engage in
identification and interference where not possible before. CAs may
also be forced to revoke certificates. This may lead to adversarial
traffic routing or TLS interception being allowed, or an otherwise
rightful origin or destination point of traffic flows being unable
to communicate in a secure way.</li>
          <li>Services: Application service providers can be pressured,
coerced, or legally required to censor specific content or data flows.
Service providers naturally face incentives to maximize their
potential customer base and potential service shutdowns or legal
liability due to censorship efforts may seem much less attractive
than potentially excluding content, users, or uses of their
service. Services have increasingly become focal points of
censorship discussions, as well as the focus of discussions of moral
imperatives to use censorship tools.</li>
          <li>Content sites: On the service side of communications lie many platforms that
publish user-generated content require terms of service compliance with all content
and user accounts in order to avoid intermediary liability for the web hosts.
In aggregate these policies, actions and remedies are known as content moderation.
Content moderation happens above the services or application layer, but
these mechanisms are built to filter, sort and block content and users
thus making them available to censors through direct pressure on the private entity.</li>
          <li>Personal Devices: Censors can mandate censorship software be
installed on the device level. This has many disadvantages in terms
of scalability, ease-of-circumvention, and operating system
requirements. (Of course, if a personal device is treated with
censorship software before sale and this software is difficult to
reconfigure, this may work in favor of those seeking to control
information, say for children, students, customers, or employees.)
The emergence of mobile devices exacerbate these feasibility
problems. This software can also be mandated by institutional actors
acting on non-governmentally mandated moral imperatives.</li>
        </ul>
        <t>At all levels of the network hierarchy, the filtration mechanisms used
to censor undesirable traffic are essentially the same: a censor
either directly identifies undesirable content using the identifiers
described below and then uses a blocking or shaping mechanism such as
the ones exemplified below to prevent or impair access, or requests
that an actor ancillary to the censor, such as a private entity,
perform these functions.  Identification of undesirable traffic can
occur at the application, transport, or network layer of the IP
stack. Censors often focus on web traffic, so the relevant protocols
tend to be filtered in predictable ways (see <xref target="http-req"/> and
<xref target="http-resp"/>). For example, a subversive image might make it past a
keyword filter. However, if later the image is deemed undesirable, a
censor may then blocklist the provider site's IP address.</t>
      </section>
      <section anchor="app-layer">
        <name>Application Layer</name>
        <t>The following subsections describe properties and tradeoffs of common
ways in which censors filter using application-layer information. Each
subsection includes empirical examples describing these common
behaviors for further reference.</t>
        <section anchor="http-req">
          <name>HTTP Request Header Identification</name>
          <t>An HTTP header contains a lot of useful information for traffic
identification. Although "host" is the only required field in an HTTP
request header (for HTTP/1.1 and later), an HTTP method field is necessary
to do anything
useful. As such, "method" and "host" are the two fields used
most often for ubiquitous censorship. A censor can sniff traffic and
identify a specific domain name (host) and usually a page name (GET
/page) as well. This identification technique is usually paired with
transport header identification (see <xref target="sec_thid"/>) for a more robust
method.</t>
          <t>Tradeoffs: Request Identification is a technically straight-forward
identification method that can be easily implemented at the Backbone
or ISP level. The hardware needed for this sort of identification is
cheap and easy-to-acquire, making it desirable when budget and scope
are a concern. HTTPS will encrypt the relevant request and response
fields, so pairing with transport identification (see <xref target="sec_thid"/>) is
necessary for HTTPS filtering. However, some countermeasures can
trivially defeat simple forms of HTTP Request Header Identification.
For example, two cooperating endpoints -- an instrumented web server
and client -- could encrypt or otherwise obfuscate the "host" header in
a request, potentially thwarting techniques that match against "host" header values.</t>
          <t>Empirical Examples: Studies exploring censorship mechanisms have found
evidence of HTTP header/ URL filtering in many countries, including
Bangladesh, Bahrain, China, India, Iran, Malaysia, Pakistan, Russia,
Saudi Arabia, South Korea, Thailand, and Turkey
<xref target="Verkamp-2012"/> <xref target="Nabi-2013"/> <xref target="Aryan-2012"/>. Commercial technologies are often purchased by
censors <xref target="Dalek-2013"/>.  These commercial technologies use a
combination of HTTP Request Identification and Transport Header
Identification to filter specific URLs. Dalek et al. and Jones et
al. identified the use of these products in the wild
<xref target="Dalek-2013"/> <xref target="Jones-2014"/>.</t>
        </section>
        <section anchor="http-resp">
          <name>HTTP Response Header Identification</name>
          <t>While HTTP Request Header Identification relies on the information
contained in the HTTP request from client to server, response
identification uses information sent in response by the server to
client to identify undesirable content.</t>
          <t>Tradeoffs: As with HTTP Request Header Identification, the techniques
used to identify HTTP traffic are well-known, cheap, and relatively
easy to implement. However, they are made useless by HTTPS because
HTTPS encrypts the response and its headers.</t>
          <t>The response fields are also less helpful for identifying content than
request fields, as "Server" could easily be identified using HTTP
Request Header identification, and "Via" is rarely relevant.  HTTP
Response censorship mechanisms normally let the first n packets
through while the mirrored traffic is being processed; this may allow
some content through and the user may be able to detect that the
censor is actively interfering with undesirable content.</t>
          <t>Empirical Examples: In 2009, Jong Park et al. at the University of New
Mexico demonstrated that the Great Firewall of China (GFW) has used this
technique <xref target="Crandall-2010"/>. However, Jong Park et al. found that the
GFW discontinued this practice during the course of the study. Due to
the overlap in HTTP response filtering and keyword filtering (see
<xref target="kw-filt"/>), it is likely that most censors rely on keyword
filtering over TCP streams instead of HTTP response filtering.</t>
        </section>
        <section anchor="tls">
          <name>Transport Layer Security (TLS)</name>
          <t>Similar to HTTP, censors have deployed a variety of techniques towards
censoring Transport Layer Security (TLS) (and by extension HTTPS). Most of
these techniques relate to the Server Name Indication (SNI) field,
including censoring SNI, Encrypted SNI, or omitted SNI. Censors can also
censor HTTPS content via server certificates. 
Note that TLS 1.3 acts as a security component of QUIC.</t>
          <section anchor="sni">
            <name>Server Name Indication (SNI)</name>
            <t>In encrypted connections using TLS, there
may be servers that host multiple "virtual servers" at a given network
address, and the client will need to specify in the
Client Hello message which domain name it seeks to connect to (so that
the server can respond with the appropriate TLS certificate) using the
Server Name Indication (SNI) TLS extension <xref target="RFC6066"/>. 
The Client Hello message is unencrypted for TCP-based TLS. 
When using QUIC, the Client Hello message is encrypted but its 
confidentiality is not effectively protected because the initial encryption 
keys are derived using a value that is visible on the wire. Since SNI is
often sent in the clear (as are the cert fields sent in response),
censors and filtering software can use it (and response cert fields)
as a basis for blocking, filtering, or impairment by dropping
connections to domains that match prohibited content (e.g.,
bad.foo.example may be censored while good.foo.example is not)
<xref target="Shbair-2015"/>. There are undergoing standardization efforts in the
TLS Working Group to encrypt SNI <xref target="I-D.ietf-tls-sni-encryption"/>
              <xref target="I-D.ietf-tls-esni"/> and recent research shows promising results in
the use of encrypted SNI in the face of SNI-based filtering
<xref target="Chai-2019"/> in some countries.</t>
            <t>Domain fronting has been one popular way to avoid identification by
censors <xref target="Fifield-2015"/>. To avoid identification by censors,
applications using domain fronting put a different domain name in the
SNI extension than in the Host: header, which is protected by
HTTPS. The visible SNI would indicate an unblocked domain, while the
blocked domain remains hidden in the encrypted application header.
Some encrypted messaging services relied on domain fronting to enable
their provision in countries employing SNI-based filtering. These
services used the cover provided by domains for which blocking at the
domain level would be undesirable to hide their true domain
names. However, the companies holding the most popular domains have
since reconfigured their software to prevent this practice.  It may be
possible to achieve similar results using potential future options to
encrypt SNI.</t>
            <t>Tradeoffs: Some clients do not send the SNI extension (e.g., clients
that only support versions of SSL and not TLS), rendering this method
ineffective (see <xref target="omitsni"/>). In addition, this technique requires deep packet
inspection (DPI) techniques that can be computationally and
infrastructurally expensive, especially when applied to QUIC where DPI requires key extraction and decryption of the Client Hello in order to read the SNI. Improper configuration of an SNI-based
block can result in significant overblocking, e.g., when a
second-level domain like populardomain.example is inadvertently
blocked. In the case of encrypted SNI, pressure to censor may
transfer to other points of intervention, such as content and application providers.</t>
            <t>Empirical Examples: There are many examples of security firms that
offer SNI-based filtering products <xref target="Trustwave-2015"/> <xref target="Sophos-2015"/>
              <xref target="Shbair-2015"/>, and the governments of China, Egypt, Iran, Qatar,
South Korea, Turkey, Turkmenistan, and the UAE all do widespread SNI
filtering or blocking <xref target="OONI-2018"/> <xref target="OONI-2019"/> <xref target="NA-SK-2019"/>
              <xref target="CitizenLab-2018"/> <xref target="Gatlan-2019"/> <xref target="Chai-2019"/> <xref target="Grover-2019"/>
              <xref target="Singh-2019"/>. SNI blocking against QUIC traffic has been first observed in Russia in March 2022 <xref target="Elmenhorst-2022"/>.</t>
          </section>
          <section anchor="esni">
            <name>Encrypted SNI (ESNI)</name>
            <t>With the data leakage present with the SNI field, a natural response is to 
encrypt it, which is forthcoming in TLS 1.3 with Encrypted Client Hello
(ECH).  Prior to ECH, the Encrypted SNI (ESNI) extension is available to
prevent the data leakage caused by SNI, which encrypts only the SNI field.
Unfortunately, censors can target connections that use the ESNI extension
specifically for censorship. This guarantees overblocking for the censor,
but can be worth the cost if ESNI is not yet widely deployed within the
country.  Encrypted Client Hello (ECH) is the emerging standard for protecting
the entire TLS Client Hello, but it is not yet widely deployed.</t>
            <t>Tradeoffs: The cost to censoring Encrypted SNI (ESNI) is significantly
higher than SNI to a censor, as the censor can no longer target
censorship to specific domains and guarantees over-blocking. In these
cases, the censor uses the over-blocking to discourage the use of
ESNI entirely.</t>
            <t>Empirical Examples: In 2020, China began censoring all uses of Encrypted
ESNI (ESNI) <xref target="Bock-2020b"/>, even for innocuous connections. The
censorship mechanism for China's ESNI censorship differs from how
China censors SNI-based connections, suggesting that new middleboxes
were deployed specifically to target ESNI connections.</t>
          </section>
          <section anchor="omitsni">
            <name>Omitted-SNI</name>
            <t>Researchers have observed that some clients omit the SNI extension
entirely. This omitted-SNI approach limits the information available
to a censor. Like with ESNI, censors can choose to block connections that
omit the SNI, though this too risks over-blocking.</t>
            <t>Tradeoffs: The approach of censoring all connections that omit the SNI field
is guaranteed to over-block, though connections that omit the SNI field
should be relatively rare in the wild.</t>
            <t>Empirical Examples: In the past, researchers have observed censors in Russia
blocking connections that omit the SNI field <xref target="Bock-2020b"/>.</t>
          </section>
          <section anchor="server-response-certificate">
            <name>Server Response Certificate</name>
            <t>During the TLS handshake after the TLS Client Hello, the server will respond
with the TLS certificate. This certificate also contains the domain
the client is trying to access, creating another avenue that censors
can use to perform censorship. This technique will not work in TLS 1.3, as the 
certificate will be encrypted.</t>
            <t>Tradeoffs: Censoring based on the server certificate requires DPI techniques that can be more computationally
expensive compared to other methods. Additionally, the certificate is
sent later in the TLS Handshake compared to the SNI field, forcing
the censor to track the connection for longer.</t>
            <t>Empirical Examples: Researchers have observed the Reliance Jio
ISP in India using certificate response fields to censor connections
<xref target="Satija-2021"/>.</t>
          </section>
        </section>
        <section anchor="kw-filt">
          <name>Instrumenting Content Distributors</name>
          <t>Many governments pressure content providers to censor themselves, or
provide the legal framework within which content distributors are
incentivized to follow the content restriction preferences of agents
external to the content distributor <xref target="Boyle-1997"/>. Due to the
extensive reach of such censorship, we define content
distributor as any service that provides utility to users, including
everything from web sites to storage to locally installed programs.</t>
          <t>A commonly
used method of instrumenting content distributors consists of keyword
identification to detect restricted terms on their platform. Governments
may provide the terms on such keyword lists. Alternatively, the content
provider may be expected to come up with their own list.</t>
          <t>An increasingly common method of instrumeting content distribution consists of hash matching to detect and action images and videos known to be restricted either by governments, institutions, organizations or the distributor themselves <xref target="ekr-2021"/>.</t>
          <t>A different
method of instrumenting content distributors consists of requiring a
distributor to disassociate with some categories of users. See also
<xref target="notice"/>.</t>
          <t>Tradeoffs: By instrumenting content distributors to identify
restricted content or content providers, the censor can gain new
information at the cost of political capital with the companies it
forces or encourages to participate in censorship. For example, the
censor can gain insight about the content of encrypted traffic by
coercing web sites to identify restricted content. Coercing content
distributors to regulate users, categories of users, content and
content providers may encourage users and content providers to exhibit
self-censorship, an additional advantage for censors (see <xref target="selfcensor"/>). The tradeoffs
for instrumenting content distributors are highly dependent on the
content provider and the requested assistance. A typical concern is
that the targeted keywords or categories of users are too broad, risk
being too broadly applied, or are not subjected to a sufficiently
robust legal process prior to their mandatory application (see p. 8 of
<xref target="EC-2012"/>).</t>
          <t>Empirical Examples: Researchers discovered keyword identification
by content providers on platforms ranging from instant messaging
applications <xref target="Senft-2013"/> to search engines <xref target="Rushe-2015"/>
            <xref target="Cheng-2010"/> <xref target="Whittaker-2013"/> <xref target="BBC-2013"/> <xref target="Condliffe-2013"/>. To
demonstrate the prevalence of this type of keyword identification, we
look to search engine censorship.</t>
          <t>Search engine censorship demonstrates keyword identification by
content providers and can be regional or worldwide.  Implementation is
occasionally voluntary, but normally it is based on laws and regulations
of the country a search engine is operating in. The keyword blocklists
are most likely maintained by the search engine provider. China is
known to require search engine providers to "voluntarily" maintain
search term blocklists to acquire and keep an Internet content provider
(ICP) license <xref target="Cheng-2010"/>.  It is clear these blocklists are
maintained by each search engine provider based on the slight
variations in the intercepted searches <xref target="Zhu-2011"/>
            <xref target="Whittaker-2013"/>. The United Kingdom has been pushing search engines
to self-censor with the threat of litigation if they do not do it
themselves: Google and Microsoft have agreed to block more than
100,000 queries in U.K. to help combat abuse <xref target="BBC-2013"/>
            <xref target="Condliffe-2013"/>.  European Union law, as well as US law, requires
modification of search engine results in response to either copyright,
trademark, data protection or defamation concerns <xref target="EC-2012"/>.</t>
          <t>Depending on the output, search engine keyword identification may be
difficult or easy to detect. In some cases specialized or blank
results provide a trivial enumeration mechanism, but more subtle
censorship can be difficult to detect. In February 2015, Microsoft's search
engine, Bing, was accused of censoring Chinese content outside of
China <xref target="Rushe-2015"/> because Bing returned different results for
censored terms in Chinese and English. However, it is possible that
censorship of the largest base of Chinese search users, China, biased
Bing's results so that the more popular results in China (the
uncensored results) were also more popular for Chinese speakers
outside of China.</t>
          <t>Disassociation by content distributors from certain categories of
users has happened for instance in Spain, as a result of the conflict
between the Catalunyan independence movement and the Spanish legal
presumption of a unitary state <xref target="Lomas-2019"/>. E-sport event
organizers have also disassociated themselves from top players who
expressed political opinions in relation to the 2019 Hong Kong
protests <xref target="Victor-2019"/>. See also <xref target="discon"/>.</t>
        </section>
        <section anchor="dpi">
          <name>DPI Identification</name>
          <t>DPI (deep packet inspection) technically is any kind of packet
analysis beyond IP address and port number and has become
computationally feasible as a component of censorship mechanisms
in recent years <xref target="Wagner-2009"/>. Unlike other
techniques, DPI reassembles network flows to examine the application
"data" section, as opposed to only headers, and is therefore often
used for keyword identification. DPI also differs from other
identification technologies because it can leverage additional packet
and flow characteristics, e.g., packet sizes and timings, when identifying
content. To prevent substantial quality of service (QoS) impacts, DPI
normally analyzes a copy of data while the original packets continue
to be routed. Typically, the traffic is split using either a mirror
switch or fiber splitter, and analyzed on a cluster of machines
running Intrusion Detection Systems (IDS) configured for censorship.</t>
          <t>Tradeoffs: DPI is one of the most expensive identification mechanisms
and can have a large QoS impact <xref target="Porter-2010"/>.  When used as a
keyword filter for TCP flows, DPI systems can cause also major
overblocking problems. Like other techniques, DPI is less useful
against encrypted data, though DPI can leverage unencrypted elements
of an encrypted data flow, e.g., the Server Name Indication (SNI) sent
in the clear for TLS, or metadata about an encrypted flow, e.g., packet
sizes, which differ across video and textual flows, to identify traffic.
See <xref target="sni"/> for more information about SNI-based filtration mechanisms.</t>
          <t>Other kinds of information can be inferred by comparing certain unencrypted elements
exchanged during TLS handshakes to similar data points from known sources.
This practice, called TLS fingerprinting, allows a probabilistic identification of
a party's operating system, browser, or application based on a comparison of the
specific combinations of TLS version, ciphersuites, compression options, etc.
sent in the ClientHello message to similar signatures found in unencrypted traffic <xref target="Husak-2016"/>.</t>
          <t>Despite these problems, DPI is the most powerful identification method
and is widely used in practice. The Great Firewall of China (GFW), the
largest censorship system in the world, uses DPI to identify
restricted content over HTTP and DNS and inject TCP RSTs and bad DNS
responses, respectively, into connections <xref target="Crandall-2010"/> <xref target="Clayton-2006"/> <xref target="Anonymous-2014"/>.</t>
          <t>Empirical Examples: Several studies have found evidence of censors
using DPI for censoring content and tools. Clayton et al., Crandal et al.,
Anonymous, and Khattak et al., all explored the GFW <xref target="Crandall-2010"/>
            <xref target="Clayton-2006"/> <xref target="Anonymous-2014"/>. Khattak et al. even probed the
firewall to discover implementation details like how much state it stores <xref target="Khattak-2013"/>.
The Tor project claims that China, Iran, Ethiopia, and others must have used
DPI to block the obfs2 protocol <xref target="Wilde-2012"/>.  Malaysia has
been accused of using targeted DPI, paired with DDoS, to identify and
subsequently attack pro-opposition material <xref target="Wagstaff-2013"/>.  It
also seems likely that organizations not so worried about blocking
content in real-time could use DPI to sort and categorically search
gathered traffic using technologies such as high-speed packet processing
<xref target="Hepting-2011"/>.</t>
        </section>
      </section>
      <section anchor="transport">
        <name>Transport Layer</name>
        <section anchor="sec_thid">
          <name>Shallow Packet Inspection and Transport Header Identification</name>
          <t>Of the various shallow packet inspection methods, Transport Header
Identification is the most pervasive, reliable, and predictable type
of identification.  Transport headers contain a few invaluable pieces
of information that must be transparent for traffic to be successfully
routed: destination and source IP address and port.  Destination and
Source IP are doubly useful, as not only does it allow a censor to
block undesirable content via IP blocklisting, but also allows a
censor to identify the IP of the user making the request and the IP
address of the destination being visited, which in most cases can be
used to infer the domain being visited <xref target="Patil-2019"/>. Port is useful
for allowlisting certain applications.</t>
          <t>Combining IP address, port and protocol information found in the transport header, shallow packet inspection can be used by a censor to identify specific TCP or UDP endpoints. UDP endpoint blocking has been observed in the context of QUIC blocking <xref target="Elmenhorst-2021"/>.</t>
          <t>Trade-offs: header identification is popular due to its simplicity,
availability, and robustness.</t>
          <t>Header identification is trivial to implement, but is difficult to
implement in backbone or ISP routers at scale, and is therefore
typically implemented with DPI. Blocklisting an IP is equivalent to
installing a specific route on a router (such as a /32 route for IPv4
addresses and a /128 route for IPv6 addresses). However, due to
limited flow table space, this cannot scale beyond a few thousand IPs
at most. IP blocking is also relatively crude. It often leads to
overblocking and cannot deal with some services like content
distribution networks (CDN) that host content at hundreds or thousands
of IP addresses. Despite these limitations, IP blocking is extremely
effective because the user needs to proxy their traffic through
another destination to circumvent this type of identification. 
In addition, IP blocking is effective against all protocols above IP, e.g. 
TCP and QUIC.</t>
          <t>Port-blocking is generally not useful because many types of content
share the same port and it is possible for censored applications to
change their port. For example, most HTTP traffic goes over port 80,
so the censor cannot differentiate between restricted and allowed web
content solely on the basis of port. HTTPS goes over port 443, with
similar consequences for the censor except only partial metadata may
now be available to the censor. Port allowlisting is occasionally
used, where a censor limits communication to approved ports, such as
80 for HTTP traffic and is most effective when used in conjunction
with other identification mechanisms. For example, a censor could
block the default HTTPS port, port 443, thereby forcing most users to
fall back to HTTP. A counter-example is that port 25 (SMTP) has long
been blocked on residential ISPs' networks to reduce the risk for
email spam, but in doing so also prohibits residential ISP customers
from running their own email servers.</t>
        </section>
        <section anchor="prot-id">
          <name>Protocol Identification</name>
          <t>Censors sometimes identify entire protocols to be blocked using a
variety of traffic characteristics.  For example, Iran impairs the
performance of HTTPS traffic, a protocol that prevents further
analysis, to encourage users to switch to HTTP, a protocol that they
can analyze <xref target="Aryan-2012"/>. A simple protocol identification
would be to recognize all TCP traffic over port 443 as HTTPS, but more
sophisticated analysis of the statistical properties of payload data
and flow behavior, would be more effective, even when port 443 is not
used <xref target="Hjelmvik-2010"/> <xref target="Sandvine-2014"/>.</t>
          <t>If censors can detect circumvention tools, they can block them, so
censors like China are extremely interested in identifying the
protocols for censorship circumvention tools. In recent years, this
has devolved into an arms race between censors and circumvention tool
developers. As part of this arms race, China developed an extremely
effective protocol identification technique that researchers call
active probing or active scanning.</t>
          <t>In active probing, the censor determines whether hosts are running a
circumvention protocol by trying to initiate communication using the
circumvention protocol. If the host and the censor successfully
negotiate a connection, then the censor conclusively knows that host
is running a circumvention tool. China has used active scanning to
great effect to block Tor <xref target="Winter-2012"/>.</t>
          <t>Trade-offs: Protocol identification necessarily only provides insight
into the way information is traveling, and not the information itself.</t>
          <t>Protocol identification is useful for detecting and blocking
circumvention tools, like Tor, or traffic that is difficult to
analyze, like VoIP or SSL, because the censor can assume that this
traffic should be blocked. However, this can lead to over-blocking
problems when used with popular protocols.  These methods are
expensive, both computationally and financially, due to the use of
statistical analysis, and can be ineffective due to their imprecise
nature.</t>
          <t>Censors have also used protocol identification in the past in an
'allowlist' filtering capacity, such as by only allowing specific,
pre-vetted protocols to be used and blocking any unrecognized
protocols <xref target="Bock-2020"/>. These protocol filtering approaches can also lead to
over-blocking if the allowed lists of protocols is too small or
incomplete, but can be cheap to implement, as many standard 'allowed' 
protocols are simple to identify (such as HTTP).</t>
          <t>Empirical Examples: Protocol identification can be easy to detect if
it is conducted in real time and only a particular protocol is
blocked, but some types of protocol identification, like active
scanning, are much more difficult to detect. Protocol identification
has been used by Iran to identify and throttle SSH traffic to make it
unusable <xref target="Anonymous-2007"/> and by China to identify and block Tor
relays <xref target="Winter-2012"/>. Protocol identification has also been used for
traffic management, such as the 2007 case where Comcast in the United
States used RST injection to interrupt BitTorrent Traffic
<xref target="Winter-2012"/>. In 2020, Iran deployed an allowlist protocol filter,
which only allowed three protocols to be used (DNS, TLS, and HTTP) on
specific ports and censored any connection it could not identify <xref target="Bock-2020"/>. 
In 2022, Russia seemed to have used protocol identification to block most
HTTP/3 connections <xref target="Elmenhorst-2022"/>.</t>
        </section>
      </section>
      <section anchor="residualcensorship">
        <name>Residual Censorship</name>
        <t>Another feature of some modern censorship systems is residual censorship, a
punitive form of censorship whereby after a censor disrupts a forbidden
connection, the censor continues to target subsequent connections, even if they
are innocuous <xref target="Bock-2021"/>. Residual censorship can take many forms
and often relies on the methods of technical interference described in the next
section.</t>
        <t>An important facet of residual censorship is precisely what the censor
continues to block after censorship is initially triggered. There are three
common options available to an adversary: 2-tuple (client IP, server IP),
3-tuple (client IP, server IP+port), or 4-tuple (client IP+port, server
IP+port). Future connections that match the tuple of information the censor
records will be disrupted <xref target="Bock-2021"/>.</t>
        <t>Residual censorship can sometimes be difficult to identify and can often complicate
censorship measurement.</t>
        <t>Trade-offs: The impact of residual censorship is to provide users with further
discouragement from trying to access forbidden content, though it is not
clear how successful it is at accomplishing this.</t>
        <t>Empirical Examples: China has used 3-tuple residual censorship in conjunction
with their HTTP censorship for years and researchers have reported seeing similar
residual censorship for HTTPS. China seems to use a mix of 3-tuple and 4-tuple
residual censorship for their censorship of HTTPS with ESNI. Some censors that
perform censorship via packet dropping often accidentally implement 4-tuple
residual censorship, including Iran and Kazakhstan <xref target="Bock-2021"/>.</t>
      </section>
    </section>
    <section anchor="tech-interference">
      <name>Technical Interference</name>
      <section anchor="application-layer">
        <name>Application Layer</name>
        <section anchor="dns-mangling">
          <name>DNS Interference</name>
          <t>There are a variety of mechanisms that censors can use to block or
filter access to content by altering responses from the DNS
<xref target="AFNIC-2013"/> <xref target="ICANN-SSAC-2012"/>, including blocking the response,
replying with an error message, or responding with an incorrect
address. Note that there are now encrypted transports for DNS queries
in DNS-over-HTTPS <xref target="RFC8484"/> and DNS-over-TLS <xref target="RFC7858"/> that can
mitigate interference with DNS queries between the stub and the
resolver.</t>
          <t>Responding to a DNS query with an incorrect address can be achieved
with on-path interception, off-path cache poisoning, and lying by
the nameserver.</t>
          <t>"DNS mangling" is a network-level technique of on-path interception where an incorrect IP
address is returned in response to a DNS query to a censored
destination. An example of this is what some Chinese networks do (we
are not aware of any other wide-scale uses of mangling). On those
Chinese networks, every DNS request in transit is examined (presumably
by network inspection technologies such as DPI) and, if it matches a
censored domain, a false response is injected. End users can see this
technique in action by simply sending DNS requests to any unused IP
address in China (see example below). If it is not a censored name,
there will be no response. If it is censored, a forged response
will be returned. For example, using the command-line dig utility to
query an unused IP address in China of 192.0.2.2 for the name
"www.uncensored.example"  compared with
"www.censored.example" (censored at the time of writing), we get a
forged IP address "198.51.100.0" as a response:</t>
          <artwork><![CDATA[
% dig +short +nodnssec @192.0.2.2 A www.uncensored.example
;; connection timed out; no servers could be reached

% dig +short +nodnssec @192.0.2.2 A www.censored.example
198.51.100.0
]]></artwork>
          <t>DNS cache poisoning happens off-path and refers to a mechanism where a censor interferes
with the response sent by an authoritative DNS name server to a recursive
resolver by responding more quickly than the authoritative name server
can respond with an alternative IP address <xref target="Halley-2008"/>.
