{
  "version": 3,
  "sources": ["ssg:https://framerusercontent.com/modules/LxY72PAjUZZwgnTUxdoz/8rWBYLvEX3cpQTzipPjH/ae9PFKI02-2.js"],
  "sourcesContent": ["import{jsx as e,jsxs as t}from\"react/jsx-runtime\";import{ComponentPresetsConsumer as i,Link as n}from\"framer\";import{motion as r}from\"framer-motion\";import*as o from\"react\";import{Youtube as a}from\"https://framerusercontent.com/modules/NEd4VmDdsxM3StIUbddO/bZxrMUxBPAhoXlARkK9C/YouTube.js\";export const richText=/*#__PURE__*/t(o.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[\"The future of identity is unfolding and 2025 is already shaping up to be Humanity Protocol\u2019s most defining year yet. After a blockbuster testnet launch that brought in over 5 million Human IDs, momentum is only accelerating. \",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),\"The energy across the ecosystem is palpable. Developers are building, communities are growing, and a shared belief that a new standard for digital identity is finally within reach.\"]}),/*#__PURE__*/e(\"p\",{children:\"Behind the scenes, we\u2019ve been working tirelessly with partners and builders across Web3 and beyond to prepare for what comes next. From  scalable proof-of-humanity systems secured by zero-knowledge cryptography to exciting global events, Humanity Protocol is no longer an idea. It's a movement and this year, it goes full throttle.\"}),/*#__PURE__*/e(\"h2\",{children:\"$H Is Nearly Here\"}),/*#__PURE__*/e(\"p\",{children:\"The $H token is at the heart of Humanity Protocol and soon, it will be in the hands of the community. The launch of $H will mark a new era for participation in the Humanity ecosystem. Whether you\u2019re referring users, verifying humanity, contributing to the network, or developing new use cases on top of our ID layer, $H will be your gateway.\"}),/*#__PURE__*/e(\"p\",{children:\"More than just a token, $H is designed with purpose. It will power a full range of on-chain actions: rewards, governance, and new incentive models that reward participation and reputation, not just speculation. With $H, we're rewriting the rules of how digital identity is valued and owned.\"}),/*#__PURE__*/e(\"h2\",{children:\"Phase 2: Scan. Verify. Unlock.\"}),/*#__PURE__*/e(\"p\",{children:\"Right now, users can reserve their Human ID. But that\u2019s just the first step. We're now gearing up to unlock Phase 2 of the rollout where users will be able to verify their humanity by scanning their palm. This moment will be a game-changer: going from intent to identity, and bringing us closer to a world where sybils and bots no longer dominate digital spaces.\"}),/*#__PURE__*/e(\"p\",{children:\"Palm recognition isn't just cool tech, it\u2019s the bridge between physical humans and decentralized systems. And when Phase 2 goes live, every participant will move one step closer to unlocking their rewards, completing their identity journey, and gaining access to the full Humanity ecosystem. You\u2019ll feel it in the palm of your hand\u2026 Literally!\"}),/*#__PURE__*/e(\"h2\",{children:\"Looking Back to Leap Forward\"}),/*#__PURE__*/e(\"p\",{children:\"In under a year, we\u2019ve gone from stealth to one of the fastest-growing identity protocols in the world. We've launched a live testnet, opened up referral rewards, secured top-tier integrations and ID validators, and showed users a glimpse of what's possible with decentralized, biometric identity.\"}),/*#__PURE__*/t(\"p\",{children:[\"As we head deeper into 2025, Humanity Protocol is evolving into the infrastructure layer for real human interaction online. With the upcoming $H token, the launch of palm scan verification, and more integrations than ever before, the next chapter is about to begin.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),\"Join the testnet \",/*#__PURE__*/e(n,{href:\"https://testnet.humanity.org/login\",motionChild:!0,nodeId:\"ae9PFKI02\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"today\"})}),\".\"]})]});export const richText1=/*#__PURE__*/t(o.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Kaito, an AI-driven Web3 information platform, and Humanity Protocol, a pioneering decentralized identity network, today announced a strategic partnership to enhance self-sovereign identity verification across the crypto ecosystem. Once the integration is live, Kaito will serve as an official Identity Validator on Humanity Protocol, responsible for issuing \u201CYapper Credentials\u201D to categorize crypto users into distinct tiers:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Inner CT \u2013 Recognized and influential members of the Crypto Twitter (CT) community.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Emerging CT \u2013 Up-and-coming contributors making a mark in the space.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Yapper \u2013 General Kaito users who have signed up but do not yet fall into the above categories.\"})})]}),/*#__PURE__*/e(\"p\",{children:\"Kaito users who sign up for Humanity Protocol's testnet and connect their X (formerly Twitter) accounts will automatically receive the Yapper Credential once it launches. Additionally, these users will qualify for an extra 50% in airdrop allocation, incentivizing participation and decentralized identity adoption. Smart follower accounts can leverage reputation and credential sources like on-chain activity, governance participation, and verified social connections to enhance trust and utility across the ecosystem. Once live in Humanity Protocol's mainnet phase, dApps can use zero-knowledge proofs to verify that a user is in the Inner CT and has over a certain number of followers without revealing their exact follower count or any other personal details.\"}),/*#__PURE__*/e(\"p\",{children:\"Your credentials will be crucial when Humanity Protocol launches its mainnet, unlocking seamless cross-platform interoperability and ensuring your identity travels with you across the decentralized ecosystem. Kaito VC credentials will be issued after the mainnet launch.\"}),/*#__PURE__*/e(\"h2\",{children:\"Kaito Overview\"}),/*#__PURE__*/e(\"p\",{children:\"Kaito is revolutionizing the way crypto users navigate and analyze information in the Web3 space. As an AI-powered research assistant, Kaito aggregates, processes, and delivers high-quality insights from a vast array of sources, including research papers, news articles, social media discussions, and blockchain data.\"}),/*#__PURE__*/e(\"p\",{children:\"One of Kaito\u2019s standout products is the Yapper Leaderboard, which ranks the most influential voices in crypto discussions, primarily from X (formerly Twitter). By analyzing engagement, relevance, and expertise, Kaito helps surface the most valuable contributors to ongoing conversations. This feature ensures that industry leaders, researchers, and analysts can stay informed through high-quality discourse rather than noise and speculation.\"}),/*#__PURE__*/e(\"p\",{children:\"Beyond ranking top Yappers, Kaito also empowers users with AI-driven tools to streamline their research. Whether it's surfacing key insights, identifying emerging trends, or synthesizing complex topics, Kaito enables users to make informed decisions quickly.\"}),/*#__PURE__*/e(\"h2\",{children:\"Interoperability Across Blockchains\"}),/*#__PURE__*/e(\"p\",{children:\"A core feature of this initiative is cross-chain interoperability. Yapper Credentials issued on Humanity Protocol adhere to decentralized identity standards, making them portable and usable across multiple blockchains. This means users who earn an \u201CInner CT\u201D or \u201CEmerging CT\u201D credential from Kaito will hold cryptographic proof of that status, recognized across Web3 applications, governance systems, and decentralized platforms.\"}),/*#__PURE__*/e(\"p\",{children:\"By enabling verifiable credentials that extend beyond Humanity Protocol, this collaboration enhances sybil resistance, reputation-based access, and trust-based engagements throughout the crypto space.\"}),/*#__PURE__*/e(\"h2\",{children:\"A New Era of Decentralized Identity\"}),/*#__PURE__*/e(\"p\",{children:\"This partnership advances both platforms\u2019 core missions and signals a major step forward for decentralized identity in Web3. Kaito\u2019s community-centric credentials, combined with Humanity Protocol\u2019s proof-of-humanity framework, will bolster trust and transparency in online interactions. Users will benefit from richer identity profiles that are secure, privacy-preserving, and globally interoperable.\"}),/*#__PURE__*/e(\"p\",{children:\"Moving forward, Kaito and Humanity Protocol will continue working together to unlock new use cases for decentralized identity, reputation-based engagement, and community-driven validation, reinforcing a shared vision of a trusted, user-centric, and connected decentralized web.\"}),/*#__PURE__*/t(\"p\",{children:[\"Sign up to Humanity Protocol \",/*#__PURE__*/e(n,{href:\"http://testnet.humanity.org/login?ref=joao\",motionChild:!0,nodeId:\"ae9PFKI02\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"here\"})}),\".\"]})]});export const richText2=/*#__PURE__*/t(o.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"The past few months have been a whirlwind for Humanity Protocol. As we push forward in building the most secure and human-first decentralized identity layer, we've also been laying down deep roots across key sectors: DeFi, education, genomics, wallets, and interoperability. \"}),/*#__PURE__*/e(\"p\",{children:\"Here's a recap of some of the most exciting integrations that have brought Humanity Protocol closer to millions of users worldwide.\"}),/*#__PURE__*/e(\"h3\",{children:\"Apes Together Strong \u2014 Humanity Joins ApeChain\"}),/*#__PURE__*/e(\"p\",{children:\"In one of our most community-driven collaborations yet, Humanity Protocol became the digital identity partner for ApeChain. ApeChain will integrate Humanity\u2019s Proof of Humanity, giving gamers and creators tools to verify themselves, unlock exclusive experiences, and reduce sybil attacks within the ecosystem. With ApeChain's vibrant community and our human-first infrastructure, we're bringing more fairness and trust to web3 social and gaming.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(n,{href:\"https://www.humanity.org/blog/apes-together-strong-humanity-protocol-swings-into-the-apechain-ecosystem\",motionChild:!0,nodeId:\"ae9PFKI02\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"Read more\"})})}),/*#__PURE__*/e(\"h3\",{children:\"A World-First Genomics Integration with Prenetics\"}),/*#__PURE__*/e(\"p\",{children:\"Humanity Protocol integrated with Nasdaq-listed Prenetics, a global genomics and precision health company, to launch a first-of-its-kind initiative that bridges genomics with decentralized identity. Together, we're exploring new frontiers where genetics-based identity attestation and privacy-preserving ZK proofs can power healthcare, wellness, and beyond. \"}),/*#__PURE__*/e(\"p\",{children:\"Prenetics also revealed a crypto strategic reserve to actively participate in the Humanity Protocol ecosystem. This collaboration opens up exciting possibilities for real-world adoption of digital identity linked to genomics in a secure, user-consented way.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(n,{href:\"https://www.humanity.org/blog/nasdaq-listed-prenetics-launches-genomics-based-partnership-with-humanity-protocol-and-unveils-crypto-strategic-reserve\",motionChild:!0,nodeId:\"ae9PFKI02\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"Read more\"})})}),/*#__PURE__*/e(\"h3\",{children:\"OKX Wallet Joins the Testnet\"}),/*#__PURE__*/e(\"p\",{children:\"We expanded our testnet experience by integrating OKX Wallet, one of the most widely-used self-custody wallets in Web3. Users can now connect their OKX Wallet directly to Humanity Protocol\u2019s testnet, unlocking smoother participation, enhanced rewards, and seamless onboarding into our identity ecosystem. \"}),/*#__PURE__*/e(\"p\",{children:\"More wallet integrations are on the horizon as we continue to prioritize user choice and accessibility.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(n,{href:\"https://www.humanity.org/blog/earn-more-rewards-with-okx-wallet-on-humanity-protocol-testnet\",motionChild:!0,nodeId:\"ae9PFKI02\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"Read more\"})})}),/*#__PURE__*/e(\"h3\",{children:\"Bringing Digital Identity to Education with Open Campus\"}),/*#__PURE__*/e(\"p\",{children:\"We joined forces with Open Campus to integrate Humanity Protocol into the education sector, empowering educators and learners with verifiable digital credentials secured by Proof of Humanity. This partnership brings human-verified digital identity to Open Campus' network of publishers, creators, and students, unlocking new possibilities for decentralized learning, credentialing, and reputation-building.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(n,{href:\"https://www.humanity.org/blog/humanity-protocol-partners-with-open-campus-bringing-digital-identity-and-credentialing-to-the-education-sector\",motionChild:!0,nodeId:\"ae9PFKI02\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"Read more\"})})}),/*#__PURE__*/e(\"h3\",{children:\"Cross-Chain Verified Humans via LayerZero\"}),/*#__PURE__*/e(\"p\",{children:\"To top it all off, we teamed up with LayerZero, the leading interoperability protocol, to make Humanity Protocol natively cross-chain. With this integration, verifiable humans can now interact seamlessly across multiple blockchains while preserving their identity and reputation. This makes Proof of Humanity composable across countless ecosystems and expands the reach of Humanity Protocol to wherever communities need human-verified users the most.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(n,{href:\"https://www.humanity.org/blog/humanity-protocol-and-layerzero-team-up\",motionChild:!0,nodeId:\"ae9PFKI02\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"Read more\"})})}),/*#__PURE__*/e(\"h3\",{children:\"The Road Ahead\"}),/*#__PURE__*/e(\"p\",{children:\"Every integration brings us closer to realizing the Humanity Protocol vision\u2014a more human, trustworthy, and sybil-resistant web. From gaming and education to genomics and cross-chain composability, we're building the identity layer for the next generation of the internet.\"}),/*#__PURE__*/e(\"p\",{children:\"Stay tuned \u2014 more is coming soon.\"})]});export const richText3=/*#__PURE__*/t(o.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[\"In January, we announced one of our biggest integrations to date \u2014 \",/*#__PURE__*/e(n,{href:\"https://www.humanity.org/blog/from-apes-to-humans-apechain-joins-humanity-protocol-s-zkproofer-network-to-scale-proof-of-humanity\",motionChild:!0,nodeId:\"ae9PFKI02\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"Humanity Protocol and ApeChain are joining forces to bring verifiable, privacy-preserving identity to the Ape ecosystem\"})}),\". This collaboration isn't just about security; it's about unlocking new frontiers for developers and users alike. By embedding Proof of Humanity (PoH) into ApeChain, we\u2019re making dApps more Sybil-resistant, governance more transparent, and digital identity more powerful than ever before.\"]}),/*#__PURE__*/e(\"p\",{children:\"With ApeChain as a zkProofer, developers on both Humanity Protocol and ApeChain can now build without limits. Whether it's creating DAOs that truly represent their communities, enabling NFT experiences tied to real human identities, or pioneering privacy-first DeFi solutions, the integration of Humanity Protocol\u2019s identity layer changes the game. This integration is a fundamental shift that brings the digital and physical worlds closer together, setting a new standard for trust and utility in Web3.\"}),/*#__PURE__*/e(\"h2\",{children:\"Bridging the Physical and Digital Worlds\"}),/*#__PURE__*/e(\"p\",{children:\"Digital spaces have always been made better by real humans interacting with each other. The integration of Humanity Protocol\u2019s Self-Sovereign Identity (SSI) framework bridges the gap between the physical and digital realms. Developers can create dApps that verify human identity for secure event access, community-driven voting systems, or even digital passports for virtual environments. This opens the door to real-world applications like ticketing systems, educational credentials, and reputation-based platforms while safeguarding user data through zero-knowledge proofs.\"}),/*#__PURE__*/e(\"p\",{children:\"With access to Humanity Protocol\u2019s robust identity infrastructure, developers on ApeChain can push the boundaries of innovation. From community-driven social platforms to secure marketplaces and immersive metaverse experiences, the potential is limitless. The zkProofer network ensures privacy and security at scale, allowing developers to build with confidence and tap into new user-centric business models.\"}),/*#__PURE__*/e(\"h2\",{children:\"Real Web3 for Real Folks\"}),/*#__PURE__*/e(\"p\",{children:\"Governance has long been plagued by Sybil attacks, where bad actors manipulate voting by creating multiple identities. With Humanity Protocol\u2019s PoH, ApeChain can now verify that each participant is a unique human.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"This ensures that voting power is fairly distributed and decisions reflect the true voice of the community. For ApeCoin DAO, this means more transparency, integrity, and genuine community engagement. Developers building on ApeChain can leverage this Sybil-resistant framework to create decentralized autonomous organizations (DAOs) that are fair and secure.\"}),/*#__PURE__*/e(\"p\",{children:\"The NFT space is evolving rapidly, but issues like identity theft and fake ownership have hindered their progress. By integrating PoH, ApeChain allows NFT projects to authenticate ownership and link exclusive experiences to verified human identities.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Imagine NFT-gated events or exclusive content accessible only to verified holders, creating true digital exclusivity. These are the elements that will boost the value of digital assets, foster authentic creator-fan relationships, and open up new creative possibilities.\"}),/*#__PURE__*/e(\"h2\",{children:\"A Shift in Web3\"}),/*#__PURE__*/e(\"p\",{children:\"This integration fundamentally shifts Web3 by embedding verifiable human identity at its core. By eliminating Sybil attacks, enhancing NFT authenticity, and enabling privacy-preserving DeFi solutions, Humanity Protocol and ApeChain are setting a new standard for trust and security in the decentralized world. Developers and users alike can now embrace a more equitable, human-centric digital future where innovation knows no bounds.\"}),/*#__PURE__*/e(\"p\",{children:\"The future of Web3 is here, and with Humanity Protocol and ApeChain leading the charge, the possibilities are endless.\"})]});export const richText4=/*#__PURE__*/t(o.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Humanity Protocol's innovative Identity Validators and palm scan technology are paving the way for a more seamless and secure world. By harnessing zero-knowledge proofs and Proof of Humanity (PoH), this system ensures trust and authenticity without compromising user privacy. \"}),/*#__PURE__*/e(\"p\",{children:\"From making payments to accessing events and buildings, Humanity Protocol is transforming how we interact with the world around us, one human at a time. With over 4 million Human IDs created and large-scale collaborations with partners both within and outside of Web3, Humanity Protocol is poised to change how we live and work.\"}),/*#__PURE__*/e(\"h2\",{children:\"Secure Payments\"}),/*#__PURE__*/e(\"p\",{children:\"Imagine walking into your favorite caf\\xe9 and effortlessly making a payment with just the wave of your hand. No cards, no wallets, no phones. \"}),/*#__PURE__*/e(\"p\",{children:\"Humanity Protocol\u2019s palm scan technology links directly to your digital wallet, eliminating the need for cards or cash. With Identity Validators confirming your unique palm print, transactions become not only faster but also fraud-resistant. This innovation streamlines the payment experience while safeguarding your personal information.\"}),/*#__PURE__*/e(\"h4\",{children:\"Event Entry and Ticketing\"}),/*#__PURE__*/e(\"p\",{children:\"Gone are the days of lost tickets or long lines. With Humanity Protocol\u2019s palm scan verification, event organizers can ensure that only verified individuals gain entry. \"}),/*#__PURE__*/e(\"p\",{children:\"Attendees simply scan their palm, and Identity Validators instantly confirm their identity. This approach prevents unauthorized resale and scalping, offering a smooth and secure experience for everyone.\"}),/*#__PURE__*/e(\"h4\",{children:\"Building Access and Security\"}),/*#__PURE__*/e(\"p\",{children:\"Whether it\u2019s your office, apartment complex, or a restricted facility, Humanity Protocol makes access control effortless. \"}),/*#__PURE__*/e(\"p\",{children:\"A simple palm scan allows verified individuals to enter, while unauthorized access is effectively blocked. By leveraging Identity Validators, the system removes the need for physical keys or access cards, enhancing security and convenience for residents and employees alike.\"}),/*#__PURE__*/e(\"h4\",{children:\"Healthcare and Emergency Services\"}),/*#__PURE__*/e(\"p\",{children:\"In critical situations, quick and accurate identity verification can save lives. Humanity Protocol\u2019s palm scan system allows healthcare providers to access patient records and authorize treatment securely. \"}),/*#__PURE__*/e(\"p\",{children:\"First responders can rapidly verify a patient\u2019s identity and medical history, ensuring timely and appropriate care. With Identity Validators managing the process, sensitive information remains protected.