From a5eeb2ca1489c670538f9fda4b89d7f3576d55e4 Mon Sep 17 00:00:00 2001
From: nihilist Paste your invite link into the input field and press Enter. You will be met with a window asking whether you'd like to
+ You will be met with a window asking wheter you'd like to
connect using your current profile or using an Incognito profile. Select Use new incognito profile. This is because we don't want to reveal what our simplex username is, we just want to join the chatroom using a random username that is not tied to our identity.
- WARNING: Make sure to check whether your faraday bag works on not at your
+ WARNING: Make sure to check wheter your faraday bag works on not at your
home prior the protest by putting your or someone else's phone inside it with
cellular data and gps/location enabled and trying to call/track it.
diff --git a/opsec/anonsimplex/index.html b/opsec/anonsimplex/index.html
index 7ae67c7..cb0133b 100644
--- a/opsec/anonsimplex/index.html
+++ b/opsec/anonsimplex/index.html
@@ -628,7 +628,7 @@ https://simplex.chat/contact#/?v=2-7&smp=smp%3A%2F%2FBD4qkVq8lJUgjHt0kUaxeQBYsKa
-
Obviously for anonymity, this is terrible. If you log into an anonymous forum account with the same browser as you do a personal email account, the browser profile will appear the same, effectively deanonymizing you if the information is combined.
- Moreover, this also stops any form of persona separation because all of your activity is uniquely tied to that browser footprint, regardless of whether you are logged in, what site you're on, or even if you're routing through TOR.
+ Moreover, this also stops any form of persona separation because all of your activity is uniquely tied to that browser footprint, regardless of wheter you are logged in, what site you're on, or even if you're routing through TOR.
Mitigation for this is quite straightforward: usage of the Tor Browser since every user is made to look the same. Most of the identifying metadata mentioned before is not a threat since configuration is uniform across all users. diff --git a/opsec/criticism/index.html b/opsec/criticism/index.html index b6d3901..d2aca80 100644 --- a/opsec/criticism/index.html +++ b/opsec/criticism/index.html @@ -164,7 +164,7 @@ The amount of energy needed to refute bullshit is an order of magnitude bigger t
This is the minimum for me to consider your feedback and do something about it. However if you want to bring some extra quality to your criticism, you can do the following:
- Level 5: (Refutation) You can first quote what i wrote (but i know what i wrote so you can simply link to the tutorial directly and i'll immediately know the context of what you're talking about), and then explain exactly why it's not correct. Ideally if you're basing your criticism on external sources, also post links to those resources that explain further what you're talking about, so that i get the full picture:
- Level 6: (Refuting the central point) If you actually care about me improving my tutorials, cut out all the bullshit you see from level 0 to level 3 and just stick to refuting what i wrote, explicitely. Whether it be the reasoning behind the tutorial, the explanations, the showcased setups, or the purpose of any of the tutorials. However, for every criticism that you make, also let me know how you think the blogpost could be improved. Tell me how you'd improve the tutorial if you think the solution i presented is not good enough (or not simple enough) like in the example above.
+- Level 6: (Refuting the central point) If you actually care about me improving my tutorials, cut out all the bullshit you see from level 0 to level 3 and just stick to refuting what i wrote, explicitely. wheter it be the reasoning behind the tutorial, the explanations, the showcased setups, or the purpose of any of the tutorials. However, for every criticism that you make, also let me know how you think the blogpost could be improved. Tell me how you'd improve the tutorial if you think the solution i presented is not good enough (or not simple enough) like in the example above.
This is the whole premise behind Truth seeking, I strive to have the most correct perception of the subject, but in the end that's my perception. If we combine multiple correct perceptions of the same topic, we are getting that much closer to the truth than we previously were, now that we have a wider, clearer perception of what we're talking about.
And that's it! You now know how to send valid criticism, and you now know how to do it like an adult. By doing so you can effectively contribute to the overall project by helping us continuously improving our blogposts.
diff --git a/opsec/darknetlantern/index.html b/opsec/darknetlantern/index.html index 3ad2de8..614fcc8 100644 --- a/opsec/darknetlantern/index.html +++ b/opsec/darknetlantern/index.html @@ -781,7 +781,7 @@ lantern.nowhevi57f4lxxd6db43miewcsgtovakbh6v5f52ci7csc2yjzy5rnid.onion → git rm --cached /srv/darknet-lantern/submissions/submission.csv -From here, anyone can mention the new link to submit, the name of that link, the description, the category name, and whether or not the link is sensitive (related to drugs) or not. And lastly, to prevent spam, we also implemented a Captcha mechanism.
