{
  "version": 3,
  "sources": ["ssg:https://framerusercontent.com/modules/16RLLbqxysVo0DzErswr/0IqSK72eeoQGVs57Xv05/RxkZ6cAsR-19.js"],
  "sourcesContent": ["import{jsx as e,jsxs as r}from\"react/jsx-runtime\";import{Link as t}from\"framer\";import{motion as n}from\"framer-motion\";import*as i from\"react\";export const richText=/*#__PURE__*/r(i.Fragment,{children:[/*#__PURE__*/r(\"p\",{children:[\"Think of new account fraud as \",/*#__PURE__*/e(\"strong\",{children:\"the digital version of someone sneaking past security with a fake badge.\"}),\" By creating fake accounts using stolen or synthetic identities, fraudsters bypass verification systems and carry out activities like \",/*#__PURE__*/e(\"strong\",{children:\"payment fraud, loyalty program abuse\"}),\", or \",/*#__PURE__*/e(\"strong\",{children:\"large-scale scams\"}),\".\"]}),/*#__PURE__*/r(\"p\",{children:[\"In this article, we\u2019ll break down \",/*#__PURE__*/e(\"strong\",{children:\"the main types of new account fraud\"}),\", reveal how fraudsters operate, and highlight the industries most vulnerable to these attacks. Finally, we\u2019ll share actionable strategies to protect your business from this growing threat.\"]}),/*#__PURE__*/e(\"h2\",{children:\"What are the different types of new account fraud?\"}),/*#__PURE__*/r(\"p\",{children:[\"New account fraud isn\u2019t just one tactic,\",/*#__PURE__*/e(\"strong\",{children:\" it\u2019s a toolbox filled with methods designed to exploit businesses. \"}),\"Here are the most common types and how they work:\"]}),/*#__PURE__*/e(\"h3\",{children:\"1. Identity theft-based fraud\"}),/*#__PURE__*/r(\"p\",{children:[\"This is \",/*#__PURE__*/e(\"strong\",{children:\"the classic \u201Cimpostor\u201D move.\"}),\" Fraudsters steal personal details like names, Social Security numbers, or addresses through phishing, data breaches, or social engineering.\"]}),/*#__PURE__*/r(\"p\",{children:[\"Armed with this information, \",/*#__PURE__*/e(\"strong\",{children:\"they create fake accounts that look legitimate on paper\"}),\" but are used for activities like applying for loans, opening credit lines, or committing financial scams.\"]}),/*#__PURE__*/e(\"h3\",{children:\"2. Synthetic identity fraud\"}),/*#__PURE__*/r(\"p\",{children:[\"Think of this as \",/*#__PURE__*/e(\"strong\",{children:\"a \u201CFrankenstein identity\u201D\"}),\". Fraudsters stitch together real and fake information - like a legitimate Social Security number paired with a made-up name - to create a brand-new identity.\"]}),/*#__PURE__*/r(\"p\",{children:[\"Because synthetic identities are part real, \",/*#__PURE__*/e(\"strong\",{children:\"they often sneak past traditional security checks\"}),\". These fake accounts might quietly build credit histories before suddenly maxing out loans or running up unpaid bills.\"]}),/*#__PURE__*/e(\"h3\",{children:\"3. Account creation bots\"}),/*#__PURE__*/r(\"p\",{children:[\"Automation takes fraud to the next level. \",/*#__PURE__*/e(\"strong\",{children:\"Bots rapidly generate thousands of fake accounts on platforms\"}),\" like e-commerce sites, loyalty programs, or social media.\"]}),/*#__PURE__*/r(\"p\",{children:[\"These fake profiles can flood your system, exploit promotions, manipulate platform metrics, or even commit payment fraud - \",/*#__PURE__*/e(\"strong\",{children:\"all before you have time to react\"}),\".\"]}),/*#__PURE__*/e(\"h2\",{children:\"What is the state of new account fraud?\"}),/*#__PURE__*/r(\"p\",{children:[\"New account fraud is escalating at an alarming rate,\",/*#__PURE__*/e(\"strong\",{children:\" creating significant challenges for businesses across industries. \"}),\"Fraudsters are becoming increasingly sophisticated, exploiting gaps in verification processes and the growing reliance on digital platforms.\"]}),/*#__PURE__*/r(\"p\",{children:[\"Recent \",/*#__PURE__*/e(\"strong\",{children:\"data highlights \"}),\"the severity of the issue:\"]}),/*#__PURE__*/r(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/r(\"p\",{children:[\"In 2023, \",/*#__PURE__*/e(\"strong\",{children:\"fraudulent new account creations accounted for approximately \"}),/*#__PURE__*/e(t,{href:\"https://spycloud.com/blog/cybersecurity-industry-statistics-account-takeover-ransomware-data-breaches-bec-fraud/\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:/*#__PURE__*/e(\"strong\",{children:\"9% of all new accounts\"})})}),\", showcasing how prevalent this tactic has become, \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/r(\"p\",{children:[\"Digital banking is especially at risk, with \",/*#__PURE__*/e(t,{href:\"https://www.transunion.com/report/omnichannel-fraud-report?atvy=%7B%22264995%22%3A%22Experience+B%22%7D\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:/*#__PURE__*/e(\"strong\",{children:\"13.5% of accounts opened in 2023 suspected to be fraudulent\"})})}),\", \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/r(\"p\",{children:[\"According to the \",/*#__PURE__*/e(\"strong\",{children:\"Annual Fraud Report 2024\"}),\", \",/*#__PURE__*/e(t,{href:\"https://www.experian.co.uk/blogs/latest-thinking/fraud-prevention/uk-fraud-and-fincrime-report/\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/r(n.a,{children:[\"more than \",/*#__PURE__*/e(\"strong\",{children:\"1 in 5 businesses\"}),\" consider account opening fraud a significant stress\"]})}),\" on their operations, impacting both their reputation and bottom line, \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/r(\"p\",{children:[\"A report by Experian reveals that \",/*#__PURE__*/e(t,{href:\"https://www.experian.co.uk/blogs/latest-thinking/guide/new-account-opening-fraud/\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/r(n.a,{children:[/*#__PURE__*/e(\"strong\",{children:\"67% of account opening fraud involves third-party fraud\"}),\", while \",/*#__PURE__*/e(\"strong\",{children:\"33% stems from first-party fraud\"})]})}),\", illustrating the diverse methods fraudsters employ.\"]})})]}),/*#__PURE__*/r(\"p\",{children:[\"These statistics underline\",/*#__PURE__*/e(\"strong\",{children:\" an urgent need for businesses to adapt\"}),\". Fraud prevention is no longer optional, it\u2019s essential to maintain trust, protect users, and safeguard operational integrity.\"]}),/*#__PURE__*/e(\"h2\",{children:\"How does new account fraud work?\"}),/*#__PURE__*/r(\"p\",{children:[\"New account fraud follows\",/*#__PURE__*/e(\"strong\",{children:\" a predictable yet effective playbook\"}),\". Fraudsters rely on a series of calculated steps to infiltrate systems and exploit businesses. Here\u2019s how it works:\"]}),/*#__PURE__*/e(\"h3\",{children:\"Step 1: obtaining stolen or fabricated data\"}),/*#__PURE__*/r(\"p\",{children:[\"Fraudsters need \",/*#__PURE__*/e(\"strong\",{children:\"a foundation to build fake accounts\"}),\", and that starts with collecting personal information. This data can come from:\"]}),/*#__PURE__*/r(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Data breaches\"}),\": massive leaks provide a treasure trove of stolen information, such as names, Social Security numbers, and email addresses, \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Social engineering\"}),\": scammers manipulate individuals into willingly sharing sensitive details, often through phishing emails or fake support calls, \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Dark web marketplaces\"}),\": personal data, credentials, and even pre-verified accounts are sold openly, making it easy for fraudsters to acquire what they need.\"]})})]}),/*#__PURE__*/e(\"h3\",{children:\"Step 2: creating fake accounts\"}),/*#__PURE__*/r(\"p\",{children:[\"Once they have the data, fraudsters\",/*#__PURE__*/e(t,{href:\"https://prelude.so/blog/fake-account-creation\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\" set up fake accounts on various platforms\"})}),\". Depending on their strategy, they might:\"]}),/*#__PURE__*/r(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Manually create accounts\"}),\": for smaller, more targeted attacks, fraudsters input stolen or fabricated details themselves, \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Use automated tools\"}),\": bots can quickly create thousands of fake accounts, overwhelming platforms and scaling fraudulent activities.\"]})})]}),/*#__PURE__*/r(\"p\",{children:[\"To make their accounts appear legitimate, they may combine real and fake information, creating \",/*#__PURE__*/e(\"strong\",{children:\"synthetic identities\"}),\". This mix allows them \",/*#__PURE__*/e(\"strong\",{children:\"to bypass many traditional security measures\"}),\", as part of the information - like a valid Social Security number - is authentic.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Step 3: exploiting the accounts\"}),/*#__PURE__*/r(\"p\",{children:[\"With accounts in place, fraudsters move to \",/*#__PURE__*/e(\"strong\",{children:\"the most damaging phase: exploitation\"}),\". Fake accounts can be used for:\"]}),/*#__PURE__*/r(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Financial fraud\"}),\": taking out loans or lines of credit and disappearing without repayment, \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Fraudulent purchases\"}),\": making high-value transactions with no intention of fulfilling payments, \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Payment scams\"}),\": redirecting or stealing funds through manipulated payment systems, \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Abusing loyalty programs\"}),\": exploiting sign-up bonuses or rewards programs for personal gain.