\"}),/*#__PURE__*/e(\"h4\",{children:\"Public Transportation and Infrastructure\"}),/*#__PURE__*/e(\"p\",{children:\"Picture a world where you can hop on a bus or enter a subway station with just a wave of your hand. Humanity Protocol\u2019s palm scan technology can authenticate your identity in seconds, granting access without the hassle of tickets or transit cards. With Identity Validators ensuring privacy and security, public transportation becomes more efficient and user-friendly.\"}),/*#__PURE__*/e(\"h2\",{children:\"All these use cases fulfilled securely\"}),/*#__PURE__*/e(\"p\",{children:\"Ensuring all these systems work together seamlessly requires a secure, decentralized framework that prioritizes both efficiency and privacy. Humanity Protocol achieves this through a network of Identity Validators that authenticate palm scans in real time while preserving user anonymity via zero-knowledge proofs. \"}),/*#__PURE__*/e(\"p\",{children:\"Each interaction \u2014 whether unlocking a door, making a payment, or entering an event \u2014 triggers a verification request that is instantly processed on-chain, confirming the individual\u2019s identity without revealing sensitive personal data. This interconnected approach enables a frictionless experience across multiple environments, ensuring that a single, universally trusted identity can be used securely in all aspects of daily life.\"}),/*#__PURE__*/e(\"h2\",{children:\"Humanity Protocol is the Future\"}),/*#__PURE__*/e(\"p\",{children:\"Humanity Protocol\u2019s Identity Validators and palm scan technology are changing how security and accessibility work in physical spaces. By providing fast, secure, and privacy-preserving verification, this system streamlines payments, event entry, building access, and more. \"}),/*#__PURE__*/e(\"p\",{children:\"As adoption grows, Humanity Protocol is set to become an integral part of our everyday lives, bridging the digital and physical worlds with ease.\"})]});export const richText5=/*#__PURE__*/t(o.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Blockchain networks rely on validators to maintain security and trust. Traditionally, Proof of Stake (PoS) validators ensure the integrity of decentralized networks by staking tokens as collateral. However, Humanity Protocol introduces a new paradigm with identity validators, which play a crucial role in Proof of Humanity (PoH). \"}),/*#__PURE__*/e(\"p\",{children:\"While both systems rely on validation mechanisms, their fundamental purposes, security models, and economic incentives differ significantly.\"}),/*#__PURE__*/e(\"h3\",{children:\"Purpose and Function\"}),/*#__PURE__*/e(\"p\",{children:\"PoS validators are responsible for securing blockchain transactions. They validate new blocks, ensure consensus, and prevent fraudulent activities like double-spending. These validators must stake a certain amount of the network\u2019s native token as collateral, which incentivizes honest behavior. Any attempt to act maliciously could result in losing their stake.\"}),/*#__PURE__*/e(\"p\",{children:\"On the other hand, Humanity Protocol\u2019s identity validators serve to confirm real, unique human identities on-chain. This process leverages biometric proofs such as palm scans and other information about each individual to verify their identity without compromising privacy. Rather than focusing on transaction security, these validators ensure sybil resistance \u2014 preventing bots or fake identities from exploiting decentralized applications, DAOs, and on-chain voting systems.\"}),/*#__PURE__*/e(\"h3\",{children:\"Security Models: Economic vs. Biometric Proof\"}),/*#__PURE__*/e(\"p\",{children:'PoS validators secure networks through economic incentives. The assumption is that validators with a financial stake in the system will act honestly because misbehavior results in financial penalties known as \"slashing.\" The larger the stake, the higher the validator\u2019s influence in block production and consensus, making it costly for malicious actors to compromise the network.'}),/*#__PURE__*/e(\"p\",{children:\"Identity validators, in contrast, operate based on biometric verification and other information rather than economic incentives. They ensure a user is a real, unique person through cryptographic attestations without requiring financial collateral. This shifts the security model from economic deterrence to biometric proof, making it far more resilient to sybil attacks. A single entity can accumulate a large number of PoS validator nodes if they have enough capital, but with identity validation, a person can only ever be one unique individual.\"}),/*#__PURE__*/e(\"h3\",{children:\"Incentive Structures\"}),/*#__PURE__*/e(\"p\",{children:\"PoS validators earn rewards in the form of transaction fees and block rewards. The more they stake and validate transactions, the more they earn. This creates a direct economic loop where validators are financially motivated to participate actively in the network.\"}),/*#__PURE__*/e(\"p\",{children:\"Identity validators in Humanity Protocol, however, are incentivized differently. They may earn rewards through acting honestly in proving that a person is who they claim to be. Their value proposition lies in the network effect \u2014 by ensuring sybil resistance, they create more trustworthy decentralized applications and governance models, which in turn strengthens the entire ecosystem.\"}),/*#__PURE__*/e(\"h3\",{children:\"Two Sides of the Same Coin\"}),/*#__PURE__*/e(\"p\",{children:\"While PoS validators and Humanity Protocol\u2019s identity validators share similarities in being crucial to blockchain networks, they differ in their core objectives and operational models. PoS validators secure financial transactions and consensus through economic stakes, while Humanity Protocol\u2019s identity validators ensure real human participation in decentralized systems through biometric verification. \"}),/*#__PURE__*/e(\"p\",{children:\"Both are fundamental to the evolution of blockchain, addressing different aspects of security and trust in Web3.\"})]});export const richText6=/*#__PURE__*/t(o.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"For the first time ever, Humanity Protocol is releasing its APIs to developers worldwide, unlocking a new frontier in decentralized identity, authentication, and human verification. \"}),/*#__PURE__*/e(\"p\",{children:\"This release marks a major milestone, giving builders the tools to integrate Proof of Humanity into any application, ensuring that real users, not bots, power the next generation of Web3 and beyond.\"}),/*#__PURE__*/e(\"p\",{children:\"From DeFi and DAOs to social networks and real-world asset tokenization, the possibilities are endless. Developers can now seamlessly integrate Humanity Protocol\u2019s identity layer to enhance security, fight Sybil attacks, and create more inclusive, fair digital ecosystems.\"}),/*#__PURE__*/e(\"p\",{children:\"Humanity Protocol is pioneering a decentralized, secure, and privacy-preserving identity verification system, offering developers a robust API to build innovative applications across various sectors. By integrating Humanity Protocol's API, developers can create solutions that ensure genuine interactions and protect user data. Here are just a few of the compelling use cases that can be built using the Humanity Protocol API, both inside and outside of Web3:\"}),/*#__PURE__*/e(\"h2\",{children:\"Education and Credential Verification\"}),/*#__PURE__*/e(\"p\",{children:\"Verifying educational qualifications and professional credentials is often fraught with inefficiencies and fraud. Developers can leverage Humanity Protocol's API to create platforms that allow individuals to share and verify personal data, such as education and employment history, age, and nationality, while maintaining user privacy. \"}),/*#__PURE__*/e(\"p\",{children:\"This system streamlines the verification process for employers and institutions, ensuring that credentials are authentic and tamper-proof.\"}),/*#__PURE__*/e(\"h2\",{children:\"Online and Offline Authentication Systems\"}),/*#__PURE__*/e(\"p\",{children:\"The need for secure and seamless authentication methods is ever-growing. Utilizing Humanity Protocol's API, developers can create versatile authentication systems that operate both online and offline. Through biometric verification, users can authenticate once and gain access to multiple services without repeatedly sharing personal information, enhancing user experience while safeguarding privacy.\"}),/*#__PURE__*/e(\"h2\",{children:\"DeFi Platforms\"}),/*#__PURE__*/e(\"p\",{children:\"In the rapidly evolving DeFi landscape, verifying that users are real individuals is crucial for maintaining trust and security. Integrating Humanity Protocol's Proof of Humanity into DeFi platforms enables cost-effective Know Your Customer (KYC) processes. This integration verifies user identities without centralized data storage, reducing compliance costs and enhancing user privacy. Such a system ensures that only authenticated users access financial services, fostering a more secure environment.\"}),/*#__PURE__*/e(\"h2\",{children:\"Decentralized Autonomous Organizations (DAOs)\"}),/*#__PURE__*/e(\"p\",{children:\"DAOs depend on member participation for governance decisions, making it essential to ensure each vote represents a unique individual. Incorporating Humanity Protocol's API allows DAOs to implement human-centric governance models that guarantee one-person-one-vote systems. \"}),/*#__PURE__*/e(\"p\",{children:\"This approach secures the integrity of voting mechanisms, preventing manipulation by bots or multiple accounts, and promotes fair decision-making processes.\"}),/*#__PURE__*/e(\"h2\",{children:\"Decentralized Social Media Networks (DeSo)\"}),/*#__PURE__*/e(\"p\",{children:\"The prevalence of bots and fake accounts undermines the authenticity of interactions on social media platforms. Developers can utilize Humanity Protocol's API to build decentralized social networks where users are verified as real humans. \"}),/*#__PURE__*/e(\"p\",{children:\"This verification fosters genuine human connections, enhances trust among users, and mitigates the spread of misinformation by ensuring all content originates from authenticated individuals.\"}),/*#__PURE__*/e(\"h2\",{children:\"Real-World Asset (RWA) Tokenization\"}),/*#__PURE__*/e(\"p\",{children:\"Tokenizing physical assets requires a reliable method to verify ownership and identity. By integrating Humanity Protocol's Proof of Humanity, developers can create platforms that enable on-chain verification of physical asset ownership. \"}),/*#__PURE__*/e(\"p\",{children:\"This integration facilitates the permissionless minting of RWA tokens, bridging the gap between traditional finance and decentralized ecosystems, and enabling users to securely leverage their physical assets in the digital realm.\"}),/*#__PURE__*/e(\"h2\",{children:\"Fairdrops\"}),/*#__PURE__*/e(\"p\",{children:'Airdrops are a popular method for distributing tokens but are often plagued by Sybil attacks, where individuals use multiple addresses to claim more than their fair share. Employing Humanity Protocol\\'s API, projects can implement \"Fairdrops\" that ensure tokens are distributed only to verified unique humans. '}),/*#__PURE__*/e(\"p\",{children:\"This approach maintains the integrity of the distribution process, prevents fraudulent activities, and fosters inclusive participation from genuine users.\"}),/*#__PURE__*/e(\"h2\",{children:\"Decentralized Science (DeSci)\"}),/*#__PURE__*/e(\"p\",{children:\"The scientific community thrives on collaboration and data sharing, but ensuring the authenticity of contributors and the integrity of data is crucial. Integrating Humanity Protocol's API enables developers to build decentralized, censorship-resistant research and publishing networks. \"}),/*#__PURE__*/e(\"p\",{children:\"These platforms can grant researchers access to anonymized, verified, on-chain repositories of data, promoting open collaboration while maintaining the privacy and credibility of contributors.\"}),/*#__PURE__*/e(\"h2\",{children:\"Build for the Future of Humanity\"}),/*#__PURE__*/t(\"p\",{children:[\"The Humanity Protocol API offers a robust foundation for developers to build applications that prioritize security, privacy, and authenticity. By integrating this technology, you can create innovative solutions that address the challenges of identity verification across various industries. Start exploring the Humanity Protocol API today and be at the forefront of developing applications that empower users and enhance trust in digital interactions.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),\"Check out our APIs \",/*#__PURE__*/e(n,{href:\"https://explorer.testnet.humanity.org/api-docs\",motionChild:!0,nodeId:\"ae9PFKI02\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"here\"})}),\".\"]})]});export const richText7=/*#__PURE__*/t(o.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Ensuring that a person is who they claim to be online is essential for security, trust, compliance, and overall experience \u2014 moreso when a large portion of our lives are spent in front of a screen. This is where identity validators come into play. ID validators are entities responsible for verifying the authenticity of a user\u2019s identity while ensuring privacy and security. They play a crucial role in Humanity's decentralized identity ecosystem, allowing users to prove their identity without exposing sensitive personal data.\"}),/*#__PURE__*/e(\"p\",{children:\"Within the Humanity Protocol Self-Sovereign Identity (SSI) framework, Identity Validators (also known as Issuers) are entities that check the private data submitted by users and issue verifiable credentials (VCs) if these data are proven to be valid against the respective claims of the VCs. Identity Validators are considered trusted entities since they are ultimately responsible for the authenticity of the issued VCs; similar to the role of the sequencer in zero-knowledge rollup applications.\"}),/*#__PURE__*/t(\"p\",{children:[\"One example of an ID validator on HP is \",/*#__PURE__*/e(n,{href:\"https://www.humanity.org/blog/earn-more-rewards-with-okx-wallet-on-humanity-protocol-testnet\",motionChild:!0,nodeId:\"ae9PFKI02\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"OKX Wallet\"})}),\", which has integrated with Humanity Protocol to help verify identities while maintaining decentralization and user control. Unlike traditional identity verification services that rely on centralized databases, ID validators operate in a way that prioritizes privacy and cryptographic security.\"]}),/*#__PURE__*/e(\"h2\",{children:\"How Do ID Validators Work & Do They Store Your Information?\"}),/*#__PURE__*/t(\"p\",{children:[\"A common concern when dealing with digital identity solutions is \",/*#__PURE__*/e(\"strong\",{children:\"data storage \"}),\"\u2014 specifically, whether ID validators keep personal information. The short answer is: no, ID validators do not store sensitive personal data like your palm scans in a way that can be exploited. They may be organisations that are required to store your data, such as centralised exchanges, but this data is never revealed to Humanity. Instead, they function through zero-knowledge proofs (ZKPs) and cryptographic attestations.\"]}),/*#__PURE__*/e(\"p\",{children:\"Here\u2019s how it works:\"}),/*#__PURE__*/t(\"ol\",{style:{\"--framer-text-alignment\":\"start\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\",\"--framer-text-stroke-width\":\"0px\",\"--framer-text-transform\":\"none\"},children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"A user undergoes an identity verification process, which may involve biometric authentication or other forms of secure identity proofing.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"If the provided data meets the required claims, the ID validator issues a verifiable credential (VC), which serves as a cryptographic proof of the user's identity.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Rather than storing personal information, the validator records cryptographic attestations on-chain, ensuring that the verification can be referenced without exposing the data.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"When a user needs to verify their identity, they share the VC without revealing personal details. This ensures privacy while still enabling trust in identity verification.\"})})]}),/*#__PURE__*/e(\"p\",{children:\"Because ID validators leverage zero-knowledge cryptography, they never need to store raw personal data like biometric scans, names, or government-issued IDs. Instead, the information is hashed and attested in a way that prevents unauthorized access while proving authenticity.\"}),/*#__PURE__*/e(\"h3\",{children:\"Why Are ID Validators Important?\"}),/*#__PURE__*/e(\"p\",{children:\"The role of ID validators extends beyond simple verification. They are a cornerstone of privacy-preserving, trustless identity systems. In traditional identity systems, centralized databases create honey pots for hackers. A single breach can expose millions of personal records. Since ID validators don\u2019t store personal data, they significantly reduce the risk of large-scale identity theft.\"}),/*#__PURE__*/e(\"p\",{children:\"With ID validators, users can prove their identity without relying on centralized authorities. This aligns with the ethos of Web3, where users should own and control their identity rather than entrusting it to corporations. One of the biggest challenges in decentralized systems is distinguishing real users from bots. ID validators help solve this by ensuring that each identity is unique and verifiable, preventing fraudulent activities and Sybil attacks.\"}),/*#__PURE__*/e(\"p\",{children:\"Regulatory compliance is a growing concern in Web3, with many platforms required to meet KYC (Know Your Customer) and AML (Anti-Money Laundering) standards. ID validators enable compliance without requiring users to sacrifice their privacy by storing their personal data.\"}),/*#__PURE__*/e(\"h3\",{children:\"Building an extensive ecosystem\"}),/*#__PURE__*/e(\"p\",{children:\"ID validators like OKX Wallet and others in the Humanity Protocol ecosystem play a vital role in the future of decentralized identity. They verify users without storing sensitive information, leveraging cryptographic proofs and zero-knowledge attestations to ensure both privacy and security.\"}),/*#__PURE__*/e(\"p\",{children:\"As blockchain and Web3 continue to grow, ID validators will be instrumental in creating a trustless, privacy-first digital identity landscape; one where users can prove who they are without ever giving up control of their data.\"})]});export const richText8=/*#__PURE__*/t(o.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[\"The future of digital identity is here. Humanity Protocol is revolutionizing how people verify and protect their identities online, using decentralized identity (DID) solutions, \",/*#__PURE__*/e(n,{href:{webPageId:\"ojWBvkK1b\"},motionChild:!0,nodeId:\"ae9PFKI02\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"Proof of Humanity\"})}),\", and zero-knowledge cryptography. This year at ETHDenver, we\u2019re taking the next step forward by releasing our APIs, enabling developers to integrate Humanity Protocol\u2019s identity framework into their applications seamlessly.\"]}),/*#__PURE__*/t(\"p\",{children:[\"In a world of deepfakes, AI-generated personas, and rampant \",/*#__PURE__*/e(n,{href:\"https://www.humanity.org/blog/what-are-sybil-attacks-and-could-they-ruin-web3\",motionChild:!0,nodeId:\"ae9PFKI02\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"sybil attacks\"})}),\", proving that you\u2019re human in a privacy-preserving way is more critical than ever. Humanity Protocol offers a scalable, user-friendly solution that allows individuals to authenticate themselves without exposing sensitive personal data. Our technology is built on:\"]}),/*#__PURE__*/t(\"ul\",{style:{\"--framer-text-alignment\":\"start\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\",\"--framer-text-stroke-width\":\"0px\",\"--framer-text-transform\":\"none\"},children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Users control their identities, eliminating reliance on centralized entities.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Biometric verification ensures that every identity is real and unique.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Users can prove who they are without revealing private information, ensuring security and compliance.\"})})]}),/*#__PURE__*/e(\"h2\",{children:\"Primary Use Cases of Humanity Protocol\"}),/*#__PURE__*/t(\"p\",{children:[\"Our APIs open a world of possibilities for developers and enterprises looking to integrate decentralized identity solutions. Some key applications include:\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),\"1. Sybil Resistance in Web3 Protocols\"]}),/*#__PURE__*/t(\"p\",{children:[\"DAOs, DeFi platforms, and airdrop mechanisms need a reliable way to prevent bots and sybil attacks. Humanity Protocol enables true human verification, ensuring fair participation in token distributions, governance, and community incentives.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),\"2. On-Chain Reputation and Credit Scoring\"]}),/*#__PURE__*/t(\"p\",{children:[\"With Humanity Protocol, users can build decentralized, non-transferable reputation scores linked to their unique identity. This has massive implications for DeFi lending, on-chain credit assessments, and Web3 social networks.