Cache poisoning occurs
after the requested site's name servers resolve the request and
attempt to forward the true IP back to the requesting device; on the
return route the resolved IP is recursively cached by each DNS server
that initially forwarded the request. During this caching process if
an undesirable keyword is recognized, the resolved IP is "poisoned"
and an alternative IP (or NXDOMAIN error) is returned more quickly
than the upstream resolver can respond, causing a forged IP
address to be cached (and potentially recursively so). The alternative
IPs usually direct to a nonsense domain or a warning page.
Alternatively, Iranian censorship appears to prevent the communication
en-route, preventing a response from ever being sent <xref target="Aryan-2012"/>.</t>
          <t>There are also cases of what is colloquially called "DNS lying", where
a censor mandates that the DNS responses provided -- by an operator of
a recursive resolver such as an Internet access provider -- be
different than what authoritative name server would provide
<xref target="Bortzmeyer-2015"/>.</t>
          <t>Trade-offs: These forms of DNS interference require the censor to
force a user to traverse a controlled DNS hierarchy (or intervening
network on which the censor serves as a Active Pervasive Attacker
<xref target="RFC7624"/> to rewrite DNS responses) for the mechanism to be
effective. It can be circumvented by using alternative DNS resolvers
(such as any of the public DNS resolvers) that may fall outside of the
jurisdictional control of the censor, or Virtual Private Network (VPN)
technology. DNS mangling and cache poisoning also imply returning an
incorrect IP to those attempting to resolve a domain name, but in some
cases the destination may be technically accessible; over HTTP, for
example, the user may have another method of obtaining the IP address
of the desired site and may be able to access it if the site is
configured to be the default server listening at this IP address.
Target blocking has also been a problem, as occasionally users outside
of the censors region will be directed through DNS servers or
DNS-rewriting network equipment controlled by a censor, causing the
request to fail. The ease of circumvention paired with the large risk
of content blocking and target blocking make DNS interference a
partial, difficult, and less than ideal censorship
mechanism.</t>
          <t>Additionally, the above mechanisms rely on DNSSEC not being deployed
or DNSSEC validation not being active on the client or recursive
resolver (neither of which are hard to imagine given limited
deployment of DNSSEC and limited client support for DNSSEC
validation). Note that an adversary seeking to merely block resolution
can serve a DNSSEC record that doesn't validate correctly, assuming of
course that the client/recursive resolver validates.</t>
          <t>Previously, techniques were used for e.g. censorship that relied on
DNS requests being passed in cleartext over port 53
<xref target="SSAC-109-2020"/>. With the deployment of encrypted DNS (e.g.,
DNS-over-HTTPS <xref target="RFC8484"/>) these requests are now increasingly passed
on port 443 with other HTTPS traffic, or in the case of DNS-over-TLS
<xref target="RFC7858"/> no longer passed in the clear (see also <xref target="sec_thid"/>).</t>
          <t>Empirical Examples: DNS interference, when properly implemented, is
easy to identify based on the shortcomings identified above. Turkey
relied on DNS interference for its country-wide block of websites such
Twitter and YouTube for almost week in March of 2014 but the ease of
circumvention resulted in an increase in the popularity of Twitter
until Turkish ISPs implementing an IP blocklist to achieve the
governmental mandate <xref target="Zmijewski-2014"/>.  Ultimately, Turkish ISPs
started hijacking all requests to Google and Level 3's international
DNS resolvers <xref target="Zmijewski-2014"/>. DNS interference, when incorrectly
implemented, has resulted in some of the largest "censorship
disasters".  In January 2014, China started directing all requests
passing through the Great Fire Wall to a single domain,
dongtaiwang.com, due to an improperly configured DNS poisoning
attempt; this incident is thought to be the largest Internet-service
outage in history <xref target="AFP-2014"/> <xref target="Anon-SIGCOMM12"/>. Countries such as
China, Iran, Turkey, and the United States have discussed blocking
entire TLDs as well, but only Iran has acted by blocking all Israeli
(.il) domains <xref target="Albert-2011"/>. DNS-blocking is commonly deployed in
European countries to deal with undesirable content, such as child
abuse content (Norway, United Kingdom, Belgium, Denmark, Finland,
France, Germany, Ireland, Italy, Malta, the Netherlands, Poland, Spain
and Sweden <xref target="Wright-2013"/> <xref target="Eneman-2010"/>), online gambling (Belgium,
Bulgaria, Czech Republic, Cyprus, Denmark, Estonia, France, Greece,
Hungary, Italy, Latvia, Lithuania, Poland, Portugal, Romania,
Slovakia, Slovenia, Spain (see Section 6.3.2 of: <xref target="EC-gambling-2012"/>,
<xref target="EC-gambling-2019"/>)), copyright infringement (all European Economic Area countries),
hate-speech and extremism (France <xref target="Hertel-2015"/>) and terrorism
content (France <xref target="Hertel-2015"/>).</t>
        </section>
      </section>
      <section anchor="transport-layer">
        <name>Transport Layer</name>
        <section anchor="performance-degradation">
          <name>Performance Degradation</name>
          <t>While other interference techniques outlined in this section mostly
focus on blocking or preventing access to content, it can be an
effective censorship strategy in some cases to not entirely block
access to a given destination, or service but instead degrade the
performance of the relevant network connection.  The resulting user
experience for a site or service under performance degradation can be
so bad that users opt to use a different site, service, or method of
communication, or may not engage in communication at all if there are
no alternatives.  Traffic shaping techniques that rate-limit the
bandwidth available to certain types of traffic is one example of a
performance degradation.</t>
          <t>Trade offs: While implementing a performance degradation will not
always eliminate the ability of people to access a desire resource, it
may force them to use other means of communication where censorship
(or surveillance) is more easily accomplished.</t>
          <t>Empirical Examples: Iran has been known to shape the bandwidth available to
HTTPS traffic to encourage unencrypted HTTP traffic <xref target="Aryan-2012"/>.</t>
        </section>
        <section anchor="packet-dropping">
          <name>Packet Dropping</name>
          <t>Packet dropping is a simple mechanism to prevent undesirable
traffic. The censor identifies undesirable traffic and chooses to not
properly forward any packets it sees associated with the traversing
undesirable traffic instead of following a normal routing
protocol. This can be paired with any of the previously described
mechanisms so long as the censor knows the user must route traffic
through a controlled router.</t>
          <t>Trade offs: Packet Dropping is most successful when every traversing
packet has transparent information linked to undesirable content, such
as a Destination IP. One downside Packet Dropping suffers from is the
necessity of blocking all content from otherwise allowable IPs
based on a single subversive sub-domain; blogging services and github
repositories are good examples. China famously dropped all github
packets for three days based on a single repository hosting
undesirable content <xref target="Anonymous-2013"/>.  The need to inspect every
traversing packet in close to real time also makes Packet Dropping
somewhat challenging from a QoS perspective.</t>
          <t>Empirical Examples: Packet Dropping is a very common form of technical
interference and lends itself to accurate detection given the unique
nature of the time-out requests it leaves in its wake. The Great
Firewall of China has been observed using packet dropping as one of its primary
mechanisms of technical censorship <xref target="Ensafi-2013"/>. Iran has also used
Packet Dropping as the mechanisms for throttling SSH
<xref target="Aryan-2012"/>. These are but two examples of a ubiquitous censorship
practice. Notably, packet dropping during the handshake or working connection is the only interference technique observed for QUIC traffic so far, e.g. in India, Iran, Russia and Uganda <xref target="Elmenhorst-2021"/><xref target="Elmenhorst-2022"/>.</t>
        </section>
        <section anchor="rst-inject">
          <name>RST Packet Injection</name>
          <t>Packet injection, generally, refers to a man-in-the-middle (MITM)
network interference technique that spoofs packets in an established
traffic stream. RST packets are normally used to let one side of TCP
connection know the other side has stopped sending information, and
thus the receiver should close the connection. RST Packet Injection is
a specific type of packet injection attack that is used to interrupt
an established stream by sending RST packets to both sides of a TCP
connection; as each receiver thinks the other has dropped the
connection, the session is terminated.</t>
          <t>QUIC is not vulnerable to these types of injection attacks once the
connection has been setup. While QUIC implements a stateless reset mechanism, 
such a reset is only accepted by a peer if the packet ends in a previously 
issued stateless reset token which is hard to guess. 
During the handshake, QUIC only provides effective protection
against off-path attackers but is vulnerable to injection attacks by
attackers that have parsed prior packets.
(See <xref target="I-D.ietf-quic-transport"/> for more details.)</t>
          <t>Trade-offs: Although ineffective against non-TCP protocols (QUIC, IPSec), RST Packet Injection has a few advantages that make it
extremely popular as a technique employed for censorship. RST Packet Injection is
an out-of-band interference mechanism, allowing the avoidance of the the
QoS bottleneck one can encounter with inline techniques such as Packet
Dropping. This out-of-band property allows a censor to inspect a copy
of the information, usually mirrored by an optical splitter, making it
an ideal pairing for DPI and protocol identification
<xref target="Weaver-2009"/> (this asynchronous version of a MITM is often called a
Man-on-the-Side (MOTS)).
RST Packet Injection also has the advantage of only
requiring one of the two endpoints to accept the spoofed packet for
the connection to be interrupted.</t>
          <t>The difficult part of RST Packet Injection is spoofing "enough"
correct information to ensure one end-point accepts a RST packet as
legitimate; this generally implies a correct IP, port, and TCP
sequence number. Sequence number is the hardest to get correct, as
<xref target="RFC0793"/> specifies an RST Packet should be in-sequence to be
accepted, although the RFC also recommends allowing in-window packets
as "good enough". This in-window recommendation is important, as if it
is implemented it allows for successful Blind RST Injection attacks
<xref target="Netsec-2011"/>.  When in-window sequencing is allowed, it is trivial
to conduct a Blind RST Injection: while the term "blind" injection
implies the censor
doesn't know any sensitive sequencing information about
the TCP stream they are injecting into, they can simply enumerate all
~70000 possible windows; this is particularly useful for interrupting
encrypted/obfuscated protocols such as SSH or Tor <xref target="Gilad"/>.
Some censorship evasion systems work by trying to confuse the censor
into tracking incorrect information, rendering their RST Packet Injection
useless <xref target="Khattak-2013"/>, <xref target="Wang-2017"/>, <xref target="Li-2017"/>, <xref target="Bock-2019"/>,
<xref target="Wang-2020"/>.</t>
          <t>RST Packet Injection relies on a stateful network, making it useless against UDP
connections. RST Packet Injection is among the most popular censorship
techniques used today given its versatile nature and effectiveness
against all types of TCP traffic. Recent research shows that a TCP RST
packet injection attack can even work in the case of an off-path
attacker <xref target="Cao-2016"/>.</t>
          <t>Empirical Examples: RST Packet Injection, as mentioned above, is most
often paired with identification techniques that require splitting,
such as DPI or protocol identification. In 2007, Comcast was accused of
using RST Packet Injection to interrupt traffic it identified as
BitTorrent <xref target="Schoen-2007"/>, this later led to a US Federal
Communications Commission ruling against Comcast
<xref target="VonLohmann-2008"/>. China has also been known to use RST Packet
Injection for censorship purposes. This interference is especially
evident in the interruption of encrypted/obfuscated protocols, such as
those used by Tor <xref target="Winter-2012"/>.</t>
        </section>
      </section>
      <section anchor="routing-layer">
        <name>Routing Layer</name>
        <section anchor="discon">
          <name>Network Disconnection</name>
          <t>While it is perhaps the crudest of all techniques employed for censorship, there is
no more effective way of making sure undesirable information isn't
allowed to propagate on the web than by shutting off the network. The
network can be logically cut off in a region when a censoring body
withdraws all of the Border Gateway Protocol (BGP) prefixes routing
through the censor's country.</t>
          <t>Trade-offs: The impact to a network disconnection in a region is huge
and absolute; the censor pays for absolute control over digital
information by losing the benefits a globally-accessible Internet brings. Network disconnections are also politically expensive - citizens used to being able to access Internet platforms and services see such disconnections as a loss of civil liberty. 
Network disconnection is rarely a long-term solution for any censor and is normally only used
as a last resort in times of substantial unrest.</t>
          <t>Empirical Examples: Network Disconnections tend to only happen in
times of substantial unrest, largely due to the huge social,
political, and economic impact such a move has. One of the first,
highly covered occurrences was with the Junta in Myanmar employing
Network Disconnection to help Junta forces quash a rebellion in 2007
<xref target="Dobie-2007"/>. China disconnected the network in the Xinjiang region
during unrest in 2009 in an effort to prevent the protests from
spreading to other regions <xref target="Heacock-2009"/>. The Arab Spring saw the
the most frequent usage of Network Disconnection, with events in Egypt
and Libya in 2011 <xref target="Cowie-2011"/>, and Syria in 2012
<xref target="Thomson-2012"/>. Russia indicated that it would attempt to
disconnect all Russian networks from the global internet in April 2019
as part of a test of the nation's network independence. Reports also
indicate that, as part of the test disconnect, Russian telecommunications firms
must now route all traffic to state-operated monitoring points
<xref target="Cimpanu-2019"/>. India was the country that saw the largest number of
internet shutdowns per year in 2016 and 2017 <xref target="Dada-2017"/>.</t>
        </section>
        <section anchor="advroute">
          <name>Adversarial Route Announcement</name>
          <t>More fine-grained and potentially wide-spread censorship can be achieved with BGP hijacking, which adversarially re-routes BGP IP prefixes incorrectly within a region and beyond. This restricts and effectively censors the correctly known location of information that flows into or out of a jurisdiction and will similarly prevent people from outside your jurisdiction from viewing content generated outside your jurisdiction as the adversarial route announcement propagates. The first can be achieved by an adversarial BGP announcement of incorrect routes that are not intended to leak beyond a jurisdiction, where the latter attacks traffic by deliberately introducing bogus BGP announcements that reach the global internet.</t>
          <t>Trade-offs: A global leak of a misrouted website can overwhelm an ISP if the website gets a lot of traffic. It is not a permanent solution because incorrect BGP routes that leak globally can be fixed, though within a jurisdiction only the ISP/IXP is in a position to correct them for local users.</t>
          <t>Empirical examples: In 2008 Pakistan Telecom censored Youtube at the request of the Pakistan government by changing its BGP routes for the website. The new routes were announced to the ISP's upstream providers and beyond. The entire Internet began directing Youtube routes to Pakistan Telecom and continued doing so for many hours. In 2018 nearly all Google services and Google cloud customers like Spotify all lost more than one hour of service after it lost control of several million of its IP addresses. Those IP prefixes were being misdirected to China Telecom, a Chinese government-owned ISP <xref target="Google-2018"/>}, in a manner similar to the BGP hijacking of US government and military websites by China Telecom in 2010. ISPs in both Russia (2022) and Myanmar (2021) have tried to hijack the same Twitter prefix more than once <xref target="MANRS"/>.</t>
        </section>
      </section>
      <section anchor="multi-layer-and-non-layer">
        <name>Multi-layer and Non-layer</name>
        <section anchor="ddos">
          <name>Distributed Denial of Service (DDoS)</name>
          <t>Distributed Denial of Service attacks are a common attack mechanism
used by "hacktivists" and malicious hackers, but censors have used
DDoS in the past for a variety of reasons. There is a huge variety of
DDoS attacks <xref target="Wikip-DoS"/>, but at a high level two possible impacts
tend to occur; a flood attack results in the service being unusable
while resources are being spent to flood the service, a crash attack
aims to crash the service so resources can be reallocated elsewhere
without "releasing" the service.</t>
          <t>Trade-offs: DDoS is an appealing mechanism when a censor would like to
prevent all access to undesirable content, instead of only access in
their region for a limited period of time, but this is really the only
uniquely beneficial feature for DDoS as a technique employed for censorship. The
resources required to carry out a successful DDoS against major
targets are computationally expensive, usually requiring renting or
owning a malicious distributed platform such as a botnet, and
imprecise. DDoS is an incredibly crude censorship technique, and
appears to largely be used as a timely, easy-to-access mechanism for
blocking undesirable content for a limited period of time.</t>
          <t>Empirical Examples: In 2012 the U.K.'s GCHQ used DDoS to temporarily
shutdown IRC chat rooms frequented by members of Anonymous using the
Syn Flood DDoS method; Syn Flood exploits the handshake used by TCP to
overload the victim server with so many requests that legitimate
traffic becomes slow or impossible
<xref target="Schone-2014"/> <xref target="CERT-2000"/>. Dissenting opinion websites are
frequently victims of DDoS around politically sensitive events in
Burma <xref target="Villeneuve-2011"/>. Controlling parties in Russia
<xref target="Kravtsova-2012"/>, Zimbabwe <xref target="Orion-2013"/>, and Malaysia
<xref target="Muncaster-2013"/> have been accused of using DDoS to interrupt
opposition support and access during elections.
In 2015, China launched a DDoS attack using a true MITM system
collocated with the Great Firewall, dubbed "Great Cannon", that was
able to inject JavaScript code into web visits to a Chinese search
engine that commandeered those user agents to send DDoS traffic to
various sites <xref target="Marczak-2015"/>.</t>
        </section>
        <section anchor="censorship-in-depth">
          <name>Censorship in Depth</name>
          <t>Often, censors implement multiple techniques in tandem, creating
"censorship in depth". Censorship in depth can take many forms; some
censors block the same content through multiple techniques (such as
blocking a domain by DNS, IP blocking, and HTTP simultaneously), some deploy
parallel systems to improve censorship reliability (such as deploying
multiple different censorship systems to block the same domain), and others 
can use complimentary systems to limit evasion (such as by blocking
unwanted protocols entirely, forcing users to use other filtered protocols).</t>
          <t>Trade-offs: Censorship in depth can be attractive for censors to deploy,
as it offers additional guarantees about censorship: even if someone evades 
one type of censorship, they may still be blocked by another. The main
drawback to this approach is the cost to initial deployment, as it requires
the system to deploy multiple censorship systems in tandem.</t>
          <t>Empirical Examples: Censorship in depth is present in many large censoring
nation states today. Researchers have observed China has deployed
significant censorship in depth, often censoring the same resource across
multiple protocols <xref target="Chai-2019"/>, <xref target="Bock-2020b"/> or deploying additional
censorship systems to censor the same content and protocol <xref target="Bock-2021b"/>. 
Iran also has deployed a complimentary protocol filter to limit which
protocols can be used on certain ports, forcing users to rely on protocols
their censorship system can filter <xref target="Bock-2020"/>.</t>
        </section>
      </section>
    </section>
    <section anchor="nontechint">
      <name>Non-Technical Interference</name>
      <section anchor="manualfiltering">
        <name>Manual Filtering</name>
        <t>As the name implies, sometimes manual labor is the easiest way to figure
out which content to block.  Manual Filtering differs from the common
tactic of building up blocklists in that it doesn't necessarily target
a specific IP or DNS, but instead removes or flags content.  Given the
imprecise nature of automatic filtering, manually sorting through
content and flagging dissenting websites, blogs, articles and other
media for filtration can be an effective technique on its own, or combined with other automated techniques of detection that are then followed by an action that would require manual confirmation. This filtration
can occur on the Backbone/ISP level -- China's army of monitors is a
good example <xref target="BBC-2013b"/> -- but more commonly manual filtering
occurs on an institutional level.  Internet Content Providers such as
Google or Weibo, require a business license to operate in China.  One
of the prerequisites for a business license is an agreement to sign a
"voluntary pledge" known as the "Public Pledge on Self-discipline for
the Chinese Internet Industry".  The failure to "energetically
uphold" the pledged values can lead to the ICPs being held liable for
the offending content by the Chinese government <xref target="BBC-2013b"/>.</t>
      </section>
      <section anchor="selfcensor">
        <name>Self-Censorship</name>
        <t>Self-censorship is difficult to document, as it manifests primarily
through a lack of undesirable content. Tools which encourage
self-censorship are those which may lead a prospective speaker to
believe that speaking increases the risk of unfavourable outcomes for
the speaker (technical monitoring, identification requirements,
etc.). Reporters Without Borders exemplify methods of imposing
self-censorship in their annual World Press Freedom Index reports
<xref target="RWB2020"/>.</t>
      </section>
      <section anchor="serverko">
        <name>Server Takedown</name>
        <t>As mentioned in passing by <xref target="Murdoch-2011"/>, servers must have a
physical location somewhere in the world. If undesirable content is
hosted in the censoring country the servers can be physically seized
or -- in cases where a server is virtualized in a cloud infrastructure
where it may not necessarily have a fixed physical location -- the
hosting provider can be required to prevent access.</t>
      </section>
      <section anchor="notice">
        <name>Notice and Takedown</name>
        <t>In many countries, legal mechanisms exist where an individual or other
content provider can issue a legal request to a content host that
requires the host to take down content. Examples include the systems
employed by companies like Google to comply with "Right to be
Forgotten" policies in the European Union <xref target="Google-RTBF"/>,
intermediary liability rules for electronic platform providers
<xref target="EC-2012"/>, or the copyright-oriented notice and takedown regime of
the United States Digital Millennium Copyright Act (DMCA) Section 512
<xref target="DMLP-512"/>.</t>
      </section>
      <section anchor="dns-seizures">
        <name>Domain-Name Seizures</name>
        <t>Domain names are catalogued in so-called name-servers operated by
legal entities called registries. These registries can be made to cede
control over a domain name to someone other than the entity which
registered the domain name through a legal procedure grounded in either
private contracts or public law. Domain name seizures is increasingly
used by both public authorities and private entities to deal with
undesired content dissemination <xref target="ICANN2012"/> <xref target="EFF2017"/>.</t>
      </section>
    </section>
    <section anchor="future-work">
      <name>Future work</name>
      <t>In addition to establishing a thorough resource for describing censorship techniques this document implicates critical areas for future work.</t>
      <t>Taken as a whole the apparent costs of implementation of censorship techniques indicate a need for better classification of censorship regimes as they evolve and mature and specifying censorship circumvention techniques themselves. Censors maturity refers to the technical maturity required of the censor to perform the specific censorship technique. Future work might classify techniques by essentially how hard a censor must work, including what infrastructure is required, in order to successfully censor content, users or services.</t>
      <t>On circumvention, the increase in protocols leveraging encryption is an effective counter-measure against some forms of censorship described in this document, but that thorough research on circumvention and encryption be left for another document. Moreover the censorship circumvention community has developed an area of research on "pluggable transports," which collects, documents and makes agile methods for obfuscating the on-path traffic of censorship circumvention tools such that it appears indistinguishable from other kinds of traffic <xref target="Tor-2020"/>. Those methods would benefit from future work in the internet standards community, too.</t>
      <t>Lastly the empirical examples demonstrate that censorship techniques can evolve quickly, and experience shows that this document can only be a point-in-time statement. Future work might extend this document with updates and new techniques described using a comparable methodology.</t>
    </section>
    <section anchor="Contributors">
      <name>Contributors</name>
      <t>This document benefited from discussions with and input from
David Belson, Stephane Bortzmeyer, Vinicius Fortuna,
Gurshabad Grover, Andrew McConachie, Martin Nilsson, Michael
Richardson, Patrick Vacek and Chris Wood.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>Informative References</name>
      <reference anchor="RFC0793" target="https://www.rfc-editor.org/info/rfc793">
        <front>
          <title>Transmission Control Protocol</title>
          <author fullname="J. Postel" initials="J." surname="Postel">
            <organization/>
          </author>
          <date month="September" year="1981"/>
        </front>
        <seriesInfo name="RFC" value="793"/>
        <seriesInfo name="DOI" value="10.17487/RFC0793"/>
      </reference>
      <reference anchor="RFC7754" target="https://www.rfc-editor.org/info/rfc7754">
        <front>
          <title>Technical Considerations for Internet Service Blocking and Filtering</title>
          <author fullname="R. Barnes" initials="R." surname="Barnes">
            <organization/>
          </author>
          <author fullname="A. Cooper" initials="A." surname="Cooper">
            <organization/>
          </author>
          <author fullname="O. Kolkman" initials="O." surname="Kolkman">
            <organization/>
          </author>
          <author fullname="D. Thaler" initials="D." surname="Thaler">
            <organization/>
          </author>
          <author fullname="E. Nordmark" initials="E." surname="Nordmark">
            <organization/>
          </author>
          <date month="March" year="2016"/>
          <abstract>
            <t>The Internet is structured to be an open communications medium.  This openness is one of the key underpinnings of Internet innovation, but it can also allow communications that may be viewed as undesirable by certain parties.  Thus, as the Internet has grown, so have mechanisms to limit the extent and impact of abusive or objectionable communications.  Recently, there has been an increasing emphasis on "blocking" and "filtering", the active prevention of such communications.  This document examines several technical approaches to Internet blocking and filtering in terms of their alignment with the overall Internet architecture.  When it is possible to do so, the approach to blocking and filtering that is most coherent with the Internet architecture is to inform endpoints about potentially undesirable services, so that the communicants can avoid engaging in abusive or objectionable communications.  We observe that certain filtering and blocking approaches can cause unintended consequences to third parties, and we discuss the limits of efficacy of various approaches.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7754"/>
        <seriesInfo name="DOI" value="10.17487/RFC7754"/>
      </reference>
      <reference anchor="RFC7624" target="https://www.rfc-editor.org/info/rfc7624">
        <front>
          <title>Confidentiality in the Face of Pervasive Surveillance: A Threat Model and Problem Statement</title>
          <author fullname="R. Barnes" initials="R." surname="Barnes">
            <organization/>
          </author>
          <author fullname="B. Schneier" initials="B." surname="Schneier">
            <organization/>
          </author>
          <author fullname="C. Jennings" initials="C." surname="Jennings">
            <organization/>
          </author>
          <author fullname="T. Hardie" initials="T." surname="Hardie">
            <organization/>
          </author>
          <author fullname="B. Trammell" initials="B." surname="Trammell">
            <organization/>
          </author>
          <author fullname="C. Huitema" initials="C." surname="Huitema">
            <organization/>
          </author>
          <author fullname="D. Borkmann" initials="D." surname="Borkmann">
            <organization/>
          </author>
          <date month="August" year="2015"/>
          <abstract>
            <t>Since the initial revelations of pervasive surveillance in 2013, several classes of attacks on Internet communications have been discovered.  In this document, we develop a threat model that describes these attacks on Internet confidentiality.  We assume an attacker that is interested in undetected, indiscriminate eavesdropping.  The threat model is based on published, verified attacks.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7624"/>
        <seriesInfo name="DOI" value="10.17487/RFC7624"/>
      </reference>
      <reference anchor="RFC6066" target="https://www.rfc-editor.org/info/rfc6066">
        <front>
          <title>Transport Layer Security (TLS) Extensions: Extension Definitions</title>
          <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd">
            <organization/>
          </author>
          <date month="January" year="2011"/>
          <abstract>
            <t>This document provides specifications for existing TLS extensions.  It is a companion document for RFC 5246, "The Transport Layer Security (TLS) Protocol Version 1.2".  The extensions specified are server_name, max_fragment_length, client_certificate_url, trusted_ca_keys, truncated_hmac, and status_request.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6066"/>
        <seriesInfo name="DOI" value="10.17487/RFC6066"/>
      </reference>
      <reference anchor="RFC8484" target="https://www.rfc-editor.org/info/rfc8484">
        <front>
          <title>DNS Queries over HTTPS (DoH)</title>
          <author fullname="P. Hoffman" initials="P." surname="Hoffman">
            <organization/>
          </author>
          <author fullname="P. McManus" initials="P." surname="McManus">
            <organization/>
          </author>
          <date month="October" year="2018"/>
          <abstract>
            <t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS.  Each DNS query-response pair is mapped into an HTTP exchange.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8484"/>
        <seriesInfo name="DOI" value="10.17487/RFC8484"/>
      </reference>
      <reference anchor="RFC7858" target="https://www.rfc-editor.org/info/rfc7858">
        <front>
          <title>Specification for DNS over Transport Layer Security (TLS)</title>
          <author fullname="Z. Hu" initials="Z." surname="Hu">
            <organization/>
          </author>
          <author fullname="L. Zhu" initials="L." surname="Zhu">
            <organization/>
          </author>
          <author fullname="J. Heidemann" initials="J." surname="Heidemann">
            <organization/>
          </author>
          <author fullname="A. Mankin" initials="A." surname="Mankin">
            <organization/>
          </author>
          <author fullname="D. Wessels" initials="D." surname="Wessels">
            <organization/>
          </author>
          <author fullname="P. Hoffman" initials="P." surname="Hoffman">
            <organization/>
          </author>
          <date month="May" year="2016"/>
          <abstract>
            <t>This document describes the use of Transport Layer Security (TLS) to provide privacy for DNS.  Encryption provided by TLS eliminates opportunities for eavesdropping and on-path tampering with DNS queries in the network, such as discussed in RFC 7626.  In addition, this document specifies two usage profiles for DNS over TLS and provides advice on performance considerations to minimize overhead from using TCP and TLS with DNS.</t>
            <t>This document focuses on securing stub-to-recursive traffic, as per the charter of the DPRIVE Working Group.  It does not prevent future applications of the protocol to recursive-to-authoritative traffic.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7858"/>
        <seriesInfo name="DOI" value="10.17487/RFC7858"/>
      </reference>
      <reference anchor="I-D.ietf-tls-sni-encryption" target="https://www.ietf.org/archive/id/draft-ietf-tls-sni-encryption-09.txt">
        <front>
          <title>Issues and Requirements for Server Name Identification (SNI) Encryption in TLS</title>
          <author fullname="Christian Huitema" initials="C." surname="Huitema">
            <organization>Private Octopus Inc.</organization>
          </author>
          <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
            <organization>RTFM, Inc.</organization>
          </author>
          <date day="28" month="October" year="2019"/>
          <abstract>
            <t>This document describes the general problem of encrypting the Server Name Identification (SNI) TLS parameter. The proposed solutions hide a hidden service behind a fronting service, only disclosing the SNI of the fronting service to external observers. This document lists known attacks against SNI encryption, discusses the current "HTTP co-tenancy" solution, and presents requirements for future TLS-layer solutions.