+From here, anyone can mention the new link to submit, the name of that link, the description, the category name, and wheter or not the link is sensitive (related to drugs) or not. And lastly, to prevent spam, we also implemented a Captcha mechanism.
Once the link is correctly submitted, as a lantern admin you have to manually verify it (obviously there's no way we'd let strangers submit links that would be directly displayed on your own lantern instance without any manual verification whatsoever, let's be real, that would be too risky).
Back on your lantern instance server, you can run lantern.py's new option 11) to review submissions:
diff --git a/opsec/governments/index.html b/opsec/governments/index.html index 41f0c76..7efc2f5 100644 --- a/opsec/governments/index.html +++ b/opsec/governments/index.html @@ -81,7 +81,7 @@ A government is the system or group of people governing an organized community,Their primary focus is to maintain their control over the country/state, no matter the cost, they will do everything possible to remain in power for as long as possible
-They are the ones who write the rules, the laws by which everyone in the country must must follow for society to remain in order (whether the subjected people accept it or not), according to them.
+They are the ones who write the rules, the laws by which everyone in the country must must follow for society to remain in order (wheter the subjected people accept it or not), according to them.
Governments pass Laws and to make sure that their laws is respected, they need Law enforcement (LE) to be able to apply sanctions on whoever breaks their laws.
Governments nowadays almost always use bogus reasons to use to pass abusive laws (the typical "it's to fight the boogeymen!" type of reasons) , in order to either make more money, or to enforce surveillance better, or to straight up take away power from businesses and individuals.
@@ -102,7 +102,7 @@ A government is the system or group of people governing an organized community,Each business is closely regulated, the bigger the business, the higher up the priority list it is to be audited for regulation compliance checks. The exception being with International Banks (ex: see the HSBC scandal) due to everyone's innate greed to get richer even if it means breaking the law.
Businesses are centralised entities just like governments, they ALL can act as proxies to help law enforcement, whether they want to or not.
+Businesses are centralised entities just like governments, they ALL can act as proxies to help law enforcement, wheter they want to or not.
diff --git a/opsec/haveno-cashbymail/index.html b/opsec/haveno-cashbymail/index.html index 874d3a6..328d43b 100644 --- a/opsec/haveno-cashbymail/index.html +++ b/opsec/haveno-cashbymail/index.html @@ -147,7 +147,7 @@ Your video should be filmed within a single take, without cuts You can put the cash in the envelope at home or in the car, and you can put your phone with the video turned on in your front shirt pocket and it'll record the whole process without much extra work from you apart from making sure that you do everything in front of where the camera's pointing. If you have something like a GoPro or the latest iPhone which has a camera with a wider viewing angle it's going to be even easier. Keep the footage in case of a dispute for 180 days. Put custom markings inside the envelope -Use some sort of a custom chop/stamp/seal, or a signature or just random movements with a sharpie inside the envelope, covering all surfaces. This will help establish whether the seller is actually opening the envelope you've sent or a fake one. Make sure the mark is visible on the video. +Use some sort of a custom chop/stamp/seal, or a signature or just random movements with a sharpie inside the envelope, covering all surfaces. This will help establish wheter the seller is actually opening the envelope you've sent or a fake one. Make sure the mark is visible on the video. Try to disguise the cash To mitigate a (potential, but very rare) case of postal theft en route, try to conceal the fact that the package contains cash. You may put the cash in a magazine, mylar bag or some other container. Vacuum sealing the cash also works. diff --git a/opsec/high_availability/index.html b/opsec/high_availability/index.html index 9e8194d..d16c1c3 100644 --- a/opsec/high_availability/index.html +++ b/opsec/high_availability/index.html @@ -120,7 +120,7 @@ The adversary has identified a probable city of residence for the administratorWhat if you want to do something without the adversary knowing about it ?
What if you want to do something online without revealing who you are ?
📝 Explaining Anonymity
@@ -313,6 +315,7 @@What if you were to be forced by an adversary to type your password to unlock everything you encrypted ?
At first, this blog started out as a hacking writeup blog, to show everyone how i hacked half of HackTheBox back in 2022, it was my way of showing that i understood how systems worked from the adversarial point of view. Then once i learned the pentesting methodology i realized that i was doing the same thing over and over again with different technologies, got bored with it, and decided to move on to Sysadmin topics.
At that point, i dabbled heavily into the self-hosting community, running a servers at home, running every possible service from home, open source only, remaining the only one in control of my data, etc.
But something was missing. I realized that Decentralisation and Privacy were not enough when reading the news, i realized that the very same governments that were supposed to be at the head of democracies were starting to turn into dictatorships. When that is the case, you have no choice but to fit into their view of a perfect law abiding citizen because any reason is a good reason to put you behind bars.