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),\"3. Secure Login & Authentication for dApps\"]}),/*#__PURE__*/t(\"p\",{children:[\"Say goodbye to seed phrases and cumbersome authentication flows. Our meta-account framework allows dApps to offer Web2-level UX while maintaining the security and sovereignty of Web3 identity.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),\"4. AI-Proof Identity Verification\"]}),/*#__PURE__*/e(\"p\",{children:\"As AI-generated personas become increasingly sophisticated, Humanity Protocol ensures that only real humans access platforms that require genuine user engagement, such as content moderation, social media, and Web3 communities.\"}),/*#__PURE__*/e(\"h2\",{children:\"Join Us at ETHDenver: Build the Future of Identity\"}),/*#__PURE__*/e(\"p\",{children:\"ETHDenver is not just where we launch our APIs \u2014 it\u2019s where the future of Web3 identity begins. We\u2019re inviting developers, builders, and visionaries to join us at the Humanity Protocol Hackathon, where you\u2019ll get hands-on experience with our APIs, compete for prizes, and help shape the next generation of decentralized identity solutions.\"}),/*#__PURE__*/e(\"p\",{children:\"Web3 is broken without trust. Let\u2019s build a better future, one verified human at a time.\"}),/*#__PURE__*/e(\"p\",{children:\"Register for our hackathon and start building with Humanity Protocol\u2019s APIs. \"}),/*#__PURE__*/t(\"p\",{children:[\"See you at ETHDenver! Join us \",/*#__PURE__*/e(n,{href:\"https://ethdenver2025.devfolio.co/overview\",motionChild:!0,nodeId:\"ae9PFKI02\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"here\"})}),\".\"]})]});export const richText9=/*#__PURE__*/t(o.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Prenetics Global Limited (NASDAQ: PRE), a leading genomics and consumer healthcare company, is partnering with Humanity Protocol. This collaboration leverages Prenetics\u2019 advanced genetic testing capabilities to underpin decentralized identity verification, while simultaneously unveiling a Crypto Strategic Reserve aimed at fueling innovation at the intersection of blockchain, healthcare, and decentralized science (DeSci).\"}),/*#__PURE__*/e(\"p\",{children:\"As part of this dual initiative, Prenetics is committing initial investments of $1 million in $H tokens, $250,000 in Bitcoin (BTC), and $250,000 in Solana (SOL). These allocations, which will be revisited on a quarterly basis to assess further investment opportunities, underscore the company\u2019s strategic intent to integrate digital assets into its corporate balance sheet. Prenetics\u2019 cash and short-term assets balance stood at $84.87 million as of December 31, 2024, reflecting its robust financial position to support these initiatives.\"}),/*#__PURE__*/t(\"p\",{children:[\"With the partnership, Prenetics will join Humanity Protocol as an Identity Validator, bringing its flagship CircleDNA service into the protocol's infrastructure. This integration enables the issuance of blockchain-based \",/*#__PURE__*/e(n,{href:{webPageId:\"ojWBvkK1b\"},motionChild:!0,nodeId:\"ae9PFKI02\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"Proof of Personhood\"})}),\" credentials, leveraging DNA testing to deliver highly secure and sybil-resistant identity verification. With advanced zero-knowledge proof technology, these credentials ensure robust privacy protection while supporting decentralized applications across finance, healthcare, and governance.\"]}),/*#__PURE__*/e(\"p\",{children:\"Danny Yeung, CEO and Co-Founder of Prenetics, stated: \u201COur partnership with Humanity Protocol exemplifies our commitment to merging the precision of genomics with the transformative potential of blockchain technology. Through our CircleDNA service, we will provide secure, privacy-focused identity solutions that not only benefit decentralized applications across finance, healthcare, and governance but also pave the way for further integration of digital assets into our strategic framework.\u201D\"}),/*#__PURE__*/e(\"p\",{children:\"Yat Siu, Board Director of the Humanity Foundation and Executive Chairman of Animoca Brands, added: \u201CPrenetics\u2019 entry into the decentralized identity arena as an Identity Validator marks a significant milestone. Their deep expertise in genomics, now combined with an active role in the Web3 ecosystem, is exactly the kind of forward-thinking collaboration that will drive decentralized identity and secure digital interactions into the future.\u201D\"}),/*#__PURE__*/e(\"p\",{children:\"Unveiling the Crypto Strategic Reserve Prenetics\u2019 newly established Crypto Strategic Reserve is a testament to the company\u2019s belief in blockchain\u2019s capacity to drive cross-industry innovation.\"}),/*#__PURE__*/e(\"p\",{children:\"\u201COur Crypto Strategic Reserve demonstrates Prenetics\u2019 confidence in the transformative potential of blockchain and digital assets,\u201D said Danny Yeung, CEO and Co-Founder of Prenetics. \u201CThis initiative not only diversifies our portfolio but also reinforces our commitment to leveraging cutting-edge technologies to drive cross-industry innovation in healthcare and beyond.\u201D\"}),/*#__PURE__*/e(\"p\",{children:\"This strategic allocation reflects Prenetics\u2019 commitment to diversifying its investment portfolio while reinforcing its leadership in technological innovation.\"}),/*#__PURE__*/e(\"h2\",{children:\"About Prenetics\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Prenetics (NASDAQ:PRE), a leading health sciences company, is dedicated to advancing consumer and clinical health. Our consumer initiative is led by IM8, a new health and wellness brand, and Europa, one of the largest sports distribution companies in the USA. Our clinical division is led by Insighta, our $200 million venture focused on multi-cancer early detection technologies. Each of Prenetics\u2019 units synergistically enhances our global impact on health, embodying our commitment to \u2018enhancing life through science\u2019. To learn more about Prenetics, please visit prenetics.com.\"})]});export const richText10=/*#__PURE__*/t(o.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[\"Humanity Protocol, a leader in on-chain \",/*#__PURE__*/e(n,{href:{webPageId:\"ojWBvkK1b\"},motionChild:!0,nodeId:\"ae9PFKI02\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"Proof of Humanity (PoH)\"})}),\" and decentralized identity, is today announcing its partnership with ApeChain, the blockchain powering the ApeCoin ecosystem. ApeChain will join Humanity Protocol\u2019s zkProofer network, a decentralized infrastructure for privacy-preserving identity verification. This partnership positions ApeChain at the forefront of integrating Sybil-resistant, human-centric identity solutions, enhancing governance, utility, and trust across the ApeCoin ecosystem.\"]}),/*#__PURE__*/t(\"p\",{children:[\"Humanity Protocol has established itself as the leading identity layer for Web3 with over 2.5 million users onboarded during its testnet and an impending mainnet launch. Humanity Protocol leverages its Self-Sovereign Identity (SSI) framework and PoH technology to deliver unique human authentication for decentralized applications. zkProofers, key components of this framework, validate identities using \",/*#__PURE__*/e(n,{href:\"https://www.humanity.org/blog/what-is-zero-knowledge-proof-and-how-does-it-protect-my-identity\",motionChild:!0,nodeId:\"ae9PFKI02\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"zero-knowledge proofs\"})}),\", ensuring privacy while maintaining trust. As a zkProofer, ApeChain will play a pivotal role in scaling this identity network, enabling privacy-preserving verification for its users without compromising personal data.\"]}),/*#__PURE__*/e(\"p\",{children:\"ApeChain, the blockchain underpinning the vibrant ApeCoin ecosystem, supports decentralized applications across NFTs, DeFi, gaming, and governance. Its commitment to scalability, security, and interoperability makes it an ideal partner for Humanity Protocol. By integrating PoH and becoming part of the zkProofer network, ApeChain is elevating its ecosystem with innovative identity solutions designed to bridge the gap between the digital and physical worlds.\"}),/*#__PURE__*/e(\"p\",{children:\"With Proof of Humanity, ApeDAO governance will benefit from greater transparency and fairness. Verified human identities tied to voting will prevent Sybil attacks and foster genuine community engagement while maintaining user privacy. This partnership addresses longstanding challenges in decentralized governance, enabling ApeDAO to operate more effectively and equitably.\"}),/*#__PURE__*/e(\"p\",{children:\"Terence Kwok, Founder and CEO of Humanity Protocol said: \u201CPartnering with ApeChain as a zkProofer is a significant milestone in advancing decentralized identity. Humanity Protocol\u2019s Proof of Humanity framework will enhance governance, unlock new utility for NFTs, and create privacy-preserving experiences that bridge digital ownership with real-world interactions. This collaboration represents a shared commitment to building secure, human-centric systems that drive innovation in Web3.\u201D\"}),/*#__PURE__*/e(\"p\",{children:\"Waabam, ApeCoin Special Council Member and ApeChain Director, said: \u201CThis partnership with Humanity Protocol represents a pivotal step forward for the ApeCoin and ApeChain ecosystem. By joining Humanity Protocol\u2019s zkProofer network and integrating its groundbreaking Proof of Humanity technology, we are enhancing not only the security and fairness of our governance processes but also unlocking new possibilities for utility and engagement across our ecosystem.\u201D\"})]});export const richText11=/*#__PURE__*/t(o.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(n,{href:{webPageId:\"augiA20Il\"},motionChild:!0,nodeId:\"ae9PFKI02\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"Humanity Protocol, a decentralized identity blockchain solution\"})}),\", is today announcing the successful closure of its latest funding round, co-led by Pantera Capital and Jump Crypto at a $1.1 billion fully diluted valuation.\"]}),/*#__PURE__*/e(\"p\",{children:\"This investment represents a vote of confidence in Humanity Protocol\u2019s mission to redefine decentralized identity and unlock new possibilities for secure, inclusive, and user-owned blockchain ecosystems. It follows the recent announcement of the Humanity Foundation's formation, led by Yat Siu, Mario Nawfal, and interim CEO Yeewai Chong.\"}),/*#__PURE__*/t(\"p\",{children:[\"The funding will accelerate Humanity Protocol\u2019s development of \",/*#__PURE__*/e(n,{href:{webPageId:\"ojWBvkK1b\"},motionChild:!0,nodeId:\"ae9PFKI02\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"Proof of Humanity\"})}),\", Human ID, and seamless integrations with leading Web3 platforms. With the support of Pantera Capital and Jump Crypto, Humanity Protocol is poised to scale its operations, expand its global reach, and drive adoption across industries beyond Web3.\"]}),/*#__PURE__*/e(\"p\",{children:\"As Humanity Protocol continues to grow, the funding will also support upcoming initiatives, including partnership announcements, developer grants, and community-building efforts leading up to the protocol\u2019s mainnet launch.\"}),/*#__PURE__*/e(\"p\",{children:\"Both Pantera Capital and Jump Crypto bring extensive expertise in blockchain, Web3 infrastructure, and strategic scaling, making them ideal partners in Humanity Protocol\u2019s next growth phase.\"}),/*#__PURE__*/e(\"p\",{children:'\"At Humanity Protocol, we\u2019re committed to empowering individuals with digital identities that are truly their own,\" said Terence Kwok, Founder of Humanity Protocol. \"This investment from Jump Crypto and Pantera Capital brings us one step closer to realizing a future where trustless, decentralized identity solutions are the norm. We\u2019re honored to have the backing of such visionary investors who share our belief in the transformative potential of Web3 technologies.\"'}),/*#__PURE__*/e(\"p\",{children:'\"At Pantera Capital, we are excited about all the ways that blockchain enables a future AI-driven world, and Humanity Protocol is leading the way,\u201D added Cosmo Jiang, General Partner at Pantera Capital.'})]});export const richText12=/*#__PURE__*/t(o.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Humanity Protocol, the leader in on-chain Proof of Humanity (PoH) and decentralized identity, is excited to announce its strategic partnership with Open Campus, the Web3 education protocol. This collaboration aims to redefine digital identity and credentialing for learners, educators, and developers by enabling interoperable, privacy-preserving credentials that seamlessly integrate across decentralized ecosystems.\"}),/*#__PURE__*/e(\"p\",{children:\"Humanity Protocol\u2019s Self-Sovereign Identity (SSI) framework and PoH technology provide Sybil-resistant, verified human authentication for Web3 applications. Open Campus complements this by empowering users with tools to issue, manage, and utilize education-related credentials through its Open Campus ID and Achievements System. Together, these two projects are unlocking a future where identity and educational credentials are secure, interoperable, and privacy-focused.\"}),/*#__PURE__*/e(\"h3\",{children:/*#__PURE__*/e(\"strong\",{children:\"Key Features\"})}),/*#__PURE__*/e(\"p\",{children:\"At the heart of this partnership is the integration of Open Campus Achievements and Open Campus ID with Humanity Protocol\u2019s decentralized identity graph. This integration ensures that credentials issued on Open Campus are validated and interoperable, enabling users to showcase their verified educational accomplishments across Web3 platforms. Key features of the collaboration include:\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Achievement verification:\"}),\" Open Campus will issue education-related credentials, such as course completions, certifications, and learning milestones. These achievements will be authenticated using Humanity Protocol\u2019s verifiable credential (VC) framework, ensuring secure and portable credentialing.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Interoperable identity:\"}),\" Open Campus ID will integrate with Humanity Protocol\u2019s Proof of Humanity, providing users with privacy-preserving, Sybil-resistant identities. These identities will allow users to leverage their credentials in governance, professional, and educational applications.\"]}),/*#__PURE__*/e(\"h3\",{children:/*#__PURE__*/e(\"strong\",{children:\"New Opportunities for Learners, Educators, and Developers\"})}),/*#__PURE__*/e(\"p\",{children:\"The partnership between Humanity Protocol and Open Campus introduces a wealth of new use cases that benefit various stakeholders in the Web3 ecosystem.\"}),/*#__PURE__*/e(\"p\",{children:\"Portable, privacy-preserving portfolios can combine Proof of Humanity with verified Open Campus Achievements. These portfolios can be used to securely showcase skills and accomplishments in professional and academic settings. Additionally, interoperable identities will enable participation in governance activities on both Humanity Protocol and Open Campus platforms. By tying voting to verified individuals, governance becomes more transparent and fair.\"}),/*#__PURE__*/e(\"p\",{children:\"Developers can build applications that integrate Humanity Protocol\u2019s identity verification with Open Campus\u2019s credentialing. This opens the door to innovations in decentralized education, recruitment, and professional networking.\"}),/*#__PURE__*/e(\"p\",{children:\"Beyond technical integration, Humanity Protocol will actively support Open Campus in its efforts to engage with educational institutions. By providing expertise in decentralized identity and credentialing, Humanity Protocol will help Open Campus establish trust and drive adoption of its Achievements and Open Campus ID among schools, universities, and certification bodies. This collaboration bridges the gap between traditional education systems and the decentralized future.\"}),/*#__PURE__*/e(\"h3\",{children:/*#__PURE__*/e(\"strong\",{children:\"Privacy-Preserving Solutions with zkProofers\"})}),/*#__PURE__*/e(\"p\",{children:\"Humanity Protocol\u2019s zkProofers will ensure that all verifications remain privacy-focused. Users will be able to prove their identities and credentials without exposing sensitive personal data, enabling secure and trustworthy interactions in education, governance, and professional contexts. By integrating these privacy-preserving solutions, the partnership guarantees that credentials remain secure and portable across ecosystems.\"}),/*#__PURE__*/e(\"p\",{children:\"The partnership between Humanity Protocol and Open Campus marks a significant step forward in the evolution of decentralized identity and credentialing. By combining Humanity Protocol\u2019s Sybil-resistant authentication with Open Campus\u2019s credentialing tools, the collaboration is paving the way for a future where identity and educational credentials are secure, interoperable, and privacy-focused. Learners, educators, developers, and institutions now have the tools to build a more transparent, trustworthy, and decentralized educational ecosystem.\"})]});export const richText13=/*#__PURE__*/t(o.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Humanity Protocol is proud to announce its latest collaboration with OKX Wallet, bringing you closer to the decentralized identity revolution. By signing up to the Humanity Protocol Testnet with OKX Wallet, you\u2019ll receive a 10% bonus in airdrop allocation when our token launches.\\xa0\\xa0\"}),/*#__PURE__*/e(\"h2\",{children:\"How It Works\"}),/*#__PURE__*/e(\"p\",{children:\"Getting started is simple:\\xa0\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"During the sign-up process for Humanity Protocol\u2019s testnet, use the Connect Wallet function and select OKX Wallet.\\xa0\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"As part of the process, a verifiable credential will be issued to confirm that your wallet is authenticated as an OKX Wallet user. This credential ensures fair distribution and will be generated prior to the airdrop.\\xa0\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Users signing up with OKX Wallet will receive an extra 10% bonus in their airdrop allocation during the token launch.\\xa0\\xa0\"})})]}),/*#__PURE__*/e(\"h2\",{children:\"What is a Verifiable Credential?\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"A verifiable credential is a key part of how Humanity Protocol works, ensuring that each participant is verified as a unique OKX Wallet user. As an Identity Validator on Humanity Protocol, the OKX Wallet user credential will be issued securely before the airdrop, this credential:\\xa0\\xa0\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Confirms wallet ownership without exposing sensitive information.\\xa0\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Prevents duplicate registrations or fraudulent activity.\\xa0\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Enables a fair and transparent airdrop allocation process.\\xa0\\xa0\"})})]}),/*#__PURE__*/t(\"p\",{children:[\"While the verifiable credential is not a user-facing benefit, it is essential to how Humanity Protocol ensures the integrity of its ecosystem and protects against bots or \",/*#__PURE__*/e(n,{href:\"https://www.humanity.org/blog/what-are-sybil-attacks-and-could-they-ruin-web3\",motionChild:!0,nodeId:\"ae9PFKI02\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"sybil attacks\"})}),\".\\xa0\\xa0\"]}),/*#__PURE__*/e(\"h2\",{children:\"Why Use Your OKX Wallet?\"}),/*#__PURE__*/e(\"p\",{children:\"OKX Wallet is a trusted validator in safeguarding Humanity Protocol\u2019s decentralized identity system. Its integration ensures a secure, user-friendly process for:\\xa0\\xa0\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Verifying wallet credentials.\\xa0\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Contributing to a network built on authenticity and fairness.\\xa0\\xa0\"})})]}),/*#__PURE__*/e(\"p\",{children:\"By using OKX Wallet, you\u2019re seamlessly participating in the Humanity Protocol testnet while helping build a more trustworthy digital ecosystem. Joining Humanity Protocol\u2019s testnet lets you secure your eligibility for the airdrop with OKX Wallet validation and maximize your rewards with a 10% airdrop bonus, exclusive to OKX Wallet users.\\xa0\\xa0\"}),/*#__PURE__*/e(\"h2\",{children:\"Shape the Future of Digital Identity\"}),/*#__PURE__*/e(\"p\",{children:\"This collaboration with OKX Wallet reflects Humanity Protocol\u2019s commitment to creating a secure, privacy-preserving network for decentralized identity. By connecting your OKX Wallet today, you\u2019re actively contributing to a safer, more decentralized future while positioning yourself for rewards during the token launch.\"}),/*#__PURE__*/e(\"p\",{children:\"Don\u2019t miss this chance\u2014sign up for Humanity Protocol testnet now with your OKX Wallet and secure your place in building the future of digital identity.\"})]});export const richText14=/*#__PURE__*/t(o.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Today, we\u2019re proud to announce the launch of Humanity Foundation, which will serve as the cornerstone for fostering innovation and long-term growth within the ecosystem by establishing ecosystem funds and community growth incentives.