 In practice, it may well be that no solution can meet every requirement and that practical solutions will have to make some compromises.
            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-tls-sni-encryption-09"/>
      </reference>
      <reference anchor="I-D.ietf-tls-esni" target="https://www.ietf.org/archive/id/draft-ietf-tls-esni-15.txt">
        <front>
          <title>TLS Encrypted Client Hello</title>
          <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
            <organization>RTFM, Inc.</organization>
          </author>
          <author fullname="Kazuho Oku" initials="K." surname="Oku">
            <organization>Fastly</organization>
          </author>
          <author fullname="Nick Sullivan" initials="N." surname="Sullivan">
            <organization>Cloudflare</organization>
          </author>
          <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
            <organization>Cloudflare</organization>
          </author>
          <date day="3" month="October" year="2022"/>
          <abstract>
            <t>   This document describes a mechanism in Transport Layer Security (TLS)
   for encrypting a ClientHello message under a server public key.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Source for this draft and an issue tracker can be found at
   https://github.com/tlswg/draft-ietf-tls-esni
   (https://github.com/tlswg/draft-ietf-tls-esni).

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-tls-esni-15"/>
      </reference>
      <reference anchor="I-D.ietf-quic-transport" target="https://www.ietf.org/archive/id/draft-ietf-quic-transport-34.txt">
        <front>
          <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
          <author fullname="Jana Iyengar" initials="J." surname="Iyengar">
            <organization>Fastly</organization>
          </author>
          <author fullname="Martin Thomson" initials="M." surname="Thomson">
            <organization>Mozilla</organization>
          </author>
          <date day="14" month="January" year="2021"/>
          <abstract>
            <t>This document defines the core of the QUIC transport protocol.  QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration.  QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances.  Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.
            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-quic-transport-34"/>
      </reference>
      <reference anchor="RWB2020" target="https://rsf.org/en/2020-world-press-freedom-index-entering-decisive-decade-journalism-exacerbated-coronavirus">
        <front>
          <title>2020 World Press Freedom Index: Entering a decisive decade for journalism, exacerbated by coronavirus</title>
          <author>
            <organization>Reporters Without Borders</organization>
          </author>
          <date year="2020"/>
        </front>
      </reference>
      <reference anchor="HADOPI-2020" target="https://www.hadopi.fr/en/node/3668">
        <front>
          <title>Présentation</title>
          <author>
            <organization>Haute Autorité pour la Diffusion des oeuvres et la Protection des Droits sur Internet</organization>
          </author>
          <date year="2020"/>
        </front>
      </reference>
      <reference anchor="SSAC-109-2020" target="https://www.icann.org/en/system/files/files/sac-109-en.pdf">
        <front>
          <title>SAC109: The Implications of DNS over HTTPS and DNS over TLS</title>
          <author>
            <organization>ICANN Security and Stability Advisory Committee</organization>
          </author>
          <date year="2020"/>
        </front>
      </reference>
      <reference anchor="ICANN2012" target="https://www.icann.org/en/system/files/files/guidance-domain-seizures-07mar12-en.pdf">
        <front>
          <title>Guidance for Preparing Domain Name Orders, Seizures &amp; Takedowns</title>
          <author>
            <organization>ICANN Security and Stability Advisory Committee</organization>
          </author>
          <date year="2012"/>
        </front>
      </reference>
      <reference anchor="Tor-2020" target="https://2019.www.torproject.org/docs/pluggable-transports.html.en">
        <front>
          <title>Tor: Pluggable Transports</title>
          <author>
            <organization>The Tor Project</organization>
          </author>
          <date year="2020"/>
        </front>
      </reference>
      <reference anchor="WP-Def-2020" target="https://en.wikipedia.org/w/index.php?title=Censorship&amp;oldid=943938595">
        <front>
          <title>Censorship</title>
          <author>
            <organization>Wikipedia contributors</organization>
          </author>
          <date year="2020"/>
        </front>
      </reference>
      <reference anchor="EC-gambling-2012" target="https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:52012SC0345">
        <front>
          <title>Online gambling in the Internal Market</title>
          <author>
            <organization>European Commission</organization>
          </author>
          <date year="2012"/>
        </front>
      </reference>
      <reference anchor="EC-gambling-2019" target="https://ec.europa.eu/growth/content/evaluation-regulatory-tools-enforcing-online-gambling-rules-and-channelling-demand-towards-1_en">
        <front>
          <title>Evaluation of regulatory tools for enforcing online gambling rules and channeling demand towards controlled offers</title>
          <author>
            <organization>European Commission</organization>
          </author>
          <date year="2019"/>
        </front>
      </reference>
      <reference anchor="EC-2012" target="https://ec.europa.eu/information_society/newsroom/image/document/2017-4/consultation_summary_report_en_2010_42070.pdf">
        <front>
          <title>Summary of the results of the Public Consultation on the future of electronic commerce in the Internal Market and the implementation of the Directive on electronic commerce (2000/31/EC)</title>
          <author>
            <organization>European Commission</organization>
          </author>
          <date year="2012"/>
        </front>
      </reference>
      <reference anchor="Bentham-1791" target="https://www.google.com/books/edition/_/Ec4TAAAAQAAJ?hl=en">
        <front>
          <title>Panopticon Or the Inspection House</title>
          <author initials="J." surname="Bentham" fullname="Jeremy Bentham">
            <organization/>
          </author>
          <date year="1791"/>
        </front>
      </reference>
      <reference anchor="Ellul-1973" target="https://www.penguinrandomhouse.com/books/46234/propaganda-by-jacques-ellul/">
        <front>
          <title>Propaganda: The Formation of Men's Attitudes</title>
          <author initials="J." surname="Ellul" fullname="Jacques Ellul">
            <organization/>
          </author>
          <date year="1973"/>
        </front>
      </reference>
      <reference anchor="Reda-2017" target="https://juliareda.eu/2017/11/eu-website-blocking/">
        <front>
          <title>New EU law prescribes website blocking in the name of 'consumer protection'</title>
          <author initials="J." surname="Reda" fullname="Julia Reda">
            <organization/>
          </author>
          <date year="2017"/>
        </front>
      </reference>
      <reference anchor="Knight-2005" target="https://www.newscientist.com/article/dn7589-iranian-net-censorship-powered-by-us-technology/">
        <front>
          <title>Iranian net censorship powered by US technology</title>
          <author initials="W." surname="Knight" fullname="Will Knight">
            <organization/>
          </author>
          <date year="2005"/>
        </front>
      </reference>
      <reference anchor="SIDN2020" target="https://labs.ripe.net/Members/giovane_moura/detecting-and-taking-down-fraudulent-webshops-at-a-cctld">
        <front>
          <title>Detecting and Taking Down Fraudulent Webshops at the .nl ccTLD</title>
          <author initials="G." surname="Moura" fullname="Giovane Moura">
            <organization/>
          </author>
          <date year="2020"/>
        </front>
      </reference>
      <reference anchor="Cimpanu-2019" target="https://www.zdnet.com/article/russia-to-disconnect-from-the-internet-as-part-of-a-planned-test/">
        <front>
          <title>Russia to disconnect from the internet as part of a planned test</title>
          <author initials="C." surname="Cimpanu" fullname="Catalin Cimpanu">
            <organization/>
          </author>
          <date year="2019"/>
        </front>
      </reference>
      <reference anchor="Hertel-2015" target="https://www.sciencesetavenir.fr/high-tech/comment-les-autorites-peuvent-bloquer-un-site-internet_35828">
        <front>
          <title>Comment les autorités peuvent bloquer un site Internet</title>
          <author initials="O." surname="Hertel" fullname="Olivier Hertel">
            <organization/>
          </author>
          <date year="2015"/>
        </front>
      </reference>
      <reference anchor="Eneman-2010" target="https://www.gu.se/forskning/publikation/?publicationId=96592">
        <front>
          <title>ISPs filtering of child abusive material: A critical reflection of its effectiveness</title>
          <author initials="M." surname="Eneman" fullname="Marie Eneman">
            <organization/>
          </author>
          <date year="2010"/>
        </front>
      </reference>
      <reference anchor="Gatlan-2019" target="https://www.bleepingcomputer.com/news/security/south-korea-is-censoring-the-internet-by-snooping-on-sni-traffic/">
        <front>
          <title>South Korea is Censoring the Internet by Snooping on SNI Traffic</title>
          <author initials="S." surname="Gatlan" fullname="Sergiu Gatlan">
            <organization/>
          </author>
          <date year="2019"/>
        </front>
      </reference>
      <reference anchor="Lomas-2019" target="https://techcrunch.com/2019/10/30/github-removes-tsunami-democratics-apk-after-a-takedown-order-from-spain/">
        <front>
          <title>Github removes Tsunami Democràtic’s APK after a takedown order from Spain</title>
          <author initials="N." surname="Lomas" fullname="Natasha Lomas">
            <organization/>
          </author>
          <date year="2019"/>
        </front>
      </reference>
      <reference anchor="Victor-2019" target="https://www.nytimes.com/2019/10/09/world/asia/blizzard-hearthstone-hong-kong.html">
        <front>
          <title>Blizzard Sets Off Backlash for Penalizing Hearthstone Gamer in Hong Kong</title>
          <author initials="D." surname="Victor" fullname="Daniel Victor">
            <organization/>
          </author>
          <date year="2019"/>
        </front>
      </reference>
      <reference anchor="Glanville-2008" target="http://www.theguardian.com/commentisfree/2008/nov/17/censorship-internet">
        <front>
          <title>The Big Business of Net Censorship</title>
          <author initials="J." surname="Glanville" fullname="Jo Glanville">
            <organization/>
          </author>
          <date year="2008"/>
        </front>
      </reference>
      <reference anchor="EFF2017" target="https://www.eff.org/files/2017/08/02/domain_registry_whitepaper.pdf">
        <front>
          <title>Which Internet registries offer the best protection for domain owners?</title>
          <author initials="J." surname="Malcom" fullname="Jeremy Malcolm">
            <organization/>
          </author>
          <author initials="M." surname="Stoltz" fullname="Mitch Stoltz">
            <organization/>
          </author>
          <author initials="G." surname="Rossi" fullname="Gus Rossi">
            <organization/>
          </author>
          <author initials="V." surname="Paxson" fullname="Vern Paxson">
            <organization/>
          </author>
          <date year="2017"/>
        </front>
      </reference>
      <reference anchor="Tschantz-2016" target="https://oaklandsok.github.io/papers/tschantz2016.pdf">
        <front>
          <title>SoK: Towards Grounding Censorship Circumvention in Empiricism</title>
          <author initials="M." surname="Tschantz" fullname="Michael Carl Tschantz">
            <organization/>
          </author>
          <author initials="S." surname="Afroz" fullname="Sadia Afroz">
            <organization/>
          </author>
          <author initials="A." surname="Anonymous" fullname="Anonymous">
            <organization/>
          </author>
          <author initials="V." surname="Paxson" fullname="Vern Paxson">
            <organization/>
          </author>
          <date year="2016"/>
        </front>
      </reference>
      <reference anchor="Cao-2016" target="https://www.usenix.org/system/files/conference/usenixsecurity16/sec16_paper_cao.pdf">
        <front>
          <title>Off-Path TCP Exploits: Global Rate Limit Considered Dangerous</title>
          <author initials="Y." surname="Cao" fullname="Yue Cao">
            <organization/>
          </author>
          <author initials="Z." surname="Qian" fullname="Zhiyun Qian">
            <organization/>
          </author>
          <author initials="Z." surname="Wang" fullname="Zhongjie Wang">
            <organization/>
          </author>
          <author initials="T." surname="Dao" fullname="Tuan Dao">
            <organization/>
          </author>
          <author initials="S." surname="Krishnamurthy" fullname="Srikanth V. Krishnamurthy">
            <organization/>
          </author>
          <author initials="L." surname="Marvel" fullname="Lisa M. Marvel">
            <organization/>
          </author>
          <date year="2016"/>
        </front>
      </reference>
      <reference anchor="Leyba-2019" target="https://forrest.biodesign.asu.edu/data/publications/2019-compass-chokepoints.pdf">
        <front>
          <title>Borders and Gateways: Measuring and Analyzing National AS Chokepoints</title>
          <author initials="K." surname="Leyba" fullname="Kirtus G. Leyba">
            <organization/>
          </author>
          <author initials="B." surname="Edwards" fullname="Benjamin Edwards">
            <organization/>
          </author>
          <author initials="C." surname="Freeman" fullname="Cynthia Freeman">
            <organization/>
          </author>
          <author initials="J." surname="Crandall" fullname="Jedidiah R. Crandall">
            <organization/>
          </author>
          <author initials="S." surname="Forrest" fullname="Stephanie Forrest">
            <organization/>
          </author>
          <date year="2019"/>
        </front>
      </reference>
      <reference anchor="Chai-2019" target="https://www.usenix.org/system/files/foci19-paper_chai_update.pdf">
        <front>
          <title>On the Importance of Encrypted-SNI (ESNI) to Censorship Circumvention</title>
          <author initials="Z." surname="Chai" fullname="Zimo Chai">
            <organization/>
          </author>
          <author initials="A." surname="Ghafari" fullname="Amirhossein Ghafari">
            <organization/>
          </author>
          <author initials="A." surname="Houmansadr" fullname="Amir Houmansadr">
            <organization/>
          </author>
          <date year="2019"/>
        </front>
      </reference>
      <reference anchor="Patil-2019" target="https://irtf.org/anrw/2019/anrw2019-final44-acmpaginated.pdf">
        <front>
          <title>What Can You Learn from an IP?</title>
          <author initials="S." surname="Patil" fullname="Simran Patil">
            <organization/>
          </author>
          <author initials="N." surname="Borisov" fullname="Nikita Borisov">
            <organization/>
          </author>
          <date year="2019"/>
        </front>
      </reference>
      <reference anchor="Wright-2013" target="https://policyreview.info/articles/analysis/internet-filtering-trends-liberal-democracies-french-and-german-regulatory-debates">
        <front>
          <title>Internet filtering trends in liberal democracies: French and German regulatory debates</title>
          <author initials="J." surname="Wright" fullname="Joss Wright">
            <organization/>
          </author>
          <author initials="Y." surname="Breindl" fullname="Yana Breindl">
            <organization/>
          </author>
          <date year="2013"/>
        </front>
      </reference>
      <reference anchor="Grover-2019" target="https://cis-india.org/internet-governance/blog/reliance-jio-is-using-sni-inspection-to-block-websites">
        <front>
          <title>Reliance Jio is using SNI inspection to block websites</title>
          <author initials="G." surname="Grover" fullname="Gurshabad Grover">
            <organization/>
          </author>
          <author initials="K." surname="Singh" fullname="Kushagra Singh">
            <organization/>
          </author>
          <author initials="E." surname="Hickok" fullname="Elonnai Hickok">
            <organization/>
          </author>
          <date year="2019"/>
        </front>
      </reference>
      <reference anchor="Singh-2019" target="https://arxiv.org/abs/1912.08590">
        <front>
          <title>How India Censors the Web</title>
          <author initials="K." surname="Singh" fullname="Kushagra Singh">
            <organization/>
          </author>
          <author initials="G." surname="Grover" fullname="Gurshabad Grover">
            <organization/>
          </author>
          <author initials="V." surname="Bansal" fullname="Varun Bansal">
            <organization/>
          </author>
          <date year="2019"/>
        </front>
      </reference>
      <reference anchor="NA-SK-2019" target="https://www.newamerica.org/cybersecurity-initiative/c2b/c2b-log/analysis-south-koreas-sni-monitoring/">
        <front>
          <title>Analysis: South Korea's New Tool for Filtering Illegal Internet Content</title>
          <author initials="R." surname="Morgus" fullname="Robert Morgus">
            <organization/>
          </author>
          <author initials="J." surname="Sherman" fullname="Justin Sherman">
            <organization/>
          </author>
          <author initials="S." surname="Nam" fullname="Seonghyun Nam">
            <organization/>
          </author>
          <date year="2019"/>
        </front>
      </reference>
      <reference anchor="CitizenLab-2018" target="https://citizenlab.ca/2018/03/bad-traffic-sandvines-packetlogic-devices-deploy-government-spyware-turkey-syria/">
        <front>
          <title>Bad Traffic: Sandvine’s PacketLogic Devices Used to Deploy Government Spyware in Turkey and Redirect Egyptian Users to Affiliate Ads?</title>
          <author initials="B." surname="Marczak" fullname="Bill Marczak">
            <organization/>
          </author>
          <author initials="J." surname="Dalek" fullname="Jakub Dalek">
            <organization/>
          </author>
          <author initials="S." surname="McKune" fullname="Sarah McKune">