-That's why i decided to move on to Anonymity topics specifically, because that is the key to remain in control of your freedom, is to make sure your sensitive actions remain secret, while portraying yourself as the perfect citizen. Whether you see this as right or wrong, it does not matter to me.
+That's why i decided to move on to Anonymity topics specifically, because that is the key to remain in control of your freedom, is to make sure your sensitive actions remain secret, while portraying yourself as the perfect citizen. wheter you see this as right or wrong, it does not matter to me.
What truly matters here, is exploring how you can use technology to protect your abilities, and enhance them.
The goal of this blog is first to put an end to the tyrant's propaganda where they motivate everyone to trust them. No you should not trust them, and that's why you need privacy, anonymity and deniability.
diff --git a/opsec/moneroinheritance/index.html b/opsec/moneroinheritance/index.html index 903df95..af0ea3a 100644 --- a/opsec/moneroinheritance/index.html +++ b/opsec/moneroinheritance/index.html @@ -711,7 +711,7 @@ In this scenario, Uncle Rich indeed has passed away.-From Nephew Nick's perspective, there is nothing to do but wait for the 30 day interval to expire. After 30 days have passed, Nephew Nick receives an email. Note: the text of this notification is the confusingly same whether Uncle Rich has manually approved access or whether the timeframe has expired. +From Nephew Nick's perspective, there is nothing to do but wait for the 30 day interval to expire. After 30 days have passed, Nephew Nick receives an email. Note: the text of this notification is the confusingly same wheter Uncle Rich has manually approved access or wheter the timeframe has expired.
diff --git a/opsec/openwebuilocalllms/index.html b/opsec/openwebuilocalllms/index.html
index 16f446e..7bad4fa 100644
--- a/opsec/openwebuilocalllms/index.html
+++ b/opsec/openwebuilocalllms/index.html
@@ -919,7 +919,7 @@ Only output the translation, nothing else.
In contrast, a VPN encrypts your internet connection between your device and a single server run by the VPN provider, masking your real IP address and allowing you to appear as if you're accessing the internet from the server's location. This is generally faster than Tor but relies on trust in the VPN provider since they can see your traffic.
-Tor offers higher anonymity due to its decentralized nature, while VPNs are better for speed and ease of use. Neither is universally "better" for privacy; the choice depends on specific needs, such as whether you prioritize maximum anonymity or a balance between privacy and performance.
+Tor offers higher anonymity due to its decentralized nature, while VPNs are better for speed and ease of use. Neither is universally "better" for privacy; the choice depends on specific needs, such as wheter you prioritize maximum anonymity or a balance between privacy and performance.
Whonix is the best part of qubes, it makes tor very easy to use. Whonix qubes consists of two parts, first is whonix gateway, which onionize all the network traffic behind it. Whonix workstation is a workstation specifically tuned for anonymity, and is usually disposable for increased security You can also hook up other non workstation qubes behind whonix gateway in rare circumstances, for example a windows qube, but you should be careful and should have a specialized gateway qube only for this. This is the ideal place for all the high risk activities like all the darknet stuff You might choose to whether or not to put whonix gateway behind a vpn You might choose to wheter or not to put whonix gateway behind a vpnQ3 - Fixing Python script
diff --git a/opsec/qubesosnetwork/index.html b/opsec/qubesosnetwork/index.html
index bad9c92..6753c87 100644
--- a/opsec/qubesosnetwork/index.html
+++ b/opsec/qubesosnetwork/index.html
@@ -146,7 +146,7 @@
The important difference between the two fields is adherence to Kerckhoffs's principle: the assumption that an algorithm must be publicly known to guarantee that it has no flaws or backdoors. (This is the reason why you should only use open source crypto software and never roll your own crypto.)
Steganography does the opposite by relying on security by obscurity: the method by which you hid your data must be kept secret.
That means that whilst complementary to cryptography, steganography on itself is less secure than the mathematically provable security provided by cryptography. Think of it as tucking away your valuables in secret location versus putting them into a sturdy safe. The safe may draw immediate attention by burglars, but provides reliable resistance to attacks, whilst it is up to chance whether they find your hidden stash.
+That means that whilst complementary to cryptography, steganography on itself is less secure than the mathematically provable security provided by cryptography. Think of it as tucking away your valuables in secret location versus putting them into a sturdy safe. The safe may draw immediate attention by burglars, but provides reliable resistance to attacks, whilst it is up to chance wheter they find your hidden stash.