\"}),/*#__PURE__*/e(\"p\",{children:\"The newly formed Foundation will be helmed by industry veterans, Yat Siu, Chairman of Animoca Brands, Mario Nawfal, Founder of International Blockchain Consulting, and Yeewai Chong, a former investment professional from Morgan Stanley and Ortus Capital.\\xa0\"}),/*#__PURE__*/e(\"h2\",{children:\"What is the Humanity Foundation?\"}),/*#__PURE__*/t(\"p\",{children:[\"Humanity Foundation was formed to invest in projects that leverage Humanity Protocol\u2019s \",/*#__PURE__*/e(n,{href:{webPageId:\"ojWBvkK1b\"},motionChild:!0,nodeId:\"ae9PFKI02\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"Proof of Humanity\"})}),\". It will drive innovation on Humanity Protocol by funding research and development and exploring new frontiers in decentralized identity verification and use cases. The Foundation aims to drive global adoption and demonstrate the potential of non-invasive biometrics and decentralized identity solutions.\"]}),/*#__PURE__*/e(\"p\",{children:\"The core team at Humanity Protocol is building a holistic identity solution that will empower users to enjoy a more seamless, human-centric experience, both online and offline. Besides establishing greater trust and cracking down on bots in online spaces, Proof of Humanity opens doors to new possibilities for users to perform a wide range of tasks in the physical world, such as paying for goods and services and accessing buildings and events, by linking their permissions to their biometrics in a secure, privacy-focused way. Foundation is positioned to build a resilient, vibrant ecosystem that supports a wide range of use cases and global scalability.\"}),/*#__PURE__*/e(\"p\",{children:\"Yat Siu, Mario Nawfal, and Yeewai Chong will serve as founding directors of the board, and Chong will simultaneously hold the role of interim CEO of the foundation. Chong is a veteran in the financial services sector with a Ph.D. in economics from Stanford University, and has previously held investment roles at Morgan Stanley and Ortus Capital.\\xa0\"}),/*#__PURE__*/e(\"h2\",{children:\"A Major Milestones in Humanity Protocol\u2019s History\"}),/*#__PURE__*/e(\"p\",{children:\"The Humanity Foundation is poised to accelerate the adoption of Proof of Humanity while empowering developers and communities to build impactful applications that solve pervasive digital identity problems. This marks the start of an exciting journey toward shaping a more secure, trusted, and human-centric digital future. We\u2019re gearing up to make big moves in 2025. The launch of the Humanity Foundation is only the first of many major milestones to come.\"})]});export const richText15=/*#__PURE__*/t(o.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"What a year it\u2019s been for Humanity Protocol! \"}),/*#__PURE__*/t(\"p\",{children:[\"From numerous major milestones to being on the precipice of global adoption, 2024 has truly been a defining chapter in our journey to reshape digital identity and trust. From more secure payments to unprecedented control over our personal data, this year was a testament to the demand for \",/*#__PURE__*/e(n,{href:{webPageId:\"ojWBvkK1b\"},motionChild:!0,nodeId:\"ae9PFKI02\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"Proof of Humanity\"})}),\".\"]}),/*#__PURE__*/e(\"p\",{children:\"Here\u2019s a look back at the incredible strides we\u2019ve made this year:\"}),/*#__PURE__*/e(\"h2\",{children:\"Emerging from Stealth with a Bold Vision\"}),/*#__PURE__*/t(\"p\",{children:[\"In February, \",/*#__PURE__*/e(n,{href:\"https://www.humanity.org/blog/humanity-protocol-emerges-from-stealth-human-institute-in-collaboration-with-animoca-brands-and-polygon-labs-pioneers-the-human-layer-for-web3\",motionChild:!0,nodeId:\"ae9PFKI02\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"Humanity Protocol emerged from stealth mode\"})}),\" with the view to solve some of the most pervasive issues in digital identity management. \"]}),/*#__PURE__*/e(\"p\",{children:\"Founded by tech entrepreneur Terence Kwok, and guided by a council of high accomplished Founding Humans including Yat Siu of Animoca Brands and Sandeep Nailwal of Polygon Labs, the protocol was set to redefine how we manage our personal data and identity on a daily basis using palm recognition technology. \"}),/*#__PURE__*/e(\"p\",{children:\"Humanity Protocol aimed to solve the identity problem for billions of people by putting control over their personal data back in their hands, addressing the widespread bot problem online, and providing a seamless identity verification experience both online and offline to perform any daily task \u2014 from accessing buildings to making payments with a wave of their hand.\"}),/*#__PURE__*/e(\"h2\",{children:\"$30M Raised to Power the Future\"}),/*#__PURE__*/t(\"p\",{children:[\"In April, we reached a monumental milestone \u2014 \",/*#__PURE__*/e(n,{href:\"https://www.bloomberg.com/news/articles/2024-05-15/humanity-protocol-becomes-crypto-s-new-digital-identity-unicorn\",motionChild:!0,nodeId:\"ae9PFKI02\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"securing $30 million in funding\"})}),\" at a $1B valuation. With investors such as Kingsway Capital, Animoca Brands, and Polygon Labs backing Humanity Protocol's bold mission to solve the digital identity problem, this raise not only cemented confidence in our vision but also equipped us with the resources to accelerate development and scale our infrastructure. \"]}),/*#__PURE__*/e(\"p\",{children:\"With this support, we got to work to bring Humanity Protocol\u2019s  potential closer to reality.\"}),/*#__PURE__*/e(\"h2\",{children:\"Humanity Protocol's very first integration\"}),/*#__PURE__*/t(\"p\",{children:[\"In May, LayerZero integrated with Humanity Protocol, joining its \",/*#__PURE__*/e(n,{href:\"https://www.humanity.org/blog/zkproofers-enhancing-the-web3-experience-for-all\",motionChild:!0,nodeId:\"ae9PFKI02\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"zkProofer\"})}),\" Network.\"]}),/*#__PURE__*/e(\"p\",{children:\"LayerZero Labs is the leading software development company that built LayerZero, an interoperability protocol that empowers developers with essential tools to facilitate smooth data movement, token issuance, and dApp development across multiple blockchains. \"}),/*#__PURE__*/e(\"p\",{children:\"Scalability and interoperability are ingrained in both Humanity Protocol and LayerZero Labs' DNA, reflecting our shared commitment to advancing decentralized ecosystems.\"}),/*#__PURE__*/e(\"h2\",{children:\"Testnet Waitlist Surpasses 1 Million\"}),/*#__PURE__*/e(\"p\",{children:\"By mid-year, the anticipation for Humanity Protocol\u2019s Testnet was palpable. \"}),/*#__PURE__*/e(\"p\",{children:\"Just before the launch of our highly-anticipated testnet, our waitlist surpassed an astonishing 1 million sign-ups, highlighting the global demand for a secure, decentralized identity solution. This surge of interest validated the need for our innovative approach to tackling Sybils, bots, and identity challenges in Web3.\"}),/*#__PURE__*/e(\"h2\",{children:\"Testnet Launches and Experiences Explosive Growth\"}),/*#__PURE__*/t(\"p\",{children:[\"September marked the much-anticipated launch of our \",/*#__PURE__*/e(n,{href:\"https://www.google.com/url?sa=t&source=web&rct=j&opi=89978449&url=https://cryptobriefing.com/humanity-protocol-testnet-growth/&ved=2ahUKEwjhhuv_6NGKAxWSQUEAHYwAI0MQxfQBKAB6BAgLEAE&usg=AOvVaw2ap6xRBwR_cO0aASFTuYjv\",motionChild:!0,nodeId:\"ae9PFKI02\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"testnet\"})}),\". Within just three months, over 2 million Human IDs were created. The rollout was split across three phases \u2014 reserving unique Human IDs, enrolling to the platform by scanning your palm using the mobile app, and finally palm vein scans for added protection.\"]}),/*#__PURE__*/e(\"p\",{children:\"This phenomenal adoption rate underscored the trust and enthusiasm for our unique blend of privacy, decentralization, and user-centric design. Participants across the globe began reserving their Human IDs, ready to fully enrol onto Humanity Protocol by scanning their palms in Phase 2 of the rollout.\"}),/*#__PURE__*/e(\"h2\",{children:\"Palm Scanners Go Global\"}),/*#__PURE__*/e(\"p\",{children:\"One of our most exciting rollouts this year was the global deployment of Humanity Protocol\u2019s palm scanners. These devices debuted at Humanity Protocol's booth at TOKEN2049 Singapore and showcased the tangible intersection of PoH's advanced technology and everyday usability. \"}),/*#__PURE__*/e(\"p\",{children:\"From unlocking secure digital identities to enabling sybil-resistant mechanisms, users have embraced the range of possibilities these scanners offer. Stay tuned for updates on when the scanners will make their way to a city near you.\"}),/*#__PURE__*/e(\"h2\",{children:\"Looking Ahead: $H and Mainnet Launch\"}),/*#__PURE__*/e(\"p\",{children:\"That's right, the ticker's $H. We're gearing up for the launch of our token in 2025.\"}),/*#__PURE__*/e(\"p\",{children:\"We're also thrilled to tease the upcoming launch of our mainnet. These launches will mark the next phase in unlocking the full potential of Humanity Protocol, enabling decentralized governance and further empowering our community.\"}),/*#__PURE__*/e(\"h2\",{children:\"Thank You to Our Community\"}),/*#__PURE__*/e(\"p\",{children:\"None of this would have been possible without you \u2014 our passionate community and supporters. Together, we\u2019re building a future where identity is secure, decentralized, and human-centric.\"}),/*#__PURE__*/e(\"p\",{children:\"Stay tuned for more updates as we continue this incredible journey into 2025!\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]});export const richText16=/*#__PURE__*/t(o.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Today, Humanity Protocol is unveiling  its highly anticipated University Partner Program, which is setting a new standard for collaboration in Web3 by bringing together blockchain clubs from leading universities worldwide to address one of the most critical challenges of our digital age: solving longstanding issues in digital identity.\"}),/*#__PURE__*/e(\"p\",{children:\"With prestigious institutions like Cambridge University and Yale University already onboard, this program is empowering the next generation of blockchain leaders to shape the future of decentralized ecosystems by offering mentorship, internship opportunities, and hackathons.\"}),/*#__PURE__*/e(\"h2\",{children:\"Driving change alongside tomorrow's blockchain leaders\"}),/*#__PURE__*/e(\"p\",{children:\"Student-led blockchain clubs participating in the Humanity Protocol University Partner Program are driving real-world change by addressing critical challenges in Web3 through innovative efforts. One of their primary focuses is operating identity scanning initiatives to support scalable and reliable solutions for decentralized identity verification. These efforts are key to tackling issues like bot mitigation and sybil resistance, which are essential for fostering trust and security in decentralized ecosystems.\"}),/*#__PURE__*/e(\"p\",{children:\"In addition to technical operations, these clubs are spearheading grassroots community adoption. By leveraging their networks and influence within their local and academic communities, they act as catalysts for spreading awareness, building trust, and driving virality for decentralized identity solutions. Their role as community leaders ensures that these technologies gain traction among a broader audience.\"}),/*#__PURE__*/e(\"p\",{children:\"The program also emphasizes educational innovation, with clubs co-creating new use cases for decentralized identity tailored to the education sector and beyond. These initiatives aim to enhance transparency, equity, and trust, demonstrating the transformative potential of decentralized identity across various industries. Through these efforts, students are not only advancing blockchain technology but also contributing to a more transparent and inclusive digital future.\"}),/*#__PURE__*/e(\"h2\",{children:\"Partnering with leading institutions\"}),/*#__PURE__*/e(\"p\",{children:\"Blockchain clubs from Cambridge University and Yale University are leading the charge, applying their expertise and vision to drive impactful projects. Their involvement signals a significant step forward in bridging academia and cutting-edge blockchain technology.\"}),/*#__PURE__*/e(\"p\",{children:\"This program lays the foundation for a more transparent and equitable digital future. By engaging with blockchain clubs, Humanity Protocol is fostering a new wave of blockchain leadership, providing students with the tools and resources they need to innovate and create lasting change in decentralized ecosystems and beyond.\"}),/*#__PURE__*/e(\"h2\",{children:\"What\u2019s Next?\"}),/*#__PURE__*/e(\"p\",{children:\"The Humanity Protocol University Partner Program is just getting started. Together with our university partners, we\u2019re building a global movement that combines education, innovation, and grassroots adoption to solve digital identity challenges. This initiative aims to:\"}),/*#__PURE__*/t(\"ul\",{style:{\"--framer-text-alignment\":\"start\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\",\"--framer-text-stroke-width\":\"0px\",\"--framer-text-transform\":\"none\"},children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Inspire broader adoption of decentralized trust.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Empower the next generation of blockchain leaders.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Unlock new possibilities for Web3.\"})})]}),/*#__PURE__*/e(\"p\",{children:\"By partnering with these trailblazing institutions, Humanity Protocol is creating a ripple effect of innovation and trust that will shape the future of decentralized identity\u2014and blockchain as a whole.\"}),/*#__PURE__*/e(\"h2\",{children:/*#__PURE__*/e(\"strong\",{children:\"Join the Movement\"})}),/*#__PURE__*/e(\"p\",{children:\"Be part of this global effort to empower blockchain leadership and solve Web3\u2019s most pressing challenges. Together, we\u2019re creating a brighter, more equitable digital future.\"})]});export const richText17=/*#__PURE__*/t(o.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"We\u2019re thrilled to announce the arrival of our first batch of Humanity Scanners, a monumental step toward redefining online identity. These devices are being dispatched to operating partners globally, empowering communities worldwide to participate in our Humanity Protocol testnet which is quickly approaching Phase 2.\"}),/*#__PURE__*/e(\"h2\",{children:\"What are Humanity Scanners?\"}),/*#__PURE__*/t(\"p\",{children:[\"Humanity Scanners are state-of-the-art biometric devices designed to securely and efficiently onboard individuals onto the Humanity Protocol once they've secured their Human ID via the \",/*#__PURE__*/e(n,{href:\"https://www.humanity.org/testnet\",motionChild:!0,nodeId:\"ae9PFKI02\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"testnet\"})}),\". Each device has specific features that ensure a seamless, privacy-preserving, and fraud-resistant enrollment process. Here\u2019s what they do:\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Palm Print Capture\"}),/*#__PURE__*/e(\"br\",{}),\"The first step involves scanning your palm print, a unique identifier that ensures individuality while protecting privacy. This data is securely encrypted and stored to prevent duplication or unauthorized access. It will be paired with your Human ID on Humanity Protocol.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Identity Verification\"}),/*#__PURE__*/e(\"br\",{}),\"Humanity Protocol's advanced verification algorithms authenticate individuals without storing sensitive personal data. This process guarantees that every participant is a unique human being, paving the way for trust in the decentralized digital ecosystem.\"]}),/*#__PURE__*/e(\"h2\",{children:\"Why Humanity Scanners Matter\"}),/*#__PURE__*/e(\"p\",{children:\"As we navigate a world increasingly impacted by bots, deepfakes, and fake identities, Humanity Scanners represent a critical solution. By combining biometrics with a commitment to decentralization and privacy, these devices lay the foundation for a digital future where trust and authenticity prevail.\"}),/*#__PURE__*/e(\"h2\",{children:\"Want to Become a Verified Human?\"}),/*#__PURE__*/e(\"p\",{children:\"If you\u2019re eager to join our mission, now\u2019s your chance. Fill out the form here to register your interest and be among the first to own a device.\"}),/*#__PURE__*/t(\"p\",{children:[\"The first batch of Humanity Scanners marks a new chapter in our journey. As these devices reach communities around the world, we\u2019re one step closer to building a fairer, more secure internet. \",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),\"Join us today and be part of the change \u2014 order your device \",/*#__PURE__*/e(n,{href:\"https://t.co/D8StVbiUnH\",motionChild:!0,nodeId:\"ae9PFKI02\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"here\"})}),\"!\"]})]});export const richText18=/*#__PURE__*/t(o.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Last month, Humanity Protocol's founder, Terence Kwok, joined one of the most exciting Twitter Spaces we\u2019ve had to date alongside industry heavyweights to explore some of the most pressing issues in Web3, decentralized identity, and the growing threat of bots and AI.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"He sat down with one of the most prolific roundtable hosts and Humanity Protocol investor, Mario Nawfal, as well as two other heavyhitters \u2014 Sandeep Naliwal of Polygon and Yat Siu of Animoca Brands to discuss all things Humanity Protocol, reaching a whopping 1 million Human IDs on testnet, and where the project is headed this bull market.\"}),/*#__PURE__*/t(\"p\",{children:[\"Their sit-down shed light on the biggest challenges facing the digital identity landscape and how Humanity Protocol\u2019s \",/*#__PURE__*/e(n,{href:{webPageId:\"ojWBvkK1b\"},motionChild:!0,nodeId:\"ae9PFKI02\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"Proof of Humanity\"})}),\" stands out in a saturated landscape of other digital identity projects.\"]}),/*#__PURE__*/t(\"p\",{children:[\"Check out the full conversation \",/*#__PURE__*/e(n,{href:\"https://x.com/Humanityprot/status/1861091451993460937\",motionChild:!0,nodeId:\"ae9PFKI02\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"here\"})}),\".\"]}),/*#__PURE__*/e(\"p\",{children:\"Here\u2019s a recap of the most important topics discussed during the session and Terence\u2019s most memorable quotes.\"}),/*#__PURE__*/e(\"h2\",{children:\"Verifying Human Identity in an AI-Driven World\"}),/*#__PURE__*/e(\"p\",{children:\"One of the standout themes was the rise of AI-generated deepfakes and the urgent need for reliable human verification systems. Terence highlighted how current identity verification methods like CAPTCHA and traditional biometrics are inadequate.\"}),/*#__PURE__*/e(\"p\",{children:\"\u201CWith deepfakes on the rise, Humanity Protocol focuses on creating an unspoofable way to verify human presence without sacrificing user privacy.\u201D \u2014 Terence Kwok\"}),/*#__PURE__*/e(\"p\",{children:\"He explained how Humanity Protocol\u2019s palm biometric technology offers a robust solution by leveraging unique vein patterns that are nearly impossible to replicate. Unlike facial recognition, which can be fooled by deepfakes, palm biometrics provide an unforgeable proof of humanity, ensuring only real users can access key digital services.\"}),/*#__PURE__*/e(\"h2\",{children:\"Building the largest ID graph on Web3\"}),/*#__PURE__*/e(\"p\",{children:\"The conversation then revolved around how Humanity Protocol is fundamentally different from projects like Worldcoin. Terence emphasized the importance of Identity Validators \u2014 trusted entities such as universities or financial institutions that can issue credentials without centralizing user data.\"}),/*#__PURE__*/e(\"p\",{children:\"The Proof of Humanity\u2019s mechanisms ensure that users maintain control over their data, sharing only what\u2019s necessary. Validators can confirm credentials with simple yes/no outputs, eliminating the need to store sensitive information on-chain.\"}),/*#__PURE__*/e(\"p\",{children:\"\u201CHumanity Protocol puts the power of identity back in users\u2019 hands by enabling verifiable credentials without compromising privacy.\u201D\"}),/*#__PURE__*/e(\"h2\",{children:\"Fighting Bots\"}),/*#__PURE__*/e(\"p\",{children:\"Terence and the panel also dove into the growing problem of bots manipulating online systems. From social media engagement to financial markets, bots undermine the integrity of digital ecosystems. Humanity Protocol\u2019s innovative approach bypasses traditional CAPTCHAs, using Humane Scanners and biometric verification to ensure only real users engage with platforms.\"}),/*#__PURE__*/e(\"p\",{children:\"The conversation also touched on how the protocol creates economic disincentives for bots by ensuring rewards and access are only available to verified humans.\"}),/*#__PURE__*/e(\"p\",{children:\"\u201CIt\u2019s not just about identifying bots\u2014it\u2019s about making the digital economy sustainable for real people.\u201D \u2014 Terence Kwok\"}),/*#__PURE__*/e(\"h2\",{children:\"Rapid User Growth and the Road Ahead\"}),/*#__PURE__*/e(\"p\",{children:\"One of the most impressive achievements discussed was the 1 million users Humanity Protocol onboarded in just 52 days since its testnet launch \u2014 a testament to the growing demand for decentralized identity solutions. Compared to Worldcoin\u2019s timeline to reach similar milestones, Humanity Protocol\u2019s rapid growth demonstrates the scalability and appeal of its biometric-based verification system.