<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.39 (Ruby 3.4.9) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-dsmullen-ppd-architecture-06" category="info" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.33.0 -->
  <front>
    <title abbrev="PPDArch">Privacy Preference Declaration for Home Networks</title>
    <seriesInfo name="Internet-Draft" value="draft-dsmullen-ppd-architecture-06"/>
    <author fullname="Daniel Smullen">
      <organization>CableLabs</organization>
      <address>
        <email>d.smullen@cablelabs.com</email>
      </address>
    </author>
    <author fullname="Brian Scriber">
      <organization>CableLabs</organization>
      <address>
        <email>brian.scriber@computer.org</email>
      </address>
    </author>
    <date year="2026" month="May" day="18"/>
    <keyword>privacy preferences</keyword>
    <keyword>home networks</keyword>
    <keyword>internet of things</keyword>
    <keyword>device transparency</keyword>
    <abstract>
      <?line 37?>

<t>This document describes an architecture for signaling household privacy preferences to devices in home networks through Privacy Preference Declarations (PPDs).  The architecture enables a PPD participant to discover a PPD service endpoint, establish trust in that endpoint through the applicable protocol and security profile, retrieve the applicable household policy instance, and acknowledge receipt of that policy instance.  The acknowledgment establishes that a specific policy instance was made available to the participant; it does not, by itself, assert anything about the participant's subsequent behavior.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://drspangle.github.io/draft-dsmullen-ppd-architecture/draft-dsmullen-ppd-architecture.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-dsmullen-ppd-architecture/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/drspangle/draft-dsmullen-ppd-architecture"/>.</t>
    </note>
  </front>
  <middle>
    <?line 41?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The rapid growth of Internet-connected devices in the home has introduced new and often overwhelming challenges to personal privacy.
While many of these devices collect sensitive data by design, the tools offered to users to understand or control that collection are fragmented, confusing, or entirely absent.
When privacy settings do exist, they are often buried in obscure menus, expressed in legal or technical jargon, and lack the contextual clarity needed to support meaningful decision-making.</t>
      <t>The result is a fragmented operational model.
Users must manage privacy through device-specific controls that vary widely in quality and semantics, while device vendors and service providers often implement isolated mechanisms with no common way to convey household privacy preferences across devices.
This lack of a shared signaling model makes it difficult for households to understand which devices have been presented with which privacy expectations, and it makes interoperable deployment harder for implementers.</t>
      <t><xref target="RFC7258"/> frames mass data collection as a technical threat, urging protocol designers to limit exposure through encryption and data minimization.
While this principle is crucial in adversarial, internet-scale contexts, the model proposed in this document takes a different approach: rather than hiding data flows, it seeks to govern them.
Privacy here is not achieved by making devices blind, but by making user-defined preferences visible to devices and associated services.</t>
      <t>This use of privacy is related to, but distinct from, the privacy guidance in <xref target="RFC6973"/>, which emphasizes reduced observability, linkability, and identifiability in protocol design.
Those properties remain important, but PPD focuses on a different home-network problem: a user needs a consistent way to express household privacy preferences and to know that those preferences were made available to participating devices or associated services.
This document is also aligned with the user-agency goals described in <xref target="RFC8280"/>, but it is narrower and more operational.
It describes an architecture for privacy-preference signaling and recordkeeping, not a general framework for human-rights analysis or for constraining device behavior.
Home networks are a significant and operationally important IoT environment.
They commonly place a local administrative boundary around large numbers of devices, many with limited or no end-user interface, making them a concrete target for a privacy-preference signaling architecture.
In this architecture, discovery identifies candidate participant-facing service endpoints.
Trust in a selected endpoint, and in the policy instances it presents, is established separately through the applicable protocol and security mechanisms rather than by discovery alone.
This also addresses an asymmetry common in current deployments: the household user is often required to acknowledge device- or vendor-defined terms, while the household has no comparable way to record that a participating device or associated service was presented with the household's privacy policy.
PPD introduces a reciprocal signaling path in which presentation and acknowledgment of a household policy instance can be recorded by the household domain.
The objective is to provide a coherent architectural basis for devices and associated services to retrieve, acknowledge, and keep current with household privacy preferences within that administrative domain.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>The terms below define both protocol roles and core concepts used by this architecture.
The definitions of privacy, transparency, and user control are included here because they describe the conceptual scope of PPD rather than separate protocol mechanisms.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <dl>
          <dt>Privacy:</dt>
          <dd>
            <t>In this document, the ability of users to understand and shape how data about them, their household, or their home environment is collected, used, retained, and shared by devices and associated services.</t>
          </dd>
          <dt>Transparency:</dt>
          <dd>
            <t>The property that data practices are made visible and understandable to the user, including what data is collected, how it is processed, where it is shared, and what policy preferences apply.</t>
          </dd>
          <dt>User control:</dt>
          <dd>
            <t>The ability of a user or household to define privacy preferences and make those preferences visible to devices or associated services in a consistent and actionable way.</t>
          </dd>
          <dt>Privacy Preference Declaration (PPD):</dt>
          <dd>
            <t>A structured expression of household privacy preferences that can be discovered, retrieved, and acknowledged by PPD participants.</t>
          </dd>
          <dt>PPD service endpoint:</dt>
          <dd>
            <t>A participant-facing service, and the baseline discovery target for participants, through which a PPD participant discovers, retrieves, and acknowledges applicable policy instances.</t>
          </dd>
          <dt>Policy authority:</dt>
          <dd>
            <t>The authoritative source of household policy state and of any inputs used to derive an effective policy for a participant.  The policy authority may be local or remote.  Participants are not required to discover or address the policy authority directly in the baseline architecture.</t>
          </dd>
          <dt>Household policy:</dt>
          <dd>
            <t>A policy selected or maintained for a home network that represents the household's privacy preferences.</t>
          </dd>
          <dt>Effective policy derivation:</dt>
          <dd>
            <t>The logical function, performed by or on behalf of the policy authority, that determines the effective policy instance for a participant.</t>
          </dd>
          <dt>Effective policy:</dt>
          <dd>
            <t>The policy instance that applies to a particular PPD participant at a particular time, after effective policy derivation has resolved household policy state and any applicable participant-specific inputs.</t>
          </dd>
          <dt>PPD participant:</dt>
          <dd>
            <t>A device, or a trusted intermediary such as a backend service acting on behalf of a device, that participates in PPD by retrieving and acknowledging an applicable policy instance.</t>
          </dd>
          <dt>Policy instance:</dt>
          <dd>
            <t>A specific version or representation of an effective policy that can be identified for acknowledgment and recordkeeping.</t>
          </dd>
          <dt>Association:</dt>
          <dd>
            <t>The state established when a PPD participant has retrieved the current applicable effective policy and acknowledged receipt of that specific policy instance.</t>
          </dd>
          <dt>Current association:</dt>
          <dd>
            <t>Association state that still corresponds to the latest applicable effective policy for the participant and remains fresh according to the renewal model enforced by the PPD service endpoint.</t>
          </dd>
          <dt>Association freshness:</dt>
          <dd>
            <t>The property that an association remains within the bounded interval, or before the renewal deadline, accepted by the PPD service endpoint for treating that association as current.</t>
          </dd>
          <dt>Stale association:</dt>
          <dd>
            <t>Association state that still refers to the latest applicable effective policy instance, but whose freshness can no longer be confirmed because renewal did not occur within the bounded interval accepted by the PPD service endpoint.</t>
          </dd>
          <dt>Needs reassociation:</dt>
          <dd>
            <t>A state in which current association cannot be confirmed because the applicable effective policy changed, participant state relevant to effective policy derivation changed, or enough state was lost that the existing association no longer applies reliably.</t>
          </dd>
          <dt>Reassociation:</dt>
          <dd>
            <t>The process by which a PPD participant recovers from stale association or a needs-reassociation state and re-establishes current association.</t>
          </dd>
          <dt>Broken association:</dt>
          <dd>
            <t>A state in which stored or reported information is contradictory or incomplete enough that current association cannot be determined reliably.</t>
          </dd>
          <dt>Policy acknowledgment:</dt>
          <dd>
            <t>A signal that a PPD participant has received a specific effective policy instance.  A policy acknowledgment is not a statement that the device is compatible with every policy term or that the device will behave in a particular way.</t>
          </dd>
          <dt>Network-observed device:</dt>
          <dd>
            <t>A device that is visible to the local network through ordinary network observation but that has not established association through PPD.</t>
          </dd>
          <dt>Unmanaged device:</dt>
          <dd>
            <t>A network-observed device that is not known to participate in PPD or is not currently manageable through PPD association.</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="limitations-of-existing-mechanisms">
      <name>Limitations of Existing Mechanisms</name>
      <t>Current mechanisms for managing data privacy within the home environment exhibit limitations.</t>
      <section anchor="device-specific-configurations">
        <name>Device-specific Configurations</name>
        <t>Individual devices often employ unique privacy settings, thereby complicating user management of privacy across the entire network.
This complexity can inadvertently lead to unintended data sharing.</t>
      </section>
      <section anchor="ineffective-and-unusable-user-interfaces">
        <name>Ineffective and Unusable User Interfaces</name>
        <t>Navigating and configuring privacy settings on individual devices can be a time-consuming and frustrating experience for users.
These ineffective interfaces often lead users to habitually agree to relax their privacy preferences without fully understanding the implications of their decisions.
This fosters a general resignation towards privacy management, making it difficult for users to exert meaningful control over their personal data and ultimately compromising their privacy expectations.</t>
      </section>
      <section anchor="relationship-to-existing-work">
        <name>Relationship to Existing Work</name>
        <section anchor="dnt-and-p3p">
          <name>DNT and P3P</name>
          <t>Protocols like Do Not Track (DNT) and Platform for Privacy Preferences Project (P3P) have not achieved widespread adoption and have proven inadequate for addressing nuanced privacy needs.
These protocols do not provide the participant-specific policy signaling, lifecycle handling, or home-network operational posture needed here.
They also do not provide a practical basis for recording that a participating device or associated service was presented with a household policy instance.</t>
        </section>
        <section anchor="mud">
          <name>MUD</name>
          <t>Manufacturer Usage Description (MUD) <xref target="RFC8520"/> is the closest existing precedent for device-to-home-network signaling.
MUD is focused on manufacturer-defined network communication intent presented to local network infrastructure.
PPD addresses a different problem: household-defined privacy preference signaling, participant-specific effective policy presentation, and recordkeeping about whether a participant was presented with a current household policy instance.
The two approaches may complement each other in a deployment, but MUD does not provide the privacy-policy lifecycle or recordkeeping model described here.</t>
        </section>
        <section anchor="privacy-vocabularies-and-policy-models">
          <name>Privacy Vocabularies and Policy Models</name>
          <t>Vocabulary and policy-expression efforts such as the Data Privacy Vocabulary (DPV) and ODRL are closer to the content layer than to the signaling layer.
PPD does not attempt to replace such work with a new general-purpose ontology or rights language.
Instead, PPD separates concerns: this architecture defines roles and lifecycle, the companion taxonomy work defines compact terms that can map to richer vocabularies, and the companion protocol work defines the participant-facing signaling path by which an effective household policy is presented and acknowledged.</t>
        </section>
      </section>
    </section>
    <section anchor="operational-scenarios">
      <name>Operational Scenarios</name>
      <t>This section describes representative operational cases for the architecture in home-network environments.
The scenarios focus on discovery, association, reassociation, and mixed-participant visibility rather than on user-interface details.</t>
      <section anchor="initial-discovery-and-association">
        <name>Initial Discovery and Association</name>
        <t>A PPD participant joins the home network and obtains one or more candidate PPD service endpoints through configuration or local network discovery.
In a common home deployment model, the PPD service endpoint is hosted by a residential gateway or equivalent home-network service.
Discovery identifies reachability, not authority.
The participant establishes a secure connection to a selected endpoint, confirms that endpoint through the applicable trust mechanism, retrieves the applicable effective policy instance, and acknowledges receipt of that policy instance.