In military science, there is the concept of the Integrated Survivability Onion — in short, the idea that they can't kill you if they don't hit you, that they can't hit you if they don't shoot at you and that they can't shoot at you if they don't see you. The same thing applies to every good digital defense-in-depth approach. Using steganography can't harm you, but it shouldn't be all your rely on. In our example, a hidden safe is better than either option on its own.
diff --git a/opsec/steghide/index.html b/opsec/steghide/index.html index 3600c16..1535b57 100644 --- a/opsec/steghide/index.html +++ b/opsec/steghide/index.html @@ -83,7 +83,7 @@Our example file to hide is going to be Bitcoin: A Peer-to-Peer Electronic Cash System, the original paper by Satoshi Nakamoto.
-As mentioned above, the cover image must be larger than the file you wish to embed, as a rule of thumb your coverfile should be 20 times larger. (Hint: you can split larger files with tools like tar or 7z into smaller fragments to embed into a whole collection of cover files.) We can check how many bytes steghide can embed by using steghide info file
. In our case, it tells us that it can embed 232 KB and asks whether an attempt should be made at reading embed data without extracting. As there is nothing embedded yet, we decline with n.
As mentioned above, the cover image must be larger than the file you wish to embed, as a rule of thumb your coverfile should be 20 times larger. (Hint: you can split larger files with tools like tar or 7z into smaller fragments to embed into a whole collection of cover files.) We can check how many bytes steghide can embed by using steghide info file
. In our case, it tells us that it can embed 232 KB and asks wheter an attempt should be made at reading embed data without extracting. As there is nothing embedded yet, we decline with n.
"apod20240824.jpg": format: jpeg @@ -100,7 +100,7 @@ Try to get information about embedded data ? (y/n)WARNING: changing the output file in anyway will make the embedded file irretrievable. This is especially important for every form of lossy compression!-Now let's try to extract the file we've just hid. For this, use
. This will prompt you for the passphrase. Enter it, and the contents will be extracted into the working directory. In our case we will be asked whether we want to overwrite the file with the same name that already exists. (You can suppress this warning withsteghide embed -sf input
-f
or by specifying an alternative output destination with-xf