            <organization/>
          </author>
          <author initials="A." surname="Senft" fullname="Adam Senft">
            <organization/>
          </author>
          <author initials="J." surname="Scott-Railton" fullname="John Scott-Railton">
            <organization/>
          </author>
          <author initials="R." surname="Deibert" fullname="Ron Deibert">
            <organization/>
          </author>
          <date year="2018"/>
        </front>
      </reference>
      <reference anchor="OONI-2019" target="https://ooni.org/post/2019-china-wikipedia-blocking/">
        <front>
          <title>China is now blocking all language editions of Wikipedia</title>
          <author initials="S." surname="Singh" fullname="Sukhbir Singh">
            <organization/>
          </author>
          <author initials="A." surname="Filastò" fullname="Arturo Filastò">
            <organization/>
          </author>
          <author initials="M." surname="Xynou" fullname="Maria Xynou">
            <organization/>
          </author>
          <date year="2019"/>
        </front>
      </reference>
      <reference anchor="OONI-2018" target="https://ooni.org/post/2018-iran-protests-pt2/">
        <front>
          <title>Iran Protests: DPI blocking of Instagram (Part 2)</title>
          <author initials="L." surname="Evdokimov" fullname="Leonid Evdokimov">
            <organization/>
          </author>
          <date year="2018"/>
        </front>
      </reference>
      <reference anchor="Dada-2017" target="https://www.accessnow.org/keepiton-shutdown-tracker/">
        <front>
          <title>Launching STOP: the #KeepItOn internet shutdown tracker</title>
          <author initials="T." surname="Dada" fullname="Tinuola Dada">
            <organization/>
          </author>
          <author initials="P." surname="Micek" fullname="Peter Micek">
            <organization/>
          </author>
          <date year="2017"/>
        </front>
      </reference>
      <reference anchor="Verkamp-2012" target="https://www.usenix.org/system/files/conference/foci12/foci12-final1.pdf">
        <front>
          <title>Inferring Mechanics of Web Censorship Around the World</title>
          <author initials="J. P." surname="Verkamp" fullname="John-Paul Verkamp">
            <organization/>
          </author>
          <author initials="M." surname="Gupta" fullname="Minaxi Gupta">
            <organization/>
          </author>
          <date year="2012"/>
        </front>
      </reference>
      <reference anchor="Nabi-2013" target="http://0b4af6cdc2f0c5998459-c0245c5c937c5dedcca3f1764ecc9b2f.r43.cf2.rackcdn.com/12387-foci13-nabi.pdf">
        <front>
          <title>The Anatomy of Web Censorship in Pakistan</title>
          <author initials="Z." surname="Nabi" fullname="Zubair Nabi">
            <organization/>
          </author>
          <date year="2013"/>
        </front>
      </reference>
      <reference anchor="Tang-2016" target="https://www.cs.tufts.edu/comp/116/archive/fall2016/ctang.pdf">
        <front>
          <title>In-depth analysis of the Great Firewall of China</title>
          <author initials="C." surname="Tang" fullname="Chao Tang">
            <organization/>
          </author>
          <date year="2016"/>
        </front>
      </reference>
      <reference anchor="Aryan-2012" target="https://jhalderm.com/pub/papers/iran-foci13.pdf">
        <front>
          <title>Internet Censorship in Iran: A First Look</title>
          <author initials="S." surname="Aryan" fullname="Simurgh Aryan">
            <organization/>
          </author>
          <author initials="H." surname="Aryan" fullname="Homa Aryan">
            <organization/>
          </author>
          <author initials="J. A." surname="Halderman" fullname="J. Alex Halderman">
            <organization/>
          </author>
          <date year="2012"/>
        </front>
      </reference>
      <reference anchor="Husak-2016" target="https://link.springer.com/article/10.1186/s13635-016-0030-7">
        <front>
          <title>HTTPS traffic analysis and client identification using passive SSL/TLS fingerprinting</title>
          <author initials="M." surname="Husak" fullname="Martin Husak">
            <organization/>
          </author>
          <author initials="M." surname="Cermak" fullname="Milan Cermak">
            <organization/>
          </author>
          <author initials="T." surname="Jirsik" fullname="Tomas Jirsik">
            <organization/>
          </author>
          <author initials="P." surname="Celeda" fullname="Pavel Celeda">
            <organization/>
          </author>
          <date year="2016"/>
        </front>
      </reference>
      <reference anchor="Dalek-2013" target="http://conferences.sigcomm.org/imc/2013/papers/imc112s-dalekA.pdf">
        <front>
          <title>A Method for Identifying and Confirming the Use of URL Filtering Products for Censorship</title>
          <author initials="J." surname="Dalek" fullname="Jakub Dalek">
            <organization/>
          </author>
          <date year="2013"/>
        </front>
      </reference>
      <reference anchor="Jones-2014" target="http://conferences2.sigcomm.org/imc/2014/papers/p299.pdf">
        <front>
          <title>Automated Detection and Fingerprinting of Censorship Block Pages</title>
          <author initials="B." surname="Jones" fullname="Ben Jones">
            <organization/>
          </author>
          <date year="2014"/>
        </front>
      </reference>
      <reference anchor="Crandall-2010" target="http://www.cs.unm.edu/~crandall/icdcs2010.pdf">
        <front>
          <title>Empirical Study of a National-Scale Distributed Intrusion Detection System: Backbone-Level Filtering of HTML Responses in China</title>
          <author initials="J." surname="Crandall" fullname="Jedediah Crandall">
            <organization/>
          </author>
          <date year="2010"/>
        </front>
      </reference>
      <reference anchor="Senft-2013" target="https://citizenlab.org/2013/11/asia-chats-analyzing-information-controls-privacy-asian-messaging-applications/">
        <front>
          <title>Asia Chats: Analyzing Information Controls and Privacy in Asian Messaging Applications</title>
          <author initials="A." surname="Senft" fullname="Adam Senft">
            <organization/>
          </author>
          <date year="2013"/>
        </front>
      </reference>
      <reference anchor="Rushe-2015" target="http://www.theguardian.com/technology/2014/feb/11/bing-censors-chinese-language-search-results">
        <front>
          <title>Bing censoring Chinese language search results for users in the US</title>
          <author initials="D." surname="Rushe" fullname="Dominic Rushe">
            <organization/>
          </author>
          <date year="2013"/>
        </front>
      </reference>
      <reference anchor="Cheng-2010" target="http://arstechnica.com/tech-policy/2010/06/google-tweaks-china-to-hong-kong-redirect-same-results/">
        <front>
          <title>Google stops Hong Kong auto-redirect as China plays hardball</title>
          <author initials="J." surname="Cheng" fullname="Jacqui Cheng">
            <organization/>
          </author>
          <date year="2010"/>
        </front>
      </reference>
      <reference anchor="Boyle-1997" target="https://scholarship.law.duke.edu/faculty_scholarship/619/">
        <front>
          <title>Foucault in Cyberspace: Surveillance, Sovereignty, and Hardwired Censors</title>
          <author initials="J." surname="Boyle" fullname="James Boyle">
            <organization/>
          </author>
          <date year="1997"/>
        </front>
      </reference>
      <reference anchor="Whittaker-2013" target="http://www.zdnet.com/1168-keywords-skype-uses-to-censor-monitor-its-chinese-users-7000012328/">
        <front>
          <title>1,168 keywords Skype uses to censor, monitor its Chinese users</title>
          <author initials="Z." surname="Whittaker" fullname="Zach Whittaker">
            <organization/>
          </author>
          <date year="2013"/>
        </front>
      </reference>
      <reference anchor="BBC-2013" target="http://www.bbc.com/news/uk-24980765">
        <front>
          <title>Google and Microsoft agree steps to block abuse images</title>
          <author>
            <organization>BBC News</organization>
          </author>
          <date year="2013"/>
        </front>
      </reference>
      <reference anchor="Condliffe-2013" target="http://gizmodo.com/google-announces-massive-new-restrictions-on-child-abus-1466539163">
        <front>
          <title>Google Announces Massive New Restrictions on Child Abuse Search Terms</title>
          <author initials="J." surname="Condliffe" fullname="Jamie Condliffe">
            <organization/>
          </author>
          <date year="2013"/>
        </front>
      </reference>
      <reference anchor="Zhu-2011" target="http://arxiv.org/ftp/arxiv/papers/1107/1107.3794.pdf">
        <front>
          <title>An Analysis of Chinese Search Engine Filtering</title>
          <author initials="T." surname="Zhu" fullname="Tao Zhu">
            <organization/>
          </author>
          <date year="2011"/>
        </front>
      </reference>
      <reference anchor="Wagner-2009" target="http://advocacy.globalvoicesonline.org/wp-content/uploads/2009/06/deeppacketinspectionandinternet-censorship2.pdf">
        <front>
          <title>Deep Packet Inspection and Internet Censorship: International Convergence on an ‘Integrated Technology of Control'</title>
          <author initials="B." surname="Wagner" fullname="Ben Wagner">
            <organization/>
          </author>
          <date year="2009"/>
        </front>
      </reference>
      <reference anchor="Porter-2010" target="http://www.symantec.com/connect/articles/perils-deep-packet-inspection">
        <front>
          <title>The Perils of Deep Packet Inspection</title>
          <author initials="T." surname="Porter" fullname="Thomas Porter">
            <organization/>
          </author>
          <date year="2010"/>
        </front>
      </reference>
      <reference anchor="Clayton-2006" target="http://link.springer.com/chapter/10.1007/11957454_2">
        <front>
          <title>Ignoring the Great Firewall of China</title>
          <author initials="R." surname="Clayton" fullname="Richard Clayton">
            <organization/>
          </author>
          <date year="2006"/>
        </front>
      </reference>
      <reference anchor="Anonymous-2014" target="https://www.usenix.org/system/files/conference/foci14/foci14-anonymous.pdf">
        <front>
          <title>Towards a Comprehensive Picture of the Great Firewall's DNS Censorship</title>
          <author>
            <organization>Anonymous</organization>
          </author>
          <date year="2014"/>
        </front>
      </reference>
      <reference anchor="Khattak-2013" target="http://0b4af6cdc2f0c5998459-c0245c5c937c5dedcca3f1764ecc9b2f.r43.cf2.rackcdn.com/12389-foci13-khattak.pdf">
        <front>
          <title>Towards Illuminating a Censorship Monitor's Model to Facilitate Evasion</title>
          <author initials="S." surname="Khattak" fullname="Sheharbano Khattak">
            <organization/>
          </author>
          <date year="2013"/>
        </front>
      </reference>
      <reference anchor="Wilde-2012" target="https://blog.torproject.org/blog/knock-knock-knockin-bridges-doors">
        <front>
          <title>Knock Knock Knockin' on Bridges Doors</title>
          <author initials="T." surname="Wilde" fullname="Tim Wilde">
            <organization/>
          </author>
          <date year="2012"/>
        </front>
      </reference>
      <reference anchor="Wagstaff-2013" target="http://www.reuters.com/article/2013/05/04/uk-malaysia-election-online-idUKBRE94309G20130504">
        <front>
          <title>In Malaysia, online election battles take a nasty turn</title>
          <author initials="J." surname="Wagstaff" fullname="Jeremy Wagstaff">
            <organization/>
          </author>
          <date year="2013"/>
        </front>
      </reference>
      <reference anchor="Hepting-2011" target="https://en.wikipedia.org/wiki/Hepting_v._AT%26T">
        <front>
          <title>Hepting vs. AT&amp;T</title>
          <author>
            <organization>Wikipedia</organization>
          </author>
          <date year="2011"/>
        </front>
      </reference>
      <reference anchor="Hjelmvik-2010" target="https://www.iis.se/docs/hjelmvik_breaking.pdf">
        <front>
          <title>Breaking and Improving Protocol Obfuscation</title>
          <author initials="E." surname="Hjelmvik" fullname="Erik Hjelmvik">
            <organization/>
          </author>
          <date year="2010"/>
        </front>
      </reference>
      <reference anchor="Sandvine-2014" target="https://www.sandvine.com/downloads/general/technology/sandvine-technology-showcases/sandvine-technology-showcase-traffic-classification.pdf">
        <front>
          <title>Technology Showcase on Traffic Classification: Why Measurements and Freeform Policy Matter</title>
          <author>
            <organization>Sandvine</organization>
          </author>
          <date year="2014"/>
        </front>
      </reference>
      <reference anchor="Winter-2012" target="http://arxiv.org/pdf/1204.0447v1.pdf">
        <front>
          <title>How China is Blocking Tor</title>
          <author initials="P." surname="Winter" fullname="Phillip Winter">
            <organization/>
          </author>
          <date year="2012"/>
        </front>
      </reference>
      <reference anchor="Anonymous-2007" target="https://torrentfreak.com/how-to-bypass-comcast-bittorrent-throttling-071021">
        <front>
          <title>How to Bypass Comcast's Bittorrent Throttling</title>
          <author>
            <organization>Anonymous</organization>
          </author>
          <date year="2012"/>
        </front>
      </reference>
      <reference anchor="Anonymous-2013" target="https://en.greatfire.org/blog/2013/jan/github-blocked-china-how-it-happened-how-get-around-it-and-where-it-will-take-us">
        <front>
          <title>GitHub blocked in China - how it happened, how to get around it, and where it will take us</title>
          <author>
            <organization>Anonymous</organization>
          </author>
          <date year="2013"/>
        </front>
      </reference>
      <reference anchor="Ensafi-2013" target="http://arxiv.org/pdf/1312.5739v1.pdf">
        <front>
          <title>Detecting Intentional Packet Drops on the Internet via TCP/IP Side Channels</title>
          <author initials="R." surname="Ensafi" fullname="Roya Ensafi">
            <organization/>
          </author>
          <date year="2013"/>
        </front>
      </reference>
      <reference anchor="Weaver-2009" target="http://www.icir.org/vern/papers/reset-injection.ndss09.pdf">
        <front>
          <title>Detecting Forged TCP Packets</title>
          <author initials="N." surname="Weaver" fullname="Nicholas Weaver">
            <organization/>
          </author>
          <author initials="R." surname="Sommer" fullname="Robin Sommer">
            <organization/>
          </author>
          <author initials="V." surname="Paxson" fullname="Vern Paxson">
            <organization/>
          </author>
          <date year="2009"/>
        </front>
      </reference>
      <reference anchor="Netsec-2011" target="https://nets.ec/TCP-RST_Injection">
        <front>
          <title>TCP-RST Injection</title>
          <author>
            <organization>n3t2.3c</organization>
          </author>
          <date year="2011"/>
        </front>
      </reference>
      <reference anchor="Schoen-2007" target="https://www.eff.org/deeplinks/2007/10/eff-tests-agree-ap-comcast-forging-packets-to-interfere">
        <front>
          <title>EFF tests agree with AP: Comcast is forging packets to interfere with user traffic</title>
          <author initials="S." surname="Schoen" fullname="Seth Schoen">
            <organization/>
          </author>
          <date year="2007"/>
        </front>
      </reference>
      <reference anchor="VonLohmann-2008" target="https://www.eff.org/deeplinks/2008/08/fcc-rules-against-comcast-bit-torrent-blocking">
        <front>
          <title>FCC Rules Against Comcast for BitTorrent Blocking</title>
          <author initials="F." surname="VonLohmann" fullname="Fred VonLohmann">
            <organization/>
          </author>
          <date year="2008"/>
        </front>
      </reference>
      <reference anchor="Halley-2008" target="https://www.networkworld.com/article/2277316/tech-primers/tech-primers-how-dns-cache-poisoning-works.html">
        <front>
          <title>How DNS cache poisoning works</title>
          <author initials="B." surname="Halley" fullname="Bob Halley">
            <organization/>
          </author>
          <date year="2014"/>
        </front>
      </reference>
      <reference anchor="Zmijewski-2014" target="https://blogs.oracle.com/internetintelligence/turkish-internet-censorship-takes-a-new-turn">
        <front>
          <title>Turkish Internet Censorship Takes a New Turn</title>
          <author initials="E." surname="Zmijewski" fullname="Earl Zmijewski">
            <organization/>
          </author>
          <date year="2014"/>
        </front>
      </reference>
      <reference anchor="AFP-2014" target="http://www.businessinsider.com/chinas-internet-breakdown-reportedly-caused-by-censoring-tools-2014-1">
        <front>
          <title>China Has Massive Internet Breakdown Reportedly Caused By Their Own Censoring Tools</title>
          <author>
            <organization>AFP</organization>
          </author>
          <date year="2014"/>
        </front>
      </reference>
      <reference anchor="Anon-SIGCOMM12" target="http://www.sigcomm.org/sites/default/files/ccr/papers/2012/July/2317307-2317311.pdf">
        <front>
          <title>The Collateral Damage of Internet Censorship by DNS Injection</title>
          <author>
            <organization>Anonymous</organization>
          </author>
          <date year="2012"/>
        </front>
      </reference>
      <reference anchor="Albert-2011" target="https://opennet.net/blog/2011/06/dns-tampering-and-new-icann-gtld-rules">
        <front>
          <title>DNS Tampering and the new ICANN gTLD Rules</title>
          <author initials="K." surname="Albert" fullname="Kendra Albert">
            <organization/>
          </author>
          <date year="2011"/>
        </front>
      </reference>
      <reference anchor="Wikip-DoS" target="https://en.wikipedia.org/w/index.php?title=Denial-of-service_attack&amp;oldid=710558258">
        <front>
          <title>Denial of Service Attacks</title>
          <author>
            <organization>Wikipedia</organization>
          </author>
          <date year="2016"/>
        </front>