\"]})})]}),/*#__PURE__*/r(\"p\",{children:[\"The ability to seamlessly blend real and fake data makes detecting these accounts particularly challenging. \",/*#__PURE__*/e(\"strong\",{children:\"Fraudsters can operate undetected for weeks or months\"}),\", causing significant financial and reputational harm before being identified.\"]}),/*#__PURE__*/e(\"h2\",{children:\"Which industries are targeted by new account fraud ?\"}),/*#__PURE__*/r(\"p\",{children:[\"New account fraud doesn\u2019t discriminate,\",/*#__PURE__*/e(\"strong\",{children:\" it affects businesses across a wide range of industries\"}),\". Fraudsters are opportunists, targeting sectors that offer the highest value with the lowest barriers. Here\u2019s where they strike the hardest:\"]}),/*#__PURE__*/e(\"h3\",{children:\"1. Financial services\"}),/*#__PURE__*/e(\"p\",{children:\"Banks, credit unions, and fintech apps are prime targets for fraudsters looking to exploit high-value opportunities. They create fake accounts to:\"}),/*#__PURE__*/r(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Secure loans or credit lines \"}),\"with no intention of repayment,\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Launder money\"}),\" or commit payment fraud,\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Abuse signup bonuses and promotional offers\"}),\" from digital banking platforms.\"]})})]}),/*#__PURE__*/e(\"p\",{children:\"The financial stakes are high, making this industry a constant target for fraud attempts.\"}),/*#__PURE__*/e(\"h3\",{children:\"2. Telecommunications\"}),/*#__PURE__*/e(\"p\",{children:\"Telecommunications companies, including mobile carriers and VoIP services, face unique challenges from fraudsters. They create fake accounts to:\"}),/*#__PURE__*/r(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Obtain subsidized devices\"}),\" under fraudulent contracts,\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Exploit SIM swaps\"}),\" to gain control of legitimate users\u2019 phone numbers,\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Abuse VoIP services\"}),\" for anonymous calls or scams.\"]})})]}),/*#__PURE__*/e(\"p\",{children:\"With a global reach and reliance on personal data, telecom providers remain on the frontlines of fraud defense.\"}),/*#__PURE__*/e(\"h3\",{children:\"3. E-commerce and retail\"}),/*#__PURE__*/r(\"p\",{children:[\"In the fast-paced world of \",/*#__PURE__*/e(t,{href:\"https://prelude.so/blog/ecommerce-fraud\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"online marketplaces\"})}),\", fraudsters exploit the sheer scale of activity to:\"]}),/*#__PURE__*/r(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Manipulate loyalty programs \"}),\"and signup bonuses,\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Commit fraudulent purchases\"}),\" using stolen payment methods,\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Fake engagement metrics\"}),\" through false user activity.\"]})})]}),/*#__PURE__*/e(\"p\",{children:\"The volume of activity on these platforms makes detecting fraud a constant challenge.\"}),/*#__PURE__*/e(\"h3\",{children:\"4. Travel and hospitality\"}),/*#__PURE__*/e(\"p\",{children:\"Booking platforms, airlines, and loyalty programs are no strangers to fraudulent activity. Fake accounts are used to:\"}),/*#__PURE__*/r(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Exploit promotional offers\"}),\",\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Book and cancel trips\"}),\" for fraudulent refunds or credits,\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Redeem loyalty perks\"}),\" like miles or free upgrades.\"]})})]}),/*#__PURE__*/e(\"p\",{children:\"Fraudsters take advantage of the global nature of this industry to operate undetected.\"}),/*#__PURE__*/e(\"h3\",{children:\"5. Gaming and Social Media\"}),/*#__PURE__*/e(\"p\",{children:\"Online gaming platforms, social networks, and dating apps are increasingly targeted. Fraudsters use fake accounts to:\"}),/*#__PURE__*/r(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Spread spam \"}),\"or phishing links,\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Exploit in-app purchases\"}),\" or virtual currencies,\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Manipulate platform metrics\"}),\", such as engagement or popularity rankings.