. Here, I used the later so we can confirm the files to be identical with md5sum: +Now let's try to extract the file we've just hid. For this, use
. This will prompt you for the passphrase. Enter it, and the contents will be extracted into the working directory. In our case we will be asked wheter we want to overwrite the file with the same name that already exists. (You can suppress this warning withsteghide embed -sf input
-f
or by specifying an alternative output destination with-xf
. Here, I used the later so we can confirm the files to be identical with md5sum:d56d71ecadf2137be09d8b1d35c6c042 bitcoin.pdf d56d71ecadf2137be09d8b1d35c6c042 output.pdfdiff --git a/opsec/tor/exit_node/index.html b/opsec/tor/exit_node/index.html index d50e972..891ae17 100644 --- a/opsec/tor/exit_node/index.html +++ b/opsec/tor/exit_node/index.html @@ -199,8 +199,8 @@ Jan 29 10:43:04 exit Tor[3855]: Bootstrapped 89% (ap_handshake): Finishing hands Jan 29 10:43:04 exit Tor[3855]: Bootstrapped 90% (ap_handshake_done): Handshake finished with a relay to build circuits Jan 29 10:43:04 exit Tor[3855]: Bootstrapped 95% (circuit_create): Establishing a Tor circuit Jan 29 10:43:05 exit Tor[3855]: Bootstrapped 100% (done): Done -Jan 29 10:43:05 exit Tor[3855]: Now checking whether IPv4 ORPort 80.78.22.215:9001 is reachable... (this may take up to 20 minutes -- look for log messages indicating success) -Jan 29 10:43:05 exit Tor[3855]: Now checking whether IPv6 ORPort [2a0a:3840:8078:22:0:504e:16d7:1337]:9001 is reachable... (this may take up to 20 minutes -- look for log messages indicating success) +Jan 29 10:43:05 exit Tor[3855]: Now checking wheter IPv4 ORPort 80.78.22.215:9001 is reachable... (this may take up to 20 minutes -- look for log messages indicating success) +Jan 29 10:43:05 exit Tor[3855]: Now checking wheter IPv6 ORPort [2a0a:3840:8078:22:0:504e:16d7:1337]:9001 is reachable... (this may take up to 20 minutes -- look for log messages indicating success) Jan 29 10:43:06 exit Tor[3855]: Self-testing indicates your ORPort [2a0a:3840:8078:22:0:504e:16d7:1337]:9001 is reachable from the outside. Excellent. Jan 29 10:43:06 exit Tor[3855]: Self-testing indicates your ORPort 80.78.22.215:9001 is reachable from the outside. Excellent. Publishing server descriptor. Jan 29 10:43:06 exit Tor[3855]: Performing bandwidth self-test...done. diff --git a/opsec/torbrowsing/index.html b/opsec/torbrowsing/index.html index 3c5a2d9..b83b4d2 100644 --- a/opsec/torbrowsing/index.html +++ b/opsec/torbrowsing/index.html @@ -233,7 +233,7 @@ extraction percent done: 100 / 100![]()