      </reference>
      <reference anchor="Schone-2014" target="http://www.nbcnews.com/feature/edward-snowden-interview/exclusive-snowden-docs-show-uk-spies-attacked-anonymous-hackers-n21361">
        <front>
          <title>Snowden Docs Show UK Spies Attacked Anonymous, Hackers</title>
          <author initials="M." surname="Schone" fullname="Mark Schone">
            <organization/>
          </author>
          <author initials="R." surname="Esposito" fullname="Richard Esposito">
            <organization/>
          </author>
          <author initials="M." surname="Cole" fullname="Matthew Cole">
            <organization/>
          </author>
          <author initials="G." surname="Greenwald" fullname="Glenn Greenwald">
            <organization/>
          </author>
          <date year="2014"/>
        </front>
      </reference>
      <reference anchor="CERT-2000" target="http://www.cert.org/historical/advisories/CA-1996-21.cfm">
        <front>
          <title>TCP SYN Flooding and IP Spoofing Attacks</title>
          <author>
            <organization>CERT</organization>
          </author>
          <date year="2000"/>
        </front>
      </reference>
      <reference anchor="Kravtsova-2012" target="http://www.themoscowtimes.com/news/article/cyberattacks-disrupt-oppositions-election/470119.html">
        <front>
          <title>Cyberattacks Disrupt Opposition's Election</title>
          <author initials="Y." surname="Kravtsova" fullname="Yekaterina Kravtsova">
            <organization/>
          </author>
          <date year="2012"/>
        </front>
      </reference>
      <reference anchor="Villeneuve-2011" target="http://access.opennet.net/wp-content/uploads/2011/12/accesscontested-chapter-08.pdf">
        <front>
          <title>Open Access: Chapter 8, Control and Resistance, Attacks on Burmese Opposition Media</title>
          <author initials="N." surname="Villeneuve" fullname="Nart Villeneuve">
            <organization/>
          </author>
          <date year="2011"/>
        </front>
      </reference>
      <reference anchor="Orion-2013" target="http://www.theinquirer.net/inquirer/news/2287433/zimbabwe-election-hit-by-hacking-and-ddos-attacks">
        <front>
          <title>Zimbabwe election hit by hacking and DDoS attacks</title>
          <author initials="E." surname="Orion" fullname="Egan Orion">
            <organization/>
          </author>
          <date year="2013"/>
        </front>
      </reference>
      <reference anchor="Muncaster-2013" target="http://www.theregister.co.uk/2013/05/09/malaysia_fraud_elections_ddos_web_blocking/">
        <front>
          <title>Malaysian election sparks web blocking/DDoS claims</title>
          <author initials="P." surname="Muncaster" fullname="Phil Muncaster">
            <organization/>
          </author>
          <date year="2013"/>
        </front>
      </reference>
      <reference anchor="Dobie-2007" target="http://news.bbc.co.uk/2/hi/asia-pacific/7016238.stm">
        <front>
          <title>Junta tightens media screw</title>
          <author initials="M." surname="Dobie" fullname="Michael Dobie">
            <organization/>
          </author>
          <date year="2007"/>
        </front>
      </reference>
      <reference anchor="Heacock-2009" target="https://opennet.net/blog/2009/07/china-shuts-down-internet-xinjiang-region-after-riots">
        <front>
          <title>China Shuts Down Internet in Xinjiang Region After Riots</title>
          <author initials="R." surname="Heacock" fullname="Rebekah Heacock">
            <organization/>
          </author>
          <date year="2009"/>
        </front>
      </reference>
      <reference anchor="Cowie-2011" target="https://archive.nanog.org/meetings/nanog51/presentations/Tuesday/LT-Cowie-Egypt%20Leaves%20The%20Internet.pdf">
        <front>
          <title>Egypt Leaves the Internet</title>
          <author initials="J." surname="Cowie" fullname="Jim Cowie">
            <organization/>
          </author>
          <date year="2011"/>
        </front>
      </reference>
      <reference anchor="Thomson-2012" target="http://www.theregister.co.uk/2012/11/29/syria_internet_blackout/">
        <front>
          <title>Syria Cuts off Internet and Mobile Communication</title>
          <author initials="I." surname="Thomson" fullname="Iain Thomson">
            <organization/>
          </author>
          <date year="2012"/>
        </front>
      </reference>
      <reference anchor="BBC-2013b" target="http://www.bbc.com/news/world-asia-china-2439695">
        <front>
          <title>China employs two million microblog monitors state media say</title>
          <author>
            <organization>BBC</organization>
          </author>
          <date year="2013"/>
        </front>
      </reference>
      <reference anchor="Calamur-2013" target="http://www.npr.org/blogs/thetwo-way/2013/11/29/247820503/prominent-egyptian-blogger-arrested">
        <front>
          <title>Prominent Egyptian Blogger Arrested</title>
          <author initials="K." surname="Calamur" fullname="Krishnadev Calamur">
            <organization/>
          </author>
          <date year="2013"/>
        </front>
      </reference>
      <reference anchor="AP-2012" target="http://www.huffingtonpost.com/2012/12/03/sattar-beheshit-iran_n_2233125.html">
        <front>
          <title>Sattar Beheshit, Iranian Blogger, Was Beaten In Prison According To Prosecutor</title>
          <author>
            <organization>Associated Press</organization>
          </author>
          <date year="2012"/>
        </front>
      </reference>
      <reference anchor="Hopkins-2011" target="http://readwrite.com/2011/03/03/communications_blocked_in_libya_this_week_in_onlin">
        <front>
          <title>Communications Blocked in Libya, Qatari Blogger Arrested: This Week in Online Tyranny</title>
          <author initials="C." surname="Hopkins" fullname="Curt Hopkins">
            <organization/>
          </author>
          <date year="2011"/>
        </front>
      </reference>
      <reference anchor="Guardian-2014" target="http://www.theguardian.com/world/2014/apr/17/chinese-blogger-jailed-crackdown-internet-rumours-qin-zhihui">
        <front>
          <title>Chinese blogger jailed under crackdown on 'internet rumours'</title>
          <author>
            <organization>The Gaurdian</organization>
          </author>
          <date year="2014"/>
        </front>
      </reference>
      <reference anchor="Bristow-2013" target="http://news.bbc.co.uk/2/hi/asia-pacific/7783640.stm">
        <front>
          <title>China's internet 'spin doctors‘</title>
          <author initials="M." surname="Bristow" fullname="Michael Bristow">
            <organization/>
          </author>
          <date year="2013"/>
        </front>
      </reference>
      <reference anchor="Fareed-2008" target="http://www.theguardian.com/media/2008/sep/22/chinathemedia.marketingandpr">
        <front>
          <title>China joins a turf war</title>
          <author initials="M." surname="Fareed" fullname="Malik Fareed">
            <organization/>
          </author>
          <date year="2008"/>
        </front>
      </reference>
      <reference anchor="Gao-2014" target="http://www.nytimes.com/2014/06/04/opinion/tiananmen-forgotten.html">
        <front>
          <title>Tiananmen, Forgotten</title>
          <author initials="H." surname="Gao" fullname="Helen Gao">
            <organization/>
          </author>
          <date year="2014"/>
        </front>
      </reference>
      <reference anchor="Murdoch-2011" target="http://access.opennet.net/wp-content/uploads/2011/12/accessdenied-chapter-3.pdf">
        <front>
          <title>Access Denied: Tools and Technology of Internet Filtering</title>
          <author initials="S. J." surname="Murdoch" fullname="Steven J. Murdoch">
            <organization/>
          </author>
          <author initials="R." surname="Anderson" fullname="Ross Anderson">
            <organization/>
          </author>
          <date year="2011"/>
        </front>
      </reference>
      <reference anchor="AFNIC-2013" target="http://www.afnic.fr/medias/documents/conseilscientifique/SC-consequences-of-DNS-based-Internet-filtering.pdf">
        <front>
          <title>Report of the AFNIC Scientific Council: Consequences of DNS-based Internet filtering</title>
          <author>
            <organization>AFNIC</organization>
          </author>
          <date year="2013"/>
        </front>
      </reference>
      <reference anchor="ICANN-SSAC-2012" target="https://www.icann.org/en/system/files/files/sac-056-en.pdf">
        <front>
          <title>SAC 056: SSAC Advisory on Impacts of Content Blocking via the Domain Name System</title>
          <author>
            <organization>ICANN Security and Stability Advisory Committee (SSAC)</organization>
          </author>
          <date year="2012"/>
        </front>
      </reference>
      <reference anchor="Ding-1999" target="http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.132.3302&amp;rep=rep1&amp;type=pdf">
        <front>
          <title>Centralized Content-Based Web Filtering and Blocking: How Far Can It Go?</title>
          <author initials="C." surname="Ding" fullname="Chen Ding">
            <organization/>
          </author>
          <author initials="C. H." surname="Chi" fullname="Chi-Hung Chi">
            <organization/>
          </author>
          <author initials="J." surname="Deng" fullname="Jing Deng">
            <organization/>
          </author>
          <author initials="C. L." surname="Dong" fullname="Chun-Lei Dong">
            <organization/>
          </author>
          <date year="1999"/>
        </front>
      </reference>
      <reference anchor="Trustwave-2015" target="https://www3.trustwave.com/software/8e6/hlp/r3000/files/1system_filter.html">
        <front>
          <title>Filter: SNI extension feature and HTTPS blocking</title>
          <author>
            <organization>Trustwave</organization>
          </author>
          <date year="2015"/>
        </front>
      </reference>
      <reference anchor="Sophos-2015" target="https://www.sophos.com/en-us/support/knowledgebase/115865.aspx">
        <front>
          <title>Understanding Sophos Web Filtering</title>
          <author>
            <organization>Sophos</organization>
          </author>
          <date year="2015"/>
        </front>
      </reference>
      <reference anchor="Shbair-2015" target="https://hal.inria.fr/hal-01202712/document">
        <front>
          <title>Efficiently Bypassing SNI-based HTTPS Filtering</title>
          <author initials="W. M." surname="Shbair" fullname="Wazen M. Shbair">
            <organization/>
          </author>
          <author initials="T." surname="Cholez" fullname="Thibault Cholez">
            <organization/>
          </author>
          <author initials="A." surname="Goichot" fullname="Antoine Goichot">
            <organization/>
          </author>
          <author initials="I." surname="Chrisment" fullname="Isabelle Chrisment">
            <organization/>
          </author>
          <date year="2015"/>
        </front>
      </reference>
      <reference anchor="RSF-2005" target="http://archives.rsf.org/print-blogs.php3?id_article=15013">
        <front>
          <title>Technical ways to get around censorship</title>
          <author>
            <organization>Reporters Sans Frontieres</organization>
          </author>
          <date year="2005"/>
        </front>
      </reference>
      <reference anchor="Marczak-2015" target="https://www.usenix.org/system/files/conference/foci15/foci15-paper-marczak.pdf">
        <front>
          <title>An Analysis of China’s “Great Cannon”</title>
          <author initials="B." surname="Marczak" fullname="Bill Marczak">
            <organization/>
          </author>
          <author initials="N." surname="Weaver" fullname="Nicholas Weaver">
            <organization/>
          </author>
          <author initials="J." surname="Dalek" fullname="Jakub Dalek">
            <organization/>
          </author>
          <author initials="R." surname="Ensafi" fullname="Roya Ensafi">
            <organization/>
          </author>
          <author initials="D." surname="Fifield" fullname="David Fifield">
            <organization/>
          </author>
          <author initials="S." surname="McKune" fullname="Sarah McKune">
            <organization/>
          </author>
          <author initials="A." surname="Rey" fullname="Arn Rey">
            <organization/>
          </author>
          <author initials="J." surname="Scott-Railton" fullname="John Scott-Railton">
            <organization/>
          </author>
          <author initials="R." surname="Deibert" fullname="Ron Deibert">
            <organization/>
          </author>
          <author initials="V." surname="Paxson" fullname="Vern Paxson">
            <organization/>
          </author>
          <date year="2015"/>
        </front>
      </reference>
      <reference anchor="Fifield-2015" target="https://petsymposium.org/2015/papers/03_Fifield.pdf">
        <front>
          <title>Blocking-resistant communication through domain fronting</title>
          <author initials="D." surname="Fifield" fullname="David Fifield">
            <organization/>
          </author>
          <author initials="C." surname="Lan" fullname="Chang Lan">
            <organization/>
          </author>
          <author initials="R." surname="Hynes" fullname="Rod Hynes">
            <organization/>
          </author>
          <author initials="P." surname="Wegmann" fullname="Percy Wegmann">
            <organization/>
          </author>
          <author initials="V." surname="Paxson" fullname="Vern Paxson">
            <organization/>
          </author>
          <date year="2015"/>
        </front>
      </reference>
      <reference anchor="Google-RTBF" target="https://support.google.com/legal/contact/lr_eudpa?product=websearch">
        <front>
          <title>Search removal request under data protection law in Europe</title>
          <author>
            <organization>Google, Inc.</organization>
          </author>
          <date year="2015"/>
        </front>
      </reference>
      <reference anchor="DMLP-512" target="http://www.dmlp.org/legal-guide/protecting-yourself-against-copyright-claims-based-user-content">
        <front>
          <title>Protecting Yourself Against Copyright Claims Based on User Content</title>
          <author>
            <organization>Digital Media Law Project</organization>
          </author>
          <date year="2012"/>
        </front>
      </reference>
      <reference anchor="Kopel-2013" target="http://dx.doi.org/doi:10.15779/Z384Q3M">
        <front>
          <title>Operation Seizing Our Sites: How the Federal Government is Taking Domain Names Without Prior Notice</title>
          <author initials="K." surname="Kopel" fullname="Karen Kopel">
            <organization/>
          </author>
          <date year="2013"/>
        </front>
      </reference>
      <reference anchor="Bortzmeyer-2015" target="https://labs.ripe.net/Members/stephane_bortzmeyer/dns-censorship-dns-lies-seen-by-atlas-probes">
        <front>
          <title>DNS Censorship (DNS Lies) As Seen By RIPE Atlas</title>
          <author initials="S." surname="Bortzmeyer" fullname="Stephane Bortzmeyer">
            <organization/>
          </author>
          <date year="2015"/>
        </front>
      </reference>
      <reference anchor="Wang-2017" target="https://www.cs.ucr.edu/~zhiyunq/pub/imc17_censorship_tcp.pdf">
        <front>
          <title>Your State is Not Mine: A Closer Look at Evading Stateful Internet Censorship</title>
          <author initials="Z." surname="Wang" fullname="Zhongjie Wang">
            <organization/>
          </author>
          <author initials="Y." surname="Cao" fullname="Yue Cao">
            <organization/>
          </author>
          <author initials="Z." surname="Qian" fullname="Zhiyun Qian">
            <organization/>
          </author>
          <author initials="C." surname="Song" fullname="Chengyu Song">
            <organization/>
          </author>
          <author initials="S." surname="Krishnamurthy" fullname="Srikanth V. Krishnamurthy">
            <organization/>
          </author>
          <date year="2017"/>
        </front>
      </reference>
      <reference anchor="Wang-2020" target="https://www.cs.ucr.edu/~zhiyunq/pub/ndss20_symtcp.pdf">
        <front>
          <title>SYMTCP: Eluding Stateful Deep Packet Inspection with Automated Discrepancy Discovery</title>
          <author initials="Z." surname="Wang" fullname="Zhongjie Wang">
            <organization/>
          </author>
          <author initials="S." surname="Zhu" fullname="Shitong Zhu">
            <organization/>
          </author>
          <author initials="Y." surname="Cao" fullname="Yue Cao">
            <organization/>
          </author>
          <author initials="Z." surname="Qian" fullname="Zhiyun Qian">
            <organization/>
          </author>
          <author initials="C." surname="Song" fullname="Chengyu Song">
            <organization/>
          </author>
          <author initials="S." surname="Krishnamurthy" fullname="Srikanth V. Krishnamurthy">
            <organization/>
          </author>
          <author initials="K." surname="Chan" fullname="Kevin S. Chan">
            <organization/>
          </author>
          <author initials="T." surname="Braun" fullname="Tracy D. Braun">
            <organization/>
          </author>
          <date year="2020"/>
        </front>
      </reference>
      <reference anchor="Li-2017" target="https://david.choffnes.com/pubs/liberate-imc17.pdf">
        <front>
          <title>lib•erate, (n) : A library for exposing (traffic-classification) rules and avoiding them efficiently</title>
          <author initials="F." surname="Li" fullname="Fangfan Li">
            <organization/>
          </author>
          <author initials="A." surname="Razaghpanah" fullname="Abbas Razaghpanah">
            <organization/>
          </author>
          <author initials="A." surname="Kakhki" fullname="Arash Molavi Kakhki">
            <organization/>
          </author>
          <author initials="A." surname="Niaki" fullname="Arian Akhavan Niaki">
            <organization/>
          </author>
          <author initials="D." surname="Choffnes" fullname="David Choffnes">
            <organization/>
          </author>
          <author initials="P." surname="Gill" fullname="Phillipa Gill">
            <organization/>
          </author>
          <author initials="A." surname="Mislove" fullname="Alan Mislove">
            <organization/>
          </author>
          <date year="2017"/>
        </front>
      </reference>
      <reference anchor="Bock-2019" target="https://geneva.cs.umd.edu/papers/geneva_ccs19.pdf">
        <front>
          <title>Geneva: Evolving Censorship Evasion Strategies</title>