\"]})})]}),/*#__PURE__*/e(\"p\",{children:\"As digital communities grow, these platforms face a tough balancing act between user experience and fraud prevention.\"}),/*#__PURE__*/r(\"p\",{children:[\"Fraudsters adapt their tactics to exploit the unique vulnerabilities of each industry. By identifying these risks, \",/*#__PURE__*/e(\"strong\",{children:\"businesses can better defend themselves and protect their users \"}),\"from harm.\"]}),/*#__PURE__*/e(\"h2\",{children:\"How to detect new account fraud?\"}),/*#__PURE__*/r(\"p\",{children:[\"Detecting new account fraud is like\",/*#__PURE__*/e(\"strong\",{children:\" piecing together a puzzle\"}),\": the clues are subtle, but with the right tools and approach, \",/*#__PURE__*/e(\"strong\",{children:\"they form a clear picture\"}),\". Fraudsters often try to mask their activities, but businesses can spot red flags by combining systematic analysis and advanced detection methods. Here are \",/*#__PURE__*/e(\"strong\",{children:\"the key steps to effectively detect new account fraud\"}),\":\"]}),/*#__PURE__*/e(\"h3\",{children:\"1. Account details assessment\"}),/*#__PURE__*/e(\"p\",{children:\"One of the first steps in detecting fraud is evaluating the information provided during account creation. Look for:\"}),/*#__PURE__*/r(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Email address reputation\"}),\": verify if the email domain is legitimate or associated with suspicious activity, \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Phone number credibility\"}),\": check whether the phone number is linked to a reliable network or flagged as disposable, \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Accuracy of details\"}),\": inconsistent or incomplete information can indicate a fraudulent attempt.\"]})})]}),/*#__PURE__*/e(\"h3\",{children:\"2. Behavioral assessment\"}),/*#__PURE__*/e(\"p\",{children:\"Analyzing how accounts are created and used can reveal unusual patterns, such as:\"}),/*#__PURE__*/r(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Unusual account creation patterns\"}),\": a sudden spike in new accounts from the same IP address or region, \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Device fingerprinting\"}),\": identifying and flagging suspicious devices or IP addresses associated with multiple accounts, \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Number portability history\"}),\": preventing SIM swap fraud by monitoring recently ported phone numbers, \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Residential proxy detection\"}),\": identifying IP addresses linked to proxy servers often used to mask fraud, \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Fraud scoring\"}),\": using machine learning models to assign a risk score to new accounts based on behavioral data and historical trends.\"]})})]}),/*#__PURE__*/e(\"h3\",{children:\"3. Open-source intelligence (OSINT)\"}),/*#__PURE__*/e(\"p\",{children:\"Cross-referencing account details with publicly available or proprietary databases can uncover discrepancies or known risks:\"}),/*#__PURE__*/r(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Data breach history\"}),\": compare provided phone numbers or emails against databases of leaked information to identify compromised accounts, \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Disposable phone numbers\"}),\": flag and block temporary phone numbers often used by fraudsters to bypass verification systems.\"]})})]}),/*#__PURE__*/e(\"h3\",{children:\"4. Unusual account activity\"}),/*#__PURE__*/e(\"p\",{children:\"Even after account creation, certain behaviors can signal fraud:\"}),/*#__PURE__*/r(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Rapid changes in account behavior\"}),\": large transactions or significant activity shortly after account creation can indicate fraudulent intentions, \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Inconsistent usage patterns\"}),\": accounts that show behavior uncharacteristic of normal users - like logging in from multiple locations within a short time - are strong indicators of potential fraud.\"]})})]}),/*#__PURE__*/e(\"p\",{children:\"By leveraging these methods, businesses can minimize the risk of fraudulent accounts slipping through the cracks. A proactive approach to monitoring and assessment ensures better protection against evolving fraud tactics, keeping both users and platforms secure.\"}),/*#__PURE__*/e(\"h2\",{children:\"How to prevent new account fraud?