The PPD service endpoint may present policy derived from a local or remote policy authority without exposing that internal topology to the participant.
At the end of this process, the participant has established association if the current applicable effective policy has been delivered and acknowledged.
The PPD service endpoint also determines the initial freshness state of that association.</t>
      </section>
      <section anchor="policy-update-and-reassociation">
        <name>Policy Update and Reassociation</name>
        <t>The household policy, or the participant's effective policy, changes.
The PPD service endpoint immediately invalidates current association for the participant.
The participant enters a needs-reassociation state until it retrieves and acknowledges the updated effective policy instance.
This scenario illustrates that association state is tied to a specific policy instance and not to prior acknowledgments alone.
Reassociation re-establishes current association by confirming that the participant has seen the latest applicable policy instance.</t>
      </section>
      <section anchor="association-freshness-expiry-and-renewal">
        <name>Association Freshness Expiry and Renewal</name>
        <t>The applicable effective policy instance is unchanged, but the participant does
not renew within the bounded interval accepted by the PPD service endpoint.
The association becomes stale even though no policy change occurred.
The participant no longer has current association until it completes the
required renewal procedure.
This scenario distinguishes stale association from a needs-reassociation state
caused by a changed policy instance.</t>
      </section>
      <section anchor="participant-state-change">
        <name>Participant State Change</name>
        <t>A participant changes in a way that can affect the applicable effective policy instance, such as a declaration update, capability change, or other state change relevant to effective policy derivation.
The PPD service endpoint determines that current association can no longer be confirmed using existing state alone.
The participant then retrieves and acknowledges the newly applicable effective policy instance.
This scenario keeps the architecture focused on policy signaling and recordkeeping without assuming that every state change requires the same local handling or transport behavior.</t>
      </section>
      <section anchor="mixed-participant-network-visibility">
        <name>Mixed-Participant Network Visibility</name>
        <t>A home network contains both PPD participants and devices that do not participate in PPD.
The household can still use local management functions to distinguish associated participants, participants whose current association cannot be confirmed, and network-observed or unmanaged devices.
This scenario illustrates that non-participating devices are an expected operational reality.
Their presence can inform transparency and local management decisions, but it does not create association or change the baseline signaling role of PPD.</t>
      </section>
    </section>
    <section anchor="goals">
      <name>Goals</name>
      <section anchor="enhance-user-control">
        <name>Enhance User Control</name>
        <ul spacing="normal">
          <li>
            <t>Support a household's ability to define privacy preferences that can be made available consistently across participating devices and associated services.</t>
          </li>
          <li>
            <t>Provide an architectural basis for recording whether the current applicable policy was made available to a participant.</t>
          </li>
          <li>
            <t>Create a reciprocal acknowledgment model in which the household can retain a record that a participant or associated service was presented with, and acknowledged, a specific household policy instance.</t>
          </li>
        </ul>
      </section>
      <section anchor="promote-interoperability">
        <name>Promote Interoperability</name>
        <ul spacing="normal">
          <li>
            <t>Establish a standardized mechanism for devices from diverse manufacturers to discover PPD service endpoints, retrieve applicable privacy policies, and acknowledge policy instances.</t>
          </li>
          <li>
            <t>Support consistent association and reassociation behavior across heterogeneous participants.</t>
          </li>
        </ul>
      </section>
      <section anchor="enable-flexibility">
        <name>Enable Flexibility</name>
        <ul spacing="normal">
          <li>
            <t>Allow deployments to place policy storage and effective-policy derivation locally or remotely without changing the baseline participant-facing contract.</t>
          </li>
          <li>
            <t>Leave room for deployment-specific protocol profiles where constrained environments or different operational models require them, including trusted-intermediary participation for devices that cannot satisfy the minimum authenticated direct-participant bar.</t>
          </li>
        </ul>
      </section>
      <section anchor="facilitate-transparency">
        <name>Facilitate Transparency</name>
        <ul spacing="normal">
          <li>
            <t>Provide a basis for local management functions to distinguish currently associated participants, stale or reassociation-needed participants, and non-participating devices.</t>
          </li>
          <li>
            <t>Improve visibility into which participants have been presented with the current applicable policy instance, without implying enforcement of device behavior.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="scope">
      <name>Scope</name>
      <t>This document defines a high-level architectural framework for Privacy Preference Declaration (PPD) in home-network environments.
It focuses on roles, trust boundaries, lifecycle meaning, and operational assumptions for making household privacy preferences available to devices and associated services.</t>
      <t>This document does not delve into specific implementation details, such as message formats, data structures, security algorithms, or user interface design.
Furthermore, this document does not define mechanisms that modify device behavior, legal and regulatory considerations, or specific security protocols.
Where this document discusses recordkeeping, that recordkeeping is limited to signaling and recording that an applicable household policy was made available to and acknowledged by a PPD participant.
That recordkeeping can provide a basis for later accountability, audit, or dispute analysis, but this document does not define enforcement behavior or prove subsequent compliance.</t>
      <t>Specific implementation details and message formats are expected to be addressed in companion specifications.
This document aims to be complementary to existing and future standards related to home networking, IoT security, and data privacy.</t>
      <t>This document provides the foundation for subsequent work, including:</t>
      <ul spacing="normal">
        <li>
          <t>Privacy Preference Declaration Taxonomy: <xref target="I-D.draft-dsmullen-ppd-taxonomy"/> defines the core vocabulary, extension model, and mapping expectations for the privacy-related terms used by PPD statements and rules.</t>
        </li>
        <li>
          <t>The companion protocol specification document, <xref target="I-D.draft-dsmullen-ppd-protocol"/>, defines the message formats, data structures, and communication procedures for PPD, including mechanisms for PPD service endpoint discovery, metadata confirmation, participant registration, optional participant declaration, policy retrieval, policy acknowledgment, renewal, and reassociation.</t>
        </li>
      </ul>
    </section>
    <section anchor="architecture-overview">
      <name>Architecture Overview</name>
      <section anchor="assumptions">
        <name>Assumptions</name>
        <t>This document makes the following assumptions:</t>
        <ul spacing="normal">
          <li>
            <t>User Control: It is assumed that users have a reasonable level of control over their home network infrastructure.
This includes the ability to configure routers, install software updates, and manage device access to the network.
This control is essential for users to effectively manage their privacy preferences and make them available to devices within their home network.</t>
          </li>
          <li>
            <t>Resource Constraints: It is assumed that the home network environment and devices operating therein have resource limitations, such as limited processing power and bandwidth.
We limit this assumption by considering that the PPD protocol and its associated mechanisms should be designed with these constraints in mind, minimizing overhead and ensuring efficient operation even on resource-constrained devices. Where a device cannot satisfy the minimum authenticated direct-participant bar, this architecture expects indirect participation through a trusted intermediary rather than weakening the meaning of direct protocol participation.</t>
          </li>
          <li>
            <t>Security Considerations: It is assumed that home networks in scope of this document are susceptible to typical security threats, including insider threats (or non-malicious misconfiguration) and vulnerability to local attacks.
We limit this assumption by considering specific security threats to protect user privacy and the integrity of the privacy policy.
This includes considerations for secure policy dissemination, device authentication, and protection against unauthorized access and modification of privacy preferences.</t>
          </li>
          <li>
            <t>Single User Policy: This document assumes that each device implementing the protocol is governed by a single, unified privacy policy defined by its primary user.
While other individuals within the same physical environment (e.g., household) may have different privacy preferences, the protocol is designed with the expectation that a device or associated service can receive the policy established by its primary user.
Future extensions could explore mechanisms for managing and reconciling multiple user-defined policies on a single device, particularly in shared or multi-user environments.</t>
          </li>
          <li>
            <t>Endpoint Discovery and Trust: It is assumed that configuration or local network mechanisms can identify one or more candidate PPD service endpoints for a participant.
Discovery alone does not establish that an endpoint is authoritative for household policy.
The applicable protocol profile needs a separate way to authenticate the selected endpoint and confirm that policy presented through that endpoint is authoritative for the participant's household context.</t>
          </li>
          <li>
            <t>Policy Signaling: It is assumed that PPD participants can retrieve the applicable household privacy policy through a PPD service endpoint and acknowledge receipt of that policy instance.
This acknowledgment forms the basis of association.
It is a receipt signal only; it does not assert that the participant is compatible with every policy term or that it will behave in a particular way.
Current association also depends on association freshness as determined by the PPD service endpoint.</t>
          </li>
          <li>
            <t>Association Freshness: It is assumed that current association expires unless the participant renews within a bounded interval accepted by the PPD service endpoint.
Participant-initiated exchanges provide the renewal or recovery path, but the PPD service endpoint remains the source of truth for whether association is current, stale, or in a needs-reassociation state.</t>
          </li>
          <li>
            <t>Local Recordkeeping: At a minimum, the architecture enables the household to know which PPD participants have acknowledged the current applicable policy.
Deployment-specific responses to participants that do not acknowledge policy, or to devices that do not participate in PPD, are local management decisions and are outside the baseline signaling function defined here.</t>
          </li>
        </ul>
      </section>
      <section anchor="association-state-and-freshness">
        <name>Association State and Freshness</name>
        <t>This architecture treats the PPD service endpoint as the source of truth for
participant association state.
A participant establishes association when it retrieves and acknowledges a
specific applicable effective policy instance.</t>
        <t>Current association exists only when both of the following are true:</t>
        <ul spacing="normal">
          <li>
            <t>the acknowledged policy instance still corresponds to the latest applicable
effective policy for that participant; and</t>
          </li>
          <li>
            <t>the association remains fresh according to the renewal model enforced by the
PPD service endpoint.</t>
          </li>
        </ul>
        <t>If the applicable effective policy instance is unchanged but the freshness
interval expires before renewal, the participant enters stale association.
If the applicable effective policy changes, if participant state relevant to
effective policy derivation changes, or if enough state is lost that the prior
association can no longer be trusted, the participant enters a
needs-reassociation state.
In either case, the participant no longer has current association.</t>
        <t>Participant-initiated exchanges provide the renewal or recovery path, but they
are not the source of truth for whether association is current.
The PPD service endpoint determines whether a participant is current, stale, or
in needs reassociation.</t>
      </section>
      <section anchor="discovery-and-policy-authority-boundary">
        <name>Discovery and Policy-Authority Boundary</name>
        <t>This architecture separates discovery of a participant-facing service endpoint
from trust establishment.
A participant may learn one or more candidate PPD service endpoints through
configuration or local network mechanisms, but discovery alone does not make
any candidate authoritative.
Before treating a policy instance as authoritative, the participant needs the
applicable protocol profile to authenticate the selected endpoint and confirm
that it is authorized to present policy for the household context.</t>
        <t>The participant-facing contract is the PPD service endpoint, not direct access
to the policy authority.
A deployment may place storage, policy combination, and effective policy
derivation behind that service.
When the PPD service endpoint and policy authority are distinct, the deployment
needs to preserve at least:</t>
        <ul spacing="normal">
          <li>
            <t>authenticity of the effective policy instance presented to the participant;</t>
          </li>
          <li>
            <t>integrity of policy-instance identifiers and association-freshness metadata;</t>
          </li>
          <li>
            <t>an unambiguous binding between the selected PPD service endpoint and the
policy authority on whose behalf it presents policy.</t>
          </li>
        </ul>
        <t>These are architectural invariants.
The companion protocol specification document, <xref target="I-D.draft-dsmullen-ppd-protocol"/>, defines the participant-facing transport, metadata confirmation, and security-profile expectations,
while deployment profiles still choose concrete mechanism details.</t>
      </section>
      <section anchor="key-components">
        <name>Key Components</name>
        <t>User Interface: A user-friendly interface (e.g., mobile app, web portal) for creating and managing privacy preferences.</t>
        <t>PPD Service Endpoint: A participant-facing service through which PPD participants discover, retrieve, and acknowledge applicable policy instances.
In a common home deployment model, this service is hosted by a residential gateway or equivalent home-network service.