\"}),/*#__PURE__*/e(\"p\",{children:\"The discussion also covered the protocol\u2019s recent private valuation of $1 billion, with top-tier investors on its cap table, solidifying its position as a leader in the decentralized identity space.\"}),/*#__PURE__*/e(\"h2\",{children:\"Our Vision for the Future\"}),/*#__PURE__*/e(\"p\",{children:\"Wrapping up the conversation, Terence shared his vision for Humanity Protocol as more than just a product\u2014it\u2019s a movement to protect human agency in the digital age. He envisions a future where identity is not controlled by centralized authorities but instead secured through community-driven, decentralized networks.\"}),/*#__PURE__*/e(\"p\",{children:\"\u201CWe\u2019re building something bigger than identity verification. We\u2019re creating a new standard for trust in the digital world.\u201D \u2014 Terence Kwok\"}),/*#__PURE__*/e(\"h2\",{children:\"Final Thoughts\"}),/*#__PURE__*/e(\"p\",{children:\"This Twitter Space offered a rare glimpse into the forces driving Humanity Protocol. As AI, bots, and digital impersonation become more sophisticated, Terence and the HP team are committed to ensuring that humans retain control over their identities and enjoy a better online experience.\"}),/*#__PURE__*/e(\"p\",{children:\"With decentralized validators, innovative biometric solutions, and a clear focus on privacy, Humanity Protocol is leading the charge in shaping the future of digital identity.\"}),/*#__PURE__*/e(\"p\",{children:\"Stay tuned as Humanity Protocol continues to push the boundaries of what\u2019s possible in decentralized identity.\"})]});export const richText19=/*#__PURE__*/t(o.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[\"The future of decentralized identity is here, and it's growing faster than we ever imagined. Humanity Protocol, the \",/*#__PURE__*/e(n,{href:{webPageId:\"augiA20Il\"},motionChild:!0,nodeId:\"ae9PFKI02\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"decentralized identity blockchain\"})}),\", has reached a monumental milestone \u2014 1 million Human IDs on our testnet! This achievement marks what we'll one day look back on as one of the most important moments in online identity management.\"]}),/*#__PURE__*/e(\"p\",{children:\"And we\u2019re just getting started.\"}),/*#__PURE__*/e(\"p\",{children:\"Let's take a look back at some of the most significant milestones that have brought us to this point and where we're headed next.\"}),/*#__PURE__*/e(\"h2\",{children:\"$30 Million Raised in May: A Strong Foundation for Growth\"}),/*#__PURE__*/t(\"p\",{children:[\"In May 2024, \",/*#__PURE__*/e(n,{href:\"https://www.bloomberg.com/news/articles/2024-05-15/humanity-protocol-becomes-crypto-s-new-digital-identity-unicorn?embedded-checkout=true\",motionChild:!0,nodeId:\"ae9PFKI02\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"Humanity Protocol secured its future in the form of $30 million\"})}),\" from a roster of top-tier investors, including Kingsway Capital, Polygon, and Animoca Brands. This funding allowed us to accelerate our mission to build a decentralized, secure, and user-friendly system for managing digital identities \u2014 something that is sorely lacking in today\u2019s Web3 landscape.\"]}),/*#__PURE__*/e(\"p\",{children:\"With these funds, we\u2019ve been able to expand our team, enhance our platform, and prepare for the next phase of our journey. Our investors believe in the vision, and their support is the backbone of the rapid progress we\u2019ve made so far.\"}),/*#__PURE__*/e(\"h2\",{children:\"Testnet Launch: September\"}),/*#__PURE__*/t(\"p\",{children:[\"The \",/*#__PURE__*/e(n,{href:\"https://cryptobriefing.com/humanity-protocol-testnet-growth/\",motionChild:!0,nodeId:\"ae9PFKI02\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"testnet\"})}),\" launch in September marked a turning point for Humanity Protocol. After months of development and fine-tuning, we introduced the first phase of our platform to the world. The testnet allows users to secure their digital identities by first registering with Human IDs. This is the first step toward a future where individuals can fully control their online identity, while maintaining privacy and security at scale.\"]}),/*#__PURE__*/e(\"p\",{children:\"The testnet quickly gained traction, attracting users from all around the world eager to explore the potential of decentralized identity. Since its launch, we\u2019ve continued to improve our platform, refining user experience, adding new features, and preparing for the launch of the next phases of the testnet.\"}),/*#__PURE__*/e(\"h2\",{children:\"1 Million Human IDs\"}),/*#__PURE__*/e(\"p\",{children:\"Now, just a three months after our testnet launch, we are thrilled to announce that 1 million Human IDs have been registered on Humanity Protocol. This milestone is a testament to the excitement and demand for secure, verifiable digital identities. But it\u2019s more than just a number \u2014 it\u2019s proof that our vision is resonating with users and the Web3 community at large.\"}),/*#__PURE__*/e(\"p\",{children:\"Reaching 1 million Human IDs is just the beginning. The real impact of Humanity Protocol lies in how we can empower individuals and organizations with trustless, verifiable identities that are completely within the control of the user. We are laying the foundation for a world where identity is not only secure but also universal across every platform, blockchain, and application \u2014 online and offline.\"}),/*#__PURE__*/e(\"h2\",{children:\"What\u2019s Next for Humanity Protocol?\"}),/*#__PURE__*/e(\"p\",{children:\"It\u2019s the beginning of a new era for digital identity. We\u2019re creating the infrastructure for a world where users can control their identity securely, transparently, and without intermediaries. Our mission is to empower people by giving them ownership over their online selves \u2014 and to build the future of decentralized identity.\"}),/*#__PURE__*/e(\"p\",{children:\"So, if you haven\u2019t already, join us in this revolution. Secure your Human ID today and be part of the future. Because Humanity Protocol isn\u2019t just changing the game \u2014 we\u2019re building a whole new one.\"}),/*#__PURE__*/t(\"p\",{children:[\"We\u2019re just getting started.\",/*#__PURE__*/t(\"strong\",{children:[/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{})]}),/*#__PURE__*/e(n,{href:\"https://testnet.humanity.org/login\",motionChild:!0,nodeId:\"ae9PFKI02\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:/*#__PURE__*/e(\"strong\",{children:\"Join the testnet here.\"})})})]})]});export const richText20=/*#__PURE__*/t(o.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Biometric data, like palm scans, holds immense potential for secure authentication. However, centralizing such sensitive information has led to privacy concerns, data breaches, and misuse. Decentralized technologies offer a transformative solution by sharding and storing palm scans on-chain, ensuring privacy, security, and user control.\"}),/*#__PURE__*/e(\"h4\",{children:\"The Problem with Centralized Storage\"}),/*#__PURE__*/e(\"p\",{children:\"Traditional biometric systems store data in centralized databases, making them lucrative targets for hackers. High-profile breaches have demonstrated that even the most secure servers can be compromised. Centralized storage also raises ethical concerns: who owns the data, and how is it used or shared? Users often relinquish control, trusting third parties to act responsibly\u2014a trust that\u2019s frequently misplaced.\"}),/*#__PURE__*/e(\"h4\",{children:\"Sharding: A New Approach\"}),/*#__PURE__*/e(\"p\",{children:\"Sharding is a process that breaks data into smaller, encrypted fragments (or shards) distributed across multiple nodes in a decentralized network. When applied to palm scans:\"}),/*#__PURE__*/t(\"ul\",{style:{\"--framer-text-alignment\":\"start\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\",\"--framer-text-stroke-width\":\"0px\",\"--framer-text-transform\":\"none\"},children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Decentralized Storage:\"}),\" Instead of storing an entire palm scan in one location, fragments are stored across a blockchain.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Encryption Layers:\"}),\" Each shard is encrypted, ensuring that even if one fragment is compromised, it\u2019s meaningless without the others.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Reassembly with Authorization:\"}),\" Only authorized processes, triggered by the user, can reassemble the data for authentication.\"]})})]}),/*#__PURE__*/e(\"p\",{children:\"This method drastically reduces the risk of data breaches. A hacker would need to compromise multiple nodes, bypass encryption for each shard, and reassemble the fragments\u2014an exponentially more challenging task compared to attacking a centralized database.\"}),/*#__PURE__*/e(\"h4\",{children:\"On-Chain Storage and Privacy\"}),/*#__PURE__*/t(\"p\",{children:[\"Blockchain\u2019s immutability adds another layer of security. On-chain storage ensures that once data is sharded and distributed, it cannot be altered or deleted without user consent. Decentralized Identity (DID) frameworks can integrate palm scans with \",/*#__PURE__*/e(n,{href:\"https://www.humanity.org/blog/what-is-zero-knowledge-proof-and-how-does-it-protect-my-identity\",motionChild:!0,nodeId:\"ae9PFKI02\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"zero-knowledge proofs\"})}),' (ZKPs), enabling verification without exposing the underlying data. For example, proving identity with a palm scan might only reveal a \"yes\" or \"no\" match to a verifier without disclosing the scan itself.']}),/*#__PURE__*/e(\"h4\",{children:\"User Empowerment\"}),/*#__PURE__*/e(\"p\",{children:\"Decentralized storage returns ownership to users, aligning with Web3\u2019s ethos of self-sovereignty. Users decide how and when their biometric data is used, eliminating dependence on corporations or governments.\"}),/*#__PURE__*/e(\"p\",{children:\"Sharding and storing palm scans on-chain represents a significant shift in biometric data management. Unlike centralized systems, this decentralized approach enhances privacy and security, empowering users with control over their data. As blockchain technology continues to evolve, such innovations promise a future where trust is built into the system, not borrowed from intermediaries.\"})]});export const richText21=/*#__PURE__*/t(o.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:'In the Humanity Protocol ecosystem, we believe that building a fair and decentralized network means rewarding those who help it grow. Enter RWT \u2013 an on-chain token system designed to give real value to your engagement and contributions as you interact with the Humanity Protocol testnet. Unlike simple \"points,\" RWT tokens are blockchain-based assets that track your participation and impact within the community, providing real, redeemable rewards.'}),/*#__PURE__*/e(\"h3\",{children:\"What Are RWT Tokens?\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(n,{href:\"https://www.humanity.org/blog/unlocking-the-power-of-rwt-your-key-to-rewards-on-humanity-protocol-s-testnet\",motionChild:!0,nodeId:\"ae9PFKI02\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"RWT\"})}),\" tokens are Humanity Protocol\u2019s way of giving you real ownership in the network-building process in the \",/*#__PURE__*/e(n,{href:\"https://www.humanity.org/blog/your-time-has-come-the-humanity-protocol-testnet-is-live\",motionChild:!0,nodeId:\"ae9PFKI02\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"testnet\"})}),\" phase. They're minted on-chain, meaning they\u2019re not just entries in a database or points on a leaderboard. Each RWT token represents a tangible piece of your involvement, whether it\u2019s from daily claims or from bringing new users into the network through referrals. This commitment to using on-chain tokens ensures that every bit of engagement you contribute is transparently recorded and rewarded.\"]}),/*#__PURE__*/e(\"h3\",{children:\"How to Earn RWT\"}),/*#__PURE__*/e(\"p\",{children:\"Getting started with RWT is easy and rewarding. You can begin by:\"}),/*#__PURE__*/t(\"ol\",{style:{\"--framer-text-alignment\":\"start\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\",\"--framer-text-stroke-width\":\"0px\",\"--framer-text-transform\":\"none\"},children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Simply logging into the Humanity Protocol dashboard daily and claiming your rewards allows you to collect RWT tokens. Each day\u2019s engagement counts, and every token earned adds up.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Bringing new participants to the Humanity Protocol ecosystem also earns you RWT. Share your unique referral link, and for every person who signs up using your link, and you\u2019ll get 50% of the rewards they earn, compounding your rewards with every new community member.\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"The Future of RWT: Redeemable for $HP\"}),/*#__PURE__*/e(\"p\",{children:\"One of the most exciting aspects of RWT is its potential future value. When Humanity Protocol\u2019s mainnet launches, RWT tokens will become redeemable for Humanity Protocol\u2019s native token, $HP. More details on the exchange rate will be released as we approach mainnet, but this feature will allow early supporters to convert their RWT into $HP, making RWT not just a token of recognition but a gateway into Humanity Protocol\u2019s native ecosystem.\"}),/*#__PURE__*/e(\"h3\",{children:\"Why RWT Matters\"}),/*#__PURE__*/e(\"p\",{children:\"RWT tokens give real weight to every action taken within the Humanity Protocol network. They\u2019re designed to recognize your ongoing contributions and provide a bridge from your early participation on the testnet to a more substantial role on the mainnet.\"}),/*#__PURE__*/e(\"p\",{children:\"So whether you\u2019re engaging daily or bringing new people into the fold, your actions are recognized and rewarded transparently on-chain. And with each RWT earned, you\u2019re not just accruing a token; you\u2019re helping shape the future of decentralized identity on Humanity Protocol. \"}),/*#__PURE__*/e(\"p\",{children:\"Stay tuned for more updates on how RWT will convert into $HP, and keep building your balance\u2014it\u2019s just the beginning of the journey.\"})]});export const richText22=/*#__PURE__*/t(o.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Have you started building your RWT bag?\"}),/*#__PURE__*/e(\"p\",{children:\"There has been a lot of excitement around RWT, the native reward token that opens doors to valuable incentives within the ecosystem. But what exactly is RWT, and why should you care about accumulating it? Let\u2019s break it down.\"}),/*#__PURE__*/e(\"h2\",{children:\"What is RWT?\"}),/*#__PURE__*/e(\"p\",{children:\"RWT, or reward tokens, is Humanity Protocol\u2019s testnet token that allows users to earn rewards for referring Humanity Protocol\u2019s testnet to others who successfully reserve their Human ID. It\u2019s designed to incentivize our earliest participants as they onboard others to the platform by inviting them to reserve their unique Human IDs.\"}),/*#__PURE__*/e(\"p\",{children:\"RWT represents your contribution to growing the network and comes with exciting future benefits when the mainnet launches. As we onboard more users to our testnet, we want to ensure our early participants reap the most rewards, and have structured our Genesis and daily rewards to reflect this. RWT are non-transferable, non-fungible, and not tradeable for now.\"}),/*#__PURE__*/e(\"p\",{children:\"For now, you can earn RWT by referring your friends and family to secure their Human IDs and by claiming your daily rewards from the dashboard. There\u2019ll be other quests through which you can earn RWT in the next few weeks.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Here is our reward schedule:\"})}),/*#__PURE__*/e(\"p\",{children:\"The Genesis reward will be issued based on the user number at the time of creating the account. For example, if the user joined as the 101st user, they will earn 10,000 RWT regardless of when they claim the reward. They can claim it at any time.\"}),/*#__PURE__*/e(\"p\",{children:\"Daily rewards are fixed rewards you can claim daily from the dashboard. They are based on the total numbers of humans on the Testnet during the day (00:00 UTC - 23:59 UTC) that you claim your reward.\"}),/*#__PURE__*/e(\"p\",{children:\"Daily rewards will continue to be dependent on the total users at the time of claiming your daily reward. These can be claimed from the dashboard everyday.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"You get 50% of all rewards earned by those who join using your link in perpetuity. So referrals remain the most efficient way to earn RWT.\"})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Genesis Rewards\"})}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"For user number 1 to 10,000: 10,000 RWT\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"For user number 10,001 to 100,000: 1,000 RWT\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"For user number 100,001 to 1,000,000: 250 RWT\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"For user number 1,000,001 to 10,000,000: 120 RWT\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"For user number 10,000,001 to 100,000,000: 60 RWT\\xa0\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"For user number 100,000,001 to 1,000,000,000: 30 RWT\\xa0\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"For user number 1,000,000,001 and higher: 10 RWT\\xa0\\xa0\"})})]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Daily Rewards\"})}),/*#__PURE__*/e(\"ul\",{children:/*#__PURE__*/t(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:[/*#__PURE__*/e(\"p\",{children:\"For when there are the following numbers of users:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"500,000 and fewer: 100 RWT\\xa0\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"500,001 to 1,000,000: 75 RWT\\xa0\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"1,000,001 to 5,000,000: 50 RWT\\xa0\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"5,000,001 to 10,000,000: 25 RWT\\xa0\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"10,000,001 to 50,000,000: 10 RWT\\xa0\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"50,000,001 to 100,000,000: 5 RWT\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"100,000,001 to 500,000,000: 2 RWT\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"500,000,001 and more: 1 RWT\"})})]})]})}),/*#__PURE__*/e(\"h2\",{children:\"Why Should You Accumulate RWT?\"}),/*#__PURE__*/e(\"p\",{children:\"RWT is more than just a testnet token \u2014 it\u2019s your gateway to long-term rewards within Humanity Protocol. Once you collect RWT, you\u2019re securing a stake in future incentives. Here\u2019s why you should start accumulating them now:\"}),/*#__PURE__*/t(\"ol\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"These tokens are just the start\u2014their true potential will unfold with the mainnet launch.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Every time someone joins the testnet using your referral link, you earn RWT. Even better, you receive 50% of all the rewards earned by those who use your link in perpetuity, making your referral network a long-term source of earnings.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Want bragging rights? As you earn RWT, your progress is tracked on the leaderboard, giving you visibility in the community and a chance to rank among the top contributors.\"})})]}),/*#__PURE__*/e(\"h2\",{children:\"How to Accumulate RWT\"}),/*#__PURE__*/e(\"p\",{children:\"Accumulating RWT is simple. To get started, reserve your Human ID on the testnet and generate your unique referral link. Share that link with friends, colleagues, or anyone interested in decentralized identity management. As people join through your link, you\u2019ll earn RWT, and the more referrals you bring in, the more you accumulate.\"}),/*#__PURE__*/e(\"p\",{children:\"The earlier you join and engage, the higher your rewards. So, don\u2019t miss this opportunity to become part of the future of decentralized identity and earn big in the process!\"}),/*#__PURE__*/e(\"h2\",{children:\"Build Your Stash\"}),/*#__PURE__*/e(\"p\",{children:\"RWT is your ticket to a rewarding journey within Humanity Protocol\u2019s testnet. By sharing your referral link, you not only contribute to the project\u2019s growth but also secure early rewards that can lead to big rewards in the future. Ready to get started? Claim your Human ID, start referring, and watch your RWT pile up!\"}),/*#__PURE__*/e(\"h4\",{children:/*#__PURE__*/e(n,{href:\"https://testnet.humanity.org/login\",motionChild:!0,nodeId:\"ae9PFKI02\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"Claim your RWT now\"})})})]});export const richText23=/*#__PURE__*/t(o.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Privacy and security aren\u2019t just nice-to-haves \u2014 Both Web2 and Web3 solutions live and die by protecting their users. To that end, Humanity Protocol introduces zkProofers as a core part of its decentralized identity framework. These nodes are essential in verifying human identities while maintaining privacy, decentralization, and user control, shaping a new standard for online interactions.