After the reply they will send you a download link, very ironically the download link is a google drive link, many countries that block tor also block google, they actually are supposed to send the brower bundle in attachment
-
If you find out google drive does not work for you, try to check whether if github is accessible. Tor browser also provides download on github officially, check the releases on Tor browser github repository
+If you find out google drive does not work for you, try to check wheter if github is accessible. Tor browser also provides download on github officially, check the releases on Tor browser github repository
![]()
f5>b5ot*%`uj)9b>4^@D+c`cnKOyOgC;?uG7lB;Xic+G^pi)t^ewlhWh&cY^M-8 zkOQEM@EYKxn4ugJ`=IIm-sKxG4C$CRgU4>q-P39kHbOey433lh=7eh()Kb&EN1W&> z_j_q;Ys2W&GDbZLFnsjbvG5w`qyuYXm5U?n@ z%VF(`n0I*g4=1r>yop<)?cN9Y)zz&U1cwu(G(YR9xw$r(-cDGF#q(&5p^~+b-r95V zN_o%Rxw<+-n2 FIqNAexx#lASOe?`?Rcpt!C?A??vT16z!+iE3 zHW65r)Q2(0UaRVp%^2u`jHge2Ul;+)CH>)Uc~C`&RG75Z_Nh2qsbl&u(pyzEH4m&f zkpF8JRWbZ)7D^wPFG%Hbi;7krVORFND6mb9269a>Y^)7I@(K$3^=Do}(CTt#Wmkij zA-my?fl9(Pl&&WZ#b8XPzt9_Xx?6>%{5R{uumymhvC@CmzmTJLlC|P%Zf aXrkwxQ=b>8%*R{b-t7; zp%f&V)?|R?S$-{6?lXg&3=Jh&N?%a*Kzu7?%iSv??C4>A4`-P#{wv6u9v&W$G!up6 z;Tyv!+l+e}YMbQJ1r(Hz%TBsJC=dYM79R6pQ<60Udg3zg|4>an-$~Tp4S&;c+8*wG za?mlf(bm>zYBm>FSEx6v!8O&@@d6GP>pm7)b{-Y%fmH;EUU(<%3Rk5>qOF62s^=Au zw6G_swKBKj#Jok(UE5QH-A$1Qyp|nGu6l+65`)Enrf9z5HR0U0BphFWAdo^_E8)|% zqIAc8!k$+U#bn5uO~v-X>yzlN@s Zu)U8 zq#xraL_{i%u id z+y{Yja8FXxMXL}7Mj_y4)0YLfYr!bPAc 7a4hgT>0ES>#5}bk$yM5Fis~=5?!*+=k3&Sn%g0ZF}XSl z@xrWb0bOt2{D7p1B04;5N-nUOdT8b9?mk2(^Vb%bdt@tYJ7S)T`K5bH%gO@gK9HBv z&XD-Sp^LE%X#ts$w|>L%ko<|k HfvsSJr$p0sa1d6RYP9X=6ddm?U7!oVK5I~o1B z?i!h!3)=mV +0UeEx}8N=g||T?oQp8aJ8Fez)1L$ z{UDmmfZop0C&PKAz_> 6rH6b!fq!)vA=TCw(uEzK*G*t?{os#8-_vz^>0LR4`0L)0`wdL@@^ zKRmRP=480}?bW(W^F15IcLg05Ni&i@vF7LXUaxyh?%Fldust(~kg^5arAwE{NgsfQ zac7(+_i?b1JPE!89HQoR;sZ0ATM WBIBGrTS^kR0NQWa;|$l2CG^dtdf9*U7(s|4;{`d8r!p>^@g`{m4ztzy!f`ys}Ga z{l5w7 oBQ`xw1hdtMg8UF+5>hl&0zt|JHPEE_NX#)qzr#jh(to2gsd^e zueUTiS_Hp 1B?_58xZ2%SsMV6MWM zmy*r!fJ{!tmK4IT&1=)+0og*u$ZznKV;M^l#um75ocYxPAc4k1%c;`>ef7;7iP 06~U@3~+N1$@&ZqM}?OBVlA=Di%(OAI?VG2RVw3i^CwmAVcd6_%n#5s;YXG zs$bSCbxhuznko@3UMq_ObUeJg ZdEp z%lm>M2H}c==?9kPs60 CHs8TO3Ygt`=c&;jKMAR& zOEQmKp7smN634LY&XDI0&_SqP3)_MzIx1hPr^zJ&wOFbAVB<;^B2}Z8zrEf-{*^Qm zQhHRS;`Agwk_dC!Lwx@x`>3ms!w&4(LmIHZo#tO1f?3Jaw?mOFxiMH$HWf0-XB$5H z*!h(-or1JsqlXGyO&fm>T@@DuR|Z9XE=&wNKrj$ gZA{nW$|*ZdEr z`hx)aZGMdCNlX7T4vo}*RhB3TWWP)Xm~Y!Fg#)vnZWIS#xM$j238@3KDHrf0hymBO zX(BXUz5I6+;u(6pB|NGC-X+x-yP sv&~0Z9zPoA-6=&37po|{enRXaa0TPAK`tn zFWiX{Y5&+sx3|POLL97WlR1bSXb5JAL`#Ep4Z QY1U`$Bp8!dM7U%^ JBcCO30CB-A!! 2J~1k>c0Rsnx159IV;g#9PpmR}A?