A participant may learn candidate PPD service endpoints through configuration or local network discovery, but it treats a selected endpoint as authoritative only after the applicable trust mechanism succeeds.</t>
        <t>Policy Authority: The authoritative source of household policy state and any inputs used for effective policy derivation.
The policy authority may be local or remote.
A PPD service endpoint can obtain policy from a policy authority without exposing internal storage or computation topology to participants.
Participants are not required to discover or communicate with the policy authority directly in the baseline architecture.</t>
        <t>Effective Policy Derivation: The logical function, performed by or on behalf of the policy authority, that determines the applicable policy instance for a participant.</t>
        <t>Participant Declarations and Consent Requests: Optional participant inputs that can disclose data-handling declarations or request consent for uses not covered by baseline policy.
These inputs are distinct from the minimal path of policy retrieval and policy acknowledgment.
Where a deployment exposes a coarse comparison result for participant declarations at the protocol boundary, that result belongs on the declaration path rather than in the effective policy or policy acknowledgment objects. That comparison surface is diagnostic only; it is not a baseline negotiation channel, policy-relaxation mechanism, or homeowner-prompt path.</t>
        <t>Recordkeeping and Management Mechanisms: Deployment-specific mechanisms for presenting association state, participant status, effective policy views, and network-observed devices to the household.
Such mechanisms are not device-behavior requirements in the baseline PPD architecture.</t>
      </section>
      <section anchor="data-flows">
        <name>Data Flows</name>
        <t>This section outlines the high-level data interactions between users, PPD participants, the PPD service endpoint, and the policy authority in the Privacy Preference Declaration (PPD) framework.
It describes how privacy preferences are defined by users, made available to participants, and used as the basis for signaling and recordkeeping in a home network environment.</t>
        <t>The process begins when a user defines a set of privacy preferences that apply to their household.
These preferences may express rules such as which types of data may be collected, under what conditions data may be processed or shared, or which retention practices are acceptable.
The design of the user interface used to author these preferences, including its presentation, usability, or input modalities, is out of scope for this document, and will be addressed separately.
Likewise, the underlying vocabulary and structure of the privacy preferences, including data categories and associated constraints, are specified in <xref target="I-D.draft-dsmullen-ppd-taxonomy"/>.</t>
        <t>Once created, the user's preferences are maintained by a policy authority, which may reside locally on a networked controller or be accessible through other trusted infrastructure.
The policy authority may include storage, effective policy derivation, or both.
When a new device joins the home network, it initiates an onboarding process during which it obtains one or more candidate PPD service endpoints through configuration or local network mechanisms.
Discovery identifies reachable candidates, but does not by itself establish that any candidate is authoritative for household policy.
The participant then establishes a secure channel to a selected endpoint and authenticates that endpoint according to the applicable protocol profile before retrieving policy.
Following onboarding, the PPD participant performs association, which involves retrieving the household privacy policy and acknowledging receipt of the applicable policy instance.
In some deployments, the participant is a backend service associated with the device rather than the local device itself.
The PPD service endpoint may present policy derived from a local or remote policy authority without exposing that internal topology to the participant.
The participant-facing contract ends at the PPD service endpoint; any split between that service and the policy authority is internal to the deployment.
Where those components are distinct, the deployment preserves the authenticity and integrity of the effective policy instance, policy-instance identifier, and freshness metadata presented through the service endpoint.
Devices may optionally report their data handling declarations to the PPD service endpoint at this stage.
The PPD service endpoint also determines a freshness interval or renewal deadline for the resulting association state.</t>
        <t>If a device seeks to perform actions not permitted under the baseline policy, for example, collecting or sharing data beyond what the user has authorized, it may initiate a consent request workflow.
However, the design and behavior of this consent mechanism is explicitly out of scope for this document.
Inappropriate or poorly designed consent flows, such as those that involve excessive prompting, ambiguous language, or misleading options, can inadvertently pressure users into accepting data practices that conflict with their preferences.
Even without malicious intent, these experiences may degrade trust and lead to outcomes inconsistent with user expectations.
Future specifications should describe consent interactions that are clear, proportionate, and respectful, helping users make informed decisions without friction or fatigue.</t>
        <t>Current association is not indefinite.
If the participant does not renew before the freshness interval expires, the PPD service endpoint treats the association as stale even if the applicable effective policy instance is unchanged.
Reassociation is required when current association can no longer be confirmed for a participant.
This can occur because the applicable effective policy changed, because participant state relevant to effective policy derivation changed, because the association became stale, or because enough state was lost that the prior association can no longer be trusted.
Reassociation re-establishes current association by retrieving and acknowledging the latest applicable effective policy instance, or by completing a renewal procedure defined by the applicable protocol profile when the policy instance is unchanged.
Devices are not expected to re-collect consent for data uses already covered by existing, valid consent.</t>
        <t>To support straightforward implementation and debugging, the companion protocol specification document, <xref target="I-D.draft-dsmullen-ppd-protocol"/>, defines a simple machine-readable representation for privacy policies, declarations, and acknowledgment state.
JSON is a practical baseline encoding for the architecture and for many constrained home-network deployments.
More compact encodings can be considered later if a specific deployment profile demonstrates a need for them.</t>
        <t>The companion protocol specification document, <xref target="I-D.draft-dsmullen-ppd-protocol"/>, defines how association freshness is conveyed, including whether the protocol uses bounded renewal intervals, explicit renewal deadlines, or equivalent lease-style semantics.
It also distinguishes stale association from needs-reassociation states caused by policy or participant-state changes.</t>
        <t>It is important to note that the baseline requirement under this architecture is limited to discovery, retrieval, acknowledgment, and any renewal needed to maintain current association for the user's privacy policy.
These actions provide a signaling and recordkeeping mechanism for establishing that the current applicable policy was made available to the participant.
However, this document does not define how device behavior is changed by the policy, nor does it specify how to handle cases where a device cannot fully satisfy a given policy.
These aspects, including optional status reporting, detailed conflict-resolution procedures, or auditing, may be addressed in future work.</t>
        <t>Finally, while this document defines the overall data flow and interaction sequence, it does not define message formats, communication protocol details, or consent interface specifications.
The companion protocol specification document, <xref target="I-D.draft-dsmullen-ppd-protocol"/>, specifies the participant-facing message formats and protocol details.
Consent interface specifications, if any, remain future work.</t>
      </section>
      <section anchor="non-ppd-and-network-observed-devices">
        <name>Non-PPD and Network-Observed Devices</name>
        <t>Home networks commonly include devices that do not implement PPD, cannot be updated to implement PPD, or are visible only through local network observation.
The architecture treats these devices as expected operational cases rather than exceptional failures.</t>
        <t>A local management function can classify such devices as network-observed or unmanaged based on information available within the home network.
That classification can improve household transparency by showing that a device is present even though it has not established association through PPD.
Network observation does not create association, does not imply that the device has received a household policy, and does not imply anything about the device's behavior.</t>
        <t>Any local response to unmanaged devices, such as notification, inventory display, or other network management action, is a deployment decision outside the baseline PPD signaling architecture.</t>
      </section>
    </section>
    <section anchor="policy-language">
      <name>Policy Language</name>
      <t>The specific details of the privacy policy language, including its syntax, structure, and extensibility mechanisms, are out of scope for this document.
The policy vocabulary and taxonomy of privacy concepts and attributes are defined in <xref target="I-D.draft-dsmullen-ppd-taxonomy"/>, including the compact identifier model, extension namespaces, and mapping expectations used by the companion protocol specification.</t>
      <section anchor="language-requirements">
        <name>Language Requirements</name>
        <ul spacing="normal">
          <li>
            <t>Human-readable: Policies should be easily understandable by users.</t>
          </li>
          <li>
            <t>Machine-readable: Policies should be machine-processable for automated interpretation and signaling.</t>
          </li>
          <li>
            <t>Extensible: The language should be flexible enough to accommodate evolving privacy needs and technologies.</t>
          </li>
          <li>
            <t>Internationalization-compatible: Policies and identifiers used within them may need to support multilingual environments and non-ASCII characters.</t>
          </li>
        </ul>
        <t>To ensure consistent interpretation and comparison of string-based policy elements, such as device names, labels, or category identifier string handling practices should align with the guidelines defined in <xref target="RFC7564"/>.
This is particularly important when identifiers or user-facing labels are created, stored, or matched across vendors or systems that operate in different locales or character encodings.</t>
      </section>
      <section anchor="architectural-direction">
        <name>Architectural Direction</name>
        <t>The architecture assumes a policy representation that is both machine-readable
and suitable for user-facing explanation.
The taxonomy document is expected to define the semantic vocabulary, while a
companion protocol document is expected to define any wire-format or
serialization profile needed for exchange.</t>
        <t>Future specifications should also define how string identifiers--such as device
roles, policy tags, or consent status labels--are formatted, compared, and
stored, so implementations avoid ambiguous matching behavior.
In contexts where internationalized strings are involved, alignment with
<xref target="RFC7564"/> should be considered to ensure interoperability and consistency.</t>
      </section>
    </section>
    <section anchor="future-work">
      <name>Future Work</name>
      <t>This document defines an architectural framework for enabling users to express privacy preferences and signal those preferences within home network environments.
Several aspects critical to a fully operational implementation are intentionally left out of scope here and are expected to be addressed in future specifications or companion documents.</t>
      <section anchor="policy-taxonomy-and-semantics">
        <name>Policy Taxonomy and Semantics</name>
        <t><xref target="I-D.draft-dsmullen-ppd-taxonomy"/> defines:</t>
        <ul spacing="normal">
          <li>
            <t>A common vocabulary and set of categories for expressing privacy preferences.</t>
          </li>
          <li>
            <t>Attributes and semantics for data types, sharing constraints, and processing conditions.</t>
          </li>
          <li>
            <t>An extensibility model for incorporating future data types and policy dimensions.</t>
          </li>
        </ul>
        <t>This taxonomy is foundational for consistent policy interpretation across heterogeneous devices and vendors.</t>
      </section>
      <section anchor="protocol-specification-and-message-formats">
        <name>Protocol Specification and Message Formats</name>
        <t>The companion protocol specification document, <xref target="I-D.draft-dsmullen-ppd-protocol"/>, defines:</t>
        <ul spacing="normal">
          <li>
            <t>Message formats for participant registration, optional participant declaration, policy retrieval, policy acknowledgment, renewal, and reassociation.</t>
          </li>
          <li>
            <t>Discovery profiles, lightweight metadata confirmation, and trust-establishment bindings for PPD service endpoints.</t>
          </li>
          <li>
            <t>Transport-layer considerations, service authentication, and policy-authority trust expectations.</t>
          </li>
          <li>
            <t>Association freshness semantics, including how renewal intervals or deadlines are conveyed and how stale association is distinguished from needs-reassociation states.</t>
          </li>
          <li>
            <t>Baseline encoding expectations for structured data, with JSON as a practical starting point and more compact encodings reserved for deployment profiles that need them.</t>
          </li>
        </ul>
      </section>
      <section anchor="consent-request-workflow-design-specifications">
        <name>Consent Request Workflow Design Specifications</name>
        <t>The mechanism by which devices request additional user consent for data uses not covered by the baseline policy is out of scope.
However, future specifications should:</t>
        <ul spacing="normal">
          <li>
            <t>Define clear constraints to prevent manipulative or fatiguing consent flows (e.g., dark patterns).</t>
          </li>
          <li>
            <t>Describe consent interactions that are transparent, infrequent, proportionate, and user-respecting.</t>
          </li>
          <li>
            <t>Explore user interface standards or API affordances to preserve meaningful choice.</t>
          </li>
        </ul>
        <t>This is a particularly sensitive area and must balance user experience, privacy expectations, and implementation feasibility.</t>
      </section>
      <section anchor="recordkeeping-and-local-management">
        <name>Recordkeeping and Local Management</name>
        <t>This architecture does not define how devices act on privacy policies or how departures from policy are detected or remediated.
The baseline function is signaling: a participant can receive an applicable household policy and acknowledge that policy instance.