\"}),/*#__PURE__*/t(\"p\",{children:[\"At the heart of Humanity Protocol\u2019s operations, zkProofers are tasked with verifying identities securely, leveraging \",/*#__PURE__*/e(n,{href:\"https://www.humanity.org/blog/what-is-zero-knowledge-proof-and-how-does-it-protect-my-identity\",motionChild:!0,nodeId:\"ae9PFKI02\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"zero-knowledge proofs\"})}),\" to ensure users\u2019 personal data is kept private. By validating identities without disclosing any personal information, zkProofers address one of the most pressing issues in Web3 and digital identity: maintaining privacy without sacrificing security.\"]}),/*#__PURE__*/e(\"p\",{children:\"Here\u2019s how zkProofers work to ensure that every participant on Humanity Protocol is a verified human, and why you should become a zkProofer when Humanity Protocol launches in the coming months.\"}),/*#__PURE__*/e(\"h3\",{children:/*#__PURE__*/e(\"strong\",{children:\"The Technical Process Behind zkProofers\"})}),/*#__PURE__*/e(\"p\",{children:\"The role of zkProofers extends far beyond simple verification; it\u2019s an intricate, multi-step process designed to ensure security and reliability. First, zkProofers interact with Humanity Protocol\u2019s sequencer, which is responsible for collecting and organizing user transactions. As transactions occur, the sequencer assembles them into blocks and batches, computing each batch\u2019s hash values as a secure representation of the data. The hash values essentially function as digital fingerprints, capturing the unique state of each batch.\"}),/*#__PURE__*/e(\"p\",{children:\"Once organized, these batches enter the authentication phase. Here, the sequencer submits the data and corresponding hash values to the Decentralized Attestation Committee (DAC) \u2014 a key component in Humanity Protocol\u2019s network that further verifies the batch data. DAC nodes play a vital role in independently validating these transactions, preventing centralized gatekeeping. By individually validating the data, each DAC node generates a unique signature endorsing the batch\u2019s integrity.\"}),/*#__PURE__*/e(\"p\",{children:\"Upon validation, the next step involves interaction with Ethereum, which Humanity Protocol uses as an external settlement layer. The sequencer collects the DAC members\u2019 signatures and submits the original batch hash to Ethereum, which acts as an immutable record-keeping system. A designated multi-signature smart contract verifies the signatures against each DAC member, ensuring there\u2019s consensus before finalizing the batch\u2019s legitimacy. This process strengthens Humanity Protocol\u2019s decentralized and tamper-resistant architecture.\"}),/*#__PURE__*/e(\"h3\",{children:/*#__PURE__*/e(\"strong\",{children:\"zkProofers\u2019 Reward System and Benefits\"})}),/*#__PURE__*/t(\"p\",{children:[\"zkProofers play a pivotal role in securing the network and maintaining \",/*#__PURE__*/e(n,{href:\"https://www.humanity.org/blog/what-are-sybil-attacks-and-could-they-ruin-web3\",motionChild:!0,nodeId:\"ae9PFKI02\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"Sybil resistance\"})}),\", which prevents malicious entities from creating fake accounts to manipulate the protocol. In return for their work, zkProofers are compensated with Humanity Protocol\u2019s $HP tokens. This reward mechanism incentivizes zkProofers to uphold the highest standards of verification while creating a trustless, bot-free environment.\"]}),/*#__PURE__*/e(\"p\",{children:\"By staking their rewards or voting in protocol governance, zkProofers contribute to the ongoing growth and decentralization of the Humanity Protocol ecosystem. As nodes committed to ensuring authenticity, zkProofers reinforce the protocol\u2019s mission to put digital identity back into the hands of users.\"}),/*#__PURE__*/e(\"h3\",{children:/*#__PURE__*/e(\"strong\",{children:\"Securing An Extensive Web3 Identity Graph\"})}),/*#__PURE__*/e(\"p\",{children:\"zkProofers are more than just nodes in a network; they\u2019re the backbone of Humanity Protocol\u2019s vision for a privacy-first, secure, and decentralized digital identity. By verifying human identities without compromising user privacy, zkProofers bring us closer to a digital future where individuals retain control of their identity while interacting freely across the internet. As Humanity Protocol continues to expand, zkProofers will remain instrumental in building a trustworthy digital ecosystem.\"}),/*#__PURE__*/e(\"p\",{children:\"Join Humanity Protocol and learn more about how zkProofers are redefining identity verification for a decentralized era.\"})]});export const richText24=/*#__PURE__*/t(o.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[\"Discourse around bot activity is heating up as we move closer to the U.S. presidential election, and bots continue to pose a significant threat to the integrity of online platforms. \",/*#__PURE__*/e(n,{href:\"https://www.nytimes.com/2024/07/09/business/russian-bots-artificial-intelligence-propaganda.html\",motionChild:!0,nodeId:\"ae9PFKI02\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"The New York Times recently published a piece about over 1,000 bot accounts being used to influence public opinions and sway voters\"})}),\".\"]}),/*#__PURE__*/e(\"p\",{children:\"Whether it\u2019s inflating social media engagement, skewing voting results, or launching automated attacks on blockchain networks, bots can undermine trust and transparency in digital ecosystems. Decentralized Identity (DID) can be a key player in the fight against bots.\"}),/*#__PURE__*/e(\"h2\",{children:\"Understanding DID\"}),/*#__PURE__*/e(\"p\",{children:\"DID refers to a self-sovereign identity model where individuals create, own, and manage their identities without relying on centralized authorities like governments, corporations, or social media platforms. It is designed to give individuals complete control over their personal information and credentials, while using decentralized networks for authentication and verification.\"}),/*#__PURE__*/e(\"p\",{children:\"In a DID system, users are issued verifiable credentials that can be presented to third parties for identification purposes. These credentials are stored in secure digital wallets, and instead of revealing excessive personal data, users can provide cryptographic proofs to validate their identity.\"}),/*#__PURE__*/e(\"h2\",{children:\"The Bot Problem\"}),/*#__PURE__*/e(\"p\",{children:\"Bots, which are automated scripts or software programs, can mimic human activity to an extent, but they lack the ability to present verifiable, decentralized identity credentials. The growing presence of bots in digital spaces creates several issues.\"}),/*#__PURE__*/e(\"p\",{children:\"Bots can generate fake accounts that manipulate follower counts, likes, and interactions on social media or blockchain-based platforms. In decentralized systems, a single entity can create multiple fake identities (sybils) to gain unfair advantages in voting systems or consensus mechanisms.\"}),/*#__PURE__*/e(\"h2\",{children:\"How DID Combats Bots\"}),/*#__PURE__*/e(\"p\",{children:\"Decentralized Identity provides a unique solution to the bot problem by introducing an authentication layer that bots simply can\u2019t replicate. DID-based systems, such as Proof of Humanity (PoH), allow users to prove they are real human beings by presenting verifiable credentials issued by trusted sources. Bots, unable to obtain such credentials, would be effectively blocked from participating in platforms requiring DID verification.\"}),/*#__PURE__*/e(\"p\",{children:\"One of the key benefits of DID is the ability to perform identity verification without compromising privacy. By using zero-knowledge proofs or other cryptographic methods, users can prove they are real and unique without exposing personal details, which protects them from being tracked or targeted by malicious bots.\"}),/*#__PURE__*/e(\"p\",{children:\"Platforms integrating DID benefit from higher trustworthiness. Whether it\u2019s a social media platform, a decentralized marketplace, or a DAO (Decentralized Autonomous Organization), DID ensures that interactions happen between verified, real individuals, making the platform more resilient to bot-driven fraud.\"}),/*#__PURE__*/e(\"h2\",{children:\"The Future of DID in Online Integrity\"}),/*#__PURE__*/e(\"p\",{children:\"The fight against bots is ongoing, but DID is a powerful tool in restoring trust to communities online. As decentralized systems and online communities grow, ensuring that every user is a verified, unique human is key to maintaining fairness and transparency.\"}),/*#__PURE__*/e(\"p\",{children:\"By integrating Decentralized Identity solutions, platforms can proactively safeguard against bots while preserving user privacy and autonomy. This represents a critical step toward a more secure, human-centered internet.\"})]});export const richText25=/*#__PURE__*/t(o.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[\"We\u2019re thrilled to announce that Humanity Protocol has hit a major milestone: nearly 150,000 participants have already secured their Human IDs in our rapidly growing \",/*#__PURE__*/e(n,{href:\"https://www.humanity.org/blog/your-time-has-come-the-humanity-protocol-testnet-is-live\",motionChild:!0,nodeId:\"ae9PFKI02\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"testnet\"})}),\"! We\u2019re only a little over a week in, so its not too late to secure your Human ID \",/*#__PURE__*/e(n,{href:\"https://testnet.humanity.org/login\",motionChild:!0,nodeId:\"ae9PFKI02\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"here\"})}),\".\"]}),/*#__PURE__*/e(\"p\",{children:\"We\u2019re already seeing the global demand for a decentralized, secure, and privacy-first approach to digital identity management \u2014 and that\u2019s exactly what Proof of Humanity will be once the testnet is fully rolled out. As we move closer to shaping the future of digital identity, we\u2019re excited to introduce key features that not only reward our early adopters but also allow them to help build the world's largest identity graph from the ground up.\"}),/*#__PURE__*/e(\"p\",{children:\"Here are a few features you can begin using right now:\"}),/*#__PURE__*/e(\"h2\",{children:\"Your Referral Link\"}),/*#__PURE__*/e(\"p\",{children:\"One of the most exciting features of the Humanity Protocol testnet is our unique referral system. Once you secure your Human ID, you\u2019ll receive a personalized referral link. This link is more than just a way to bring your friends, family, and community into the network \u2014 it\u2019s a tool that empowers you to earn rewards as the network expands.\"}),/*#__PURE__*/e(\"p\",{children:\"Every time someone uses your referral link to register their Human ID, that signup is added to your referral counter, which tracks your progress. It\u2019s a simple yet powerful way for early adopters to continually benefit from their involvement, as every new participant you bring onboard strengthens the security and utility of Humanity Protocol\u2019s identity ecosystem.\"}),/*#__PURE__*/e(\"h2\",{children:\"The Referral Counter\"}),/*#__PURE__*/e(\"p\",{children:\"The referral counter is where you can keep track of just how many people have joined Humanity Protocol through your link. It provides a visual tally of your contribution to the network\u2019s growth and serves as a key metric for unlocking rewards. The best part? The rewards don\u2019t stop once someone registers. For every individual who secures their Human ID through your referral, you\u2019ll earn 50% of all the rewards they generate. This creates a perpetual earning system that ensures you benefit as the network grows.\"}),/*#__PURE__*/e(\"h2\",{children:\"Leaderboard\"}),/*#__PURE__*/e(\"p\",{children:\"Do you thrive on competition? \"}),/*#__PURE__*/e(\"p\",{children:\"We\u2019ve added a leaderboard that ranks the top referrers in the community. Updated regularly, the leaderboard lets you see how you stack up against other Human ID holders. Top referrers will enjoy additional recognition and exclusive rewards as the protocol continues to develop. So, not only do you contribute to building a more secure, decentralized identity network, but you also gain a chance to rise to the top and be celebrated for your efforts.\"}),/*#__PURE__*/e(\"p\",{children:\"This milestone of 150,000 participants is just the beginning. With each referral, we\u2019re creating a more robust and secure identity framework for everyone. Secure your Human ID, share your referral link, and be part of this journey with us!\"})]});export const richText26=/*#__PURE__*/t(o.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"We\u2019re rolling our testnet out in three phases:\"})}),/*#__PURE__*/t(\"ol\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Human ID Reservation (you can do this today!)\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Pre-enrollment via our app (this phase will be rolled out in the near future)\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Full enrollment via palm vein verification (this will be the final phase and will be ready after the pre-enrolment phase)\"})})]}),/*#__PURE__*/e(\"p\",{children:\"This is your chance to be part of the future, where Proof of Humanity (PoH) isn't simply an idea but a reality that empowers individuals and protects their identity. The journey starts today with the very first phase: reserving your unique Human ID.\"}),/*#__PURE__*/e(\"h2\",{children:\"Phase 1: Reserve Your Human ID\"}),/*#__PURE__*/e(\"p\",{children:\"Today, you can reserve your Human ID, which will serve as your username and identity across the Humanity Protocol ecosystem.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"This ID is unique to you and will be central to your interactions in the decentralized ecosystem. Whether you're registering for services, verifying your identity, or participating in future dApps built on Humanity Protocol, your Human ID will become your permanent, verifiable credential.\"}),/*#__PURE__*/e(\"p\",{children:\"By reserving your ID now, you\u2019ll be one of the very first participants to claim your space in the ecosystem early, allowing you to be among the first to access future features and rewards \u2014 so don\u2019t miss out on picking the Human ID you want!\"}),/*#__PURE__*/e(\"p\",{children:\"While phases beyond this reservation will open soon, securing your Human ID is the foundation of everything to come.\"}),/*#__PURE__*/e(\"p\",{children:\"You can secure your Human ID using several methods \u2014 Email, Telegram, Twitter, Discord, Google, and MetaMask.\"}),/*#__PURE__*/e(\"img\",{alt:\"\",className:\"framer-image\",height:\"435\",src:\"https://framerusercontent.com/images/yua99MOBumDlGATeyOkum5dJRM.png\",srcSet:\"https://framerusercontent.com/images/yua99MOBumDlGATeyOkum5dJRM.png?scale-down-to=512 512w,https://framerusercontent.com/images/yua99MOBumDlGATeyOkum5dJRM.png?scale-down-to=1024 1024w,https://framerusercontent.com/images/yua99MOBumDlGATeyOkum5dJRM.png 1600w\",style:{aspectRatio:\"1600 / 871\"},width:\"800\"}),/*#__PURE__*/e(\"p\",{children:\"The sign up method you choose will determine how you log into Humanity Protocol each time you use it.\"}),/*#__PURE__*/e(\"p\",{children:\"Once you\u2019ve chosen your preferred sign up and login method, follow the onscreen instructions to set up your Human ID.\"}),/*#__PURE__*/e(\"p\",{children:\"After you\u2019ve secured your Human ID, you\u2019ll get a dedicated referral link that you can share with your friends and family \u2014 this is your key to unlocking airdrops and rewards once the testnet is fully rolled out. The more people you onboard via your link, the more rewards you\u2019ll receive after phase 3!\"}),/*#__PURE__*/e(\"div\",{className:\"framer-text-module\",style:{\"--aspect-ratio\":\"560 / 315\",aspectRatio:\"560 / 315\",height:\"auto\",width:\"100%\"},children:/*#__PURE__*/e(i,{componentIdentifier:\"module:NEd4VmDdsxM3StIUbddO/bZxrMUxBPAhoXlARkK9C/YouTube.js:Youtube\",children:t=>/*#__PURE__*/e(a,{...t,play:\"Off\",shouldMute:!0,thumbnail:\"Medium Quality\",url:\"https://youtu.be/smPos0mJvh8\"})})}),/*#__PURE__*/e(\"h2\",{children:\"What\u2019s Next: A Glimpse at Phase 2 and Beyond\"}),/*#__PURE__*/e(\"h3\",{children:\"Phase 2: Palm Print Registration via the App\"}),/*#__PURE__*/e(\"p\",{children:\"In the second phase of the testnet, Humanity Protocol will roll out a mobile app that allows you to register your palm print. This biometric system adds a layer of privacy and security, verifying your unique identity without revealing sensitive information.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Although this phase is not available just yet, it\u2019s important to keep an eye out for updates so you can register your palm print as soon as phase two launches.\"}),/*#__PURE__*/e(\"h3\",{children:\"Phase 3: Palm Vein Scan on Humanity Devices\"}),/*#__PURE__*/e(\"p\",{children:\"After completing the palm print registration on your own device, the next phase will involve scanning your palm veins on one of Humanity Protocol's devices.\"}),/*#__PURE__*/e(\"p\",{children:\"Why palm veins? Unlike fingerprints, palm veins are nearly impossible to replicate and provide an extra layer of fraud prevention. Completing this phase will not only finalize your identity verification but also open up the doors to unlocking exclusive rewards, such as airdrops (or what we like to call, fairdrops).\"}),/*#__PURE__*/e(\"h3\",{children:\"Claim Airdrops and Unlock Rewards\"}),/*#__PURE__*/e(\"p\",{children:\"Once you\u2019ve completed the first three phases, the rewards begin! Don\u2019t forget to refer your friends and family to unlock a whole host of rewards and airdrops once our testnet is fully rolled out. The more people you onboard, the more rewards you\u2019ll receive.\"}),/*#__PURE__*/e(\"p\",{children:\"Airdrops are just the beginning of the rewards that come with your verified Human ID \u2014 more exciting opportunities will be revealed as the testnet and our ecosystem expands.\"}),/*#__PURE__*/e(\"p\",{children:\"While you can\u2019t claim these rewards just yet, securing your Human ID today ensures that you\u2019ll be among the first to experience the full range of features and rewards when they become available.\"}),/*#__PURE__*/e(\"h2\",{children:\"Be Part of the Future: Start Your Journey Today\"}),/*#__PURE__*/e(\"p\",{children:\"For now, all you need to do is secure your Human ID and refer your friends and family.\"}),/*#__PURE__*/e(\"p\",{children:\"This is an essential phase as we move towards a decentralized future where identity verification is in your control. With Humanity Protocol\u2019s testnet, we\u2019re laying the foundation for a world where human identity, privacy, and digital interaction are reimagined in a secure, decentralized way.\"}),/*#__PURE__*/e(\"p\",{children:\"Stay tuned for future updates as we roll out palm print registration and unlock the full potential of Humanity Protocol.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Your identity is your power \u2014 claim it today.\"}),/*#__PURE__*/e(\"h5\",{children:/*#__PURE__*/e(n,{href:{webPageId:\"augiA20Il\"},motionChild:!0,nodeId:\"ae9PFKI02\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"Reserve your Human ID today\"})})}),/*#__PURE__*/e(\"h2\",{children:\"FAQ\"}),/*#__PURE__*/e(\"h6\",{children:\"Who can secure their Human ID?\"}),/*#__PURE__*/e(\"p\",{children:\"Anyone can! Once you\u2019ve secured your Human ID, be sure to refer your friends and family to do the same with your dedicated referral link. The more people you onboard with your link, the higher your rewards once phase 3 is rolled out.\"}),/*#__PURE__*/e(\"h6\",{children:\"When will phases 2 and 3 roll out?\"}),/*#__PURE__*/e(\"p\",{children:\"Phases 2 and 3 will be rolled out in the near future. Be sure to secure your Human ID and share your referral link to be the first to know when phase 2 is available.\"}),/*#__PURE__*/e(\"h6\",{children:\"How can I collect more rewards after phase 3 of the testnet roll out is complete?\"}),/*#__PURE__*/e(\"p\",{children:\"Share your referral link far and wide! The more people you onboard with your link, the higher your airdrips rewards once phase 3 has rolled out.\"})]});export const richText27=/*#__PURE__*/t(o.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"How Zero-Knowledge Proofs Will Revolutionize Digital ID Management\"}),/*#__PURE__*/e(\"p\",{children:\"Managing our online identities has become a critical challenge in today\u2019s world. We constantly need to prove who we are online \u2014 whether we're logging into our bank accounts, verifying our age for specific services, or proving our credentials for a job application.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"However, current digital ID systems often compromise our privacy by revealing more information than necessary. Enter zero-knowledge proofs (ZKPs), a cryptographic technique poised to revolutionize digital ID management by enhancing privacy, security, and user control.\"}),/*#__PURE__*/e(\"p\",{children:\"At its core, a zero-knowledge proof allows one party (the prover) to prove to another party (the verifier) that they know a specific piece of information, without revealing the information itself. It's like proving you know the password to a system without actually typing it in.\"}),/*#__PURE__*/e(\"h2\",{children:\"The Current State of Digital ID Management\"}),/*#__PURE__*/e(\"p\",{children:\"Today's digital ID systems often operate on an all-or-nothing basis. When you need to prove your identity, you typically have to share your entire ID or a significant portion of it. This approach has several drawbacks:\"}),/*#__PURE__*/t(\"ol\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Privacy concerns: You often reveal more information than necessary for a given transaction.