|Ax zr-V>NFz$iRDmBzx>}5_)s#4;esd?ZgN0*3q@7~SKI1UUwG<6iZ1d@%zASuEGrwDDY ztdtgEbPRVUw@z!*!|{M)H&A73W3Y0SIMD)0CjOk=(R1hKp;po8ORC6$Lx-|m9vV8U z_n$KjOtV7S)O({aYWYQe=DVy~ml&GtB$fU2h5`LD#7pQ3dsa4K)V8)_0SCdq=K|Oh zmJ!%e;ABMg#vO3YcH?*@1%(ggU+p6*8Ycmf{oxbW7MGTwNvdgDQHVycZ=bzQU8UoR z)XvD@7zny_w!N_oZ68=L+?^Nd`^To+D1)clWd$+7tfwha&1t& _>MQyLM4BJq@gP;W1DFHS8vEA! zNXp7SXi33%`e%P*ga_Nv_^$jjF0&)y)ir~U9=v~H{oF*$pvo(A *(iC?ZY1ysMsC}J8rKBz#n!JBkIkcrl z^UqsS0~qx6W5wL(IABchH5B_)k6%~g`N4~$pKz-|6~VL@0&rupoSGV8Sa-6YQ=I+y z%;8@=bg|zuEJ{uZ5iDTnGBlyo(G%ZxXBQ*m8mwiPA+(uq@sW5Ox~aal7Q;*x7Z(={ zYt+=j)I<+s_iy!h3VJ&t5R~fB1mQ!x7{m}|@fF52sE?4*V;Y-S3T|DIkhqhjfV+Jh z8=J8_w1j356B!A+`+&d&;2jV@2dXqbD_1wSK{{n>OV*)R7&;S9aq=%#V!iHSlH?x{ z5SpbElA8Jxb8;LUedN8}7%+XH1gCgj=H{v#ZvURp=oC{p`R5PDR+Ym?Ed_=Zt`r z2qM@h2$Pt!0yU&A@!Gq9IK-$c{UK-`%xzdCDM$a0!2(E{CE~UH&ZCHkn~+gpiUxqg z^kp<{)0L}7N>vPkAP$Wb`pU?`Fb&)NR1T-R7Fh1_nNeGd`Vl^ zdaCG7s(9nU0yEa6x50TBu97D~uS8sapMQTF^9CV|oZ?4CzjSoC0FLSv5d{q5JC+Ic zlA4OD_1u2e*~>VpTpz4;lZ({O#z?vA&=a>uR6Z?=+C`eCZcVo_syqsnRq8|E2Iy6^ zv`@hGx8M1V%fMY %-HZ|I?u|@1ZieD1EW8XeOHNMCCKXm9<+UX%*Kl<0ca&DX>Eq$`lyJ70_LP@2 zDw ;g z)Do5af<}{eKRtZ#6HRmk{6u-?t!xF o#om%eq}~b6lr^4c2vc0F1DN4tr=37;Q1JuwW=?fedRs z!lLwo@F ysE5$hTvFQl1%; z#WH9wW)YS4wzdZl^~f9;oflzs(YUTj-Xg%sDW9ocBF6ZiBFS<~Grwh`Yg5G5CNa$I ze?g+Ta^ gJm!PEQe8^1|ouF~AH?!%DrG2y+l1!i@XHL8kkx z@+f<|tE`-y>gZSr?iz=YmumY+5cXc9dOYBANd3A8E+6CCB6_K&DG=cS%P4a=-3Yx! zEj8qU=Z_yh=6-bxLC=JEKzN4!9Ua3VB{qm8cH2mS4gHUFgmC^(DsNl(&;Ge;%+z4o zcBc^{+%32cjD(lqL4eZo73v#~s^NTA;^nBbpkAb%U1%Tqr^fDLFn9mnJsh
Q5{!*Dl?#Iyy&b#w@Kf=Q3IN}DwRBFJ zGmn?Az;87+#!>ncO2#JbZItn`H=3S{k9^eoEpR%O8^ Z4QvCqHk``nlH0HmHl99ox+8yESjdJxzIIGI!|fmO7^W? z!GOSPX}pNrq|q;{pG$T|oNvZNq4M)TY#iD0AVSciQf6h4Yu5Oh7Dy;u259}Tksb~# z3nN$z5IO=iO)H0FT}OCck1+llV#>+L;7ro4?irvYxfNDzZfLN3549W9Y%@}^$d-=N zk20O+9JmKA(@AUS@z_F%jWt==1Xy4MozOyQCgL;TYO9t0X=v4{3RmC~L2tHz(GhIV zcgH~(L0^Iv0@-6 _4TamyT&&a8QW03*q_gCh8U3>oXxR z6myC NT>AwoDSzUdhcWk&|_=2Y7og-si1?gZqIK=cY zAONH66q-6b!pM8PpdDvX%o@FqjH+lcoKNe~9La4~FMdZ8U5-=HsJqI*fH>ED{KN@u z=cx>wj6?Hmc&NDFbGmp@sHP{@%jf6JCap^&y>`YLKcX*~v*|7dKjB4muGEOFlCkJ$ zHCihyQkbB?;BsOq)QQOc`Wxaw{NPd7%>W~yi}NTv_V@E6>I}rr0XL>p8{dHyW4)2W z2Mej!vE2-Uj;8*vfdKFM`qE$YfwQ}IzA-}WP~@tps()!I^&vqV8E>&Y4guCt#5hau z6bp+fOgE$$q7Zn@+oq=IB Q$rt7((;-n(?7P#;E_<#-( z$C*&a`Ep`fTDt&5@Z!|X&q&&@fzkMuY)ONYS)ckJY-Ep->Va_%VyhtxKk&7|$^hpu zo;uL{Litz#ohadnOH{g?Alf}+O|m(R6R6>`Qf!fC3RQ0$7uR!