Future work may include:</t>
        <ul spacing="normal">
          <li>
            <t>Optional participant status reporting models and device-side implementation expectations.</t>
          </li>
          <li>
            <t>Recordkeeping mechanisms for correlating policy delivery and acknowledgment records.</t>
          </li>
          <li>
            <t>State models that distinguish current, stale, and needs-reassociation participant status.</t>
          </li>
          <li>
            <t>Deconfliction strategies for devices unable to meet all user-defined constraints.</t>
          </li>
          <li>
            <t>Deployment-local management options, such as notifications or inventory display.</t>
          </li>
        </ul>
      </section>
      <section anchor="user-interface-design-specifications">
        <name>User Interface Design Specifications</name>
        <t>The user-facing interface used to author, modify, and review privacy preferences is out of scope.
Future design guidance may address:</t>
        <ul spacing="normal">
          <li>
            <t>User experience design principles for presenting privacy concepts clearly and accessibly.</t>
          </li>
          <li>
            <t>Models for progressive disclosure of policy impact.</t>
          </li>
          <li>
            <t>Multi-user and household-role-specific control models (e.g., parental vs. administrative roles).</t>
          </li>
        </ul>
      </section>
      <section anchor="interoperability-testing-and-reference-implementations">
        <name>Interoperability Testing and Reference Implementations</name>
        <t>Future work may also include:</t>
        <ul spacing="normal">
          <li>
            <t>Development of reference implementations of the PPD protocol, PPD service endpoint, and policy-authority components.</t>
          </li>
          <li>
            <t>Interoperability testing across devices and vendors.</t>
          </li>
          <li>
            <t>Conformance guidelines and self-certification procedures.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
    <section anchor="internationalization-considerations">
      <name>Internationalization Considerations</name>
      <t>In contexts where privacy preferences or taxonomy elements involve user-facing or vendor-defined string identifiers, additional work may be required to:</t>
      <ul spacing="normal">
        <li>
          <t>Define string normalization and comparison rules, particularly for internationalized text.</t>
        </li>
        <li>
          <t>Support identifier consistency across diverse vendors and locales.</t>
        </li>
        <li>
          <t>Consider alignment with <xref target="RFC7564"/> for handling Unicode-aware identifiers in a secure and interoperable way.</t>
        </li>
      </ul>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>For a privacy framework to be effective, it needs to support the expression of user preferences and protect those preferences during transmission, retrieval, and acknowledgment.
This section outlines safeguards for confidentiality, authenticity, integrity, and metadata minimization during PPD operations.</t>
      <section anchor="secure-policy-dissemination">
        <name>Secure Policy Dissemination</name>
        <t>Communication between PPD participants and the PPD service endpoint needs protection against unauthorized access and tampering.
When the PPD service endpoint and policy authority are distinct, deployments also need to preserve policy authenticity and integrity across that boundary.
Discovery mechanisms can identify candidate PPD service endpoints, but discovery alone is not sufficient to establish that an endpoint is authorized to present household policy.
The companion protocol specification document, <xref target="I-D.draft-dsmullen-ppd-protocol"/>, defines explicit participant-facing security profiles and the accountability properties they need to provide. Future deployment profiles still need to identify concrete cryptographic mechanisms, such as encryption and mutual authentication, so that legitimate participants can retrieve privacy policies and detect modification.
Those deployment profiles also need to protect the binding between the authenticated participant-facing service endpoint and the policy state it presents.</t>
      </section>
      <section anchor="anonymity-and-metadata-protection">
        <name>Anonymity and Metadata Protection</name>
        <t>Even when privacy policies themselves do not contain sensitive personal information, the act of retrieving or acknowledging a policy can reveal characteristics about the household, such as the types of devices in use, specific user preferences, or behavioral patterns over time.
<xref target="RFC7258"/> cautions against protocol designs that expose unnecessary metadata, treating the accumulation of such information as a legitimate technical threat.
This framework takes that warning seriously: metadata exposure during policy retrieval and device onboarding needs to be minimized to avoid turning privacy infrastructure into a new source of privacy leakage.
Concepts from <xref target="RFC9577"/> may help inform this effort. <xref target="RFC9577"/> introduces techniques for authorization without identification, enabling a client to prove it is authorized without revealing who it is.
While <xref target="RFC9577"/> is optimized for pseudonymous web authentication over the public internet and assumes a centralized token issuer model, its core ideas, particularly around unlinkable token presentation, could be adapted to the PPD protocol to reduce metadata correlation and minimize household identifiability during policy exchanges.
However, this needs careful analysis, as the assumptions of <xref target="RFC9577"/> do not fully align with the goals or context of a local, user-governed home network.</t>
      </section>
      <section anchor="policy-integrity">
        <name>Policy Integrity</name>
        <t>Devices need assurance that the policy retrieved is authentic and unaltered.
Integrity protections, such as digital signatures, are necessary to ensure that users' preferences cannot be tampered with in transit or at rest by other devices, malicious actors, or misconfigurations.
If policy is obtained through a participant-facing service from a distinct policy authority, integrity protections also need to cover the policy-instance identifier and any freshness metadata presented through that service.</t>
      </section>
      <section anchor="device-authentication">
        <name>Device Authentication</name>
        <t>Devices participating in the privacy framework need an authentication model before accessing the PPD service endpoint.
This limits policy dissemination to known, authorized participants and helps users maintain trust in the integrity of their home network's privacy relationships.
If the PPD service endpoint and policy authority are distinct, the deployment also needs a way to preserve the authenticity of policy state presented through the participant-facing service.
By aligning with the concerns raised in <xref target="RFC7258"/> and incorporating ideas from <xref target="RFC9577"/> where appropriate, this framework seeks to protect users not only from overt data collection, but also from silent inference and passive metadata surveillance.
At the same time, it avoids treating anonymity as an end in itself.
The goal is to support privacy with recordkeeping, where user-defined preferences are signaled consistently, devices are identifiable only as much as necessary for the exchange, and the user retains visibility into what occurs within their domain.</t>