          <author initials="K." surname="Bock" fullname="Kevin Bock">
            <organization/>
          </author>
          <author initials="G." surname="Hughey" fullname="George Hughey">
            <organization/>
          </author>
          <author initials="X." surname="Qiang" fullname="Xiao Qiang">
            <organization/>
          </author>
          <author initials="D." surname="Levin" fullname="Dave Levin">
            <organization/>
          </author>
          <date year="2019"/>
        </front>
      </reference>
      <reference anchor="Bock-2020" target="https://geneva.cs.umd.edu/papers/evading-censorship-in-depth.pdf">
        <front>
          <title>Detecting and Evading Censorship-in-Depth: A Case Study of Iran’s Protocol Filter</title>
          <author initials="K." surname="Bock" fullname="Kevin Bock">
            <organization/>
          </author>
          <author initials="Y." surname="Fax" fullname="Yair Fax">
            <organization/>
          </author>
          <author initials="K." surname="Reese" fullname="Kyle Reese">
            <organization/>
          </author>
          <author initials="J." surname="Singh" fullname="Jasraj Singh">
            <organization/>
          </author>
          <author initials="D." surname="Levin" fullname="Dave Levin">
            <organization/>
          </author>
          <date year="2020"/>
        </front>
      </reference>
      <reference anchor="Bock-2020b" target="https://geneva.cs.umd.edu/posts/china-censors-esni/esni/">
        <front>
          <title>Exposing and Circumventing China's Censorship of ESNI</title>
          <author initials="K." surname="Bock" fullname="Kevin Bock">
            <organization/>
          </author>
          <author initials="" surname="iyouport" fullname="iyouport">
            <organization/>
          </author>
          <author initials="" surname="Anonymous" fullname="Anonymous">
            <organization/>
          </author>
          <author initials="L." surname="Merino" fullname="Louis-Henri Merino">
            <organization/>
          </author>
          <author initials="D." surname="Fifield" fullname="David Fifield">
            <organization/>
          </author>
          <author initials="A." surname="Houmansadr" fullname="Amir Houmansadr">
            <organization/>
          </author>
          <author initials="D." surname="Levin" fullname="Dave Levin">
            <organization/>
          </author>
          <date year="2020"/>
        </front>
      </reference>
      <reference anchor="Rambert-2021" target="https://www.andrew.cmu.edu/user/nicolasc/publications/Rambert-WWW21.pdf">
        <front>
          <title>Chinese Wall or Swiss Cheese? Keyword filtering in the Great Firewall of China</title>
          <author initials="R." surname="Rampert" fullname="Raymond Rampert">
            <organization/>
          </author>
          <author initials="Z." surname="Weinberg" fullname="Zachary Weinberg">
            <organization/>
          </author>
          <author initials="D." surname="Barradas" fullname="Diogo Barradas">
            <organization/>
          </author>
          <author initials="N." surname="Christin" fullname="Nicolas Christin">
            <organization/>
          </author>
          <date year="2021"/>
        </front>
      </reference>
      <reference anchor="Knockel-2021" target="https://dl.acm.org/doi/10.1145/3473604.3474560">
        <front>
          <title>Measuring QQMail's automated email censorship in China</title>
          <author initials="J." surname="Knockel" fullname="Jeffery Knockel">
            <organization/>
          </author>
          <author initials="L." surname="Ruan" fullname="Lotus Ruan">
            <organization/>
          </author>
          <date year="2021"/>
        </front>
      </reference>
      <reference anchor="Bock-2021" target="https://geneva.cs.umd.edu/papers/woot21-weaponizing-availability.pdf">
        <front>
          <title>Your Censor is My Censor: Weaponizing Censorship Infrastructure for Availability Attacks</title>
          <author initials="K." surname="Bock" fullname="Kevin Bock">
            <organization/>
          </author>
          <author initials="P." surname="Bharadwaj" fullname="Pranav Bharadwaj">
            <organization/>
          </author>
          <author initials="J." surname="Singh" fullname="Jasraj Singh">
            <organization/>
          </author>
          <author initials="D." surname="Levin" fullname="Dave Levin">
            <organization/>
          </author>
          <date year="2021"/>
        </front>
      </reference>
      <reference anchor="Bock-2021b" target="https://geneva.cs.umd.edu/papers/foci21.pdf">
        <front>
          <title>Even Censors Have a Backup: Examining China’s Double HTTPS Censorship Middleboxes</title>
          <author initials="K." surname="Bock" fullname="Kevin Bock">
            <organization/>
          </author>
          <author initials="G." surname="Naval" fullname="Gabriel Naval">
            <organization/>
          </author>
          <author initials="K." surname="Reese" fullname="Kyle Reese">
            <organization/>
          </author>
          <author initials="D." surname="Levin" fullname="Dave Levin">
            <organization/>
          </author>
          <date year="2021"/>
        </front>
      </reference>
      <reference anchor="Satija-2021" target="https://sambhav.info/files/blindtls-foci21.pdf">
        <front>
          <title>BlindTLS: Circumventing TLS-based HTTPS censorship</title>
          <author initials="S." surname="Satija" fullname="Sambhav Satija">
            <organization/>
          </author>
          <author initials="R." surname="Chatterjee" fullname="Rahul Chatterjee">
            <organization/>
          </author>
          <date year="2021"/>
        </front>
      </reference>
      <reference anchor="Elmenhorst-2021" target="https://dl.acm.org/doi/pdf/10.1145/3487552.3487836">
        <front>
          <title>Web Censorship Measurements of HTTP/3 over QUIC</title>
          <author initials="K." surname="Elmenhorst" fullname="Kathrin Elmenhorst">
            <organization/>
          </author>
          <author initials="B." surname="Schuetz" fullname="Bertram Schuetz">
            <organization/>
          </author>
          <author initials="S." surname="Basso" fullname="Simone Basso">
            <organization/>
          </author>
          <author initials="N." surname="Aschenbruck" fullname="Nils Aschenbruck">
            <organization/>
          </author>
          <date year="2021"/>
        </front>
      </reference>
      <reference anchor="Elmenhorst-2022" target="https://www.opentech.fund/news/a-quick-look-at-quic/">
        <front>
          <title>A Quick Look at QUIC Censorship</title>
          <author initials="K." surname="Elmenhorst" fullname="Kathrin Elmenhorst">
            <organization/>
          </author>
          <date year="2022"/>
        </front>
      </reference>
      <reference anchor="Gilad" target="https://doi.org/10.1145/2597173">
        <front>
          <title>Off-Path TCP Injection Attacks</title>
          <author initials="Y." surname="Gilad" fullname="Yossi Gilad">
            <organization/>
          </author>
          <author initials="A." surname="Herzberg" fullname="Amir Herzberg">
            <organization/>
          </author>
          <date year="2014"/>
        </front>
      </reference>
      <reference anchor="MANRS" target="https://www.manrs.org/2022/03/lesson-learned-twitter-shored-up-its-routing-security/">
        <front>
          <title>Lesson Learned: Twitter Shored Up Its Routing Security</title>
          <author initials="A." surname="Siddiqui" fullname="Aftab Siddiqui">
            <organization/>
          </author>
          <date year="2022"/>
        </front>
      </reference>
      <reference anchor="Google-2018" target="https://status.cloud.google.com/incident/cloud-networking/18018">
        <front>
          <title>Google Cloud Networking Incident #18018</title>
          <author>
            <organization/>
          </author>
          <date year="2018"/>
        </front>
      </reference>
      <reference anchor="ekr-2021" target="https://educatedguesswork.org/posts/apple-csam-intro/">
        <front>
          <title>Overview of Apple's Client-side CSAM Scanning</title>
          <author initials="E." surname="Rescorla" fullname="Eric Rescorla">
            <organization/>
          </author>
          <date year="2021"/>
        </front>
      </reference>
    </references>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA9y9644b2bUm+D+eIqDCOSX14SWvklKGYedNUpZSUlrMsmw3
GkIwuEmGMhhBxyVTlFADP0YP0A0M5l//nVc4b+InmfWtta9BMlNluzHAuPtU
VW5G7NiXdb/2+/2oyZpcvYiP41Fb3apVXE7jj2WVT+6yiYpPVVGXVT3PlvG1
SudF9tdW1VEyHlfq9kU8qZJp08+qZtpfqqSa9VP7eDQp0yJZqHsf6u8cRWnS
qFlZrV7EWTEtoyhbVi/ipmrrZm9n52hnL0oqlbyIX6lCVUke3ZXVzawq2+WL
mGeLbtSKxiYv4ouiUVWhmv4ZPhhFdZMUk09JXha0iBWtepm9iP9rU6a9mD7f
VGpa03+tFviP/xZFSdvMy+pFFPejmP6XFfWL+KfB5SB+neQ5D8l2fiprtZzH
l2Wliq+l+7WsZkmRfU2arCzcYuJRmWaqWfEjapFk+Yt4Tq/8PqvLdEDvBN97
OzgbxMdJVRbeB99m6TxReRz8FH7t9Of4pGzziar87yzkxcGkUneDBK/+foZf
Bmm5CD57TDMX9HI9KZtGzyHfPl6oPEvWfw0+738z4RcGtOXp7xPvrUGaBp88
GdBBFnQp7lsnqvDGwg36nxirYvAZzw0AU1u29G4Qv1TJog638y5Lb8Lx8DM/
x6fzLE1mpf+9qX7+920qPw7UpO1cW/ymKCfKB5O3dMkE1f4PnTtTAJF4Wlbx
mVqUaZWkq/jfBcvKvJwFILO44Wl+n04aBpooKspqQTPdqheEMoQ47q/4w8vT
nWdH+y/4v549OzzQ//V0T//X052nT+W/nh88N78+P3xO/3XRP+PL6zd53a+L
rK+KtFot9T0Hvyr62R/7a5ul/aZKinpJ6MUL+Xiyt7O3IwDSELKqhqC/aZb1
i+GwqqfYylAVQzzUvwPN6S8rVdf9aaXUpFz0M4KgL30+qKyY9ScqzWraJP4j
maj+57KtiiTP6kVffUlSVY2Jlkz6aUmgntxmREPky0LgHuEzQtriK3wmfimf
IWSlz7yIz/V34iQ2X4rlS3xL7mu92PtcPF7F3hcf8SctMYn1xb+IPygcCyFE
/DGjH9uGULYCgvBDE5rqRYwV0rm9Pj57f3XR3352d3d3g3kyKZfZYFrhBAEd
w/2nT58HG76q/vN/1XR6DHFbF/aaxlR83DZllTX/+b/iJe0zzpP4LJtO25re
pEOo41K1t3RoMZE0+u2qKhuVNubHs6rMmjqu6UVD+NZ3NRodn/Z3d44e2Beh
WFEYyKhXhHmL4TTLVa3/WScpz0JUYDmZBvulD9AvL+LruYovFsucpsISa7C0
s3ejuLwlhHt9fX01iok2uaHry9HW07k4PX73Lh6ptKXTWfF7oyYZZzn+Op7c
Eh0nLD8tF4uM6Jxa3zZPsLezu/ePb3nWZpOkSAnuSyIHRb9W2deWLqO/82yR
VLt7m87ilX6HQZfAfZkwaJ/xDPE7olHxewa/Hm1OpgP1SW4II+6K7WD8z5zH
7h6dx3VZ3QMB9NDRAGdC0Lisys8EZHwwJE3Uw2XezmbJOFeOzNSDebPIB6oI
Nk/feBFfmafja/v01m0BZK75pPib69f48ap/pqb3rJzu4C67yZZqQvwPS74b
MvkaLOfL3/HCfuuEqX8v80k2+e3Rwf7R/vPDo8Ng9e6xrcv9aL5EpKdoqmwM
7N1ASc5P+7NkMc5BPbfDoGqrfk4rpX+Xy4T+NczVLMn7mJvIx/D83fD6T9fD
39GV//b0/PL8Ty8OMdnodGf/IFz6+4I+pWLzTWKPcQNkZKKQ5MQVqxvVbN3W
ORagkkLgpwbxWQegzp6Otuwp9bZDAuNdMx+a/ajbJG+ZNPQrNWvzhA5v1W/K
ElwNvDTF3CXvxX2ragkX+wTwfRKrikLlufCkBYaa8i6pJnV/91MHFM/tt0CF
3Odi/hxjp/1kXHaOjz/JOKY/iUH5Yqy/KABQ5jlxonI6JYT+x0/3SE73HkDx
D9VKHWXxqRYpd1iou7oqy8UwWyQzBaxtFzhxmvJZ/wAXULd5o99pF0S9Vp8q
Zox0bp/oqZ1PB3s7z3bWSbs8jDMEQBG1onlq8+dVS+eV0r7c9HSW/NO0bYi2
4UGVE2ITn6YHSVpcqIqI42b45BPHeEZMRC0MBzVfO8sq8D6SDmhs06yPSXPZ
Ge7vDs9Pn/xzsE4ycTNPFv3dZ0e72/nHrCxnuYIMPByX5U09JMqABQ8/Dc/T
g+tj+t8fjo9/+t08/20HOq+SoiThju6FuIE+inqpOfvrsq3VpvVrRUhVarEy
S9Q/abUpGJUdYQuArzxv8/7u0bP97ftZqoJYXkFUmxjeHKvw9nbwdG//YLgE
FJI4PUn641X/c5JCL+0rTD7syEDmQSHyLw3M4jbfquLHOj5u6OGW5Jh79iof
kNV3turG9EZpbxB+Fa0NcL95n59b0pMqegaohMeGu7tEiPt3alxnjeqP8zK9
IXQPd/NO3cXnP5MEdhdDUk6J8tOq9DuxeceANdaObf7IeEewSS8Zue3HezaL
pfH6Ozu1QxZGn9FG3xTZbN7QVncOt18pCAORiKLJ6oYvM6kI7HIiEcWzw+dH
/YwuO0uKPvR3zz6wLO8Iyia447buN1Y3Ck/lQl6OoW+7l2P9MgT0n0exe3n7
zj9mea7342/948AfNJvfOYRQe3H2brtMkCfjelARp6b9N8O3ajEm+jycZeVt
UqhPCxK0k+FE8Y0QK2E+ktwwVyEZjLSgpJ0QBygahop5uST20/STfpo2+SQ4
gTMzCZOua56EZL27gnQcM0n8UU8SJw2Dx6DI4zS9vjzbfiCvZKnxWyzVP5JX
A28sEDlOiWgmRXsPawY8fJ3QiQSAQLpTnSXESPuTrCaALWhDdASkBdJaSRPU
xp2k7pMo2/TLKR3EMgdXpFNTdROCxAeejZhk7GaLMZvQdWOdSeoYswFJkljP
FmO27UdymjSkBBZmn/6hnA6C0YCvvlak/OU4lXuwhFEkVbVqkltVZBW0uzkB
HkP+kPkLAQOLIaKu0X8tSTHDKCE/kaiq35J+AAJi9vhp//D5XqgXnspEMQsX
Ru+jk5CZYj1T3BYxkxWj0m0/k/d5dptBt+JN+kfyfuAP2hMB6pwXEGRwIvdo
g7N2UKshCRr1TQFquASnv2ECPvwd/yE63gUJ008Pj/ZCujC6Igkry7VaT5ec
zjPS/pNxy8o9MQL6Jclh/CRSSnBIIkClprlmgPQC1FpFYhXz+0LV9/AIkh0y
pXflH8HbgT9ojwC48ippcjmCe1CFNBi1pPXT9S9bNqUR1oCeDmuthQ3rktbT
vykrlfSzWhNQ0JEAdYiI1kVZLkW4ZesO6VHTaZaGuDPCbPEbzBZntTYB4wCd
qESoQ1R1pGeDHDR6dwE9C7NtP6KRqmZZq7ftn9Fo4A8GiHNJGmt9zxEBNdKq
LdI5HwweHO6S9LVDdLaZt2MS8Rek5RP3qFtaRQaJHdY2um1Co+VNP5nSjoiY
NFr37bNZRkhPvSRtOTydVzxrrGeNr2VWbcP7z/+Lpv373/5PEiqu3sQ8MxEW
M3PMMwsZGmHm7Sf1jqhMPU9k9/5JvRt4Y8FB/TFLG9at7wOmYtVkC1UHR7Vz
NGTj2zAhkjkklPr6lTSL/lwRZZzXTUlK0LwkmLmhf7C6HZzHiX6eLpdw5f10
Gp8k6U1OqxfTg4LN7Cug5LWbkG4b4kgGIZN+eUP/2H4WZ8TdVa7355/F2cAf
DA7jFcHSLXFzBbnk+fp56OMgiJ61tHiSHvhINInNalggh3h1WJS3Q5LOPKEk
801c+hggWp5ks/iEKAvIBGjHO8ISp8tvF7dKt9qOwBWOW8HjOajny5fbhUts
jagWmyHEhMQSJu1mZ28oRiRSu2Yki5H+dTcnIr9MlkRZulrXx3mWzh3K61cy
mAOhajJBIAG08eRKvnT5REwgT/LO79Zvtr9JkXib5GmZdxUJHl1seOtt1tDa
Rk2ZN1875NYbDN951dbxh5Ikg44o48bC5/9I+46vki91GVCrPw78wUAYvq6h
qTdfgYZPN19OmRB2FJO6vBkIhRpk5ZDPvx42+nW8va4Dl28I0LTa/6oq22IC
tPJcdKdZRQo3mDhugm7gfLHMqizN6sVDl2C8TKdJldtddM41GA5fHyUwRh0T
aQteIrruxsI3jouyWJEIHFA39kT54//MfTyFNJqU91wF8IS0yyL7wqgSmF5J
aCQQhzg2lEcMt919Csa7+/QT39mnNCnXboqoYP8qISZ6fXoVn39Z5jCPE6Tl
5ZgkjA+0wPgyW2QNWyyyCWspROVmii51g4QRHsKfW4Vt+Qfw54EdCZ/9yzxb
kRj3hyxkt38ZuKHuC0SKP5Mc85GW03nFDoWvXLekep2FC7oe2JEOnFQkvRV0
MnRnb6qsntNwS1xh1YGa9d/CeS6zOgFIktB1G0qc8WUwGkDDpVqNk3s4JNEu
0qqbwTgrJ6rOZsUgqVu4+4Y0TTL05E2mqEd9yGRJTRLXvLxRy5I4Q70GDNrN
w5oZCTnqLlkBnRRNXRmN7ZiY5IqZ5DuenqDkeBSfulkfAoo3WdUQcSNaxnv0
D+SNPxa+daKKzyS8EJ2YMFXxXzsZBKPhi6crukNCeHjQOuIuKUH+aJfUTzIi
FPP4A0Es7DvGe+4IfjDcAR7iU3MIA7Di4KI6QOOPBtLA6TzJHhCMtpGBaZlm
dNEa12meT+0Sc6/jvDYlLmDNZM8LiQDn4j0lFRXy8eNz+ucTKKXbaPZD1/yX
bFHybjqoaYc6NHaRVXPibYqu+NU8mZKG0qG2/uj6uzAB0kXWyaTqvNf5ITht
onxZfs9xw23PB50U1Z1IofgvRqhpRrB/cNBPUkKsGf1BZ7dBLEmIdBLV+XPZ
EmwnxBRYpqaRi6sHxY1RtiAQk1V2AMiNha+8y26yJoHDNqvL24447o8G5/Cx
0oax3S22zmVJ5GRVKdKd7wYwpxtjSE0HQgShzuqh1d6sHktKmyLxoZ9nY0TE
GH0mJbEMjnNShNiSRMwE6rXn4JgoOKxDn7iV7ZyaLNNDetBfiL0vvABy0yeE
mvEnfKeG/sSDEh/BpD6eDvZ7gx2uRycSn1QEyZPg1oj1+aP2AmCCJRnpVt2n
EZFghBgD7bCzRz3DawVwmLShcjasENMC/+vnrIR+DRl/xvpzZq3lMFyx/dVY
cMNz/qCniH/KSijVPAUrzW4KEAaewhh0HzzHVy3RkGScTPRWO2KtN9jhFi29
NqsSwoViNu8wCzcWvnSel0WRZPHrLL0pb/yXzgf+YIADPNk9N5BUX7JbIQbj
erh7tLs32Hl+eLQTHN7r8g4xGsRvNN1kSvtRjR/kiv/IPv/RQ/1jUpGodQKq
GEAoSTreYHA67477ozcPaewkMJCuTHIHH1O6gg1Zi6IEf1mTceDPMN0b4//6
AFhDPfqeYUjCeRYlvcHWnNCqcazfIDLorD8/1jEcDtdlmbNa99LSiIucPcRO
NTwV1+pDF/KhpNU38VvaSSj4fxj4gx1q0dYNUaPRnMlNh2D4ox06r0iUnUP8
fRe6p4jQvwtcU0ZKoLP8qorLZIwr2WA0EJLBD+XJeJAmYF6kU+8PCVqMLa1f
E2m8hRGAhIb0RjV0ITQ6ISqf0thEkTaw0iSGzbn1ckViluo3bXWjVv16VWVJ
eDknBIvatgZNS6ZnK9MVf+ESX4jP5AvxzzVs2CX9jS/Fr+yX4pF8CaT9mj/G
VPwDyWRwaMbnMwR6EUGnGYBjJeluxBYyqCvHk4f1+BN4T0j0Tr8mAXk4GQSj
nctNbtoxKQu5uuncrBvrqpoVCZBv0zdtoTrX6g12hJlJsiCAKKYBvyE5xo11
OdScIC4tm6b/ISGwL9fgbu23LqSTUqTAQJsOnPujFv5g0nn//t3FPcSgJNRl
ErAs60arH3OSkPo27GSL0/AUT4HpFERHrY+QROw4J42uTWYq1g5jNlvZ2JIH
Ban2Zj4mIXGNuI62E9djUlOqEpQkqZv//H86txEMd+wTJKUm8Z9WRRm4XEgF
dGMBNpvT3ILHa6f5nH2QfbZk1Q0hb7O37mWUwLcayvzZ1YU7TDq2i6JuwGsW
8eMruJT2Nrr+tfZKpCmbxOe3k/KGJPpAoiT1NRwPYOQsuderDIaRpEQFarpr
3t4NnAcNzP3ztmHzNtEpIhpVuLnLBBZ0lkmu31+9YAb7wxt696J5Xzh/mZkk
1pM8BCLXWdGWiCVMQmcy2wcmm1TSKwWb+VuiZAE9uBp4Y4HF7Y+qukkWy3ui
Vr7TysOa3p7+lygiu13V4wJPMwd8q2ALy1JBGTX2Vbpjts2JkALD+oPS8Lzo
XyVtbvYSkhrauj/eNdsVyZeMZJZlk3Twwo0FISXvknG2RSehs9oZHyTTp+kk
3ZvupIdHR88PDonM7OwdHKaH6dH+s/RwoiZpmuxPd589PVBpejTemw6qg/1B
Ot0bACjSiZjSd/f2nz/r82nu9wv6aPcsYTInsaMpF6sNZ5hBQ7vJEMS/FY3+
0o4Toj/Ykb/3vwzcUKAPXCcSMnaPNTCtB007bWo2+sC6M9zdfUpSKuEGyVhT
Ipp4f5jSsmbrwAHu3kA3EmHKBAy9IlmqIeJWkShHVJdGmSRv3Rdp8yUv1t/V
6cANBUat42olPsQt4P95niAzYMG3smzHxtbM5E7uZ03DdnJdcCMggXCW0lbq
Jr4sy5vvULbbajaXRXZ4hBsL33ldLpL1F15vf4HY8XGuviAXY7JBRjwedH4J
8OF1Wyc390BFnhU3g3oJpNe+VxOxsLsz2N19/nRY7+4/3T/s0wz9nZ39nf4z
/ygl3FjLhg4yOKYvR0BMnE1g+5lqw6LWDGFVhIt6NLocXl+OSD3H57EKRHk8
cOhvscJCdtYhCm6sS0dyhKLhjLqveIMd4g4/JCm0VZ0F7xBx9wY75D25hZNB
5Z3ooquBPxjAN8uB2ymWo+D1oM7gJV+INr9Iwdb3Lbgv0t3dPRLAMd1xF+KP
iaDTcU5Yz7mQG1kZ6ywpN9OsWhgXOInHwOGfP1x6GhEJBpM2bSSi83u8ft8h
9wbEi1NjcAwHDx3D3qZzODDnsNw7OlrbfUtUmJMZdCARwSE2/jKAOiZcjh6c
sKniisTHeusuw5yeTbk/do8H0MC07XdLUIij0W2xYAr9f6T6jWFGPKvGa2u0
TPvASFsdNe1kJbE+xszeH9EPCOmsJYqajoBoXyV5D+4wRiwzvGDX9hgO8UsF
OH7px5a8vn57ScpUvSQ5WrH9jKn8fQGUE8XG8O+xhAdxI6y13GNY9JRUgACj
we4u+/cRvNwgjFk7HPpeGG9fxxKT8Ftlt0m66uONor8geRLG2Fk/Wbqsio4B
AeFWp5j7hefNuHCTs4kAkzNkXckHcEp4syD009+Ij71vbD+879DoAvT50NZz
tSX8akswgBduyAg0VWOc4hgHocMBWANTteobTapfKwgLfR2g7B/RCTZnQ3MY
OOhNp4PJmza0GXSkZUVcR3P+PNp6GGclESdiL7xJ/zzOBt5YcB6ncyXC0GY8
S4jBc75nmtiz6Iu9GoexM9x5OpSw435zp5KbWuuiTeliRegQxLLQr2mV5kgC
sHnFU8R1g7BEGwrCQWn2bQTpiQq7zJNVHc/pisYGLbYG62aywy5K2bEAn07K
FW1k9+hoi1pVp3PSYpjsDfLkbjBpbxTTn2mS0p5Wn7wHhk93j0LUeFm2KUn3
DZMENt8tk5T15+pWZXkOu3AvHsFOo7JZ0ax6jCKvaZ93GVzDmujeF55MKCq7
6GzYjZng5CMoTR/nWYOopGo7Xw2jNEkKft7XqbZ1v75ZLVWfoLPGhQtMG9Ni
P2scWjAA95/t0P9IH9h7HhzMbo8mjc2k8QiTAuTZ9CST9mI9KwfiGZThWbdr
BQlhkd1gRzEIxwOMODk5vf80xuPUxd61JJIcHD3fefb0cANA4/5IX63KupwS
AM8qBSBXy9rZ+BGEiAyDLfyTcwRoSbDA1hvQtywmeTadqu1LnmVfF+Wk5CVr
VE2KgjRTmCEXIl/2aS9ATGJ+zOhqBAZykGQf6+vvHjx9erh/tPt0f8Mmj81s
JHCKtApr8QdvNgQGnnLI5THvdiQk7pokyu33R8CcKbfBLgYH48GZ/GXOUccb
EiUCR8O0WcpfRiLa3d15xv8Y7D87OliTjYr42NPnDAzqrZwXM2TsWEFg666u
SaWjBXbkZDNi94EUiY/JrGDM3NlgCcRWJrdlSsxzMON4ktsSZl9JHZLEs6XN
3GqXeZlMEKywcwSSPVFqKVZp53ZKEEakPV8uym1vTY46o3e1wdnPEgGob1AX
TQq8CWegeyP6NlPsGMdb8d//9t/xyKxiwdPlPfMpi6xwT5ICJEs5qI5o6Q3a
gDn2SnP27f2SZb0iFZFYnY4F5Khx55MlYMlyWPDVUpv2Pf9f17JxxQ9z5unG
c9sOKHNWq2S5HXDxBgP+dUqMETY+2uoGLXajEkti4JLmYiV2h+H/6PDZweHB
pyCE+mJWuNDfX2vG+ICQsmpiVufvBeEf3qi9KLZnmACwLcrOrzXpHeh/EfXT
E69ZonRMXYJcrGWlSEhgcnZFZEwnj63v/8eaE4jvVfWYiIcBbYG+84bk5Sa5
R7n915rjjow57ka+u+0cLvK8XSD2QpLhPZ3vrXBj2vtb1CMAN3uZpEj+hZPo
/Dap7wPt0VwRQIzpHszOOxYhfzQg7R+Jh6h7bFxw03dThtl1f1PAJe/9Myv6
4yqbzOCKK03OrN7/Gzzg/zMrfgSxOpEXSMwu75E7rrOFrLODtG4ssDsRnaqb
ZDq9X+aoFEL+68DuxOrczuFw5wBSyCKBVEyKndJpCyZxNZv8/Obkw/nRwf7O
0Su8s3O4cxAgd4HoWn65Z1JPzSTxmG4C+SEQlggGiqRuVjFhw/bb1WG8Zl8d
vh0MB3f7Wi0bncu7JcdxPbWa/hrq9z7dDj4dX//b3tPrwOwmP8a39SA+vv73
623IaZ1d62z49WeVL26zmwcyVLKsRooKJ6jP9SufxkQq4BjqYtiJHheuSbSm
vNXGo6ZMyzx+P562tei+W8/5vMpu7OL8U0YYhj8cmgy02/gBomqc1wxw8PSI
/DCT6ju+Smye9LLy+vW8vEuTmqs0bP/VesrTHHKjsXyuCRyeSDDSrwIbtScc
DMR7m65yvtJRlZyyK3YGhCLCBEGsE7orATyq0WxNyjWntE6qP7KMtIUEBfIl
bYOo7c7BYOfg4NntmgsJwSzWI3tiHIjXOolh04VfkQSdE/GVJXSspt5gQF58
LrqzRa1tEC9ZNFMAJV84nTLHMa0kqLVc0Jk3/TGpTPJkv5kTpDac+L7zbHdn
b7e7M2IIJ/w2WCneJlZxYt8n4ca8/yu5ZXdL2yxfRCpmYNNT4tKOCzDF/JwU
JiWINTBUimGbBXadNX0SiJYK2YT4e4ZUQ3bj4SfE093Nib7hjzu6DU4W6of1
ZV5lzet2HOu5rf0v7sc0IemvsflAjwfopGbIQBRfYdaI0s9fwcP4ihDfdqt6
uOWs9jm5rk6m9/j5OuC6v7s3OHy2f7QOri6z9IJVCpHmtTh7VsFuUxZhZtht
liDwfXhxFY+4hpjULtjOOT+Uq0SvuCMkeoOhPKCS2/tUJKmqklW8Q8S/GF2v
QnIlie2fhc0Nikld76zZw92mX9IE0E5Or/Se13fRDRVlU1Ctl+jv593AH1wL
jEKIE1cQ6JyBN/hPZEOwDvSO1q/SezgtXV89UOmQ9tv/MLr+dGEOKhAT5cc4
/HEDfBb7zd5gP11nrSM6I1XcQ5n8BCboW9BfWIt9hoQ1+qUvQRpsWeknS0ur
iNazoVr0MzZPMYGERhAwl/OXLznRt9bWmTuiDPHx1QtDt0Cd9WSxngwoayeT
F2CJMs69+9Ie6VHZc0fg9QbtRXFQQ1lclnNSRost+Wv3HtJzZHpN09SULJkl
9L3Gp+d9Q9BNBIt/Ni9PT+MPXHnkWN60ZwKbNFHza03NT/yXN238JayXbi/+
5l8Ouj8E6W0oq6dWD2yeoBXlADl5MZSQ95492999qq3WVbbg3CrvD6bxk4J4
XJLOVX9ZZoQvgBvMV68lOYKzQdnjp2P7dMxPbzdRlGO9j46JwhsMZIy/LLLP
6q6+ye4R0sDParryJNUVP4ztBv8mMYEtLEPEEmb1vL/BsMOsi4CCTX9WoDeo
Le9tMuhwbSjoyBwSep8icI4UMruXjoQajgfbP355td2/yQZYnVyZSdKUtmMQ
j629JGcIMxznJHVl1CRf0S0TonIVCS81msv94Hv9QIoRpv06cVZNexgnZm5T