~a7qc8%uXC%Yr9DU zscwys4Cj9Yz#mqKbwo^~#PG%y>EFQ#F4Q>8G+Uw1cG$!b+b#K+c-Tz5 mi@)?stn!l%CNVK@!pY=-6a93(rCevO z!Uf5u_Torsyh^*JDIOg_+G&o03k9f0gBGZ0*MS43-M0aHNqyACU#wEFG34PC2>iqW z(UGI4U*Bhp-WR7( >TC;bQDmGf;$f#&MV`3xIO>N77`g!zS9cXO;n+H|y9 zx>9=qNJXl=iub0m*Y7N%&M`&4U6=3>_Li4!jTl$qAOTK8mBU>C0hta>XQ$Y*?cA8Q zLr^9T*8q@Q{&Si$Z{h|ytM|^4jT<+fb2%}^wxnq~7ZDy_0M>$`auui$N;5HR2ls@w z6}4u205 o#1Tm@ck#efTlvxYdWBnvn{Ix1y31Ca7KJsv{I5&i+C(fK7-&%!@b) z0f0pqelSv-!=P<2X&ZFjrUbFx$;@ ?4=4FEmok6|Ni1-Wk#2PX?-pu?)00|Nb{T{-kZR&ST~YkLjZCLbVc$HH zITv;#hDej&U_!4BI%ILZ>_qy6CQM>}qU%mw4-5-b1w>JF^Z>j@^yeBGyC3&~9iM)S z3w*o8l+tC0>B4=#IZ8bM?Xm6LNv-BM9=h1=+*>i%WwE#%3GT`$>d`TyjL6wT)yCEb zhZ|SxfqZo6AZ_9_9&r@2)C_1j*id?dY%!?qaIxLZr|IC}_lHgLk8H)zf?DqINOxJ$ zu#1L98<2=qly?5nuYxe6lKR>ToOy17h+;S7BTpw{WuO3JQJ2xi<(;2osXlKMTb WG1x3+hODdb6P%^?|{Fq~U`<+iOuU<%P^V;8Vtn0xU zLBUcNdmLxz%bt?wx8>;>86RJnX;!3N)5xbDgZXPejqS!Qe@AyN%kUHDPJVI4PwU!m zmz)r6PuFa^Pa`5Rqi7}C=g2R Mw2t}6%j6lg-cJiG$L#__7pciZ0ff3Xv7ecF< zGnH}%_ypC(1+>8>h7+ZzDB)cWZ|-e_@TQ^*wdS}W431oH*{o~ Y~ z^VNU7^FYWVfA(}^8gPX5PKL(_=wGH zA)fiT_0AFEz&4=unZqdS%dp(uaP`L+`++D2Jv?ff*_5fLwD7DF&ge_|B=*y%U(N?i zn8dqYOjV0^P|I0a`a|FA%E=|B!WNFEaz?cFbIKzXvD?TxU7p|^oZgXEkBaPrC#jn7 z!)BrBPz5Z;a2D~G;{h&ZP93WkR8!T?_Bfx(zw&y0A2IyGlb9N8lfXYo>nN~sykbm> z2EgIOV|IWVldb27gE5X-7dr`0o}3jP{B*CvP(M|z5`Iup3?6oZHefNa>D5nSG$qKT zb9HP4dKGKI$93M_8^sU6x6^WR@ALKCA7@jQ@f3sS@ou#)!k{7%3&~%Br{O$@BsPHl zA>|Cm3LnRvQ{NG3B%eMANp_c89)&?>BkR3*`t-R3x6yMel+8c4?@DU=t@2)1<56^N z4 9l4aOA-a^uYv?#`FEwh &!bW0RS*KdAbyLs z%ed;n$8P$pAd-74E~$82=sqXP#?3vA6LvUK)6~TOi$-1eDnb{}K$ujHXuB=Ls}RDr z`!wN6w-nGbUuX3F;&oHg7pDF(<6`+JAP3vG*ZzQinN&mryk-8Q$j!&c2S*N`iD(#A z!ViN%*U;b~oz2wL)SgU#jy{mH6N@#wH+~;@Vwk0o8Le;V33Gso$xj?}j@~->`Z}@s z=&03w_(FvF_x@5mTy7`Bxg({i1Q>Cfc{!SX>Egx8-*2{)Vyt`0S;N(hMN1y^C0n 5vDK*OKHpRi}MPZ$my(j+67^}$>mGOkx4bjuhrX+55bZbW~yJT_r&Dv{Z+wk zv>`qyKV*4`w =tsGJXlWn+fPi%KU&S^Xw6;t zsH~ teX^#UgD8dh{ zLrSl5oWK#-{5oB`&WK6=62c6xto-<=SztivgK195W4cI8Jg1~Vcj|(;xOnwly1 ~$p9hayX3d4&vKIQl}Kgu~#=+0341MX~XT37gsPD*Be_@J6$-ZhWhsF6$QCCJwXj zZ(o1k$H%`i8xJsIi7xzc1rr=1kEQqpQXZ4a@iFl09xIheR#_PmTg&N{!y~)kW?V^V z(MbKG?6T~4-;MIlr(`+WE!pqZNh;oQgEx5k_wSdza!rwEo=I-$xrWrEu_`v+?IWRl zw395TLOvE@uv?oGhzjm_QVd*Dml@^}@qR&a`h5ZqTi$Hmap2px@DD7^%$IoH6Q|%H zXuR}Xtr=U+gXxXzeS{@kHkJ9zMsaC5xxE#?pdi`FelIh1a=|z@kT8q2vwAWG3LrQ9 zx3jRY-~oG)lf`(T4Mze8(9IstLgEnG=lSs(!nTFzdsw4CX$S&9aZB#s4%vXB?Wyn) zz{3uj`N!*thscp95w2gn+6#$t(v%AWx1Sf2b+qZOc4Bo02GpT|_VL|GiII>U?;9LU z3Esaqv;EBT!i Paz5AJVxEmZ$ L7KPqGg AlZCODfXwt>j_ND)`q@It+vKIyw zrNZoawdgxiHLwIqmC2P+lGzQCRXTCFh2A6!+!Bo3GBzm#L;GEa_*b%4!NH|!lHCNq zv?6sMZlUKfz0#N8B=RRVko&`5M5uS37z)o5C3C4?#V8weJ7V?OtR0>nRRZAJM=;9N zqxM7=&7D7lXTZJc#Th-X#h=W5c97uqx^fc_!s^9x2G-yq2G_1%w~EzE8#D%>B+*Ex z_(x>GMF8BUlOO*!R`4Yl>%p~2;7qu KWfnW{-p~MYSP|ouk~K9 z_iMOc_v>DJLirGv)xZ