      </section>
      <section anchor="policy-acknowledgment-and-recordkeeping">
        <name>Policy Acknowledgment and Recordkeeping</name>
        <t>PPD participants need a way to acknowledge receipt of the applicable privacy policy instance.
This acknowledgment should be recorded and verifiable so that the household can determine which participants have seen the current policy.
The record needs to bind the participant identity, the acknowledged policy instance, and the time or sequence context in which the acknowledgment was made.
For devices that rely on a backend service, the record also needs to distinguish between acknowledgment by the local device and acknowledgment by the backend service acting on behalf of that device.
This record is important because it creates a reciprocal acknowledgment path.
In many current deployments, the household user is asked to acknowledge device or vendor policy terms, but there is no comparably strong household-controlled record that the participant was presented with the household's own privacy policy.
An authenticated and integrity-protected acknowledgment record allows the household to show that presentation and acknowledgment occurred, which can support later accountability or review even when the architecture does not define automated enforcement.
The companion protocol specification document, <xref target="I-D.draft-dsmullen-ppd-protocol"/>, defines baseline acknowledgment semantics and the protection properties acknowledgment mechanisms need to provide. Future deployment profiles still need concrete mechanisms that remain practical for constrained home-network devices.
At minimum, the selected mechanism needs to provide:</t>
        <ul spacing="normal">
          <li>
            <t>participant authentication sufficient to bind the acknowledgment to the device or backend service that made it;</t>
          </li>
          <li>
            <t>policy-instance integrity so that the acknowledged policy can be identified unambiguously;</t>
          </li>
          <li>
            <t>freshness or sequencing so that an old acknowledgment cannot be replayed as evidence of current association;</t>
          </li>
          <li>
            <t>verifiability sufficient for the acknowledgment record to function as a protected receipt of policy presentation and acknowledgment; and</t>
          </li>
          <li>
            <t>a way to retain or export the acknowledgment record without exposing more household metadata than necessary.</t>
          </li>
        </ul>
        <t>A policy acknowledgment is not, by itself, an assertion about subsequent device behavior.
Any local response to non-participation or other local observations is outside the baseline signaling mechanism defined by this architecture.</t>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <?line 633?>

<reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC7258">
          <front>
            <title>Pervasive Monitoring Is an Attack</title>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="May" year="2014"/>
            <abstract>
              <t>Pervasive monitoring is a technical attack that should be mitigated in the design of IETF protocols, where possible.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="188"/>
          <seriesInfo name="RFC" value="7258"/>
          <seriesInfo name="DOI" value="10.17487/RFC7258"/>
        </reference>
        <reference anchor="RFC6973">
          <front>
            <title>Privacy Considerations for Internet Protocols</title>
            <author fullname="A. Cooper" initials="A." surname="Cooper"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <author fullname="J. Peterson" initials="J." surname="Peterson"/>
            <author fullname="J. Morris" initials="J." surname="Morris"/>
            <author fullname="M. Hansen" initials="M." surname="Hansen"/>
            <author fullname="R. Smith" initials="R." surname="Smith"/>
            <date month="July" year="2013"/>
            <abstract>
              <t>This document offers guidance for developing privacy considerations for inclusion in protocol specifications. It aims to make designers, implementers, and users of Internet protocols aware of privacy-related design choices. It suggests that whether any individual RFC warrants a specific privacy considerations section will depend on the document's content.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6973"/>
          <seriesInfo name="DOI" value="10.17487/RFC6973"/>
        </reference>
        <reference anchor="RFC8280">
          <front>
            <title>Research into Human Rights Protocol Considerations</title>
            <author fullname="N. ten Oever" initials="N." surname="ten Oever"/>
            <author fullname="C. Cath" initials="C." surname="Cath"/>
            <date month="October" year="2017"/>
            <abstract>
              <t>This document aims to propose guidelines for human rights considerations, similar to the work done on the guidelines for privacy considerations (RFC 6973). The other parts of this document explain the background of the guidelines and how they were developed.</t>
              <t>This document is the first milestone in a longer-term research effort. It has been reviewed by the Human Rights Protocol Considerations (HRPC) Research Group and also by individuals from outside the research group.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8280"/>
          <seriesInfo name="DOI" value="10.17487/RFC8280"/>
        </reference>
        <reference anchor="RFC8520">
          <front>
            <title>Manufacturer Usage Description Specification</title>
            <author fullname="E. Lear" initials="E." surname="Lear"/>
            <author fullname="R. Droms" initials="R." surname="Droms"/>
            <author fullname="D. Romascanu" initials="D." surname="Romascanu"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>This memo specifies a component-based architecture for Manufacturer Usage Descriptions (MUDs). The goal of MUD is to provide a means for end devices to signal to the network what sort of access and network functionality they require to properly function. The initial focus is on access control. Later work can delve into other aspects.</t>
              <t>This memo specifies two YANG modules, IPv4 and IPv6 DHCP options, a Link Layer Discovery Protocol (LLDP) TLV, a URL, an X.509 certificate extension, and a means to sign and verify the descriptions.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8520"/>
          <seriesInfo name="DOI" value="10.17487/RFC8520"/>
        </reference>
        <reference anchor="I-D.draft-dsmullen-ppd-taxonomy">
          <front>
            <title>Privacy Preference Declaration Taxonomy</title>
            <author fullname="Daniel Smullen" initials="D." surname="Smullen">
              <organization>CableLabs</organization>
            </author>
            <author fullname="Brian Scriber" initials="B." surname="Scriber">
              <organization>CableLabs</organization>
            </author>
            <date day="7" month="December" year="2025"/>
            <abstract>
              <t>   This document defines a standardized taxonomy for describing data
   handling practices of Internet-connected devices within home
   networks.  It complements the Privacy Preference Declaration (PPD)
   Protocol and architecture by providing the necessary vocabulary and
   semantic structure to represent and reason about data types,
   purposes, actions, sources, and destinations.  This taxonomy supports
   both machine reasoning and human interpretation and can be