\"}),/*#__PURE__*/r(\"p\",{children:[\"New account fraud isn\u2019t just about detection -\",/*#__PURE__*/e(\"strong\",{children:\" it\u2019s about stopping it before it starts\"}),\". By implementing strategic measures like seamless verification, multi-factor authentication, and robust KYC checks, businesses can build strong defenses while \",/*#__PURE__*/e(\"strong\",{children:\"keeping the user experience intact\"}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"1. Passive verification\"}),/*#__PURE__*/r(\"p\",{children:[\"Silent, behind-the-scenes checks are one of t\",/*#__PURE__*/e(\"strong\",{children:\"he most effective ways to catch fraud\"}),\" early without disrupting genuine users. This method verifies user information and behavior in real time by analyzing:\"]}),/*#__PURE__*/r(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Email and phone number credibility,\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Device and IP reputation,\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Behavioral anomalies.\"})})]}),/*#__PURE__*/r(\"p\",{children:[\"Tools like user verification APIs, such as \",/*#__PURE__*/e(t,{href:{webPageId:\"nSTrDjT9o\"},motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:/*#__PURE__*/e(\"strong\",{children:\"Prelude Watch API\"})})}),\", can automate these checks, \",/*#__PURE__*/e(\"strong\",{children:\"flagging suspicious activity\"}),\" without adding friction to the account creation process.\"]}),/*#__PURE__*/e(\"h3\",{children:\"2. Multi-Factor Authentication (MFA)\"}),/*#__PURE__*/r(\"p\",{children:[\"Adding an extra layer of security to account creation is essential to prevent unauthorized access. Multi-factor authentication (MFA) verifies\",/*#__PURE__*/e(\"strong\",{children:\" the ownership of critical user details\"}),\", such as phone numbers or addresses, by sending \",/*#__PURE__*/e(t,{href:\"https://prelude.so/blog/sunday-case-study\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"a one-time password (OTP)\"})}),\" to the user.\"]}),/*#__PURE__*/e(\"p\",{children:\"This additional step ensures that even if fraudsters have access to stolen data, they cannot complete the account creation process without the user\u2019s active participation.\"}),/*#__PURE__*/e(\"h3\",{children:\"3. Know Your Customer (KYC) checks\"}),/*#__PURE__*/r(\"p\",{children:[\"For industries handling sensitive data or financial transactions - like banking and fintech - \",/*#__PURE__*/e(\"strong\",{children:\"KYC (Know Your Customer) processes are critical\"}),\". These checks typically involve:\"]}),/*#__PURE__*/r(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Requiring a valid ID document,\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Cross-referencing submitted details with trusted databases,\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Ensuring compliance with regulatory standards.\"})})]}),/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Although KYC checks add a layer of complexity\"}),\", they are crucial for industries where account security and fraud prevention are non-negotiable.\"]}),/*#__PURE__*/r(\"p\",{children:[\"The best way to prevent new account fraud is \",/*#__PURE__*/e(\"strong\",{children:\"to think ahead\"}),\". Combining proactive measures like verification, authentication, and KYC checks helps businesses stop fraud at its source, ensuring platforms stay secure and trustworthy.\\xa0\"]}),/*#__PURE__*/r(\"p\",{children:[\"New account fraud is \",/*#__PURE__*/e(\"strong\",{children:\"a complex and evolving challenge\"}),\", but it\u2019s not insurmountable. By understanding the tactics fraudsters use, identifying key vulnerabilities, and implementing proactive solutions, businesses can protect their platforms and users. Staying vigilant and leveraging the right tools isn\u2019t just about security,\",/*#__PURE__*/e(\"strong\",{children:\" it\u2019s about fostering trust and ensuring long-term success\"}),\" in a digital-first world.\"]}),/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Looking to safeguard your platform against new account fraud? Try \"}),/*#__PURE__*/e(t,{href:\"https://app.prelude.so/sign-up\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:/*#__PURE__*/e(\"strong\",{children:\"Prelude for free\"})})}),/*#__PURE__*/e(\"strong\",{children:\" or \"}),/*#__PURE__*/e(t,{href:\"https://prelude.so/contact\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:/*#__PURE__*/e(\"strong\",{children:\"contact our sales team\"})})}),/*#__PURE__*/e(\"strong\",{children:\" to learn how we can help protect your platform.