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Security risks: Oversharing personal data increases the risk of identity theft and fraud.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Lack of user control: Once your data is shared, you have little control over how it's used or stored.\"})})]}),/*#__PURE__*/t(\"p\",{children:[\"Humanity Protocol\u2019s \",/*#__PURE__*/e(n,{href:\"https://www.humanity.org/blog/what-is-proof-of-humanity-and-how-does-it-protect-me\",motionChild:!0,nodeId:\"ae9PFKI02\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"Proof of Humanity\"})}),\" solution mitigates these risks by putting control back into the users\u2019 hands. With its ZKP technology, users wouldn\u2019t need to worry about their data being exploited or handled poorly.\"]}),/*#__PURE__*/e(\"h2\",{children:\"How ZKPs Improve Digital ID Management\"}),/*#__PURE__*/e(\"p\",{children:\"Zero-knowledge proofs offer a paradigm shift in how we manage and use digital identities. With ZKPs, you can prove specific attributes about your identity without revealing unnecessary details. For example, you could prove you're over 18 without sharing your exact birthdate or any other information from your ID.\"}),/*#__PURE__*/e(\"p\",{children:\"By minimizing data exposure, ZKPs significantly reduce the risk of identity theft and fraud. Even if a system is compromised, the attacker gains no useful information about the user's identity. ZKPs put users in control of their data. You decide what information to share and when, without relying on a centralized authority to manage your identity.\"}),/*#__PURE__*/e(\"p\",{children:\"ZKPs enable selective disclosure, allowing users to reveal only the specific information required for a given situation. This granular control enhances privacy while still meeting verification requirements.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"As ZKP technologies mature, they could lead to more standardized and interoperable digital ID systems, making it easier for users to manage their identities across various platforms and services.\"}),/*#__PURE__*/e(\"h2\",{children:\"Real-World Applications\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(n,{href:\"https://www.humanity.org/blog/exploring-the-use-cases-of-proof-of-humanity\",motionChild:!0,nodeId:\"ae9PFKI02\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"The potential applications of ZKPs\"})}),\" in digital ID management are vast:\"]}),/*#__PURE__*/t(\"ol\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Age verification: Prove you're of legal age without revealing your birthdate.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Financial services: Demonstrate creditworthiness without sharing your entire financial history.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Professional credentials: Prove you have a specific qualification or certification without revealing your entire educational background.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Government services: Access public services by proving eligibility without sharing unnecessary personal details.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Healthcare: Share relevant medical information with providers without exposing your entire medical history.\"})})]}),/*#__PURE__*/e(\"h2\",{children:\"Challenges and Considerations\"}),/*#__PURE__*/e(\"p\",{children:\"While ZKPs offer tremendous potential, there are challenges to overcome:\"}),/*#__PURE__*/t(\"ol\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Computational complexity: ZKPs can be computationally intensive, potentially impacting system performance.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"User experience: The concept of ZKPs can be difficult for non-technical users to understand, necessitating user-friendly implementations.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Regulatory compliance: Ensuring ZKP-based systems comply with existing regulations and standards.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Adoption and integration: Encouraging widespread adoption and integration with existing systems.\"})})]}),/*#__PURE__*/e(\"h2\",{children:\"The Future of Digital Identity\"}),/*#__PURE__*/e(\"p\",{children:\"As ZKP technology continues to evolve and mature, we can expect to see a fundamental shift in how digital identities are managed and used. The future promises a world where we can interact online with confidence, knowing that our personal information is protected and we have full control over what we share.\"}),/*#__PURE__*/e(\"p\",{children:\"Zero-knowledge proofs represent a powerful tool in the ongoing quest to balance the need for secure identity verification with the right to privacy. As we move forward, ZKPs will play a crucial role in shaping a more private, secure, and user-centric digital identity landscape.\"})]});\nexport const __FramerMetadata__ = {\"exports\":{\"richText3\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText16\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText26\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText1\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText14\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText22\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText12\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText15\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText4\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText7\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText24\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText11\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText2\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText10\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText13\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText17\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText19\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText23\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText5\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText6\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText9\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText8\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText18\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText25\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText27\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText20\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText21\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"__FramerMetadata__\":{\"type\":\"variable\"}}}"],
  "mappings": "mQAAyS,IAAMA,EAAsBC,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAC,yOAAiPE,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,sLAAsL,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kVAA6U,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mBAAmB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4VAAuV,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oSAAoS,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iXAA4W,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wWAAyV,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8BAA8B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gTAA2S,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,4QAAyRE,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,oBAAiCA,EAAEC,EAAE,CAAC,KAAK,qCAAqC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,OAAO,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeC,EAAuBL,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,ubAA6a,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,0FAAqF,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,2EAAsE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qGAAgG,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4vBAA4vB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gRAAgR,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gBAAgB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+TAA+T,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gcAA2b,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oQAAoQ,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qCAAqC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mcAA+a,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0MAA0M,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qCAAqC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iaAAkZ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uRAAuR,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,gCAA6CE,EAAEC,EAAE,CAAC,KAAK,6CAA6C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,MAAM,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeE,EAAuBN,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,qRAAqR,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qIAAqI,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qDAAgD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,ocAA+b,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAEC,EAAE,CAAC,KAAK,0GAA0G,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,WAAW,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,mDAAmD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wWAAwW,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mQAAmQ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAEC,EAAE,CAAC,KAAK,wJAAwJ,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,WAAW,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,8BAA8B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wTAAmT,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yGAAyG,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAEC,EAAE,CAAC,KAAK,+FAA+F,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,WAAW,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,yDAAyD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wZAAwZ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAEC,EAAE,CAAC,KAAK,gJAAgJ,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,WAAW,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,2CAA2C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,ocAAoc,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAEC,EAAE,CAAC,KAAK,wEAAwE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,WAAW,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,gBAAgB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uRAAkR,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wCAAmC,CAAC,CAAC,CAAC,CAAC,EAAeK,EAAuBP,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAC,2EAAmFE,EAAEC,EAAE,CAAC,KAAK,oIAAoI,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,yHAAyH,CAAC,CAAC,CAAC,EAAE,wSAAmS,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,8fAAyf,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0CAA0C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,skBAAikB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+ZAA0Z,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0BAA0B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gOAA2N,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uWAAuW,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gQAAgQ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+QAA+Q,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iBAAiB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mbAAmb,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wHAAwH,CAAC,CAAC,CAAC,CAAC,EAAeM,EAAuBR,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,sRAAsR,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0UAA0U,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iBAAiB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iJAAiJ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yVAAoV,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2BAA2B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gLAA2K,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4MAA4M,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8BAA8B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iIAA4H,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oRAAoR,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qNAAgN,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kNAA6M,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0CAA0C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sXAAiX,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wCAAwC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6TAA6T,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,icAAkb,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uRAAkR,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mJAAmJ,CAAC,CAAC,CAAC,CAAC,EAAeO,EAAuBT,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,6UAA6U,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8IAA8I,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gXAA2W,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,weAA8d,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+CAA+C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kYAA6X,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qiBAAqiB,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0QAA0Q,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yYAAoY,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4BAA4B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iaAAuZ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kHAAkH,CAAC,CAAC,CAAC,CAAC,EAAeQ,EAAuBV,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,wLAAwL,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wMAAwM,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uRAAkR,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6cAA6c,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uCAAuC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kVAAkV,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4IAA4I,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2CAA2C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kZAAkZ,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gBAAgB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yfAAyf,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+CAA+C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mRAAmR,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8JAA8J,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4CAA4C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iPAAiP,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gMAAgM,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qCAAqC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+OAA+O,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uOAAuO,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,WAAW,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uTAAwT,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4JAA4J,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+BAA+B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gSAAgS,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kMAAkM,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kCAAkC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,scAAmdE,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,sBAAmCA,EAAEC,EAAE,CAAC,KAAK,iDAAiD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,MAAM,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeO,EAAuBX,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,6hBAAmhB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mfAAmf,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,2CAAwDE,EAAEC,EAAE,CAAC,KAAK,+FAA+F,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,YAAY,CAAC,CAAC,CAAC,EAAE,wSAAwS,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,6DAA6D,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oEAAiFE,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,EAAE,gbAA2a,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2BAAsB,CAAC,EAAeF,EAAE,KAAK,CAAC,MAAM,CAAC,0BAA0B,QAAQ,sBAAsB,eAAe,2BAA2B,OAAO,6BAA6B,MAAM,0BAA0B,MAAM,EAAE,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,2IAA2I,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qKAAqK,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,kLAAkL,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,6KAA6K,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sRAAsR,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kCAAkC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8YAAyY,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2cAA2c,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iRAAiR,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sSAAsS,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qOAAqO,CAAC,CAAC,CAAC,CAAC,EAAeU,EAAuBZ,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAC,qLAAkME,EAAEC,EAAE,CAAC,KAAK,CAAC,UAAU,WAAW,EAAE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,mBAAmB,CAAC,CAAC,CAAC,EAAE,4OAAkO,CAAC,CAAC,EAAeJ,EAAE,IAAI,CAAC,SAAS,CAAC,+DAA4EE,EAAEC,EAAE,CAAC,KAAK,gFAAgF,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,eAAe,CAAC,CAAC,CAAC,EAAE,+QAA0Q,CAAC,CAAC,EAAeJ,EAAE,KAAK,CAAC,MAAM,CAAC,0BAA0B,QAAQ,sBAAsB,eAAe,2BAA2B,OAAO,6BAA6B,MAAM,0BAA0B,MAAM,EAAE,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,+EAA+E,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,wEAAwE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,uGAAuG,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wCAAwC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,8JAA2KE,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,uCAAuC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,mPAAgQE,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,2CAA2C,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oOAAiPE,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,4CAA4C,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,mMAAgNE,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,mCAAmC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oOAAoO,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oDAAoD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yWAAqV,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+FAA0F,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oFAA+E,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,iCAA8CE,EAAEC,EAAE,CAAC,KAAK,6CAA6C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,MAAM,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeS,EAAuBb,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,+aAA0a,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uiBAA6hB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,+NAA4OE,EAAEC,EAAE,CAAC,KAAK,CAAC,UAAU,WAAW,EAAE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,qBAAqB,CAAC,CAAC,CAAC,EAAE,oSAAoS,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,0fAAgf,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6cAA8b,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iNAAkM,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8YAAqX,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sKAAiK,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qBAAqB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qlBAAskB,CAAC,CAAC,CAAC,CAAC,EAAeY,EAAwBd,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAC,2CAAwDE,EAAEC,EAAE,CAAC,KAAK,CAAC,UAAU,WAAW,EAAE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,yBAAyB,CAAC,CAAC,CAAC,EAAE,0cAAqc,CAAC,CAAC,EAAeJ,EAAE,IAAI,CAAC,SAAS,CAAC,uZAAoaE,EAAEC,EAAE,CAAC,KAAK,iGAAiG,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,4NAA4N,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,8cAA8c,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uXAAuX,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0fAA2e,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,geAAid,CAAC,CAAC,CAAC,CAAC,EAAea,EAAwBf,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAEC,EAAE,CAAC,KAAK,CAAC,UAAU,WAAW,EAAE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,iEAAiE,CAAC,CAAC,CAAC,EAAE,gKAAgK,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,yVAAoV,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,uEAA+EE,EAAEC,EAAE,CAAC,KAAK,CAAC,UAAU,WAAW,EAAE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,mBAAmB,CAAC,CAAC,CAAC,EAAE,yPAAyP,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,qOAAgO,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qMAAgM,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,geAAsd,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iNAA4M,CAAC,CAAC,CAAC,CAAC,EAAec,EAAwBhB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,maAAma,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8dAAyd,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yYAAoY,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,2BAA2B,CAAC,EAAE,uRAAkR,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,EAAE,iRAA4Q,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,2DAA2D,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yJAAyJ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,ycAAyc,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iPAAuO,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+dAA+d,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,8CAA8C,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sbAAib,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gjBAAsiB,CAAC,CAAC,CAAC,CAAC,EAAee,EAAwBjB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,uSAAkS,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,cAAc,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gCAAgC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,iIAA4H,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,kOAAkO,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,+HAA+H,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sCAAsC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kSAAkS,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,2EAA2E,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,kEAAkE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,oEAAoE