   implemented using ontological frameworks such as OWL-DL.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-dsmullen-ppd-taxonomy-02"/>
        </reference>
        <reference anchor="I-D.draft-dsmullen-ppd-protocol">
          <front>
            <title>Privacy Preference Declaration Protocol Specification</title>
            <author fullname="Daniel Smullen" initials="D." surname="Smullen">
              <organization>CableLabs</organization>
            </author>
            <author fullname="Brian Scriber" initials="B." surname="Scriber">
              <organization>CableLabs</organization>
            </author>
            <date day="18" month="May" year="2026"/>
            <abstract>
              <t>   This document specifies a participant-facing protocol for Privacy
   Preference Declarations (PPDs) in home networks.  The protocol is
   between a home-side PPD service endpoint and a device-side actor,
   formally the PPD participant, which is a device or a service acting
   on behalf of a device.  It defines baseline operations for endpoint
   metadata confirmation, participant registration, optional participant
   declaration, effective-policy retrieval, policy acknowledgment,
   renewal, and reassociation.  This document complements the PPD
   architecture and taxonomy documents by defining the message and
   sequencing behavior needed for interoperable policy signaling.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-dsmullen-ppd-protocol-00"/>
        </reference>
        <reference anchor="RFC7564">
          <front>
            <title>PRECIS Framework: Preparation, Enforcement, and Comparison of Internationalized Strings in Application Protocols</title>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
            <author fullname="M. Blanchet" initials="M." surname="Blanchet"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>Application protocols using Unicode characters in protocol strings need to properly handle such strings in order to enforce internationalization rules for strings placed in various protocol slots (such as addresses and identifiers) and to perform valid comparison operations (e.g., for purposes of authentication or authorization). This document defines a framework enabling application protocols to perform the preparation, enforcement, and comparison of internationalized strings ("PRECIS") in a way that depends on the properties of Unicode characters and thus is agile with respect to versions of Unicode. As a result, this framework provides a more sustainable approach to the handling of internationalized strings than the previous framework, known as Stringprep (RFC 3454). This document obsoletes RFC 3454.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7564"/>
          <seriesInfo name="DOI" value="10.17487/RFC7564"/>
        </reference>
        <reference anchor="RFC9577">
          <front>
            <title>The Privacy Pass HTTP Authentication Scheme</title>
            <author fullname="T. Pauly" initials="T." surname="Pauly"/>
            <author fullname="S. Valdez" initials="S." surname="Valdez"/>
            <author fullname="C. A. Wood" initials="C. A." surname="Wood"/>
            <date month="June" year="2024"/>
            <abstract>
              <t>This document defines an HTTP authentication scheme for Privacy Pass, a privacy-preserving authentication mechanism used for authorization. The authentication scheme specified in this document can be used by Clients to redeem Privacy Pass tokens with an Origin. It can also be used by Origins to challenge Clients to present Privacy Pass tokens.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9577"/>
          <seriesInfo name="DOI" value="10.17487/RFC9577"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA819W5PjxrHmO38FdvRgaYJsW7Jlye0Tx25Nz1h9dm47PbLj
xMY+gESRhAcEaBTYPfQJ/Zf9LfvLNq9VWQWQ3SNLsftia9gkUJesvHz5ZdZi
sZgN9dC4y+LJ276+K1fH4m3v1q537coV127VlH051F1brLu++L7bueK1G+67
/oN/MiuXy97d4U/fXl/1q+2T2aoc3Kbrj5dF3a672azqVm25g6dXfbkeFpXf
HZrGtYv9vlqU8It6cKvh0LvFb34/aw+7pesvZxU843K26lrvWn/wl8W6bLyb
wXt+O/usKHtXXhZX755fwT9wHJu+O+wvi7/9pfgb/KtuN8Vf8JPZB3eEP1eX
s2JR7GVq+zA1jx9vcTqtTAc/qNvB9fBB0a2LYQvPok8rd1fDYgx92fp9iT8/
zu5ce4BRflYU4f34j+G4h8mmA4GPd2Xd4Ff+7D6Wu33jLlbdDj/HJbgstsOw
95e//rX546/hcfDoetgelrC+VQ8vbjeN+/UD6/gEftXA+vkBfqXPDb++4Ade
1N1Dz3no7xfbYdc8mc3Kw7DtelxjeHFRrOHbvN9Prsu2dk1xyw94Qn/u+g18
+k+Sp8viWbls3Mty6elvjtfoSXUh7/zzCv/ewN9xQeBd43d819dlW9yu+hoE
5/GvWOLPLjz/7M/w8P0Btv0CfgpvWSwWBfwANns1zGbvt7UvQIgPO9cOIAj8
I1/Aa+1y0OHw9aYtG9z3bXfwbts11ZTgFUMnEuVB3lIZBKEDkdlsi/Nn0Ref
w4nzX1wUxfutS0fiWpwzjLCArxQgrkO9qmH7B3pv7Vfdnevlr971JNmurfYd
yP68AMGBn9d+C9J+8AMOcNiWQ/hGGOCA793vm5p2CebXDd2qa2BhKnjs6tDX
A866W9eNmxe9G/ra3bn8Z2ahOvjsCO+DAcBs5/SgcvWh7e4bV20cPGLl6r2c
TBhR9gNdivAL2rAwHVx2/FVZ+L1b1et6lT+guC89nNMKnnEHYkLDgxXDAZtF
/GNRgxh08Li2g+Vawu8H75o1jNfDasIL2iMpDpCh7jDkP/+VL/xh6d0/Dji6
pduWd3XXX7DU7eqqatwM9MJNO/RddVjhXqMMwuzLfV2hqrkftrgEN6KoFqAm
W9h5V1mZwreSXG1L/Dc/DL7Sunta1249uLZAQbjfumaHw11tSzx0G5bPvet9
B8Ks8nsx+9sWNhLWpz3yDjjvwhth3xsYQ4H6uh5q2GZQ4SUuDhwYOBRzGtDQ
dY2HH6M8V/gS2Pqe3nZoK/ivgUbWw9NwwA3vlzwa7U+Jx6wvaWNdNcfvrQ8e
xj7HX8GHde+aI55d+G8cMExRj593w4DaHLaucB9rP9CQjvRMXowlSCwMCxav
W/oVHiR4z8HDifgIZxf2lv7WuA0sCrwOTtu2BSFuir+X/aZrWV4bED+aK87B
fRwO8Hc8tHgWWucqnrc/7PcdiMrOgaZqN6DPYJ1WtYdJLnYlGo4L2XTnDw2c
QTzMceZFB7tDagCevusq11zMfqCl3OGJhS0qNy7MXM8r79UiSL+sshyLu7I/
Fvd1hQsI0/wHDBzHzIcZngjyC0txTzIg1hAMYNX1Xr7DegTO+12NeymLWqM5
o4NY+w7NUgWTBklra7/z8D6Q5baDoex2sL/35RFXBwZ2BztzXoWWq77zXgXw
gtU0rT4IJ5zxbYkyFhUyLRMszQc8H3CA6zWsAa4t6u3wqlwYYb6rbZByOKsO
jixJlfO8FTQF/poOE+QFBJbVNEtFPeib8dDS7i1pHfdNd6TVgeHCS2kwYclg
ECAG//Vff3r34tk3X3397Y8/ogzsHCopnDqeMHs6UEiiVMK2uxKk/NBvcP5B
PfOBlHPX1DsYGwy48yjwKiqwxP1xz0+F4dObQEfAl9msqjIYcNFh2i3oNvgn
/GPVH1Y1vB1EqKxAu3gQ/bKZB7dq4WFs4XR41gu8NzBCGAafsiExugOtXUmb
hvs/oAHpuxI9JzgHW1g4kGEwpHWFU6XhrpvuHh5fo05yH2iyG1R3pBp3FzM1
r/BjGjgoc5CpLZqoCvUWH8Ow9WBCWtA4S1Do8Y+ovhaVW9etqxLhvIOjLNZD
H0DGzPsOVgfFRs6LvxAHAx6FgqsiBJ+AKqNvDh2/Fgw3KDDQseu+2/G66bc3
h7oiAwYrx+Ly+z9889sff5yLYLrdHsxA/U+HT2U7ACoORlAuazzlc5CD9kP4
B0lshep0XcuH+ORMgvDIwXbRtoHZq+nh4F7RmQflVqIzgQNHN2MNW+nhGyhQ
ZhvRQi3E88EHwZrtLuEbuLCkLnHXMQyAueP3RUGIQn5IQ7Ska9EbYBU3yHjj
V+5x88cWP5jrwYoAHM3JDUwdRFTVje/gf/CUiX7AzSJhAb3c4oZ18J3gS1Zx
37796tvf4L7hutX0sLbsweSjvwbT2XVoraLyv5jdPOSSysos4rSNUsRnglcF
MdIH5/ZkSOkcFDBMeEnD+oZ2h9TkAQzBoq832wFfVjZH2BhclzUbbXSZ6zau
mXFvvk98XDS6JY0DLRF6pmT548TQCKkUFTfde9BId3XftTsy7O/RcLPNgC/u
Qevj45oO1V5ZoaLCkZAbAi5YW6FpK3v8L7AQPZhGjjPRRunuztmxod0ipejI
EwHbBEZuQfJIKmxdomcq5x81CQvoCtxbEB18OFuU8oGFt4HU7EYUnv10Hjz1
YziM6GjBQtUYHlufcgGjwqfmzjwKp/rwsNyuYTcx+vp00tlZzHxhMpJi5VCN
euNIo/DvMQ5BX+GTogFj+q3eRjcxTLZsutbJqeKTVFXkfrF8++NuB6GE7j8O
Hx7ec2ym5tRfigOs+oE3UJ2SHrzvWlxQG2CIh4Qbz75NUO6w87vg/qSPRgeb
XRhcE5y7aCk+WBp0TOmUaZVCYUjmYCSv/JWP+o52DawZ6Njg5aPShJfXsAd4
IqLUwcu3uGDqrtArymDms8iJ/KiT4RlKIpxvmSXbzHRhqg6tAZ1WMDd/Ry/l
jkwtalh2E+nwbMWkR+GHQS9LVC14kh4woLzSHFvO7W6ydKNeCwJCS3neaOBX
NOLNVInOB8OzZ+iithyI42uuUU5q+jc77h9AQyH25Isnr364ff9kzv9fvH5D
//3u+f/44ebd82v879vvr16+DP8xk2/cfv/mh5fX8b/iL5+9efXq+etr/jF8
WiQfzZ68uvrPJzz5J2/evr958/rq5ZOxT4UqGJZu6Viv7VGB4QLPEqv03bO3
/+d/f/k7sE7/DazTV19++QdwQvkf3375ze/gHxA+SuhDypj/iZHVDLSBK3vS
PQ0EQRC+DnCeMUwG77y7b8n1guV8+j9xZf7XZfFvy9X+y9/9u3yAE04+1DVL
PqQ1G38y+jEv4sRHE68Jq5l8nq10Ot6r/0z+retuPvy3P8ERdMXiy2//9O8z
lhFSKrAD4KkWrGjAXA3bqDshOhPBX6HhRzvj9gM5i3LeMqPBh62Kwmh8ynmC
XvKWkVrUaBslAhzM5oCnmdzipVuV6JhSoKxyodEtDgWjW9Dbe/JdUQdZra5G
Is4nqn/Y9s8+K97DAtRt13Sb40wd8svZZVHcZNLK7q76ovCuKeCALM223KMO
uucgICAw7DDXJtIjyEA/2znrYFAcw3EVogy42oRflWgK5vqenvfgEf69WXaa
3ftt8JqPrGlosHvEG/lZ6pVqHEF7FWZqgSlciLlsG6r4+/C4dBK4JOxQolUg
NAPNGQU/9DHPiGd3b9C1xKMG+w7GhrAGFZswI7M74sDbwJpDIZLxU746RsgT
PvpELDXtibOXY6IFtmnkUIpZvghidirFgajqFzSnqwI0/4GOVaURB34D5vcA