\"})]})]});export const richText1=/*#__PURE__*/r(i.Fragment,{children:[/*#__PURE__*/r(\"p\",{children:[\"We\u2019re excited to announce the\",/*#__PURE__*/e(\"strong\",{children:\" launch of our mobile SDK\"}),\"s for iOS, Android, and React Native!\\xa0\\xa0\"]}),/*#__PURE__*/e(\"p\",{children:\"With these SDKs, integrating Prelude\u2019s phone number verification API into your mobile apps is easier and faster than ever. Our Mobile SDKs allow you to capture certain device signals that will be reported back to Prelude to help fight fraud. From SMS pumping to synthetic accounts, you can protect your company and users from fraudsters with less effort.\"}),/*#__PURE__*/e(\"h2\",{children:\"Benefits of using our Mobile SDKs\"}),/*#__PURE__*/e(\"p\",{children:\"Here are some key benefits of integrating our mobile SDKs into your app:\"}),/*#__PURE__*/e(\"h3\",{children:\"Better fraud detection\"}),/*#__PURE__*/e(\"p\",{children:\"With our Mobile SDKs, the Prelude API can leverage more than 50 signals to assess the risk score of your users. That\u2019s 10 times more than with our back-end SDKs. These signals include details like device model, application version, battery level or OS version.\"}),/*#__PURE__*/e(\"p\",{children:\"By leveraging more data points, our API can spot and block suspicious activity with even better accuracy. Clients using the Mobile SDK have already reported significant improvements in detecting and preventing fraud.\"}),/*#__PURE__*/e(\"h3\",{children:\"Ease of integration\"}),/*#__PURE__*/e(\"p\",{children:\"With our Mobile SDKs, you can deploy our verification solution for your Android and iOS applications without having to build an integration from scratch.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"No need to manually configure each signal you want to share with Prelude, the SDKs automatically handle signal gathering behind the scenes, so you don\u2019t have to.\"}),/*#__PURE__*/e(\"h2\",{children:\"How our Mobile SDKs work\"}),/*#__PURE__*/e(\"p\",{children:\"Here\u2019s a high level overview of the process:\"}),/*#__PURE__*/e(\"img\",{alt:\"how prelude mobile sdks work\",className:\"framer-image\",height:\"300\",src:\"https://framerusercontent.com/images/2koXmwQ2gJEAWO4jKtWCPuaZ4wk.png\",srcSet:\"https://framerusercontent.com/images/2koXmwQ2gJEAWO4jKtWCPuaZ4wk.png?scale-down-to=512 512w,https://framerusercontent.com/images/2koXmwQ2gJEAWO4jKtWCPuaZ4wk.png?scale-down-to=1024 1024w,https://framerusercontent.com/images/2koXmwQ2gJEAWO4jKtWCPuaZ4wk.png 1200w\",style:{aspectRatio:\"1200 / 600\"},width:\"600\"}),/*#__PURE__*/r(\"ol\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"When a user starts the verification process, the SDK generates a unique dispatch ID.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Your app sends the user\u2019s phone number and dispatch ID to your server, which then forwards it to Prelude using our back-end SDK.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"At the same time, the mobile SDK collects 50+ data signals from the user\u2019s device and sends them to Prelude.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Prelude instantly analyzes the request and calculates a risk score for the user.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"If everything checks out, Prelude\u2019s Verify API sends the OTP. If something looks off, the request gets blocked to prevent fraud.\"})})]}),/*#__PURE__*/e(\"h2\",{children:\"Our Mobile SDKs characteristics\"}),/*#__PURE__*/e(\"p\",{children:\"We know that mobile app developers are looking for seamless, lightweight solutions to improve their phone verification process without compromising on security or user experience. That\u2019s why we built our mobile SDKs with speed and simplicity in mind.\"}),/*#__PURE__*/r(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Available for multiple platforms: iOS, Android and React Native\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Partially Open-Source:\\u2028\\u2028Published under the Apache 2.0 license\\xa0\"})})]}),/*#__PURE__*/e(\"h2\",{children:\"How to start using our Mobile SDKs\"}),/*#__PURE__*/e(\"h3\",{children:\"Prerequisites\"}),/*#__PURE__*/r(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/r(\"p\",{children:[\"A \",/*#__PURE__*/e(t,{href:\"https://app.prelude.so/sign-in\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"Prelude account\"})})]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/r(\"p\",{children:[\"Our \",/*#__PURE__*/e(t,{href:\"https://docs.prelude.so/api-reference/v2/verify/introduction\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"Verify API v2\"})}),\". If you're still using the legacy API V1, you'll need to migrate to the V2. In general matters, it is highly recommended to make this migration!