zI3mjk95bpJ6YPbJqvj9XeGlTCN2djv/fnm14RSIqfdHF69O3799u0XWZEHd
c/FyrDiRgCm8DMYKklaG50F8Gv7U5qvh3v7us/2dZ33+9+4ar4fd6rTMc6TF
E5M/S2Cclti2dXAYrxglHmQC9wl0OQIh72FHJclL8ECgeoYR5HbZjkmo2ySL
pSREQDwDNHMdtf6sySdC+QKWTmu9Nm/YAj/0lq5oNru+PBOqtxWu36hiUiV6
1T5Yvxn4g6EtF/pl/6wcfa9mu1Y07EwVWZKj3gXxGkT4foKNJL35d9rMb6SM
GEnih4fP9w6DKg/yHm5vJO+hzg29txUat6jCTzW/3qo6GmI8TuEYYaSckgRO
athQcQIZqg7cTYjfM5Ii2WWovqQ512Cwv0F/Zg2x39706yWSWWSfhLfWcEcy
OqIO636xt7v/NEDbkcwTn9E8rC7GP7+JR5hH71tNHCj2CL95ogeEOZSD0pv3
7/vtwB/sCHLa6HleL0vCyyArEgKtP9z9WEMgeQcM7H7NDnUyFXJCD5glVXGX
6DBDP1HBHw/jLM4/XIO33hNjQdDMADnPauQLpKT8J1Ldj450eHoMb+nT/t7u
IJ0uOsJhPPrzu/hlXpYTa+mgsWVZTtm9fz8UYmmhOADrxZsquW3q8jbZroBr
D/6irNPyzhU5YGedkQs4eULAqkaZmapdNv1yyVfC3i9j/hoePCP8PVoTBE69
CRA0ggni93aCH1Eh6gH7/p/VDZcdISZjd+Xf3J8HnfGAZP4R1QAKFGq5x9XF
AcADn3hudAkRKSXGIE/zrzVXTxXHQH/n+XqKI80YH/PzHKSI5+LnPeOt0dkE
NQdtwqWtr5pNqG21gNvMnVX8dnOMuauAUTXedjuKVOeHgOa+rzL2hdxjViVA
yYq/tllFUgTOx/wh4LK39/zZwf7+8Gu2GCfjO+VMq/OMy6iADBnGM5mUhlQF
DOcv+mVnUqWXwTX1y1KClDhDnGzFCC1PzZJCNtWRpdxYoBy/bQtI6w859xuY
GlDQgSWpQXvjDMtHQ2NV/sRFqD6ZPdSfsN1Pd2r8aWOugbEnF27X9ZKIKNco
s+HyQ952mifZPW5gWL3cVjpWr3A82P0ZadJqi2rJGi7xKPHk85aJwElcFCl5
MCYOCfGf7u0/H9RNQNd+aosmoT9mc8KiOl5w8c06rdTd1h3Ywt1YUYeiu7FA
73utkhSuis2GjS0iEVy7z0QQ5ij/WsqHWZH4S1Z8zhKOx5kBiKXgDcFOGJ8k
gu8IE0jpMCv1ZUX8Jz0H4TfmiI+5tM0HO8dGs44aE62bm011OKE/GhgpTsu7
bBt1k5RBDsYeFCQWzJhHLRTUn1k95KHD3SFq45mqjfXwulX1JFkNL6/7Mjcn
Ov3b3s4lrDE1/QcJvvRPs98u3ePHY3k4sHRt3flP2UK24e+Zgxfusg0ECy7f
utwWw30fuu4hIG3vaMhJY59sya9xTgSlbMOaaCM8E5+2XDbTk+k5VoXAMVdc
irItsgccEBeo7aLX7G/wYhCMhoUsdXDN+Puia6QYuI5XBFzvHewfPQ3r5Aq8
qgWy3Ohe7sp4ATs5AecCkTdADhM9VMc1Oyg11iarbdIHLXOdopwSUVu0D1DT
YllZe3M9pMuiBfXvkpUNvqRb2jt49nxv53BnH+UrF6TKFk1f6aQ7WGJmMxSi
4hoGKqjvd2Uedzl6J/J4fOw/vlFrkUoaE3VrNtJRXfzRYN/HV/dD5LydQqJr
ygI5VKak1B6ECtpiDbZW9cdqrmqwTaQbfCo+7e3t7+/uHa5JViN+PD7Rj/di
U9RRb7QXfySV/IQUCwXKhADSumRppKwmomnjmJAZ22z0pYgyWqNSLQeccAn4
dUB9XS6JRdXbpatKJZM7lN4zG97Fbun/pz7y1J+0H4CQ8lOejVfJp4ZEaeKc
6gZD7G4NhKsA97RnSNwIl3i9F/8hoZVkaxcPtT2DuVnd4GFdgfl6RcdX3FPq
8rQl8Upv1geI00EwGtCpVzo69n5FsBtGK7XFOII2WVZcS0tHBxqQ/5wQ8SHJ
E/EKIeuqWhTJrPt/zYr+13k2b7MuBYBQqeeJZZ64Rd+J2M4G8fNHm8GmZ/xx
G4TABvIqaXn564rTSQV16G47KXhYvHj2fP/pwU5XvGBi9mPtMu1+JB24iEkr
Bvn6+9/++4NShl5aR87wRwPkfpmg+cGvq47G5FMMzLVakpgsQge0LjZgLLh6
MiEjsZRltU6rP5e0LNTDa6tpfJds93iSGJnd6CV2NuQNBgbjV1Lo6R77RFj5
7gBmpJ2DIQoYQuEDUU2QJs0uBPQsKdZo1LV5psd+IX5o6x5ekwRcYFn+Bl4P
7EgAV28J4Mp0/q/V6SaqyDyFbj3LS1Q5thQxHSlNdH4YjGclBRvl+GDWV6Nu
kfkxMBvzz2A06Ix3PWG0JGk4sxYzFgwHpOn45buLB8J3kylRV1RUZWCtbXFy
jhirVZbrAsVT9Dgajk77PEz/zQGz5bR/9m7UHycwJNtWQ7ZqytrZioXYhI7x
8uKR+QBKlZMGg84up95HdJ8K+Yg79un2Y7eGZJp+HcfZstnnvhv3Z8d+T8+N
ncOnW3puxPTTC27v4RpAEM29WBDNkxrtujqEC3eAi5hLqXvtKCTH5l/VeCJ+
jAU9WWfwZ1Dcd4+ONjuOU5jSlaq+DFCoeqmrf8FmSeBiA2J+Nymz3yJyEv9v
f2+wv7+zx/bYSi1/S/+3y380q6X6bfe80PanQkVMNTHH0j/h+0YCrEsowv7M
cYkDiigfFz26aOJX5YPFGJDpwHvtMHc71H08679uJS0lfOP1wI51si65xvR6
joUd6n6hLfqXKqM77y7qcuAGbZoCVMFrtAG7S263Je5o+N0fNOZBJu8Iukeh
i+Fz9XQ4z5fDah8F+QWWdwW+PwlWrdczlSt4wbV51Bco+1zVUizakpjBKZ3G
mLG9pYhZUwiDXDW8XM7L+qFi0PwQb4i4UktY2C5BUxDTeEdyzkyBTpBqcfj8
6eEgqZdf/H38zKSySaRGpHwwBLFt65ZnNyx6jmzrexY9T/JBVpCSyWWrk7xP
CLez92x3z5LaQKuGzxz0MF/pkCFdEUmTPznl7asNoetj8pXgHYZ5XqUPXx8H
4XAniXWejTk553Re5uqr/+L1wB/sVq9sSsjZr0rEe3Rz0PzR8L2LOhmrHKr2
nCQzeyZOgw7Hgwv4MHq5pcq+s4rUA9NXi7M2++IuXs6X+7/LJp+0Hfy3u4dg
EN5lXOtcrzxGdcJObFL6YIiz6201Sgr01SLClqmqk+LJBfN1JZgHYP97Y7sP
9b+kPl9/IZN/RwpHwuVz/v63/yFB3afIjCn+/rf/+QCY/UMlbv7BkKBfXxnn
u+KowlfOktsMeb7TTIUOpLNBMPovKMFTwW0ehEIcD+zI/yfVd/6Z4rKAZX1A
98DyUjX1agGXR7swqbiHxi+/s/9Jz7AWJqx5C1Kz2JvSxIF1IUYcZjubm0LL
U0a4B4nkP3bZCN+bxZdrVT4vN9Zi+FAS6V51Mr5h7rVj3XovVboiJJh1A4QQ
2+qN/rN3JTlr/Q/XJy+35HgKd/Wb6XCNM+4aRYLsMK8+qXayTH63lFT/36JK
H2eB+Vc3Mlm8i/KWuwmgb0yjbRKoIuvXykYfF1Rf5VZA24irrLxH+kA6WN/X
2dvLq/7hPVa6ySJfMuhJTy/0klNDswYCsRXMISqfemFiy5VUrhQPjdZ5EOpm
FE5/w1d2KpTj5Km8uDE9FYK1aapYJN1SSowZ+Xfbxs+yWdagKRNbbS/prDZ1
Z2Oh/g2dX75d/Zt8GZDErhvJZS8guR8+e3Y0/Mv+84M/7L8N5L/3S3h4Oelf
Sd369y1qXDUofskhzugipCYcIuMVVyPeYvuuWKXGNXu8qrKyit+VxIDv6an0
hqTWQnbjw/WbgTcWJq0SyH5dqJW6TzDb3Iamlmq66tPYzsFxNV6oGP7MEYpB
KlEBxyd6NKA6QDnu1LcMU6Hix/j7kt58Eh+TUEBvI0Dqw8XVeXyMKe6JldSr
8nbW4TCdHwJs+Kgr/NwTVorqEWkl1SO+cnnsv3JVHNQHefbJbf5Tky7XtF1A
ONTORuG+6TZRgAnMjQC8BEijJg7665zfJiJ449lpm28KoXqw2O931eKOg3f+
1cXBw9k5fX7Vkoqwplfaoc4r/3jB76DKl77Y+xqHbrtYhHjv7XwiPrzpRkd/
fnt9eoXqpm14YVvSXSVO2NVLyeADXiYFMTH8N+jBBqv7P3+xozmquM26OcQj
l0P8/19I6Ez0Rt0iVp6rXgfrfeMNdd655vbKZzCIJ23w0rU/FnSyuszuISUT
yFIDEuyn00JblQnY6qHUTEb/JdCTNXCjn//+t/+bn+jFj4snMWgHDVZobsjN
IL9AWqSLfrw5S+qJ1xQyuS2zic7OXaBNkVGoHwLAlwRk0wSeJf8kXg7MQOfw
jsckAsQfkq/JbE6gngTmXAjxnV+6gj96wbwlDeg2IwZ3M7/pFiH3BrtfruAC
PL6ZJ7f073cZMdi48zIPbnpXpN1TfUMdcTcY7ryo862S+FUW1uQhkdQOdReK
8llvszovw1Cl40EwGtC0E4n02FbvEzl3twmTtcWEyZrWG+SHT2la765lrjx6
xT8SPbst89tOexCdn0s0DvA3yx4uMC2odtKJ3ngzcEOdc3ilkDATvyblJNT1
Xg38wc5bf8qSkklNQEv+NPDG1i9XxZdYXedi3VhQDVSf9Tb+sfWslfDxftD+
R8r8bSiQ4DfhMxLAafDmGd5keQHZjLYgFZzdUtDXZIKK4etffj9/RsHEl8mX
DlswI53ZV7kiDV3VqjO7G+tM/1NSV8nn9YqwPwUVYf/hqySyHHt3uSGYZMtl
ljXcPBxJYio3oX39kP8RXOK5ob9c+M31ZtAVm+Cj9TAKLR5G7y7+5deUkVYG
bdR/PBj7nl46YSOd8AOXZZvV/deqqDLSr6qsCAQFtFBxgxvp6ndYEToU8tf0
k1izW/wKCImIHy10YsHePV1z6YIrRWLjQnw80G+HRZbCUpeGrV7MfB8/ftxb
S5p4ZKIQPnJRDFIP7jKkv86BI7+jq+fyRl5/BV3Oa0s1jQcrqCd0p4iz5VyG
rnXLH+2cP8oiQcj4qLKCdrMmd/rDnePPyllJqntVJZOky0iD4c4n38lpik27
CW/v3SActhe4yy1lEfyS33OBk3yQpAuj0UspzoPD4f7Bs/2nOwcD+vfB4dOw
i4DruPOHP7xNMhTwSKwcr0hlz/3msdvL93U72qAT2sosuUP0/NE1DETDng9t
KMJeDtxQcCSG6G05j60M7K4sm73d/p1KlmXB9ow+yVJZrj2nmzVcoXBQcd+u
9B8vYKg2U/gk8KKYkoDXVK3USoEMe+x9wASB/8tJ5BWxzOQ2PiGgTiZ3yeeO
oBaOdy3r/3u5VHBf38+k5MLg0NhAZc4RUGHaX7zGYhKuRtkuSdb7giZOlkWx
IHFWEgVT2ovmV3DJJpNcjcsv/zuEv2RcoVPjO4KwABNeDbyxf1bG+LU3MSIq
/jm5B3dqIu+kYEgHHvEzEfEvJk1e97fcxgl+v74cveiICDQUuC/T7zb2jGQR
erX+zpAm7AY7h/Ehmbc5190k7vJZBYf4YdD9ITiX83yhClpNfR+j7NBZLhZg
ae3zZ4eHewP8+/n+0+B8OsW8g7IcXCr1+mq4H8NYEv/h54vTByExaYhXFN6S
O8DS+aFzSCfEElGYf5TOWxV2NTwZBKNdk0W2QLPSE1LAy86VuLGusy+v4+M6
natiTDQxQB3ied1f7rmRe+J1EAaGdObBtC0mOsWp/9c2I5KTl+UNuoTjr06F
1vgPeMKaKHHwv8Ia+WvvwO4M9nlSm5PJFgjThnkDVnuHR892nwXe6bCfos04
/V7W8md095Ql+Ev+88Ab29T7TFVfu4LS8SAcDoP4jt992JLniUsj+baqtRNw
j0OkidIg7D9HBzN0Mb9D5FKFLEj0vG+XXEqzKlv209hmz8HJXPIU0gSNY/hk
DmRAIvf+Z+LPDXqe8hw2euqhEzueNskYxTsm2V/brrUmGA5vWXxse1ubbiAK
v60HaV62E9/RlhUpV0Ef8i99ndePTKHd5+h74e9YF588xZMoaKGfhHuM54h/
4Hce2KK3p/Ai5WNRrG4qjyyuJ+5O2hSC46ylC8ASbC8RQsXlkk4hJbaCQOaq
HOopZAPvbyUHFnQQpY4VNEquBN+vuVrK6Pgt0aSkKGzwVuAnMdtw1aBSJN2l
ZZUbtmETxMJxn9b0+/04Gddo49FEEUeQmyCdeEJvVdkYyS42LGQh7S7qRa0z
LiQ0Xd+ULzg3aM6HTBV4vySCJIK+w2HgKJjBIqLrnEJi5mKZZJUpMcNOEm37
HCDYjbPEmjJeoBiOtOUkOamH13JmKfwX1HUpl+xHrC61OYVWgoCwSIdjLuFv
rRokByvpzkrbwQzeNjmrH0u1JQMiVYgbNJb4WqkHYgtcD+I4PMcFF0woyrhu
ZzNVm4qoETrOkQrd0rGa9cWpbgQrGqdsh+ZaEtfMV/5XkrwXIUi8mGDJiKau
lA6JGXS+jzYDsXZWm0BUU3f7vJgjR5Of4wakdU074j8JaMSHjRbDy/jx1fnx
h1dPjNp68eH65UDgZ8GiZBRFqJjOXwFR/vYDA/0v0W+9/0WR30ii1mWOkCZI
clPDZcBpqSYzlNa6LO/onOkjdYtmg7STyLXM6sE/TNf0lU+kxzDkzpRfWiIF
DKWEg7iJiIEza+xx032MNTdJxnCyk9awmLZ5L64R+IfGar0YZa8bYEG+oqNP
UfwEB4qPpqhqWnAbh2/fPl71z9SULVO//IKSAPD8zuYGOQQzVDFDUQXasBdW
tWhrQjsClNJGdrC3voeUpoxozwqbjErkgBGMJoCQJrhrklO5cnIOOpVz/K1F
3qgL1QS3STrP1K3agMCDX0kOeFce/mvUjxLXBOcfQ324jaNv3z68PH327PDg
l1/45SSeZDVttdZwYl9zfa2K0NgSNag2jGdBMGx+Dfd5sClwCJ6D8ZbQrRdX
CZ8zbQzwKSgfOZTXMRD8IV2SoQbqceEuAtScbjGJZ1V5hwWwPYy+ThMkE7Ug
Yl0bo693aGnQuPtxrRQfnLQGjXXYHmb59i3oMP7LL096rmI8eqDeccv2O5ST
VzexIZtERUjbpEVjlRH2bimPpahCczyiOgiwNlwi7zLTEd5YakqszxwyT5AY
VE78jS5EE5BaZ0CDNG8nSMwrbP8xAoCJKqdTLnxPC09Mb0wmBfgO/0LX8Lkt
PKesQt1vH0S5n4fprkJgP1Z5ebcG3nMiLghvMMG+hBQeiGGd+hY8AvhPkFGZ
UCeomqMrQG1a3S+I0GmGV5j5cde2hjvbntN3DTXX7IF/ijnKN6kmEh0Uobp2
prM3vv3A0B8Q4yj6qCxSg94ozlG3ypnFCndtL2IsmF5YMsGNwpY1mluZylia
Eyl3xBxBhdQf+dgi+UzErNYZ5T25OCar6J0hDs0yhuIlTKt26xtw2p5ZCB1B
pNk5I+d4pcHfUNwJmokhc5LG6VgRkM9bXHAFBgKSBg4pkrfbfGIrzqvBbNCL
tdeVe8Asy6ooZ1WypMltb1YwJUR11VkF1jGILsI+Plkd37s284EYoQV4LTJN
gkpbUsxBr/RjHCtbXtAST9QT5CVHE5pHu4Nps7TOJWrLm9PHD49q9eURM9uC
dXAkYSMurWRq1zCRW1oSbHkRd5/4cBlzVLr6MlBfEmB5jF6SeXYDfsOLi/zz
iAWQNEQ8eBwMPqmaqIhx2w92BHQR/N1KUU9Hh/lNOgpzmzyrLWimHwyYjMa2
QkDPXLUlWVLu2PHNusxbXkGaLLEnpm9ebyA+wjkfIX+IzkioKLDZfHAV4ZjQ
U1lhsXfzMgd/JgoMsg6hgvYui80YjohAWSIWQDuQmUuYyVgoYXno3UGR4Nxp
B9NsJotDWNqdx72JTwMPcKN0vpG0Kfj27VWeFLcot8HJgpBsXkk12JykEvNq
MpsR4+e4KK/lyyMzDQMd/1eeEf3ucSQkDGWaMUMkIkJMuE4fNKrXL7+waAe5
oVJJ3kf+Hh13y16DlPDP0lowUx1L+O2bTfDBUkclvWOL0Gtpp2bI1YyPxaEF
ARIea3lbEdi6AoIvy0xTRd0ah5Z3qVZjrkPDHxC+j/mEJRL90iKGCJu6rrI5
J2wG4XNsHedtLBJOh43ZCsAww7ePsFFwe9OyDt+6IBgCuqOWRlold7mRd+6b
IxFBmxg1WFtluBLBcWJYmppOkasGdUZDtxVy6IMLNYnoKOiIEg25KVekTAV4
tcQskhFhWgGtih8iJFjo/jU1XUP0GTc3Ma0hvn0bXZy908IymLI5R6LSImwT
Lk6J71qqbeHHsoMXxr3W05HQEZTinhVuGH4sP7O+9ccXV8SIJxOoCAProcNB
6nhqzBJZiZKrsC7zhKgYmAgdmNcGic78VuWGlIAi/MbJVpYYlVOkrZdp2lam
9zcqNurKktDXvR7g9hISSKlj0rLoXTPnb6KLKyfsNtyqnd7x1ijT01N6h9KL
6uLq9mBI/3hqCNYgYtywCAzoBXQKtYB4kiqRUiuwD9enhb6mWFtirIkY86VQ
nkNwul3fCUvCO1gMMzBGtSXYsrwE2S0y4Pbtm+/6A8wzZPj6BqsQbZYzp2uX
WkDwPn1L6tLAukpSgn3Soun1mgRfSMjc24oJ1YTUrmoVPzJf1zj+KDYJZL1I
mFSO6p/mpES5sEyS5xxXZUISBKJquEAWE/5N9LRnFdoZnU+u1SAnYKz4CDj6
GgkzgvV6j1xZuxfJH2YXRgNBFSG1WDIWm3V8JdRGPCI9tMj6HIiuFd1ISzFY
CLTBnCRjPlmSmpN+k8wsiMHeR0poUoHa866atvAIsr06R5glY6cW5YMvKKs8
ag0biLdIxu0oUMMN9YECQkpko080aZg+MACxuMD1D0RLMBKOEaac0m5uNXJ0
ZQ4PEjxmtUxdVoFBQX8LlIAh38HWgF1tSxQJNJoL0OWtTKWTpTVUSV8Uxwu9
nGrjW+75b0anpMQZ1eiizhPoiq/abJKw+CTNN0XUtptkmmtC7OmRlxU//O3b
6+Oz91cX2hQRcawgmhGJLHD+s9i1NIHuJiQQ6irdZJgps8lSzZMVPTz1W95J
9yJe0y1RrZLTHTK+HoKEptU63drxluj4VVmW72aiR3mirrSLUghGYugZyTFh
xCjwHHMeFoVZFQS7IQLLhX2hQ5S5qqQkmae/iy0Iyh8sSpVKFZEjFqx5cRNN
SFOXsNtzur/Xoy4wBATiSyjLdfQDLc1lky1yHIty0ZUVQEyRtW8/LMv0Fxjg
wv+xGa6ruDFfqDVjgNyf5yx32ta0WiKKmnLJsMlK5yJZ4VCdLWBiJAVjLsoa
zvN4DK4X0x3R9vKyXEagzcTS5kmbP+mZwuD2bNi+zbKUL97LJJBp5tDtexE7
AWLujWAkayeO5BlTNCPJ0Vf00hLk0xOdEumNv6fSsi/ESH/EY++aSvHkMAXz
vRA3Y1N71nDqAgBXS0jFpK/btfImZDpRpKxVeKLw2chaLON6QUe9RKHIHmHW
ks4YU5LceaP/0/CZWH1B3RpJjcH7kcxVPyE16rjATZCABvtNwoICW0hplwlz
UGfz0EpUoByTsgP23LCOVmnboP0wLQLlKvm/TXlr0QHnlgzzNKkNCQlIry8A
E+PNyrYmSJjxalhvm69q1qVEkkYZBSNJG34KaDO2wWADjun3NLklfAQTYqUU
to+cWFPDEjzzJpoCjAxcK4r+i1e3V3ftfBFfOHOU4QtCE6G6cOprBt6UxFIq
rRfFwvNAazTf93RcT1EWUkJ/kzAodkdMQwdAShZNorFNZoWaqgW/usi4hpKc
FYTwRVZVUjpYy5rGdEezqC84kJnSasnAd7Hz05nWWHyFJYPozj5ZRCqJFpBY
WSc3avEUEgAIsceyxoRksIyZ46A5TOFcAIDZlTnnHslljUBI8ClPZaYZLPm1
Z2U+g7nEhQMinrnvdtQ4msTQIdHhaqe6xVZ1YzHBrSOdlzdKq3O0CZrjQd0u
gCFTRPfKkKUX9/wGdKAvTDn7jzPcnZtp7bOMQgiLZrEEhzAm/Xqa8fmOFU5I
EaJjkgL8miFvvHKA3O/HrF/gi4ncqKQbYi5f6Uo4PrE0CW5ONvLNtFGs6RpU
2XrZNvw9wg18h7krU9vJJNNzmNIIIqCRnDJCVWtgjFVkHOxrspAFveE0Ggme
gEWJyMiwIKZEWdqPInzr9DxPJ8DHxlr/wdVKgzlaCBcacY4jmIVhK20gRZR3
sHoT7rCWeFvmqPBYrYZpCd32li0ZORdm0ZDgRJoXYgBuOoKOofxpWREua1ce
LQfdQYnQ9MJeeWkyVbJ0pn6bNgaL7jWL+95mmWynKYfyi5psCIWkmuIM6T23
a2vZBHrie6zrdRg8kau5ypfGMcRQYLdG5zYrE+zAbHFa1qZQiRiy0pZ4rxgJ
QPMQhhIzxcizKYOrHII0l6xQQgmFrpcwiwm9YhVKgSemmWpgZwg3wQvgmzDV
ZGzTZhyajgSIH5+evXvyIqZ/1tYFkqKm+bJ20g5RdS3vANZJq1VaO+XYCcgz
jeV+cSqZfVCynTDzIwJeLYASzasQEaCtrZq8FTXruCxW01i6Mh4WIhP05F/b
BAGSAvV6WoF2Wrz7juXCsdA2OLtlhRPSXLG2R2ZtLIUw3dQb7cOvQMKH4AfT
vDtVwVqzTvycqxsmeVYxxDgpRJ4/KTwAwiitEPX1UcqaVSinQYJWqSp0B/Ct
OSkL+XNGyqILOyZRC29eccx1/w3x2zColB66enNRP0EEhP+qZrt1S5dVrUi+
0jZ6zQjSFlI8vV6S/q8slQBygGvwYuimuhyT2OpxOLdbOesl2tREBLvMmdpj
8deXo6HE/D3GcSEAjtbMMuQHTfmGlywoe9VDP3BBTz7Axx8uPtA5eJ9F0I5C
jd9ZJpTS7N2oUY8/vKejY2COT15dacJujB5jlqhSQW2ZsSpna9sRTRdQKFcI
TQrVJgE22UANesxqtFjlaxZWhGR7kHZqg2yEak7XNaRd/5DelqWYvGmptFIl
527WIhTK7aBSt8TAg8VrzIP8mKtE3NoTIEgCbwDORYtnOoQqlmsKhUxhsLxB
KHhwMRNFgAP4LuP4U1augTIl34SW4BtzJxZ6rD2IZqr1tK0YW2JtHNVKj2hi
GkDBWRk/tBCBGCvPuqjJgKcNGV4HoxsAvMcyFftOePkcOEDwr1XxiXOVOLuB
IVKlLknAawazGa19zklWU9EhoQ9nt0qbd76QBP5VCcNm+sI9oiBZtKRFw7oA
nV2Lt+Y3sykUK0ZJrdqum/mFiRyftMotnmFODNVy5UTcF/GiZetczeavSmzc
LLPD6me+x+KXVh/M1ntCvI2DwejDvAlLi82ViGRGW69A3IpZDvU4hUg6ZYy2
xBRX4Vbr3Mhg/SiBTaJNUmtNJRV/r/cQeybBQIFFC5HS9EFDQvC1eogTuC+P
G9ZSoeB9oHNvVrlJRcvghi1WEJkaCPxCCXCDIMK1dDbqS9s/cBoDMcbAY4Mq
zIdAN+jqGMMhJEKMc5zLRGfBfQeLXh3wXc5jFbTk2nyk3zsomJYiyFoDAfZ9
UXgeJ20QRYO/DIJdkjq7TMWlKZVITSicVYiAJrtZlCbkCpOero3qlm309rjU
srk1LoBS+G4AWMdYxBKdcV1mg9GazbOiSJIsBX0PixRPmx9XYjqcN/MW0H5j
k3x17kbuY4arBpNxZJIhDcZ4YUzFEmvFxOaKyyiix4vSRMe3l2sZeSO1HxvR
ED2MJuYTYq4QX4gmy4irYBAjCCeyTJyWLXyw1uj234AeQh990YgDqBUbCPxI
ExGatc4CAy+bbUCXBRJ1WMDj94BxlB/pQWJJYB6RHeqlsXauGJbZ4xBv2R04
UVwnuoc7q9T2V4SNQF9PW75IXgQqUsGhqnREFkiTmMgKopi30LdAWUhMY3FU
BzcYm3Ts69s9VKYWOcwKyQgWwg57lqAKzdJBmMQEn4iOQCO2vTbICNfz1lYk
In9Eu6uxQ5YpCJmcO3Ae1bLVwjBUu19fV9AwMYE4EGoGCZeoBZJL8iuBBFoY
+VoXEUz7vqgIHn0jgDxumF4w+HRNkzHpIxVclitt49moASKuLXKcbpORhu1s
dW15AmMzx9Ba1VdlHPkleATZ14RfBKEeFlPFQIx5vDiNyITW6IAjYzIphM8k
QfxbTQQG/2l3YhQstrmVBd8d7tqLYAL86HAIF92g4yIYNrQiqB3Q4vtluUYb
SI26YNRCZ7AMKUUvojvi5qkaaHS4VY3YjlDKoyvbdOQEQBE7PTc4TnuiIsHo
xas21y1uBmNauopqxPg7f554UjX7LJgr6K/1JHzSC3az0b8R/KTapSDUV0za
dIwwjRgLRy2Rd9++Icq7T8f4yy9sK7ID9fKXX54MUPw31jEwPQhy7RhSJ5sM
OJJhwf4YDrzLaBXonJdEN0EiKDJe7+CcY3LFHbcEkHgCEBp2vPunSp+KNHiD
yIjrw7rEdZAHS20sC5Dm6HzA8ET4YuUlH/K3H+g+xK+z0aFw7ZtUsU0Ts+XC
x7xIaoZzG7unZQ5SGLVZtRPvY6ypkmvtlqbdTEFc9XmSziP3eRM1yKHoGfcm
MtdhV6YRs1ZmFWNFQlxWam1tiuIiqvJip6Pohx9+kIieD9qQooOj1vw2Fjro
TAs/CMgFuiWkL7NWQDgP3cG3qk5dfFcnkM6LGX4EUeeRid4pC1+gl5BSF8UV
GcuPXsVjfIFTrHYHu3wtDF9PejbsS8dG6olq7SOA74TVW3puBQPsLJLlI22J
qUQvfiSvPuJp9SJZCaRVogUDT6nJ8UJCQgVf6arHyBpp4CHwoo3jY2uPp9Wx
PdxRbMI9LxjCqi++G+cx1vBEC02tDhtB4Jv++dX5dTTE30+MCK65XEdPtREz
OA8zk8TXicBgqZU55s4EmnQQjKLS/4QIhQ5YZkM0cVji35GcHsJdDKK8sOC2
Hj/oxaLBoEEr4MAAmhZt1TrAYy5V4rFFSdR2Y9/OpwmxcYnAYwc7qZXclPMH
FUpNdA6EloOkoHXWXWiU0pEsJfItqVdoupqkDKw9I7xmHEeu2cMdk652MtPd
R+oU5e84UAkoRKIKoYIYU7gNMiEozDshcTdAL1I+IkcR4MHgx5zAxPyJydpe
3sO3Rvux+BAbVBo5x7dHutnPzAoNNBeObGYJmoAluxUpY6JgHyeKzBGTomrp
DMj7Cc0gCtgMkCstnRxMDE2rncjkKVgmq1p9yeCKYixk37/2XNKDKUekmPOE
cGosHXGpW88LLmvUNqBeRIk58F6gWDfzO1h/g5AzY1RqIFboSoDhfLdJ3rLg
d24JuAmseMFFUWxmTtWxOnkiHyvlU84vUmB7WvT16PGQo1aDyguskaQmqKQX
W79idJKQYk9v1UTlTpI54RqJKDpM46IgrbSnIzBMj6tefEWwjeDrXvwBKnzS
i0YJTYaKR2P8Pipbgr03hP/0x/UcmlsxEYUGjVbViiSLP6rqhnbOBdpJ3Pj2
7R29y5UM+a/jaiX9NvYQCnRqA+/kuGHCNsqtEFoT6gQ5PTK89ts3rhirZx0Y
n0K6ZTYYG0jUKBdjY+TqAuzFuo3v2mKYQHM3HNrqvY6MI1xWF7ONQQmI/mCm
n0TsbSIMeOH72sLtgsJ1MHxtIgCIVkBW8/dKW+fpuDWEBGR4bF6IxhY+7xg9
SX1R9HGe6XT6B+QDIlAcUyRr8hh/pKUDF03Bsxk6xnFkGlMRIMPo23OkrUO4
Wonrc2JFzSlfhX0BipoxWLCZJXKTW6a6QasJmdOxOGO/Y+OinXmBpybVyH6M
5/C1MXDjPhtlSL0FC+lpap6zZpivIrATnsNwMI/4smOeA8JoNTiPXAeW6/rs
irv+RvKXJnm1cV7LEbFxmgZtSCSLvPZnLczY4F7+ALxkEOk4XMELBvfCigor
kRl+RKLHoxFfxCNDg4U1j5UP4iINs0zXOetNGReP/pglLCKSeqxYQBTWSAiu
p9D72Ew/C4AOaHiuGq1ZV/TBwrQ7j4xZ6Y5BH09IcIKauPwEY+nW8eVq8htn
BmGjeqR5pDkcmdKEEbBNUIcbGavWhMtoCROhZyIXeSL2XQ6YF4eC5e+b4XgT
d7kouM9cD2RmRhS8crRHTuHnImNtruFwvnfqLnqrvmQp1kV6RN2IPdSsblsZ
HxI8X358wkYwwYM5wnGsjPnt22kFg0jORWs5XdDC9drCpjqRTp8HTcxWYy75
3Oq56QJwOsQCJ62X6gCDmNGlOe+M6C1b1cW+QN/LE651o0mRBXy/DcXNWgkj
SE3Rf/1vj3+4ueMWKE8QhsWhHyYdhCUAyP+GB5nIIz1Z5MURgjwhsb+GgW5R
sygDf47hOuvLMnTcMR1RaG13kMfXl6MnCLHLa6LdOoIVwIUJXdYCixATpfOZ
E45gUnLxvjhTQtyuI5sI/NB3H7NRd+W1j2Ai9GQQvxWVSMfwet9gmqeMZUZI
hbRFubAZBfHj0buLJ0JTvIgol6CM7gm9+FxIHW2I/4SQxy1R+O8wMBpUzeCX
LliiERVxE5pzhC636F3Z6FgP+NJ2B/sx5wBKwJs5B3gDykJ79lFoQt/YD/dv
7dsPpAD+gkhGQ7DF9VAYu4MQSPowk/9KRZp2aM+4rAuiZrxo8yaDyP3oNqua
Vnud6JlHQPQknmUoqGMCArSZpGcJk+aVrH5AD2KWzILLSnPvSJL20ecpL4mu
kr4wU9rI4SuohBcw/JrU0YJpW0koVIrLxePRuBKdBOdF2ixhY6nQtI5P3LuO
J84CGd17rnjPASPn1D7deco5JczxNm4FenDhroGd3KdXurwNzUjvfhSzJtfU
oksWEWDbZG4qDhMjmInYeD4RZYLTwCWl0UZtQQWX4GQ2fjJD12JVxp5EPSd2
BQObSeypOJJX25ZE27AxereZOJ1LIzTC8zyCX5NbvhCZFknayFMCDYrIx+Ok
trYO3IKRD7qS15OelbzDZOTAsI6tEGw89vVXf9onEaMUHXdWB3nTPTdjzxmA
OUaGaM6EgAUm5chHGxu0EOhmdLTzbJz57r3Hkkk4TiaDaVnaRD+NZTbjTiSC
WVmGj8n1PSEZ3OsVEyZJcWDarOTT0GmrOp7BOnc1egFmP+raHpJCy4EGorni
pr59u+ifDYheT/uo1ESUo+/A4Zdfos7vKPUo9lyO9WYLgs6FQtt5cFCEPeBz
JqEayeNO6VA+XTWQwU5x+tH1rbGXQws4JZ1PRxOaLCinfBJJPAvbN7C4MEYo
JJJfl+WSY6oQeuecpKEWECh5fjsKPvWtL9lAnygIZNeJSZ1FLduG0+6nbCpt
QuImdxX2SmLvu1FxiBa/0PK1CdxnacVi9UokdLE9GeTEhJI9oxPqOIetLUw+
gKyh50TTKPwFfl8G97lkT5lEN3uFvutWVqfzodwjQroYUo3Pl3U7dnp2D8km
RUUSu8im+FqM1e7KtdsuCxodeYYl1std/LqWHAEzt6oy5n0WLQw6gzDIqboC
CCIm6hWyYU+f5ViFXpoSx6ODN0ikb5WfRVeHqpaX3IewJyNisoxnINUsCmJV
VDNJ9RykE/0hP3DI+LECERbuJZOEENkgIa9oRa3lOYOnArcuvmTackBquTTU
L/LoRqjfSg4ccyzUBGD2UystBIRg/dgkhvPDNrtzFevOITGrDTqOYzS6ZFKD
+SAT9nQGsJwbFCS21kZ+qLS2RUJaY1r1hHO/TKSt9i87HUL7A2o/kzDyMgkf
n10R6++a5bRlGLfZNjoAN1+Jqd0PutNhM0spiRBEBLL5lhFI5CIuJCZhXfRJ
ty5iyDi+SuIxJL9SWX6ttZJAWvCDQioO6ZJbGKCZIHuaYgNOrrxE4XBJ5yxr
OQpeelBdL9YPeOT4qFyobAf1CEju6gu+GORB6p6GbhnyeR2peQg3azjC2xAg
k6/H2XprbKPngjOcsxohb2ygnsrOpcyLi9BkbdeGQ7ggYxcu4lMzG7q1RQF2
vJhtodZxxrE8WnyfZjYiqATZ30StnPnt27ewTx+b3bwWd8yLA4nAydkuSsC1
5upJl2tjb+W+x70oNKay+VT+TS9rK6yZ9Ofjc44nIHy+o6OolwxLtAdf6/QK
0Xz79v79uwuuW8ZrN38diUH2uD96o/8ETyds/KqKy2TsXniFviiFe8Xn+/Qr
4n0rNwPXGLUJ5CAyjnZrczmjlDGyWKlADDTlmNUFtiKK3Rn/9ZYlGRRioy92
Cglaw+cPoXIYPz7XapcSveujUTo4KpCE3hvI7rpYiVNJ8KpooQg1lgBBJ8Nm
LG9akote3pbvQ8Kbp2hmztZ4o0HyzG5pPk2IHp+fvkYalDTQoZnpb+FIG/fi
6DUMRl60VOR4TWd/rFYwV2UMlcVagyGT+GDXg+hn2F2blrau/CIInJHIheIC
pZXprtFczgOmEhljuERYuhBsdo2ynxIdmIl0KaCoR71sXJyO4ohMcP+Y6y3p
m+KqPJkUKTfa1Uo1jBbsnNKmD51ww+Y2FlZWdOKbLyTmCzGeaY468qX52BQX
klL4kYhdDWIGcdv+TDpfqLlnYZz/7bj1tdmSJZ749EY4gL/SEX6iz/NsZqs6
4TlO8zIhMDoq0/NEF2WclwW6isuNRp4R1doCrC9aNL3OVfVdDrXJ4Y4kh9v/
GBvyjTWu7zL7SzHyEW7NlOf7iASA+ETz1X1Gzr0d7b8ikJglhXdgoI0m6NUe
nkxsKMI3V2Qf5JrbOUuCXlGmLfvwHYSz4BptsjLzO6ZuPn8giI8Fb9F1q0gF
i2S1Bpscz/E+1bPF9Eydm0Ld6Up0XNQ4ulOVZ9ML8IvrJDB6ylL8HRgC+V5s
ZX3WMH8wslgUmXJOypgNLRnmVdS+HIm31gXIyF6aIHbpfYmNPCiDxBmNddd1
5AhZ5IEt2rXc6HDbcyZdPiFCuk3NYoYNLw0oUuSv0mZVioxZkviV1TdrYLyG
jHbdtpyZga81AhgcinQJ8KkbS5Luc3ZB3zOPLuA0Vp7riJ0ivmcQq9+CKxw7
ldScBb7tll2dIs10XX2Q71hiB6G61lDrqfGSZKLozFnyQToJoyb1HEFlydSE
i62TVM+cyMZLbU+MLPPu2BA1MHoj4uvyanZZtdAzjHI47UoTKhN7iPh43f9E
ZFg6wcKY3vQBRsb2Be1Phxeu8Tyn5IgBlpiDianVIoMl2ZG/cn567CnxobJ3
aiF0bPoQ+tZXbyKrw0Ch2aJCcVxPR4+KrMZkSxI4iV5UPqI1xzZ5UhfVCL6d
1RGLWxIUqCEY235tAcCfuyOQIWPG8F3NYfAQKWE3WiIwwMq0WXjcFjZyH81D
0XYd7/9TVkaIIUKNCgRK2MIJ/nmGLlWn/HjIA9HY1Wp33voLG9qCadey/9j4
ZTxRRKnfQq3x9QqrchmVyWW3uHXQjha1ym85M7SK9CO8Uc5MIS6VLBRDoRaW
dDyjqUzgLwfpvyZThju9I/qBAynNHehkCryTarXNhCIyWyamDyMDmEfFKbJl
8Kb3NSYtq1yh5BUKdmgHH8tyrqRhpTSVliKKFuFQTAoxSlyjSqdr+JPDBl2s
bJYHw78+mzpuG0nRkASVKgin4cIzHESo61IiJCnTGXQosMFiTSnFI/KVl1JA
08/orDkuXEdvEmKxiK5D3Fgn9mFi4yVwjdda9ErjdewG/Vlvs7kK3JWkthTa
XGUyZAZes8+a/U4+jNiX+HyNx1QXjTnOdbbzrbIIr8/ahuxqEzvoR6rzcTnD
qF1avYsWg/wVTDrg0NMgI0lOasMRbT4hbN8/IZRiEb+AkT7lYKR2jAT6daq9
1DqhRuKqvRPUYfTjAA17Qa50WMK3jrUy44Oew8huUZVjZ42O/mGQEBLP3CqA
eBG8Ud0/zYSnmIIyQcUik/w7UsIwiXgV3NxVqpk5pnOy+p6VeXEykXeSXqLe
GvEKtAjwpBmb5dVdFEiOppSHZIZ7ZZGSJXfXtYKBM/BmTcSJl3wtRJJECeFF
Sq53ttRZjD7nDsMVXeCGXRodAwfGJ2NUHvTJWWAmM2YP+DY4FR9BHj71sAFF
6weFEDn9ygZqVotdcdayr12TrA236tX5IclpnWsAV+2x6JIVHGe5ib+oL+xk
i7jHsk94k8KvomBTpHwrgAtPzacyxFZhSN420j4StexBCIM4DB1YtGuTd290
/nDhXpkPjkLiUuPSiRzm+WNTo89E60qtGQ1qomKpiasYx0CwdsriSyVVgzP/
e6xxRBJNZEdhmRZDs6Tm6szhuuVyYbqUNf3pWl9GEmmtmbYpe7k0xiMho5KM
VFarwHLKh02A/FwKLZ+f6rjLJ98hHk1071e37Y7XLRqvNsAHGL/NwCRFaGb5
JfNDJCMaL1ToqiNRSRXTxoQ5csAgWwAV5mCSSWrKXDkDLHds1dFGKFY+J+2T
ZMnKRUqenJy6P0jMmuSgsjZq9LqMvBAoUZoqdZvkJvJWdMfVUnkcdy1w7U5F
XBuiu+KwAvloy09+EFa95RtCOLonzfgpgrutRALfGUqTw+gEp1NYuhqRAH6Z
DVshROxWNnxODFhWo8iTO5N6yoSGJVvt7NC2NY6U8TcIa4CN7NZFlezuXPm5
SMrfAbolzMqUqBPrpegy/rxm+wNtCKItWZZtMnk3v8Gk65HZcpavHtmPRfoN
iDx+3UVWBGVOiRpTS67CYuuddO4kenxxevWEtoLr5ZA4D0LFBwjFlEMvmm6R
x4Rjf/zds4C7eTMddS8HF4oQ66WRKTOxurouAOxGgtnAo7/MWyxql7GoizZy
VT8XHEXxhq5vAluWMdgvCQXFgezjZsSwb7mB48Aoj50wNwSTnmkwZNBZGeck
/SvjoCEtG73QXVf4zN9mqPJXThtR1xIUwJs4ExBrrByfuruz09vZ2YmJujNN
phP4efBmYKvAIPgbYVLjlm/GUYZoE2WIz1s45+iy6SAEBYKE959HMmS06mhR