uEuoFVtHdWtEgshKVSNkkwQpw2pRcqYAWhnbae+Pn46yATbUkdKJzpXxUO27
5sGNY9dgjBzrI3ychx/NwyceYOZQ4nz4I84YgKxE2ZFP2ND67tCvXLbQ/FN4
1uAEwESgFR6/P6hGJAnp8Qmw+A5iTPY45Kfilcc5CV68zwYFcnjEreNwAn4E
UW03ILr81qwYnVGMlawvGbB1fBV7rda3jq+o4BergZG2ZKdSZQ5RUzp/3XxZ
DHXo4XXomrCCkonapAKLZO/Unz/tTkYxhrc/z5eQVpfzKrpzoLsJbVofWjpp
cwSOYQQ7FmoYStdSGNisBTUercZcdKAbyBw4Ht5o/4LjOd7I8VCjns1+zI4d
Sim7jvqgA2iAkdAbx53+PtQ7PF4QQ/Tj8cXFoZAAlrprEEs6I8MowPbEmDMd
UFoWcFEG5hsiCqwSyZiVnLAhxw2X0lU1Br7+gAcaY4IlHFVnsFrUjaA3kg0q
wxM5xRKiFtavOAjYVlEBCiFEFcCfnFEDUQvoJ6psdcKoZEjP9lFieVnpyI8X
3urbECnLMUgjmhHcAaO5EkNihZp3yAa86NZOaEXeaFHr7BhJqGFWYDTgkfbP
E1unElQw3Gf6/GzYZhoyfH7SUKPv3cGP/L5rGd/GcXKG+Oww1+wgpSeCVhCV
DQRn8EyQrBWuJ6Eh/GQYnrvXvASYLXjMKoaHUyYt3QV+LqgBf8JZIhQgfl2H
EyI3AX30HNwh/AxTWbp117tkiJUrK1S7GDeiO3t+mLwgCKoz9lMmu4BHTDYf
5nM7IMr9SZtEqvdT9icmShEtvCfHKawdHYi2A/3cbhxOnpJlNetlcevDMtQV
mbJuBRM4t46PWiaY/WtCbmGl8vnLrAMEsRpLMw4cBzM54gxkGi0JhhcbdLCs
zPI7ezCWd5IDP6e7wyMoo0g+ET8AUZmm84NiyY7TiKTxzPDjmquVgTfXMFx0
Pt+NlkTEGz1yXNRT7hdqLVSMBP7jgFLpYvVPgPkiWXZjbHq3sLnwiaWHAX7X
dx9cOxbcfOP80PXseICO7no2Omj2+a0Ue0B4UFb1Cr5JfgDEKB1mtlCztgIZ
ouI+KwLBKajsMqofmWh3HSihXYq6TSts0Laorw0T4OThujD+VmZNNGnEa8OJ
KhUNwfdoHXaI+VEAgvCTIz9cTRdMjuPQ9Hf3qBAIPHcc1RgnhMMYYWAtOI8T
cv+JV8CPrZMQinQLebbRN2TPn7Q4Ogz6B0kR0Y4sDzI5RjuHxDjarQvslbfX
GCi2nIvOhtdODz6MF1+AS92myRinHkjX67dEepqjJL05NI5jyMT7s+IlYvtl
wEae6xF+FaCJaGMNWr0mFxveEPKL6jIbdTnCEdzHbb2E8LqJL2Xg4zpLxT9D
Tbc5CLVnNrtpq/qurg5koyTmJeTa7RDiLg5t/Y9DjKSV20AgR++WBI6Tlhw0
TSnro8Cu/lKy6KTNiD6heyMAPB/ZjxizoEEBAcGk7sBL3oD5ZAwGDQRZCloa
hBLYufoMiSzxbKEa+qE9eNolAhFuNKcCk35d3tUbHjFDXrwmnLzOSBwE/I/W
SJzAkhx15MX4w04ft0bfuOfHY4IefDYNJghMIujMo4jF8YaMjy4/zThgT9sS
NvdAyapy0zvHUHRTfhRc6RS+jJgUUtiOBtORdBIl/2nfRED5SUoO0WzjGuwQ
DiIm6nrKycoZ7O5LRJ71/XHrQ+ZqxIAIk3IfXUpMUXiQAluZmHKDGGRDcKqB
JeeEEIoMGKnay5TMQlhiBEvHO0xy4z+39R7fHs4j8ifxG3BWXr+nV7z97VtE
bxhKBFNcf3DFdVe8Bi3wvkfex+fwzS/4q/BQNEY0szHg4+G/O8xHFJ/DQ79g
WkeS/0cejIdtg90uqy4SIeibmLtwfBYg9ke1tI7xPo69PaDliOAQ2WWVr32Y
QdXRSzUVkrnaizwICGkczNaDhB5XyJ6DUTVKgEqy6ZYitAdxOdDZdortShKV
EmzZQAISmaRhOG6Knu+/mNA6k1m64H1/9cP1bPaqbA9wAHH0PWgMpDVdEw7N
e/I5fOkLTZ1//dVvfvyR8ksYh4Grhg508NH2aPYxOjRJpcXQLZJFC2t8MYMn
FzT1FWFL8LKdGUtIDOovMRt5aOXkkuJoBzNnpNokVhe8pb4MACMn8Eyi03Ak
Ai0iLJihnOQKxkrJpDCNHB0bYc/HEbJA6BD/ErCf4C7T+6oO3Zn9peTHfRdY
PMRoEqPFJsrBp0VHryT/J6Z2OdrB3VEOZnqCNOvO74wnJYiwTozj05jtkmwU
ip6qjL/Cli3R6aoFohbH8xX+FCxW+DvH9PzOhcGKYbXBOfYBg8ERXqPOHL3h
COrr7V9Zfb25fveS8EUS4l7dNuJMwdo05VFTLPKXmOGlv7E0heUpB/BO9wNb
JyZL0HhIDmXTkBYqpmSxP/TIwwKRHyg1Q0vHnI8GYqMDHEKkLIAFKiFM4hCQ
Mz2e80J9S/n3LDcl8L83Wa2wO3OZILjKLVmw8mPXdrsjj1F/SH8Hrc15swD7
7EoyHT3EJbAud2bPIhQeHx2SUcmjc+WrkHqaOo8BmoWhxoJuT0UO9nD++I3R
zrcrB3533Xmhgnnh80Vej8XB7hICECwA6guFapL1FmZ5UG7GM2VrVHh9M6s5
VHIhVTC3rvM8DeZ5XXf1R1ctrD6gOIOzQDYRCI8l8lNwpzCsK+vGq4dYD0gZ
vI4UEHi6wUpms6tRIPf3DjGf4HXrHCkzsBwIEOpaOvXEmYq0mSnIIpLuV9YR
x1+nWjusDnF2SuWg0BAMmZNUy/w0kFQjdc0LjlKS70a4JbwJHGCH/BFEH/5x
ACXRjHhy8riL2fUUQahH1RmofHT+FWjnTberaAGBkmk6pGdaEUECyCd4Q4LM
+MdVBnAdQYimTAbpQUDnZDGAf7AagCY7ufxoa+RAJQAQgsYIr5R57mecwFE3
npizwSlikiuiD92eVee4fOBidiXoESexhEJLCNB8hLdiuH0q1K7Xj0ac8THE
Wwa5rCkdOaGXTq4XO4lpeqaWQxsBR0aIdDeyuPszNZ0/7CsFpBIwjBkRuSrV
JH1WQJHPby6onT8ziXpHCZGB+e1wrkgdTOJgU8j3xNlpJQQ7Dbsd4FA2GGtF
gR+JMSXxaVGqMyiUWAbR10XdNBzNhqKW0bvRD66F4na64gWHgzqCKFn1KGPi
lY2X7NUjoMSCMAhSEuF0TMm2R6GcxrunooIEQX8RRO/5x30tZuMdY9osTo/R
LLhQhzagvstxxQ55UjPO9aKf9K8D5DQ2u1jgmCKtn3Fdd0drQpq07VJomzH6
Xo+rHWUEnrfl9J4EcVQglqRvFjLYmg8gbVQJnciKHVPQNwfe9jEKLdrz5IGY
EYovVk+WfHqfTaq9uCV5fkZfR1fATlrOPQcJxLtUr7CkDf8EAxPzpJXhg/DR
nCN9TQku/E5STRyh8IGTDXpknuGMpko07WmE/FR2hwqiYtwrCQAl1aYyM2yJ
DXtWOYFMNMdHrWEuLhhp+bFfakLqHNqYiD/V0sLsD1GXMIqeLTyJMb/QlzvF
uRUiIVNCVCysvDKFd4g1kCtrhU7w9eKvwaVF0Ut8TYzHyNEk0l5O3+HCGQEm
meAgMMsIz77IbB9uLucEMefFszDwrVItvFBO9Eha5CUl9yTj4kThIzNv7HeN
8HoEDDNo3z9oo9quXUyBRlIO0Ao8mJW3gRpp1HclKBH9NqEfc8op4TVyXJkv
WcBPQ2VFiI5XmNAdJdNEphJuTpRSjGCF8cjh3F+wnoMk6Xm7JatC6PYzhk5n
s6fFrVT8lQnvRlXKeXKcJThkxSqR7dYEMP/EGp/iJz5FNJSBv/YkCTuif4oE
nXA95URPV9JmrJ2nxTNZfEtXz7JsDNOExOMwOilMzORnTPHtMeHxSFRyTMyb
W+fpPGKJy0jBwk2s8RPF8bR4HoqqKV2IJSlV/U9bDJlw3cmQVuipe5fgjj6h
mU3GsqbUOqnHMAUD9QR3b4KvF6XWkiot5YG0derJsFpVWdyiLesQWYK1y+mN
dFxodC8wxxRX66phSnQo5yD/lJCrwKHqegSDcQTBHi1GVpY1QXOMoVwTYzc6
45p3Cad8AgXiVPaKJPalwxRA33W6YTpGg9crwiS17154tqFAikLpiMXg4CLc
Oyrt9WrZhMccub5C91okdC9z+iWSSYyQ6HgPf/Zr9lGpsPOwo+gWYYQVnRKm
KCbwzrIUc/kC1qWpyfhacvPM6hKjPB5vwWI696QtY6+T9tMI3kJSG+l3Obo5
YXVwN292lMyxwBUsZqcFMtZsnqz9Pa8Io3+pYocZviO5aEyN0pTsqGQODcst
kuvHPSgYtARbUm+2C/A3XZNp7rRu7zGc5wfgwpvB1nAShDsXYEdK7EipRLxd
MojzvLKPHbk9bz+n1T883DAjMSOPLKmN66W2Hk4TZ3W7qNRDtXUpoCshkzEc
gLiM0k5MboE/cIpbMzf4Ta1uK5sNokNbrBSTlGphMU+umn1x6NGAIiw5T6sc
7EDJGTAEBDq8oA/q9TGXlLn0JGBtvDlAKN1RfVyLsGKvdejYnkQnbdtzcDaS
uiX0Lh8QWJoDZaSyKlEhFFtHHcvvpXAS13fCpY/Jw/ZsB5ATzsMEZ35E8EE3
cTQy9BL2U3qpRCIvEhghMo7Vz6BchzkrZY9tYUKlq6ID57bMHupgDKkMF/WM
6fzBDA3xHm7PSyPD7akgktMcPGau5NIEIpVuxZSHbrsm3tPTUdY7L7+PCTi0
JENnGG7IoDhQ+Kbui61QTwIjEhCs2VUpm8cmAqGZSDYI2R4O3takUIL9MouG
jzcW8JItzlnl9l5SSZeYJr5ZXF9MtDXSdNOPPyYJISq6CvmkIzYCGbC/CeaC
GeHnspX9XkklSm6ICKKkI8NSUepKQRDy35Q8xrvcHxrSYE+JGTiRtko20xRI
nZ6d/hTryu30HtZsTMOxie0ADfEUYQLWIckIU9PoRkww7UC6pYkFhZuSW0p5
jxspwMS/MBMDESqLzsXNnqsGEQ8Ymb+T3L25Yl3zsQ/LhvfKIhZv7nAW7l4h
SLVfuRRzjw8WYXRhhRuqXydxtYHhZXHDDQPwO05CF2bikLtR0sikfInNPDgK
E4ScBJfIqQU0RinsEzgmhp2a8EKfFltgYa03uiwNSFq3Hu5RyzAG5lXcqbmM
2CDEO30gLefcMR4n1Y57yW+lXCP13AN/7wxzypSIYdX9lEMQkdlsTehAvXNS
WPRMHXGsE5/YgVFW0XL6LKwjbg2HEL1DD4qiA32R4f1Fh0KNpOR8KLkcGjws
4X/u62rYgj2W30smPYiRQOtk2xNsnUyhLbuvB2/9I3M6PdjcpmKCrU/7VHgT
qAwErO6o84m0fyEgDQRvS9wojL5azxw9h3SyOglhGMqmhAGvyMLGQOqHF+x5
aOXJvxqizCeoB6ybPXEG8TdZlKR5yxMVNDaXfe9ABFuNGsXJJfddHhyCP/sG
kr9bdbqeJZ7ZpAimLeFgE0KV7biK2x88Jh0Cw/e4J+pW8PG4EZC3irrmAeif
is+p1QX2nkJ0AEP1HappkwtnZsrdoWkDrhFJTeUwgH71j5fZsSOqI+HeALhv
7D8HoqoQOXBjNr3UmRoLGzohpNoudYLZneAst2IFNagmEC+xH6rWopwFuoMM
i3CPDeK+MMJWMsKI5Igq5DYtVTTRhm2blteBRNTYkpFNAudHL4vMOSOh0Dx7
GXpRRUdRRTEIHvycGx2pi+zpLXOk6VJhVLpihZLJuJEd/nWHQo+rr22elIil
hNuk2Iag9v0WHGQUBasqP3cXm4t59O+/oMw7qUhLbxutzXw0oZGWst6WIn5n
KYiMFBLxvzBFiDa3PrkALw6iQMTzQ5FC1Qnvb7reneSIa9TTIlKCrhEyZLFH
VtozStA47ovEGxUK8CLnnwtFpeYc34IP46Y0aZSOSKM6WimdhvrATKqaBygv
ZoIEuTPT5PhJ7JqJis3rtN9LjKNM+0kJFS1tJi0UTlq3GQ0w3YlG4LjQVyr0
J5B+Lda4sGTnxJfIS8esQ1okr0TPQIGxxJjJkY95DQbY5v5otKPCnLjViHpy
F0fpJ4HGH+q5meqCaAiniSCf2JBTmvikgD6GG14xV2rJk5JFZHLh4VLQg91F
ktab2m5zklvwSYU39fBwwc1E3aXyYvYO6yq7NkuFKzmh9LaK6Xzh3NNpgsP0
uZ0YkUMihENCQxNqz5NoCoKeoLzLn0pfMHnSBfOA6JB81GS85eMqp0BySLwH
JaZalGkxKWla1EnHMLQDAO8MNhLPTuAjWz5UYD0ISjznsrNzjARa85ek8N5Z
zOiyuEKTIn7nfJzE1h67aT5K280xfjw6kxzUWQzrLHgMWnIivcCVvF66tNrH
2yzzOLPDXKqueFxOek6u5elEKusC7EZ3GLxu9kSqVKH+4GYEmnUi6rehTDEI
vQTXyaoP4iSeZKqdlJhZUsU8FoOUVpLwIs2XqQz8PJ+rnIWdehxnYlK1EPDm
Y0sl5hiIy2vABVoT7EIOYkwyaoUrZzo9vhh8VpwqB7c9AbAXMsxfXz1Rk/1T
SsTh3Se048360XSehNUVVE1QyrOg8VRjSnV4gIVy1SlsvxHn6eIxoxLFOEfK
5tnK5NnDlcmM5MODkuLkOq9NJjbf7CxlSGLdk3MtZ2fU5g3IaE0qGBno42c8
yEbDMt6f044cZ9qR5afZjMcRsqbrYCYtD8iYuJo5vIhFbYlzzh7e4irQi7+T
rpVTOjAWW8S2PtS44xENIWdELOC0XdBx3FMzVYAYqDWu7NufwqKfPTqkCJ1t
p2MBhPtm2CQlvjhxoy9m30lTB+3KUI4ZrpnrPSGqtEmoec5FDZ8cIMzUt4zO
/z85WZJxzzUWmPL+M8JezkjQarfpTv6UlmJYisGJmdLRMzo77r4tXyi1qarQ
LAKKDj71MmAlCfdCvjEz+grc6boVZzXULFBP9tP2O1RRGa49nmttfsy7F8c6
k82TRe3RvxpQciHYRZsYtswgRqeNRlKvl4nJH+FpCfgk1V7R4mgNRp9mppGd
EKMBzXng40qk5JawopsDQm7LmsuAl3BMlBYdJOzkcrHFHC0aOStI9JPWPqab
a/AupSKV2HcJewD58XhBhtYJ/aJpqAnxDjTNkzki21V2oUc06bs+01b1QawD
HUf8oG3XMdjNzXsjEyupTvrvDgHbHfhLuHbS+y6UrUOcwIjOGuvJKwJqNOEv
8NeuW+JAQLfMi3u3LKircfMF90wOekszK7baPYULUQJuRQIU5Lk82wmuSJu6
jcIR1buRMTZmhZ1t6PaoGiiqaOu1HcbPUfd0ylT93EVegSwqYcdEKdTIvLDL
zi3CMrcwK4PChNCKK8O1oUlwAC5/ale8vCUeCtmDLPTHdsCTMryRGkLPkovu
gknjQoCHy6ZCxZQS+qiRON7Go60MYiFVyh78pGZ8MYntIoT8k7vyxWZzsm/X
sS/eL9sU7/RpnOyKZwntyd1BKCrP6HatoXiH3AqPqdA3U+l1kabAQcZlxbJk
YgssArm+so8nkaGnFit5i+R9hXPNLTFxLSLvMqK31IWD3mpNPwtVyAbSMDkm