\"]})})]}),/*#__PURE__*/e(\"h3\",{children:\"Join the Beta\"}),/*#__PURE__*/r(\"p\",{children:[\"Our Mobile SDKs are currently in closed beta. \",/*#__PURE__*/e(t,{href:\"mailto:hello@prelude.so\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"Contact us\"})}),\" to apply and retrieve your SDK key.\"]}),/*#__PURE__*/e(\"p\",{children:\"Once you have the key, setting up the SDK is a quick one-step process. For detailed instructions, check out our documentation:\"}),/*#__PURE__*/r(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(t,{href:\"https://docs.prelude.so/guides/ios\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"iOS SDK\"})})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(t,{href:\"https://docs.prelude.so/guides/android\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"Android SDK\"})})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(t,{href:\"https://docs.prelude.so/guides/react-native\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"React Native SDK\"})})})})]}),/*#__PURE__*/e(\"h2\",{children:\"Start verifying users at scale with Prelude\"}),/*#__PURE__*/e(\"p\",{children:\"Signal detection is just the first step of what you\u2019ll be able to achieve with our Mobile SDKs. Our team is working hard on pushing new features to help you create even better onboarding experiences for your users. Stay tuned as it should happen in the following weeks!\"}),/*#__PURE__*/r(\"p\",{children:[\"Ready to reduce fraud and streamline your verification process? \",/*#__PURE__*/e(t,{href:\"https://app.prelude.so/sign-up\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"Start for free with Prelude\"})}),\" or \",/*#__PURE__*/e(t,{href:\"https://prelude.so/contact\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"contact our sales team\"})}),\" to learn more.\"]})]});export const richText2=/*#__PURE__*/r(i.Fragment,{children:[/*#__PURE__*/r(\"p\",{children:[\"SMS verification is essential for businesses today, from securing accounts to preventing fraud. But what happens when SMS becomes the very tool scammers use to drain your resources? Enter \",/*#__PURE__*/e(\"strong\",{children:\"SMS pumping fraud\"}),\", a sophisticated scam that\u2019s costing companies millions each year.\"]}),/*#__PURE__*/r(\"p\",{children:[\"In this guide, we\u2019ll break down \",/*#__PURE__*/e(\"strong\",{children:\"what SMS pumping fraud is\"}),\", how it works, and most importantly, how to protect your business from this growing threat.\"]}),/*#__PURE__*/e(\"h2\",{children:\"What is SMS pumping fraud?\"}),/*#__PURE__*/r(\"p\",{children:[\"SMS pumping is a type of scam where fraudsters generate fake text messages to premium-rate numbers they control to earn money. They either trick people into sending these messages or exploit digital services like OTPs (\",/*#__PURE__*/e(t,{href:\"https://prelude.so/blog/sms-otp-definition\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"one-time passwords\"})}),\") to trigger automated SMS traffic.\"]}),/*#__PURE__*/e(\"p\",{children:\"Fraudsters often work with unethical mobile operators or find ways to hijack SMS routes to drive this fake traffic. Since businesses pay for each SMS they send and customers can unknowingly rack up charges to premium numbers, the financial damage can be significant.\"}),/*#__PURE__*/r(\"p\",{children:[\"Also known as \",/*#__PURE__*/e(\"strong\",{children:\"SMS Toll Fraud\"}),\" or \",/*#__PURE__*/e(\"strong\",{children:\"Artificially Inflated Traffic (AIT)\"}),\", SMS pumping is a form of \",/*#__PURE__*/e(t,{href:\"https://prelude.so/blog/what-is-international-revenue-share-fraud-(irsf)-an-overview\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:/*#__PURE__*/e(\"strong\",{children:\"International Revenue Sharing Fraud (IRSF)\"})})}),\" that impacts both businesses and individuals, with companies facing the biggest financial losses.\"]}),/*#__PURE__*/e(\"h2\",{children:\"How does SMS pumping work?\"}),/*#__PURE__*/r(\"p\",{children:[\"SMS pumping is a sophisticated scam\\xa0 that requires technical expertise and often \",/*#__PURE__*/e(\"strong\",{children:\"the involvement of a \"}),/*#__PURE__*/e(t,{href:\"https://prelude.so/blog/mobile-network-operator\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:/*#__PURE__*/e(\"strong\",{children:\"mobile network operator\"})})}),\", whether knowingly or unknowingly.\"]}),/*#__PURE__*/r(\"p\",{children:[\"Fraudsters start by partnering with unethical carriers or gaining access to \",/*#__PURE__*/e(\"strong\",{children:\"premium-rate numbers\"}),\". They promise these operators high SMS volumes and increased revenue, using international premium-rate numbers (IPRNs) to drive traffic.