ToLcwfDaXPiF0xvBSEWqtAUPexHzwEVS3Ug9Yb+QIVdpmCZaCNJsCrdpqTrC
L5gP6pxVNsG2DWnzvc56tpAZ7aB2GcFS/GTlhGe2+2rREeZW7UJljZD9T0lx
E5ndGm0iiXXyiCn3FKa6CvHhmyQu2OSB3VUTOD9J2V/KSzWuWmS1gCn0HLT8
WOsdR7LjXnzC/tG7hOtts+oVGPhMy0srv7WNLjSgbbgh97GhWycSXdO0aFbk
hZTYDgakedsgI1GpdK1MpaO1z0nXyeq5nz7JZMKFCcC06R2JprzcF4MI51h7
Zc2c+qa12Kfdj+OMnclY7Y+1XZwO2NNhD5UL0PHgVcf+QqZqC7sT/cCTmG3T
bF4LJjBGcl4Q4dEN0ojdmcqsgFenl5g4nk2SnmQS6LK9YZlVEbxAn6SygY7r
E2FDSkSOlhxZo1vLsBPdcq9iStS6ifyCbaeEeMQkVlIwTAuWKU7o1rVFYBsV
lItaNzaBM65uFzYSIInbgvucwI/UgORclouktk7S876E27IHL9KqozVL8Yn6
StvEVx75OFBwccmppWg+U8JOx7WRJ55GVC6zwvADv+8EVo+FEMwR+L5Be3um
NFLn+I8ZsqudO1frg/SLBGkzpYEZC6bEtVzSyRLOBfz0eHNB6CdBDmAm5pib
rGCM1EEfCQkoq5pj8VeIHXV5v66uINGSsRbshT3BuhB1w0CkLkCu5PqDKN6N
SQQRHxVH060Ik3AeHxN0E0H1Yj6PnwsOomALqAuAJ1yTUBGUBV6MEX9g8r+l
fg4rTgm3bmjCvPHoEWj9o7g2RfwTCE+E/9rUCnetzuewbZQ4VpgrO0ihPNvb
aTNpH/DiNFR5PirZxKbEUZM6ZQhdJlZiBJOwjugpevbOJlJzEV15kxRRCSie
XJuoFFMgksBcp1Zn8JrXOl7Fr6lodd9rF1CFbGnoD+AjutCYX63l8R/K0RPT
v4XvIrLyLEMTf5V5LRepAXd1aSBSCcnuRWJRkIsQaVMQKldNaD2m4rLODXJJ
IzVdp6mfoPl6orNLoprkIdgqUWt4zPliOfe0k9vUq2NpjhaYt6hDJz09uAZ+
HVUtt06D4Fm1HAmgG7PTf410aerHF2e0fy80reN6Dyw4AAZI6LYhicjgztS/
lohr0cNoHUKmhAvFdPb66Aldrgg5RZoUqVeHVOvmXp2qASYIW5BEcMhU22af
HwOfMBhushJEDLgyH5cWJeMuSiKHA4RDMr8jE5DizDOABeudwxsBoPsR46ZK
fyRRWuEUvAUD7M1DOQ9wiERBMLauucZmARQt5znFshR8y/+MRj3GKRPnIQhu
ymNLFWtGN/WFswb0SftmJ9OhKhqJcYbjirl4ulQm94xvvJ4weGpDkcfoPV8F
qHrdrcGqRToaUlUlmo54f4yLBUx+46mbarETkxIUOBHFDq8DKUV6loAzpnSi
JerCeQPpmGTCM2EyY0M95kPxWlUtaf6GRUbO+dJ957wmFx0MQTssNiWufqzX
avv0YPq5q4HwnRpLVo1LzBnUNpAw8oqb2cRVPk0sU4dm0tKzJew1bcYlQLnY
ndLNxJbaMK0aulo/+l8crGE+g3d4CDNJpEyhZGp1LsSQvW/fXrd1cmO6eUD9
qJeZq1+lsdOioRdeq4s2bkz4jzSP05EzTDq4tIkJpr1+KEtNrLVGQvbLIkmJ
bONEh6mkJ4Ej7BZ9wGQNbOb8LSzw7N1IlwKE4Y5p2IfRtXC2ccK/R0bZqyXr
1aSA9KSYsu9lX0ufwwhJd02JILydp5I6XZTFalG2XvLvxnRzJl05p8dlyk8r
j/20cuO+Fp6F/Qe9IYNwTCnPFusV6TQ+0i5kzebvyC5QONsb9GpObuzjuCjJ
gdcOVyT+re08+p6dd+aWcB4AnMwcTQ1gmKgj3F2nk9sEPRZyyfBDtI7U3hNx
HTlOqJmPm9GfMsYBzi+6lpgwvvo0R0NPUaVMej3HeZ4384xE8ERX/GrYrsqd
EflKuKSIhjsxZ7AoMp7We67hComfWT5RNmHeJutD6I3YJuMptDp7ytirafKe
X/IjPjsrRyHphz+AC9GYus4JtyDGAvoshGbaNKD7i7E4TGc0nTpjyQUy2+uS
CxiGCZOhS4wN3SXQrkKgtfAS21HGwBsL4KY5kqQWQwbQB2VLzBk10NRGZW1/
xo0OPRKlD8SXaE24MVwHpITBnqRFU21bl0yX1yinKdY70/igkyP57QdbhGOt
2JAoSKO5lCC9kvkvXCj7pgID67qULeJBDFXkNFORvtYzr7fb0TEZvQfrFwQE
2ZTe73FGiC7OJF3KbD0pGMKjtWopKL7QKSRjO7TpfkdZgYQ1nmOZoRBJ1BEJ
JIULiDFWurJJwmYUr7KQdsrS7eGOiHmwZwRi+YugfCmXX2E2v0lrpNWehQ8j
DNs8jDi7sh0L0+GmqYlALetgk5I9ibqsbOKCUXSQ/qaCasg6Ne2NWHKASAF7
lzTV1LJF5OJaggrj9KaWz3VauSmbGNSKkSdNxqd5wz8T8UEhfafhjiISvFzo
fGa25OmCyrbEQTHVAVk6cSCYAlI+zZxbG8EVF6KxMjaXCcLe9JatWOd7fLgR
CwSbLGju1BPtXoBPE8Gw2JSWSLQCFkBe7x7E0HKniYz27s8duhW5wM7R/+7s
ytWlGQR/uhB3l+PmxbFbZ/AXmzHsh+eH8ey7zsXeFw1tc0UmNgvqzCSJiUFo
ZS1tYLm+nQ6r1PUn2WnD3sNCSqZtrL0goW9iofUrU9juB0GJSPszdjnWRZdi
XXSJERK+qYYLYap1e4XXtMgv4iTc6epiEJ94qMLelitOtf1rm7FjTtYgoTWS
DGvvjD8uwrSsI37sCgEO9/f0A9wn9+r2IHLdxFgNj4e7e8/DZ566jmNPPAOt
nH1kenWw0UNIJNGt1NTNRMPzUp+DsWPp/m+katZcOf+KFGopKzCI/S5opuuu
F/2ZVi18ehemABkKRHMmWKARa/Wc/SrKxEKwwd7m4LG4sxZLADiwzQS55Hzs
Us+tKEh/E/YRT9DxLbIPpud+e7ZBHGoCfFK6e0B3n8inIihApKHNG/MTo5ny
IWFdojWq8stK+7w7TT0jE6PpUz6I2bb4aujP7bKxKEhN667Stf/Q9gNuPOSa
sXM53YsrUczjCPQDd6ErBYA+9v35ZqbhJLMXXVPPbJvTmGyTQHNVRNl0qjZq
fDoq2XEXOCE+TAplWNHdVnQcGPPDIMiFGUJQ1WZW6th/+eDznV5U+8U2LbQZ
1weHGBl7uqdFMY5JUXIEv1hxry5z096bJpXkcA7rweKkhENnDQcH+9IVKzIK
K/cb/msrsYZhGgkKZaP7D3Nw3aDUmVeQqFYQ9qJYi1+H2L2veVvAzbBCz4/O
TLNnOsCb7+q497AzFDzKS+6WIOKI6z8RPd+xpdn8coGm240HgXfWoBY2jZaI
aMGBrQa8tVqfNmqVBO3IqSHwNYLiyw1ITVN3+kzOxysTmysrFFcMQRl6tjBr
MPVJuCaiFJXre+mGEnuJSfcO48ejt9dXUl8GIbyi2tjewAxKprACWE39oyNX
7PtHswoRjbL6hv1uSJjOQZK1ixEt1yRPvxTqasoF1N3JXWliabBoDLAuZFHP
LQU4tDvEduNck+NBJ7gvmmk/ziQZCk7tZA+dU+RoStgwTtd+iPyKLqYobWhw
Jxk3uGMoo7qmAjNiUwQ38erLjVzN2cTJXTo4Vjcq1iVGrXOmp+sXBFFjUNHE
3G1r03QnhPOfg+a15XutKNyxKS7oBMAw8sgmf/PNp+UMvjOmyKC7tuu0TzEg
BfBGnbuZCNlyzkeWCIHSPidbXYg+VosjzSsKy06qVY7umCAhzu1h6rH2XG56
2LFJJx0x+tplSaaYyN2kdH5W+eI2u3FGoBHNf5sVypl8LqzphkVaHdUaNrNv
pDtPYzp9WbxeoMSjrbDAooDYzaRnm2bFYUe0oCgYw48F0dDJsGkR7Kb3HWoi
HUXA84m6LXORl7m3GC2Cg8ZSx0D8siPrs6OpnMpxNTVXdAV9t3FbdjKTNGYe
nrA9fYPYsQXcvOQNhl8/pQaSbJTY18c6EVeP1GCOUt3pwjYs1o8Fwa62rTt8
uYopOHcG4Gsx1IfUxOAEXFPelZe6IoVkGtXhPK6uzuZJBugkhxWxwGeLBuk2
G77SXahZKV9IPBMmb6cIBIMSofO1SK8wv3vFjJAoZbe14WJNeJetNtY5UHCZ
GVuA5facCe2a8wc+MgC7uBhftbracsumRGrG0khuo+FrE+YbMZiy4ThZBTqp
3yivZ6skNJ2UN2kxCWlwywqsAs14JYhthHpnJtuE6IzI16U4GLo9/AL1TdNc
/cofywvWc0ejy14gdXuRzkmNpqqGdCMuVs/vktRspQCvvoZoQLaPTZB3FxnX
gCfLsPBitFtLYQauXRibtThMziviMCZxZ1PpB7hxUB5efLUTm0Bick594u74
mRdS6ZexcK9nbEQmcoZOOuIjGTim7kI3eEfbyEnm8vOk5nX0oxUvf/TKEaQJ
aZOsxxs1dqwh03YvMrpvD+En/VvFRdG6EoQgkAdDHHHRFpZzTjyK7qX16VjA
2iOMXhk9nSepXN01c9dRmPer220Z2T836QrumzpBs16wJ6dCohF6rxD8uw5v
qPDBNZlDC4VpyWGTtX/U3/kx9jYFKqpFCt/aY80DEAy2xURvQ1ZXkNqLj6PN
RqKPofRGm9puzjCtwJ7NjoBCl/S2TeYcpNSm6obsnDV3qwluASiNy7pXkCGR
PamIgR2yGLIxhG7L5iJr0jLWMpYhO34DVrybBsWNRq99M63uExC1RVuzRhU6
cHae6apVNK+Q+e7ElpRHMICs6jWKvvVWsHDd4MOsHqqAWRzBComqAjrm8iUY
aueZ1DcRLe60XKQaPRsbDRuNGg7S5lk/jK6160/rdby+qiVV8yRraOlsv77W
VfHX1m/z2flgXcHGwmmaXawzrdsdBWBfFzpCb8T4x2fvSNjliAKcKcN47BVo
EAVUaJ61F3AtaZtPiaAfpvFgZ/aGOiQikr3smZrR7AYSK7J1c20XrVwkL0kF
XOJ/v+MY3VL6A8kK2QQBDV7P2G8/VHrUSaXc1EC0YtPYE3FDwCzui1SsO4iZ
JJmZgtzCJFoiri+7lcrnnTCyO60WSzqz1a0nWQ3AgBmSXhpzAa+oIzr5PXwR
eFR7uf3OPxcWDmB1QkdTR5IcbmoZuDuCbdmdVSe0FoHfQkA5YYOVGTEvhkWf
Dfe1ZURtb2bTBM/1iLGNtb8gRSjVxrUoaPqMInON5KytL4wjM5jFcmkmk+8l
DW2C8xHQkdMOJ9DlFOGHrLLZDD5Bv2gfo02kEwxNVa3AAsS5TNJ6b/Ui3us3
LbjHY50sDkOfTrK+uHrSi/bv+/0/sOsnLJodrD33H2Ja0bXtzcOD+KVU/FrL
xJdCh+z74JnWPGn2pMDekatkUsg1FKpJBzi4EsRG6HBGim4IdkCt8agAjbRM
41z/ILiS+whwsetQFIcnXceNbYcFsfpyJLnrpWyNEa6kCPskJDS2k8fvsM41
y9PhXrZWSyRBWAgDcNqO/hl5A6nsTbIfIN1uERc6eosBjI1722C9ExmTjYDe
k1AHJBpV19YMk9jRt7SSHA/20mmzaLTpo7b9g1GxxGkvCc8csvgFd2HWje9p
oN06naw5jFA3vS50IQ/d79q1d0uaaL1WAntLtePOVP3UkEXnzzAXOo7uW5qX
ui1MliNSkq/JzRzC4hoSRNeWsF34hO3bD6B4fZ/Y/RL9dsP/NvQjWm9BZCID
ED3U+cykqPsLtGygFf8SceF2Ta2CMs5evXO/CkXsVaEQskgkQMdYaiyQkCM2
unMHVC3J2yAljTyEk4hdIpnt5bsLL3/u4vT43bv+aHRs8k38E3ZVfuauNkKP
7mWZMy5KB8UiVgiINTFnurcXl/PwH4L8X6FhmXHRDWJXo7mxxwLDfRCUJq5g
sUrhgHUuEMIs6c8+qyUCmFww+PnB8wMtidqfEVrHPz57fohKaKY8RrSQ/CXV
af3Kbkv3qaDze920Y2NJAYTC1lUJuTU75mRP8/5q/QBs/ILp9Cv1InXxk7Lo
L5NmHrR/pTOdTmU4hXqGIMi6LKxhQq5jvOJyGlwVkzkPLesR1mEA8JF06zFd
l6WGoLODERxu+rjxgfg78CITWKjSqTKdVCj/FLyCQLRTz5s3iI8LY9a2Zj4E
Ctp6RSbnxLoGJmX8+E468UCGTe6ksQgLuiITIsqwL05aU0HKHAKx4fe4ypKU
/e7MLH3RYrFsE4wByQdQKFxDR/uTIC6pISRZrJAza9ICvNCEjfFJXOyS26uQ
iJdpzq9ctIhXNJbkSlJ6vKIkLAFJQvEgPjftN4WpKxV3avdnhSmIgK7moK4r
LhnKcYFuf5IQyaYD5m3+zdpEIUxvroib+z1hy6KrieaulsGvFwlCGymlKO0u
vBfNKz0RoWfK65Bk3jSg1fFwuZaGEPcSFMREDsYkm3nVPiKBPK7Iq/cWr+2N
IGP3aG+wM9gb7FkvI/YQPbq7uxu49ChTUvNR7OrasL+Sn1t/6rHTv3TCOUwF
9Lk7tAUnOOSaJtxbKtK799b3aPfo+eBwd7C7szPYeWTTnPhwXkRRTP/7N97u
f9RzeB3+oyiJ1ZBkHv/ebec43rwFfv03v/GVQixuggS53+CyTJ361BWsAtmZ
/LoPb/ysv68oAiB2KJptZmtJnohHU+2ISryybR3vrKXitasjZbGn/n8bu7ru
xo0r+d6/gkd+sHQOKdtJHMeZJ83IMx5nNNaOZDvZN5CEKFgQwACEZFon+9u3
q+5HNyDKu0/2UCTQaHT3/apbZSYy7gsVZycKg5uBLNEuQcO5Xg3USvQzHr/N
zBrTL/8eqtWdwCLFOoyvnF01PCPNZ1bACVfyd//09D2Q63tkVf4GN+bNZIao
VRnjOufXSvwHKqmY3ZkxL55gCjELxS5GxVvR+hWtNoVfDRyO1Xqzn+HmItb6
yjgZZIMqwkYnXOo/gvHxiQTahYvIu6Ax8To7ktX28E6HU47YHUAZlIiJV4VQ
wBh1QnUTuNETWs+bpvpUTlzPD43xSKa2XB8F6d2ZvpnjuLg+/vP8x4uz9x/F
2zkZ2b18MQRfDMNWpEJmvoSyRTBnF4yUSnz7+9ErGR+dr+ORLDkVdNKc9q0y
bWRDjhFnEgdUtWWu6gY7AZtB8X8U/oszzVUF9cHTMCEBgpNdFaNsCrZn0WkI
l7hKR5WpUDYLLom5fUeeNBFswSstua0kusFlJiXjkbdMsrdCbfmjFkFWIKuK
884H1XYPejx0iI4UvhH8gFB1396dTrWE5is7dflioUeFdH1QHjlkp0J6pQ5G
yygE1DX3vn5cTTqwpY+YK4TP8OJ5oeVmvURAXNPtfr8v96XLFTyLuvtMuA/P
NXJqXRE9J1wT/hy0tfalEbDhyNAqILSfMaW4mMsbczMY1zPKPub6tMY1ltcY
8S1VXTmTusuloZJnZwSlx90vvvlf//QXoQjpSpjIybs5ceOcjn/uklTqJY7O
ygpeUJMDR7datq316nyLfUigwmZvWAFqzK/GXzyxhM1+RkBM1v6M0/DXeEL1
a+FKE94ZzKF3JiuNa3yQn1Xt5VKljD/qJB7/fPnxJLjrCCGkzIHXzMzYGnBr
iH8nB5J8MeTeupzjINrUQ1/jFDMNRS6X4MCanr23hTG/5hA85QHLm35l1QOu
9ip11cwFtJPxLSUxLamsNTnrIGOQJVDF5t8lu2jsJDzh1dRxQibCXLr7qp0V
qfhFyH9mFP88X3NIlG475OhLmUFFFubqxNeSuh2BhFNhorDmKGn2zUlZxFPX
xRJGy6FXopcspdcpaZCqkCU7CYAmfKaFbBEMwXYftvf2XrPJtnEzRHSyN2K1
xQ2A6S8qVVQtlXRggiXIOk12RlEgLEgJxzgbYVV3k2li6ejZiVQERe7NUxpS
w1maQMpzEO+ajE/wzQ9+tWf8lALYzJIpJucVb3713RuGKmJvrDgTJKuAPz4U
dbVW1IB/TyEKloSVBC8THM/8w+NGW4RpoHAQksuKblVLVjqEKCLopCjjIMO4
1951HQinQGHIekfTbrjx4YY03JM8k5KnuKnopDv9vuRcSBaJYyY8OEj02PEM
0PtLjlkuh/aI5vOdTQ7MfCeq83PBEEg2L6iGm9tVGfcXBwymXaknZiI6k+3Q
8/0l+lLyT3jzO7G3Oa21wHVU4iSMYllV+St6A1Ii/ytwfceNff1nMHgi4/XV
l996wStxyo9eSUpF4T6qO/Ry3ulEsdE+IEtpjTgQZXyhzRBjGcpzgtxrnVzV
pBryvFbI81qJDDzNwM5bkRnFK+dDJiT8Qsp7ul21oV8wc2Oc/xyHq0tgWhFh
TGaEWFEI9ZOktXSLwW6rzGzSrXl2WJD+g8hbUlMtkOCxlOgNoMdCuwcrHq4f
2YjPffSvdrgelvL7oiai9TFuiiRFEH8NEB5N3i4dghNEjjCMlCZnrm/TiZsV
4aLsBXr/EEda1Xw2EIoA3ppmLfVBeBeR2C6RjsEZnUgpAW4WzxU8T/fVr+Vj
f1d51+TspzqG70ryn98OgBiWEG6rXws9nsm1nDI/GSvTB6YD//x5LzPfKPQm
jPyfgwN4Ya24AxKDotFygdnMZ5RZvgkDzlF26JMzBS0oR+hLbGY/FI3xA/3F
cID2qGI9p48asCHE+HVKIJ53G89+0a7SeB1sUQuQ5mEd91N0Rx6jA3Ya16+j
jgR8a5sh8ywwF+6bWYitaqNxQrj2BSaNcewyT8Se3MKIhTZ3gGKH2nTNDMBW
0AEijX+p0684jMXV+3dvfry4MAVmk3IyJPqoh9V0SVyJRIjBFAohcpNVvxp4
iDi+qzR9hPPeaLPEVSR4geUYOkQqmJX5BHFy3/ddEbd3OD6t6hOXI4hjr5dl
t7OGTJ5teUuFEesmNEXVBOfxSopVhL9Ya8yBnr1MkOYW+stCGeZ6ch+RcIgT
MmZIm89el/WmGuL/nJeNMHi9rRrKY4e3XcGl/q4E6JqhcinC2e/jht1TgFso
KOjd30LDtEEL52UrXyODERMOV48lyphPT7+QMSxVZ75rynuJh6ONQrG5YZpz
U9wvGQ4c2/jC66HegCkuboffoyGdfSoleon/3m879G77E3wX11CDb/oTdGUZ
/xu+H5oNeQP1AT4Uuwd870Oc06HgT2zsaJ8YNnDdPsU32VBTvG4fijvqicf/
K/l1PqIYnitNNP719M+nf4qb/e9CcmaPYtWn8OzTb+OTn8wTnxoq40gDSa3w
GGvL18N38YVGI7OancWtnVbHyTxEn6FkX/BK8omCFEYQeSzTgKwbRJJqDa9P
lF4DyZ74Ne9seenrB3qJDxUKvVZ4mcH1z8tNV4gvF0zCWzs+chuYeUjxSKiT
RDeYaqxROFq4eNzetHHzwpD6XmJre8rETIuHc+MCQiDVZPDpHEZDPsvNPmkE
SmgojH+lykbILUO6g4mYZuEjvRoj+ZFgU7R015yJ8lBDg+TtRDrao56UwRZM
qZoVPCJCLoJK4wowD6KQWDC7OYUeZ/mt1ullWP8sArxCHWKN5CRtKtX1lNjB
1ed2beN8kbA2jPJj8rdirzO30fN9jO4upB9NoljJg4WmzZMYvfRpK3C32Hpb
fCYDgHe2YDjBWV3GZR2dJySgc2SM9fI6LDFjQUIraFagK8IL02UZqZlkpGQd
jz2eF2faBBRCUT8CG1hixI0RuGrvK+GSZbsdxfmFJgToo6DpG0uZxOeS3EJ/
hL0rSzUUjTbh5dMtxYTM7TgmSD6GRnFsGPCJtG11pamiJ/wIJRwOynaYVWSG
wFlN8bLk0Q6/jzAKAiYtORlpy6ix7Fn6lOeMIC/OTW81Bl0TLAZrwgqkHeXW
LLubmVPDXErCwMou5s/3Y93GrN9NVF7srAjuOFndAVk3Y+kSJWK4GE6Tl6hH
JT+JBzl0q0ySW3QMZNEJZxhrFIpT1+6IawO0L8tRniNPAnqImtBwIcsw9BJz
TaSZrDPCsl1gQdASiYJHXWI+z9dIh/NkH03eoPcOZogmuttSus5mSEE3WH05
/UKOLItG5E7SYS/6TKLvm/MrvL9ECR0+8mPD5Od0hCC6djY66RMP0oihm3jk
GZplTdx1j1Wv0HIOBw3VGaeSeuj9sOSDPvB/F+JRvsKlN2M1VEpewYVZArkC
7hPhmURoDm1g1xY08NRNca8vHA9UssPVrmCLVJLRgOmucVw9H57fas/emOmK
tYeesOAI9co1kZbG2UBAgbzdkN5u4kKI4b0qKGWIdOFWA3/W9ACA5WbtYQVS
hTLj8i5I+Ya+KyU1egk8/3xBFjMuPsVeGojWs8NhnPhjig8kYtI8o4f5QL7u
tZPgidfAPUR7pq0ZtjHxnAtwzXg4W4FOvXgQnmAkCx7jBGTEUuE5sdRzloch
n1w/Iwvn1avIgRvD7fg2smNghKHNfCb48H1xU/nLTWGStZSE6XzqUZJdXVcb
cPn4wtXV92HaXin1H6xpZjIe25FkZjEblnEO43oc+tzEJfqtjy3IDvbzZ4++
TvJOSdpJKMknslJGPsN47bDnmuYZjzSSj+yRiu601d40eixgVRA6Vs5PG6RC
DrFtvCwoSWC/8/UYvv/pM3xRIDX/SYbRGwDmqaF/PgYgxHmvmkV81oVIus2O
L95fX5yEhAI6+PAiwbZt25s+WTsmlOL6jbNPRyJ1YrF4fMqx27clnagMmEbr
UgN13aDOIYWo6zeXGRCdtkjeC70ffgsLMIaBPN0MFJTZBWYGookaenW7V2XF
Yqc0h+mBc1uO/O+Dc1z1ISPzMJaG7WSmjZ/KmtsSYY22X4TxHOncENmko89n
CTkVtJD1bPTj8h/PySvsMWIQ/NGgAXTXZ/PEXlY1ADsRnxhB+3sl5KMOWCfO
KrxALmqFRT0MNRZQ4h/os8af6dPjiBF/NX97fkL15W7YnqpXLTcx15oOHHI3
LJwASbzLmbiDpD70D5VqhcJ93u6sSBQj487qZfp25ISWspb7QKHq+4EvYHy7
XXtXNklA1aoem4FAz1wjzg+RuTzFuCtz3Lcrc+DsngkRpJXj3shsxhP9fGaX
+5B+Iw2rSHJFj0j6WCC7oavnNBwLYeb7xflpVe5uFgB2LBIrWEaiqWRzpyfj
WvxZbUD05jnFCHJ1aGhP7T3HmAeQk1yVq5P54X1Ei0GeGVdg8d4B6ctKfd7W
b8mfpNNHRN3LZySyL2/cBnmG+EyLpXAiZodatry8b5GR2kNbrfOQHcsZbsWS
TWVxVd/xrFoJ+6nQR4jTXUlyK4tfLWUngwtmIE2YMhubtvLvE7FnxgOlHpTw
BFvxdXTaGVZGqH11T0gPCex5ovZVsq6KB5IUJxE30IVCaQ58zM2LjVHoGIOD
YrTTYGCH89Tvm1W07g2Ms1KAyqkFq8INK40YAnApIB23aMX+XOE0P7748frq
5OQ0HHyTdDRu1alI+j1E+4JuzQWmMuZg+g9GkWXB9lYqJDRgiV+PnXgjU6A5
bT+8Rd/wNu82sZ7+F5ae3ANjOiob7KSjYFiGUV8MBknJPKYomvVCSLxksFgF
ySogB16X0YtnpUQT8omwh2xbSiZtoIm5MqSQ1i/aD2OjUZJykKiPPjD/B4ef
FtdFY5kXRL1UqnVffvMt0rtqFRmh5BOROrCjj+H3FKyLHdrYdS6FWs7iRY1a
Ci44T27flvEq8b9rp0/rEdEdSeQjk6sbKn3RL+Mt7N7lRWwDscuh6kdsX0ai
J+5qFp2+rsEDjyd8Pz2Y44R8jCMqV14AEGbpNBSdAIszpEPS5BSU4CxIHhOt
ufEFHrjd3zNWcOrBHCG9vD5KliLYAsh6raz2TQdK5AUBA2fEmY1qSqTM3YAT
Xp0UNPLNpJHvVy1NgXMgI/JQdLYJaTD2Df/zzZeQPnEKKJmP3kpJfdZq7NSG
qpKg+05qNpoq+qJd3gy9kKIk02MnLHp9wVRNnoV3VV2s4Tvn7T0IZsoHIlq8
n5K+7oinAoWwMduA8it0Wn9MoKTRAdxBj8FchKo7eC6ATqUWfOyYvHVO/lKp
Fnwj//xQZf/QliBUElBf0K+y7B8OH5mpT1IdK8ytOveZEZjZiMy2/3See5n9
i6Z1Vty3ajCVOlksdhaZZWZQveF1sdeYGDEoIR47LGoNi1nVMG8DzIAhJzVz
rzPj0kEHKSlcrPcMR48RehRGfhxectZpwsl9o5q3OUaB3YPirbnnBVbgok3E
0gfFyg5MmBACSCXeMANzS4MFsY159u4lohdLiJuiFK06emhC1p0xa7uXzLc2
eH/5zdxbycfSM8q6fPClj5rJPV+5G4Eh+pB1mT89Xa1u27LR3npl3xC13bpU
SbmfrmZvyzVsGGg3UzK7xwjvK4lQukGwg7ocdOxxJ/zcNh/a2xjNNgY1z9Ii
CdfmWWvs7PRwIT3chDFoO3QQuujdrmSOI3poVGAIND0PWhDPpK14dIkH9Men
V6JZE2ij0RocZosJnyT9+3/U5pguMDTmOaVRzK15+kylUrxIpyx9ZXdbbNV0
gNBRNCy57dLae8H9Vto1+NtNO+GWIiUNW5fuJK3alaM87ZitJpqq4AwCbK/d
FmxuUwwOxCkJqkPUfDtw6WOTSseLPDHzSJ7G0Mw4WpgE4rkaGIRJVGiwxVtC
HxPF+LJd79l/se6oMVc7/vV126Ha9i4OCk/mdA/Hr99dnlBauPotzpTl6XOs
hlz+cwcAvdxzLEB3fYL16AXmw0aQOmxKAfwvCYejV+gp/C3yuiwa6l8Tmhf5
gnW1gS7pSMQ0TmzdemfSMp7CNxXd0E3dLjGBi4SRTWjxJWYN3ZCHxtwn9Lsr
AMFVcFGPxWwVP/0dDTOWNVHk4hgO67dLQo4kVbYsOWr03E7T22P8dSsUxKvo
btWzGnonu30M6w8OmZ0RBUvBBWsjC7pchjiUOQUlhcyz0iF6Vov5AOZF5dY4
ZlHa6+SUYOc6BaKTcgxYbyg2fMiiHNzLyNk0mRAPW44ALfmD688FoYO6QGIe
whqasU5Vz4O/IYkZSkMj6MrUNAwkp3DCShFFt8ZN1cU7BFU+NY1ONvqo2jZM
jdfBfoDeIUFs+wKwDj1dsGsOn107VcyTH6ps7r8HqCljSyzLutYdAnMTbcN5
u6xKtT1mFtJr1s6clO/kP/8ZfYSqYPcx9ljQ1LFMn177W8t43tzglU6aSFyw
CgWJ0Mc/FdZSK1k5uTJ7pMpiJY6dKDjhCDiL5+Lsasu79gWznsGdrJtO6TaG
XuPfg1MlLKQzpUeMg/1us9+KENKHarkv5Dm++orio4+cI0Qu8sqv9l1l3/hT
nMXr2/a+b1OWXvPYlQjHlIopiGZE2j1SR1ZIc80TVH6Ysfl6W7ecLYrZk4LQ
WZyBmlpg2EMWayMX1LtKmtTyPu+zd5hk0eAZKpEMNKNtuBwtvbHEyVfKVdNw
5z5WJAhXY68kLvP7PrAciqBKSqI0lKnSTYd7IY037K1qWLFDVYbpCEhJYEc1
gzOVs1bAHSKZCJEvlXS7LANH12moHp01nzEYQ9YyYclJyaBv8K98pwgk4ss+
L9aFBhVWVThToDXOiE98lLMmRtRxAolNevqsWD/wEeExXMC0Q8B+selEDXTa
1iVNy1zzU9KOrEtclme0mAnVaeTvRRoPm0GkBavnl99fJgObATN5tdwukqmJ
vNbqvRnbbz+OMOq99y/InNsFxVus2ySb+UwUQLTTGBiis2rQ5Zk3z/BmBIUo
7wWTxHJQKARE6sXaf7Nvh258Af75oSoftUjFcqskfHbS6vrCD1OmzF+urtP8
5bp71cvRwwP82bvSftPsUngXowtxgiwo1hcmEZi2t2OdNmsr9RR3iXY8H7ZR
FctaF/yzJr+TUvlsXdJ4EyuMC3fteliJ07YZ+meD84ip0LauyWEz8cLO7O8c
Jt9pjEFEz8Ew2kIsE+cjDre+Jwb66tIqD/adDWtdcRHtMijSqUrtSr/5lrBL
5ZoWx8JV7Xw68Tz5lHJc5ozZy8KeWDt3jO+H0Zqgl8B2pKvLL97/81J68TEM
01Jh8kPuSsQRvBxsgloQYyBLSt5JmfBBNIp/iyHVHXXLZ9dyaKZ++n/F8QPB
ro0V1rmjh6//LqHFqb11qyLd8D+zWbAeOp3oU4UaPNrfRflTV8DanJz40NFQ
eDvrWK06HRalsR0n17bcgAjNIdn2LPZO2ufPbQL1oINaJ2rnG+neBJhi6HqN
xL/6Wxw7jwaYEIWyj3Af+tmqbod14n8War2rePaS7Sj+toaD4LrDTCfjRrkW
oXRbA2Ng5Pna2derMlM8pmo78Xb9hDr/mhFqfghzqsVVv8dCs6avVp0tnRCQ
IxhNRXrHi3jGomM4bp2nJ3lI2KYYwpPARWrUDau9Qqaub3JkNjDSn67ylcNu
OkDtgK73pgpn9LN3JNbxy1PtaWik2qq+zTEq74KeNecUH311IiW3HVWC4I5y
GFJRQN+rdW3IBI1eBuG2F2cfP12J7b0AxHNBmVTe52P0sOo/iOpTYH9uyghA
6gOjzDd4ZXKTUFI6QZy/bnvY7D/+up2vwuaj2BdNjnl9LFhW4ug2fh4tJ5gy
j7RvEQIfKPrcSmVSiTFz4lGRkzqHFGNGMCpY1ow/CN0oTDheazIh/pmhSfqO
XMXGjPzIXbVdxM+wZCheg2MVAchMiWEe25R9Vg3O4GETIpNXM+ojtmt76kxi
WErkivAtJQwQ4sgguXiDa8r8aRf4VrRA9KrZNUhq3zFc4a2CqHO1+mF+t77N
rq1nPJBRdElKKA/2pfSF46yH93EEXDGbs47yK02sm7wFVmvYAs+k2oiLIuVB
1J/nOROdefNccNQkYPRByF0GYfQyPflKgmTG1U2TFWBdggA5S/Ms4te5NjNV
Ss4jjHkKzAkCpgJOm/kJRK5OocgaJpfJ/7N0fK0kSDLZmlnlAlkVXTxDqHOZ
14Lk6pqJFPFP6RaVZTAl/c1Iga1Gm+qVnaKKISD6qKzTaU+ts71rOY/UrY8j
K1ooAbo4++9p/pLZ5LWulibTMupBtKmRC2SUCJYjcIpezmR1z+YsNMktdq2m
gbLFgyKqgyIP4QT/6H2/BD2WKFQafE7/cRpN+Ls33/+XDIvPCaNQorBHfuxg
cdDs/ac38CDgjrZAn2ngLOfYfYkAijkShy5mRORX+2b2lruXtxD8+6tZ+pha
gdXOSqWGKPPkLeoTwjZMOn586wFe2L0zI4j6jbgDqZdN/Dsr8DqKShSk+1kP
Nv+WTM96pgXJsDsLPwL67z5dI6HAjtB4+Pe2wkRyO5lEQPFtWuLLlgEK8QIX
eEc9qzxjl2qHnlkIr4fow1KbG0DMcngovQz6RkHBAkYUkYJ4qoqNjSP/R1c8
7Pr2oXDatv+u7pfF8hGm8se4OhovjtESq75g/OVFdO3YTWdtRrQzhzUHbZUk
HFamHmg9ycygyoLWhA/cBCmACY3sV19bl15dxLsDwFXMMnNk7AxCPUPQg5QY
Awk+VmMM+FgkFB15SzCUHsnnb+C9NkdzWRCPRR/GqKDZD8VDcbXqqi2cuHUp
YShy45RBU4Sfy9yLAiFRsorfU8KpUhQJrfAQd+emVKwEIGk6dZ7VCK7xx/UT
X0O88O9Swvw6ZRQy1lvw25Xb3S1UAuMRMHe/IBEl3sMPYjdEKjPA9GJ40XFE
jyoT6VkvJf6+xmWPTic346eH+GNfKQ+E3j6pydBtswPKkvWHxmTkGumIc76J
JcnWRspMidkY3mu8XAzzCD47mUvbkbQCgj0AgJjay9FCIg4dnvyoFulD6R9x
lg+5BObGx5u6eA4wB+/a6XPL+E9GKqDB6BqlLYStu+jCTxeRPhyrox9nFPDe
ZTk0j0UzrtJba9XcpXlcliV1tQgtZP67k4kD89L7ZnC565TqIDPx0lWJmZoj
kVix+MO4L+nEb4b4GuJ4y16lP9Ps/d25jPHaCNF5KADyC/h/w4JOSmF7tkX1
OyXDMKEcJlL4oBJpYvIDCkyJpQpWW/nrDYmzagWGo8xSWW+/wFi8GNwzTaxC
wv7UaTEfIpO2jfYSZ+yB2RYSZBNt5hYTOg2vngXtseilFZdVfzI9j8lhHUad
6rXOaAGhZ9asx0vZBjE3NJkX7HxNmyenMuNpb+RKAm9ui8rQFDlr+DKaEgpc
6M7KFkk4vKMMojc9SkYIuozRdSnE5F2RYdoSyfpk00141tPmY6o0kxHIFSTR
8qeNcCrk9WzDGaOIX0D98ud61Liw3nxMrh4CAtYXmWkbTAPIzXaHKWmFlhYg
QBAIvXXxhqfP7vmRyzk806+NUfBZr9n/+9Iwb/OMElquEBflsnU4GyKjklgH
EjxIozua0jXr7BZAz0jKGU/GJodrVrWQaDn6/mg/YEvQUNUs9QzbRImgkaSU
SAyOlUu6SOyQQ8xF+oQ2JW8s7UqU3ShweFMXm95GHQf7zvpMUhwwS60mxbBr
kbteJZmMuU4T2de6XUYrEPIljPts5OHdkTQHcs4+JYiTAMNVa7aK51u4L1HM
wDGMO3YjYQopnCk6IOuqEExQ9N3ZWCrS8uYziXnQ54DPkrUR32T9Np503iGS
lf65lMLOviOxrcFodMmQAkGz/Fo5SMOnYWTKwMAIr1Vj9AuksCTfsFjIafY5
VZ4E+CC1H8axRcibtbClXguPMQ4eMKypAFiiDNCR+XsLwptIWFfDlVHtBjVj
HALZJTR1+Ubf5KUnO82J0ZxinOdfymrZzn0mYlAJRxaOcAxCSyXB1UKWM47G
m/zYOAdUXHD8ubiFEuU9u4omHTZdKX4ffMx4yMcpOXpo60EPvLpcb8ojrb9o
EePoUjjMLvlHPPlVWd8sUK2LBzt8WoPvmsfrE/C+WQ8xgt4faUMaeKKwJ+LN
j1BFiftOQpswbG/bei2pExnFGiw/QzkWC2Im+c2lkfTclkyQFCpvyUHAvZB2
jozTOh9dlqscLYB4pvLBRqoR6C2TY/mAkje/PuakH4uptKshdxTAcnDDSFO6
vyoyPVoPZ10IEc2B0D1uBsg56WHpbbyhnwxAdl5LtRJ8E24Qp460YtaSh4Ou
uCtFoBooxQdvKyoLQ1iSm0Zbd6CbyIHdFA+4M0YWz24Jim3e7aLHqYctlV3n
U0CdrncWiOah3K1OT6xgjH3yi2bVBO0DymSkj5BpzwQnGIazHXH6HhqFgMY4
Drv3l7aL6+SSrJhv4waIfjeWZvmbEuQTU/3LazetV5IkuI7Pw1wGlgE+uWsP
LIKzHFcIo68sMUtQrFwMXVwEt17fNwo2Vq+Fuy5sb2NUjenyeqe0VzIJq7Ar
PABZjw/ldSCa15okX0IfyRawMnaicrVeZb0t8wrUemrJMolmUL56I8bVlAk6
ZIRwEF+WAoHURECmUcRtPqxg8IKOfOfcBLmxlWeWetns+ZPH+8OIardrYr/0
FGxKDno+lGkDBL8f212lraHZq2v46XM/hi/vvXrQTvMxR/6HQrDeOFn+BmKl
jMB8XT2IpgAKzzS39iZG42WXE/Y1L5ix5RX+5iipR80DiyEko6UhB4NoPoaf
AxYbzIRhX2V/xR8OnmJd7oVfuqlM1lkNDiuMBIrTrB99qpw/KLxtu027i7c5
YtJppeki3MDJUX5iCsvLRZ+uX78FIJq5Hfocca2lULkbajVIzOZ08ThYpTyq
lwCFr8VyUCbSa1wtC3RaM5ht0vvd2ftFKpvETzyDxhxE5wKvm10wNdZUw320
yMYAc7bazY7PL96cnTitzNeE25xffLhcfK2Az3NG6IuPcHWv4i4Z8IpEkaHX
fx5cWQv7qTDpS166iINpN4PxVS20FwffWDg3o0FWlvsgCwdnC1N3+nU8cc+1
ag276RPbJ/fkP0F0tGYjYIIcjkg66QRoWC0envMO8657DXTkBpqsKsdXSOaL
oyWV8ho2fsP8pTyskBrGgEmISjkilIIIlBbvoi4eT2fZnM1sfqVMnpjvvBjG
gqH+2jhwK/WC7U4+eTm3kzXRl2vfiHSv742cQCUtZEWiS/jtWwftqPwO4U5P
n93wXwv8axxohVw0nE1G1nmqWco4XE6cx8ui7Eh2CJ7cBwoFvWQozK2Q4GvF
tb7qKtUsxESJ559GiiROgeZKVhIeo6ulnChb5XNYtaq954lBR94cHojDuQph
GcANlyWLr6saFtAt/fgSsl979S33MxF61VKm9yBIJLafzMNE4DKflXj6lTW5
bExykVfjIeRN1wI0c+ckfUGNyohSlSZGhWjUvZHg8NB8uCoTl8U9Dxidhn0+
ULCWSxxHuwtNIXa5JnJp+AXSIZIkVISpemRkpSgn42axXlDR2M+ZImsuHUY3
VImHnLoIZvPHZjyxc0XRJ3bClOeoCVNgQKqweutFyWNKE/RWeScv1THx6uzS
2TxOJMKyJW5lSAJX0o6RTpN2MnIBl6VxAXZe3mjdSymC7cKnM2Dp2ocyl4Q/
sMoUe7jba6YoEwrGTlN1Kh/P0bYeNhvjk1HZmfmRZzlq2MHoZNgwel35INmI
81onQTUM2hoWLMFmyiquY33zB9uj9d4sS35YhRF7l/5VDBlvJXZy2pRZ9P/X
I/Kmp6frtstkP9tMc9X0rAlSl6tkp86oI4MgSdXi7NO0Qiq8javwQwHOMTE9
zyBOcd5jKCHUYbNc22hyKEk3EQ8UJdJXEHVi8Mq6k8ZnKbMLjRRdC0GJkp8B
3gUTqbJqnu/z8jfBM4yuJhSCWyGKp+xv+ZiPNK14K1uJHgjfhsyuUHeHwCoe
atA41Z4+y/85NTnXozHoa8HhjBejZIyE0CpBEfbbdpAXF86L6I2BrLDHGXC1
K7fRF2C/hXLGz2c/V/HorIYeOiq7oSnm4d3QYQnFCPMdaibxO2fNuovPerGK
AyWEESSGSHDNPlZ1z2tfxL1QlHX4hP/G1YDPLgsARO9mPxer8o5De3Mb484Y
urXo/F0gOQPIxv8Co2pMLMaTAQA=

-->

</rfc>