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,8KAA2LE,EAAEC,EAAE,CAAC,KAAK,gFAAgF,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,eAAe,CAAC,CAAC,CAAC,EAAE,WAAW,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,0BAA0B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gLAA2K,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,uCAAuC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,uEAAuE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sWAA4V,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sCAAsC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2UAAiU,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mKAAyJ,CAAC,CAAC,CAAC,CAAC,EAAegB,EAAwBlB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,gPAA2O,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mQAAmQ,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kCAAkC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,+FAAuGE,EAAEC,EAAE,CAAC,KAAK,CAAC,UAAU,WAAW,EAAE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,mBAAmB,CAAC,CAAC,CAAC,EAAE,mTAAmT,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,opBAAopB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gWAAgW,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wDAAmD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+cAA0c,CAAC,CAAC,CAAC,CAAC,EAAeiB,EAAwBnB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,oDAA+C,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oSAAiTE,EAAEC,EAAE,CAAC,KAAK,CAAC,UAAU,WAAW,EAAE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,mBAAmB,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,8EAAoE,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0CAA0C,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,gBAA6BE,EAAEC,EAAE,CAAC,KAAK,+KAA+K,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,6CAA6C,CAAC,CAAC,CAAC,EAAE,4FAA4F,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,qTAAqT,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uXAAkX,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,sDAA8DE,EAAEC,EAAE,CAAC,KAAK,qHAAqH,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,iCAAiC,CAAC,CAAC,CAAC,EAAE,uUAAuU,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,mGAA8F,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4CAA4C,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oEAAiFE,EAAEC,EAAE,CAAC,KAAK,iFAAiF,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,WAAW,CAAC,CAAC,CAAC,EAAE,WAAW,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,oQAAoQ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2KAA2K,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sCAAsC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mFAA8E,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oUAAoU,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mDAAmD,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,uDAAoEE,EAAEC,EAAE,CAAC,KAAK,uNAAuN,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,SAAS,CAAC,CAAC,CAAC,EAAE,yQAAoQ,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,8SAA8S,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yBAAyB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0RAAqR,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2OAA2O,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sCAAsC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sFAAsF,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wOAAwO,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4BAA4B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sMAA4L,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+EAA+E,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAekB,EAAwBpB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,mVAAmV,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qRAAqR,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wDAAwD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qgBAAqgB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4ZAA4Z,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2dAA2d,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sCAAsC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2QAA2Q,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sUAAsU,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mBAAc,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oRAA+Q,CAAC,EAAeF,EAAE,KAAK,CAAC,MAAM,CAAC,0BAA0B,QAAQ,sBAAsB,eAAe,2BAA2B,OAAO,6BAA6B,MAAM,0BAA0B,MAAM,EAAE,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,kDAAkD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,oDAAoD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,oCAAoC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gNAA2M,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yLAA+K,CAAC,CAAC,CAAC,CAAC,EAAemB,EAAwBrB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,qUAAgU,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6BAA6B,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,4LAAyME,EAAEC,EAAE,CAAC,KAAK,mCAAmC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,SAAS,CAAC,CAAC,CAAC,EAAE,mJAA8I,CAAC,CAAC,EAAeJ,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,iRAAiR,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,uBAAuB,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,iQAAiQ,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8BAA8B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+SAA+S,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kCAAkC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4JAAkJ,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,wMAAgNE,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,oEAA4EA,EAAEC,EAAE,CAAC,KAAK,0BAA0B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,MAAM,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,EAAekB,EAAwBtB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,sRAAiR,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2VAAsV,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,8HAAsIE,EAAEC,EAAE,CAAC,KAAK,CAAC,UAAU,WAAW,EAAE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,mBAAmB,CAAC,CAAC,CAAC,EAAE,0EAA0E,CAAC,CAAC,EAAeJ,EAAE,IAAI,CAAC,SAAS,CAAC,mCAAgDE,EAAEC,EAAE,CAAC,KAAK,wDAAwD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,MAAM,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,yHAA+G,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gDAAgD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sPAAsP,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iLAAkK,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2VAAsV,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uCAAuC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iTAA4S,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8PAAoP,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qJAAsI,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,eAAe,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oXAA+W,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iKAAiK,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wJAA0H,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sCAAsC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4ZAA6Y,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6MAAwM,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2BAA2B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yUAA+T,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qKAA4I,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gBAAgB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iSAAiS,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iLAAiL,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qHAAgH,CAAC,CAAC,CAAC,CAAC,EAAeqB,EAAwBvB,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAC,uHAAoIE,EAAEC,EAAE,CAAC,KAAK,CAAC,UAAU,WAAW,EAAE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,mCAAmC,CAAC,CAAC,CAAC,EAAE,4MAAuM,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,sCAAiC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mIAAmI,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2DAA2D,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,gBAA6BE,EAAEC,EAAE,CAAC,KAAK,4IAA4I,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,iEAAiE,CAAC,CAAC,CAAC,EAAE,qTAA2S,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,sPAA4O,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2BAA2B,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,OAAoBE,EAAEC,EAAE,CAAC,KAAK,+DAA+D,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,SAAS,CAAC,CAAC,CAAC,EAAE,iaAAia,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,0TAAqT,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qBAAqB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iYAAkX,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yZAAoZ,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yCAAoC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wVAAyU,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4NAAwM,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,mCAA2CA,EAAE,SAAS,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAEC,EAAE,CAAC,KAAK,qCAAqC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAsBF,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAesB,EAAwBxB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,oVAAoV,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sCAAsC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yaAA+Z,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0BAA0B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gLAAgL,CAAC,EAAeF,EAAE,KAAK,CAAC,MAAM,CAAC,0BAA0B,QAAQ,sBAAsB,eAAe,2BAA2B,OAAO,6BAA6B,MAAM,0BAA0B,MAAM,EAAE,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAE,oGAAoG,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAE,wHAAmH,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gCAAgC,CAAC,EAAE,gGAAgG,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uQAAkQ,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8BAA8B,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,kQAA0QE,EAAEC,EAAE,CAAC,KAAK,iGAAiG,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,+MAA+M,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,kBAAkB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uNAAkN,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qYAAqY,CAAC,CAAC,CAAC,CAAC,EAAeuB,EAAwBzB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,wcAAmc,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAEC,EAAE,CAAC,KAAK,8GAA8G,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,KAAK,CAAC,CAAC,CAAC,EAAE,gHAAwHF,EAAEC,EAAE,CAAC,KAAK,yFAAyF,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,SAAS,CAAC,CAAC,CAAC,EAAE,0ZAAgZ,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,iBAAiB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mEAAmE,CAAC,EAAeF,EAAE,KAAK,CAAC,MAAM,CAAC,0BAA0B,QAAQ,sBAAsB,eAAe,2BAA2B,OAAO,6BAA6B,MAAM,0BAA0B,MAAM,EAAE,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,0LAAqL,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,kRAA6Q,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uCAAuC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0cAA2b,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iBAAiB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oQAA+P,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qSAAsR,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gJAAsI,CAAC,CAAC,CAAC,CAAC,EAAewB,EAAwB1B,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,yCAAyC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wOAAmO,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,cAAc,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6VAA8U,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2WAA2W,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qOAAgO,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,8BAA8B,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uPAAuP,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yMAAyM,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6JAA6J,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,4IAA4I,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,yCAAyC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,8CAA8C,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,+CAA+C,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,kDAAkD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,2DAA2D,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,8DAA8D,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,0DAA0D,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBF,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAS,CAAcE,EAAE,IAAI,CAAC,SAAS,oDAAoD,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,oCAAoC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,sCAAsC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,wCAAwC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,yCAAyC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,0CAA0C,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,kCAAkC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,mCAAmC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,6BAA6B,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qPAAiO,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,gGAA2F,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,4OAA4O,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,6KAA6K,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uBAAuB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qVAAgV,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oLAA+K,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kBAAkB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0UAAgU,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAEC,EAAE,CAAC,KAAK,qCAAqC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,oBAAoB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeuB,EAAwB3B,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,qZAA2Y,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,6HAAqIE,EAAEC,EAAE,CAAC,KAAK,iGAAiG,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,gQAA2P,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,wMAAmM,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,yCAAyC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uiBAAwhB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0fAA2e,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4iBAAwhB,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,6CAAwC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,0EAAuFE,EAAEC,EAAE,CAAC,KAAK,gFAAgF,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,kBAAkB,CAAC,CAAC,CAAC,EAAE,4UAAuU,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,qTAAgT,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,2CAA2C,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6fAAmf,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0HAA0H,CAAC,CAAC,CAAC,CAAC,EAAe0B,EAAwB5B,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAC,yLAAsME,EAAEC,EAAE,CAAC,KAAK,mGAAmG,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,qIAAqI,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,kRAA6Q,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mBAAmB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6XAA6X,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2SAA2S,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iBAAiB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4PAA4P,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qSAAqS,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0bAAqb,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+TAA+T,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2TAAsT,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uCAAuC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qQAAqQ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8NAA8N,CAAC,CAAC,CAAC,CAAC,EAAe2B,EAAwB7B,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAC,6KAAqLE,EAAEC,EAAE,CAAC,KAAK,yFAAyF,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,SAAS,CAAC,CAAC,CAAC,EAAE,0FAAkGF,EAAEC,EAAE,CAAC,KAAK,qCAAqC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,MAAM,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,mdAA+b,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wDAAwD,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sWAAuV,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yXAA+W,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,khBAAmgB,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,aAAa,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gCAAgC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wcAAmc,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sPAAiP,CAAC,CAAC,CAAC,CAAC,EAAe4B,EAAwB9B,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,qDAAgD,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,+CAA+C,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,+EAA+E,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,2HAA2H,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2PAA2P,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kIAAkI,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mSAAmS,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kQAAmP,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sHAAsH,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oHAA+G,CAAC,EAAeA,EAAE,MAAM,CAAC,IAAI,GAAG,UAAU,eAAe,OAAO,MAAM,IAAI,sEAAsE,OAAO,oQAAoQ,MAAM,CAAC,YAAY,YAAY,EAAE,MAAM,KAAK,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uGAAuG,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4HAAuH,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mUAA+S,CAAC,EAAeA,EAAE,MAAM,CAAC,UAAU,qBAAqB,MAAM,CAAC,iBAAiB,YAAY,YAAY,YAAY,OAAO,OAAO,MAAM,MAAM,EAAE,SAAsBA,EAAE6B,EAAE,CAAC,oBAAoB,sEAAsE,SAASC,GAAgB9B,EAAE+B,EAAE,CAAC,GAAGD,EAAE,KAAK,MAAM,WAAW,GAAG,UAAU,iBAAiB,IAAI,8BAA8B,CAAC,CAAC,CAAC,CAAC,CAAC,EAAe9B,EAAE,KAAK,CAAC,SAAS,mDAA8C,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8CAA8C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uQAAuQ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sKAAiK,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6CAA6C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8JAA8J,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8TAA8T,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kRAAmQ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oLAA+K,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8MAAoM,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iDAAiD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wFAAwF,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gTAAsS,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8HAA8H,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oDAA+C,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAEC,EAAE,CAAC,KAAK,CAAC,UAAU,WAAW,EAAE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,6BAA6B,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,KAAK,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gPAA2O,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oCAAoC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uKAAuK,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mFAAmF,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kJAAkJ,CAAC,CAAC,CAAC,CAAC,EAAegC,EAAwBlC,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,oEAAoE,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yRAA+Q,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8QAA8Q,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yRAAyR,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4CAA4C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4NAA4N,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,6FAA6F,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,2FAA2F,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,uGAAuG,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,4BAAoCE,EAAEC,EAAE,CAAC,KAAK,qFAAqF,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,mBAAmB,CAAC,CAAC,CAAC,EAAE,oMAA0L,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,wCAAwC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2TAA2T,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+VAA+V,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oNAAoN,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qMAAqM,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yBAAyB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAEC,EAAE,CAAC,KAAK,6EAA6E,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,oCAAoC,CAAC,CAAC,CAAC,EAAE,qCAAqC,CAAC,CAAC,EAAeJ,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,+EAA+E,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,iGAAiG,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,0IAA0I,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,kHAAkH,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,6GAA6G,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+BAA+B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0EAA0E,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,4GAA4G,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,2IAA2I,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,mGAAmG,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,kGAAkG,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sTAAsT,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wRAAwR,CAAC,CAAC,CAAC,CAAC,EACtj0IiC,EAAqB,CAAC,QAAU,CAAC,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,SAAW,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,mBAAqB,CAAC,KAAO,UAAU,CAAC,CAAC",
  "names": ["richText", "u", "x", "p", "Link", "motion", "richText1", "richText2", "richText3", "richText4", "richText5", "richText6", "richText7", "richText8", "richText9", "richText10", "richText11", "richText12", "richText13", "richText14", "richText15", "richText16", "richText17", "richText18", "richText19", "richText20", "richText21", "richText22", "richText23", "richText24", "richText25", "richText26", "ComponentPresetsConsumer", "t", "Youtube", "richText27", "__FramerMetadata__"]
}