zpP+iRuRgI/KcrIF5SyMjm8aKHsv5q6vPScutUPGCc6BL0LEJaZRW84HlhQ9
Atv8SucSdmEiRYXmYZOMIn+jg4ujmGxFxO21/UXxnhH9MH5/YFuEOZS63LSg
fetVxFJDC6OwDa3bdEMdA87WBQ4FkVg+8p9MMac0nujuWzCD2PljP9CMqN1V
0kkAduVVhJJix53LYgrnyjIr4r3k7bZI9Y37fdG1PfnyIYXDn6hoCKhYl/ri
F7NbzNubwaiukRYSgeQluoepPLkGofYOqRbBKBAdmxd4UUlW+g06sgmH3pA8
ubEv6sxSCLTqLBKnYj6y8aeLkGNt/EgPyuAfxRoNRNPsKgrsNzzJ4giNAOj4
y7DPXMERiLxkz0qbOUhvXBuXDhH0e4rIocGV9l5zG2oiyH0eKbUWabbeDSfS
uEXoJ6q1vrbHdOz5En+AtlXvLyGyVyCGSIHDce/4Ygq6dIctse1GjS2DuEMz
6NZK2nzbL4cGz0T5lLbOhH/g89HXbYXLZftNM/SPy69NxHFp1TxlXFZtt8sy
I7SRJINruAZDKLMQ5x0bQAnZkgB6UPXoLmKdD5GIMSl0oBVn1gMHyEk7cOpS
zTkbw3qM11JczF7WH9x9rdAUrRrTru/Sph2BKDUiFExPh4MRvuNS24KYfLPh
zjCELvrM6SUvD1IQQTDfUIET1cYIPIfrT31605Nkuv6SRz32InjTUTLY244V
EZwXoXPB40ayVsP+0lKZXbXtp8Y0gEiRyWlmJzxJIWNEMOGMQ8qdOjviP/FR
xIpbyexP93ygO54UPqQ7Qrp22ZUMOOvxrpijxKtRD79kjwjb5P5ch4bGvFGB
MAW+wqWC43S4BcM+ISE+qvqcbv3AFv9E3weWdQOC5f0fRkD/OUAtIO6hlbCO
90XIb8SdjIbMzkTc6iRJozJft3fYgNnbN6QwW5b8HncyTvLb57xvCoV9GgFP
dHOoJ7swR+URQhMReOsTUp6GBE0ZQCQg//+2uXgIuqSseXk6B/xHEnYPSz4Y
SCxiiWf8F2+HmCGGsdChE1efkZ2zMGNAFyUMs6giMS1zVtqZOvPTuOFcGhXm
WOEkvcRNZMiuxYnFnVeudHOUFq3inNADp8M2WatpqFE4fTDozbneKnmvkNLM
JyTdSOLSFswBBedwadLN5xRgIHqFe/1ECxTqE1NGGwcw4JKxw5R445oQJ3SE
b1yeh5sUuVJceljKNabu2Om1GMEb2pYW15/zHY/HYInkKgrXDiEWRvOA1xLi
bWj3joC3IXpaRP8NFSNC9NRHRNQI2dQfUQ/ViFSc95NQLVGPNdB01JwF48cO
6WSBUBfic74uMTYq67z2Y2U9ink5dAi4ASLSOqm4K6DX2hqMLPiu9tgqk9Zy
L/zncf9QcoLR7DAhnOqy2A01XVbVRw1cNZj6EDQlV4RHlPQ5Eo5Va0U2K/fj
m4ujGtt/8lGp4OxiAMIAHRWQS2dTeAp35sDmxfEWQnw5s++ShpbCFUzLbZRr
Ha7P0RVPwjg27tTyzSGFme7C7OkED06LFPDBw/oAAfnWNXvt7OqZFc+18BTJ
KkUj9Brt65X6KmsY1eZwinYgeEDdyhVCLqS3834oReyHYhqrT5x1SbCf6YZl
SB1ZP3XTD6X+ibn/vHVN7SNISMHeJ3bXmIDZuNgB/U7qn/7Jvcr1Bz9Dz/Lk
3WmDGWTpRlaUfvGBDufSE+gRLIKf1iLo7D0Sk8yUc5YV56VdJCUbPGppY8GH
hzzUe81Vnhewa9PFghispiivx5IHvhrbIqGk2wgOLRvsMnu0kKgW3c0L6lKl
P0TAIt4cTUHmZottbrHZb144yFUqy8NmE3znXyyJh8RlfDvoodUWPkHCCN9R
ld3fYa4jNX0IrAuS55/I9xLb/x+3b16zB520p2WLDsq8I3Mz2QmR3CpmZx+T
Mvwkv2Rc94vZK75wjRtO6tNDh2ktK3CVFJHWa9soYpx0hI92/F6KUYlzoGPd
CRT1i20QYnHT3FT2MO7ckRwYc4lY7PERxkLiqoxRPVeq5vmWdPJKRq4dM5ZM
Vg/T827hh2Pj4t3ihB+y9/iYLlMnqUm4R1pfaWBz2wvXdA3C5Btza+N1swNx
Il3UgkHKDMQb3MqcnpOWQZtcoqlJzIsRNXOnKxcvileA52ybugAO5ZUwlN0X
DyMWQJ+DTNN2JEGDJ3Vmn9r1ZRQZGu/3XCk13eKXlrqTwCqp72h0M5Jden5C
rffnHOkJ1Kcdoh0nrVLvJ4vNuB27lpyVxaZGpyNbSfK/EjAwFKRyzkEiLVK5
TCJgD5t81gXdCHXIymj55iYsOadfCYSbFHJL3bXUMb6oKaiLd9FOdYbAhUGx
wzLOcBt6iFTF6yy4qhotZz3VeyCrDh4VAutl4NIwoetT15aA4nHp+S+g5xRi
PcknGZXOSzmXncDF7NkDoyf6JhzTudBbs4357LPiddcuKNMDz9cLOt5ohknc
hFl2FXa4xlph0il+drDuTM2Ojbq0cyRIefYdFKs+3iBJr1D0IAUszT0fUjwz
Tbn2cWyln27WxUfMwlYYNeohWcM6o8zjfU+nm8KQjQWXAGLNtdxeZl57vhUZ
auqKL4eIl9FEZZTf1WHqlTG45HeqFFK8Kv1hDMPf9hoDFYQ32Zqm+PHeF0Xe
bDfH+hPvT3k93qFzjcvm8Y/UZCaqbBlWdvvNuNsquY3pM0Dgh21sBB+f9itv
e9VcgfniLdX6BL4ZJGsSFxEGeENYa1SpeJ0yti3BphtNeTTtFQOwHmWlFFpF
7dNUvsa+01UJFH2euIIda/6FzfFSkAz2yoxTx704JutODfyRZr78Eez3x3lM
MwlvkusJpZDWEmKlpuIsqmNSLVk2KzRON+nKcG0wuRkDeCHLw5ClYh+Zm0q6
T22jgxwxTOV9xVYZLUSecGJWsYHARL+MeKPxw/aBda3uEvFXNO+OlM/vDyAo
IQa55F1F4xCL3sFrrJPbV0g7aDoaG0O9ykKZycdovCNJJnoI4QOHoduVoYwc
r9aOUZm5YuJp8VzEAF9AxCGdVHzJmlqjNfHSLMLI0GhQCsghOGdJg1LdiLIA
UkWXK9fS7IoxcVbG9T+ZmRqr5MwUyVEwdFbanag8d+SmUAgzxIiUilJxYoe0
DNiHNlxXt89ubtB/QweEFhojWmogYDsZTq2aobTgwRgQm12wttdKXjZ+RsOI
0iP5m8PSLp26KZy9PVqx5UdGYDwCj7IVsGSbNmZoIDypHHM00jP07sWzb77+
/e8wj8ul6Nr2Tgt5Q5zBxURmmaU1hnotPGJGBTUXzPeuMcZaDiuyHtxpD/Rn
1fFD/BHWUXtGsXmmsq5YdE2a2nnpdMnbEaNcKc9KKMHXxI2rtVF3Gl5LkXrI
P2dxv17rRTVMOUgwo0NxqIdwfOwaYFBZtsY3CQou+Ly1TxAXcV85QcKxZdLD
h93mcjahZR54JEZo97AMC3YtsMQDRlqHs5QUGCv3UopZ0HE/hw5L2iTEPSKO
RjoWi1SuZ9KDTQtay03qg0tEwkK0WJS9ur8kR3yepL/rTKXKdxmOhI3Xuroy
MD9JHbPU1fbftFqwoNFVnWoaV8l8vNwxTwkFfDeeqZ1C6jN7eowGNGDLENRF
nTXZ1MoL1iHEbgeLLmvOl0mdaKKXNz1NW+dRnWeE2qknFpN3TvWoCRcQ5heZ
iwI9RUiCY3frKGbTSBOOfc04F+XjOUa17nYO+sm6tCHz17j1kHoTHP1K7ea5
9mHrSXEVei4fHF1Ln3T414Zb9JZbhXdms09pv0W1G1dKLc8ZO8zGMhwcPml7
vX9rkj8PzzOuDz1GhhYRWeJezUPuL+XytEnLnsi9oke3uUdHlY3rjq+97EHl
M89fVjW+zXJVq3onTSa0P1rQdsR2065o0kbJWMwAUKeGc6oHq22eKDYjtK9l
NXibBOPE2pT4+QXHz78sXEl7/yqL2HMC7v+TvmBPTdmeFpNgy8vNdrh3+L/n
qlUoT7JIiu604ud0tzQSrvdaDbPgm5/yxo6BDzHVtIbJBpEbIbV/Sd4y7Tpg
bvTQE2LdfrROI/SXuiUq3Msei8DKNAq2aDmOS5zkCPVWDwG7ONDvRoD/qO1e
iLS45SA3Xi0oe1Cm2QN4bM93wwV2024a9hf2R5X1/I0lRdzg3HFF/44PVEaw
JytEONw1J/yTcyaHKuKv4a4pPbDKIgAtXYu4Uw56Oq+U0ewn6A85zdLgstO6
ny0yHc9r9lQoWZ20C+NCvDuuImzrPTYjpaoYzTyrXg2cAy2Tqkowh3t0T/rW
f0GH7XEZ84jIDHMiJXKvyMkcOrmWkkgPIRg38skYrrHLJQz96u0N3ifR9VXZ
Ckk8lBvamzK3HdUnBce/TF1/j9qdL0IF+WZ5owa6ZUNpxUApYHLCPBiypLCN
o7PU8q8xomXTo/dq5sx7bnIR+fdTpcWnEXjs4jLQjQ1Z/o7p/9SsG6bKjSHx
GKt67fkOZ0YKiWjGt/DIBSZBJgP6hxyj2OkmrbO2TZwe6CGb17FN96d5ERFc
S1UlGZ+shslxfm3RHbsCLgh3yvYn17fvppMuXux6T+1CIyWykGub8mntmF2E
z+J27ZTZkiExfjxurh1K1LkOYqxtx/Pl06iJDNbIGFRu1PlSITm0mvTZOYfp
vCbtd2VUBT8zlH2M4ODAG5oCDD0TxzPMkEU/LdA8p2xtoHmK2z6XpsvqEGAN
yaTrP9KmIlvC7kK8gA45ipk42rEfqLmQWL4Pr2hX2DBsVP0ygvVICzcqG8La
PhKKxZLAD+g2vfC3pIRLOO96KMjm0a9idzE23nrtKEacsT5H23uKuIkaZ0UM
W3nnL2CeWKrFfhp1zYfpfKGX/mXx23sXOw2/CwUnN2k4OhudWAqc7bG9xkKZ
bq9d1WPtSh7ZCo5ru2bOz1TKjDypSB0N4Jqdz6DzYSd80u1+Shd/o4uLAzSQ
EscnzXqxcn2UepM25PD25ur1VdZNMg9zOd/A3xTTKb+dQANHzxqH9lOijwC1
BioKwwXaoD1k8EWee1AIY5xjbh2csM1LV5jaTuuDyBNaXMUwjwwypDqbrKEe
x2Y5TsFtF+LFFwYhNOBC2FS5oUOxt1LvnnG6udxmM8U5EpSQKfuKOv7Q1uBy
ukVJfXctNki1TMLSD3lclrfGcYsyui9gusconBvmrcnuRYyDI/9AqqJUcOip
oNAuMZrjrbZwcqQ3Z4p8aOPOMfQh5Rfkqu1qekpKiBiZtYsTBXG+XLvNgRwz
iYHXWkMu3dsjNXseedmSetDwTJrZSpzKg8OjH8AViYlvecG1zNf2Cp3NniUJ
caWoT94DdZL7yEv9Ca1Fh3K3px6qP0MrDXvBCulRhfSDc2secILvLieBnA0t
fLV1L6faRz5QbDPdGEboqf4QWg0jHveYhpFZ55XpGplfjIAVqFGTvRriVQwc
S6rApBcTUDiD1oBpDkezWUTsuSiCw3Gq44X+Im6C9r5Y9cf9AA5Cud8mlbfR
+4JzjN9R5bqDdyFQmUEOvuNNaMA1HGrMgZ1pSjkKJdiJJhViO+ji5lDB+cTE
MrFV/eMmm6mk3aMf0S4pLzGRXluxlYpkStquPe70bLxSJfM2nOqZ8NK3biKA
QsDAO6pUEraHXCxn4kXYeM+Ib+Q1SFPClbg5gUjb9RmPNqRlePXvHBI1NOuD
ymDlTXI/HI15cmt5LEsVR6ammuN5zI/nJkF4xpwl4Gp9iu2lb329Ax9ZLOFX
X38LlnBVHiTnIDrQUHTQJ9ZqMyrXBwXZOsq6kpLhJZ/HRlBygA47QiAkbXig
sjDDDMEQ3cgqZUwZcKd21GKEjLWUBv8wDLDQrcgMlhg0x8toXmiIdBbZtEw2
KNB2xbFYMdjdpVMLJaEIJWHgdLc2AEgLMKV8guolY6sQ/S6ECB+ocOeZRg0U
pfP6/+Hrb76B9afmzK7Zh2v1cO58g/1F+s0aPf/qQFAILRkiU5r6JnXL6xuu
PBJHRtVESKqUELyoHmemzahflj6DBZfZqR1/TdtTp2PzFDry2lHk492hwgOK
6Dc24EmVVrhGodgfYFArcQrdoJW9ktpcOaxbEy+x+4CpW/hbJDwg2YMuDIHJ
lrmzWfZoGrEta91+kBD5Q7xKSpZlpRkvkKK96UKVNPYnUjmuvQWbBTBQ5Syy
Y8yc7oAak1QwQ8u9nJvJErkCtwHxrXgPThnKNcJVTiBsyT6ILuOkVZ487wQz
luCC+9eR5zzngCF0MM9ucYhppht1QWaBgE92AMfUUzwVqxiS44fpLR+FgHFB
mNng6Frd8FzjlVlSQQ3aArFjxKj0mhQk/gdlFHOU8TqPXyXecKTvsTenlZ/I
rkAPueYbC6l1CNUCMw8qUKhiXROo8K73WnKVFCZ7Kt0xUO9SCsVjj+czFlAK
REPvlXFheT21Tqk9XsWjdbLmMXCfH1n2aHvJUQsN1qJXyZmOIpHe/Cbcv3EU
xJLT5qqBs3hS3yTQitiWUxc7K/3bx6SeCRq0QXA7typuFC6gFvahuEsY4Jy5
kSnkBafZfSeGDa6awW/rvQ/lXD9P97243V6vXzbBw6hSNoJN7EhNl7WelsqL
2XeiSsgMhMv30KShY9GXtU94OOxXcMBis7CkoicsoHDDY8WkqMEoKLHm1FxS
wVEJMWzpmSj2gzSKkKJSVO8Y0dCC0Zd83XBOQ/EpWv2SEbpwBECP3Dnw3Rmu
vpLmpljLhQ4URevkHHjTAjN6o16iIVwSWy6O+pdaR8YQX8WFVjW77I2XJb24
IGtEwZC9MxSMATnq9oLfaIKUjozVAgruBvWpRQ1qk2KfGnIw+bZXP3FjIzJy
sAAvuwao6vAEJabjKgXQGXE0M+Zee8mpZAURbgo41QP/9JWrD3XFj3QXXnzJ
nIIk6ZJpbJX2MKCWXFpuffLeSq8hkNZu2LBX7s2N3metUY9tXUC7x33JzreZ
jhuGIkp8NKkzCOY+uc03WwitIbkgyCohw/dO+5ZkPRTmUjlO8zA6KbtdVGPB
7I2SHk2aK0zkWUIWNWvfICXjaUO3UvtDyW7L2JI6I63BrJXL7c9ehMw9tW5a
qWKTjRz1m4iiwRlNZM1/kDDCiG28LIXBS3sxQrjo0PWCuQiYCnKIurvv7H2d
i9A6RouJjOdlJGh83XI6XrBZYBhHVUxXbRa3J/jTQvSwO5EWwxQUJpnTlUG9
R7VBlBS0VMWJfSelQvQ4llm6nV205tQNkpzmpDyRC1H/qCQxT7VGzrC5QfIX
hqVif8NMFwVmVMA/IkBpYKj8pu4I9f1EbGrcizWcfCq4idQN5T+dKOSUe2DB
XiY3OISONpFmYfoH01AptZDcFZC6hCn2GFRlthSh64geslxr8HWuWCpXU2fh
kYMc/Dur9qfUrlSkBo+6sj2FmyM+PLrWURmTW9UFyBRPRTaHGKX0DrOr3H3N
4SK1DC5M1CTi69Rm8WkwCxZqcydPKqxZIAEIUUePtrGx6YU7pw6t3ksQLLZc
Es88QU1pTI9j1POGOEFReQTfjOqbguNCRU3T3RkZtp7Hrk5zijXo+hoaP4Fv
5prT0VXQ09U12dXW3OCBY0Xp7BPrhjRBfe6uDtsB2RTJZywRmOhiseCEG4KT
/M8Aq8EH/xe+VLNdUsAAAA==

-->

</rfc>