\\xa0\"]}),/*#__PURE__*/r(\"p\",{children:[\"Once the carrier agrees, the fraudsters flood the system with SMS traffic, typically through digital triggers like OTP requests, account verifications, or two-factor authentication (2FA) codes.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),\"These SMS messages are routed to premium numbers controlled by the fraudsters, usually in foreign countries, inflating the cost for businesses that pay per message. When the victim (a business or individual) receives the inflated bill, the carrier splits the revenue with the fraudsters who orchestrated the attack.\"]}),/*#__PURE__*/e(\"img\",{alt:\"infographic sms pumping fraud\",className:\"framer-image\",height:\"540\",src:\"https://framerusercontent.com/images/8n98lilOAu1bzAMVtyTsrDpO0N4.png\",srcSet:\"https://framerusercontent.com/images/8n98lilOAu1bzAMVtyTsrDpO0N4.png?scale-down-to=512 512w,https://framerusercontent.com/images/8n98lilOAu1bzAMVtyTsrDpO0N4.png?scale-down-to=1024 1024w,https://framerusercontent.com/images/8n98lilOAu1bzAMVtyTsrDpO0N4.png 1080w\",style:{aspectRatio:\"1080 / 1080\"},width:\"540\"}),/*#__PURE__*/r(\"p\",{children:[\"In short, \",/*#__PURE__*/e(\"strong\",{children:\"both the scammers and their rogue partners profit from the fake SMS traffic\"}),\", while the victim is left covering the costs.\"]}),/*#__PURE__*/e(\"h2\",{children:\"Examples of SMS pumping fraud\"}),/*#__PURE__*/e(\"h3\",{children:\"Targeting an individual\"}),/*#__PURE__*/r(\"p\",{children:[\"Lily receives an SMS that says: \",/*#__PURE__*/e(\"em\",{children:\"\u201CCongratulations! You've won a $100 gift card! Reply 'YES' to claim.\u201D\"})]}),/*#__PURE__*/e(\"p\",{children:\"Excited by the offer, Lily replies \u201CYES.\u201D What she doesn\u2019t know is that by replying, she has unknowingly subscribed to a premium SMS service.\"}),/*#__PURE__*/e(\"p\",{children:\"Suddenly, Lily starts receiving frequent messages from a premium-rate number, and she\u2019s being charged for every text received. Her phone bill skyrockets, but she only realizes something is wrong when she sees the unexpected charges.\"}),/*#__PURE__*/e(\"p\",{children:\"Trying to cancel the subscription is a nightmare. She\u2019s forced to jump through hoops: sending more messages (which also cost money), navigating poorly designed websites, or contacting hard-to-reach customer service numbers.\"}),/*#__PURE__*/e(\"h3\",{children:\"Targeting a company\"}),/*#__PURE__*/e(\"p\",{children:\"DopeSocks, a subscription-based luxury clothing retailer, offers customers 15% off their first subscription in exchange for entering their phone number on the website.\"}),/*#__PURE__*/e(\"p\",{children:\"Once a customer enters their phone number, the company sends an SMS with a discount code. It\u2019s a simple strategy to boost signups from interested customers.\"}),/*#__PURE__*/e(\"p\",{children:\"But fraudsters see an opportunity. They use bots to flood the website with thousands of fake phone numbers. Each number triggers an SMS that is routed to a premium-rate number controlled by the scammers.\"}),/*#__PURE__*/r(\"p\",{children:[\"DopeSocks ends up with a huge bill for all those SMS messages \u2014 \",/*#__PURE__*/e(\"strong\",{children:\"but no real customers\"}),\". Every text they sent went to fraudulent numbers, benefiting the scammers while leaving the company to foot the bill.\"]}),/*#__PURE__*/e(\"p\",{children:\"When these messages are sent, they bounce from network to network before reaching their destination. That means there\u2019s no way to detect which network is colluding with the authors of the SMS fraud. In most cases, you never identify the criminal who defrauded your system.\"}),/*#__PURE__*/e(\"h2\",{children:\"How SMS pumping fraud hurts businesses\"}),/*#__PURE__*/r(\"p\",{children:[\"In 2023, 5% of Application-to-Person (\",/*#__PURE__*/e(t,{href:\"https://prelude.so/blog/a2p-sms-guide\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"A2P\"})}),\") SMS were fraudulent. This means more than 20 billion messages were sent by fraudsters! These fraudulent messages cost brands a staggering $6.7 billion globally (\",/*#__PURE__*/e(t,{href:\"https://mobileeurope.co.uk/5-of-application-to-person-smss-were-fraudulent-in-2023/\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"source\"})}),\").\"]}),/*#__PURE__*/e(\"img\",{alt:\"sms pumping fraud statistics\",className:\"framer-image\",height:\"150\",src:\"https://framerusercontent.com/images/kmZRHZ9dkeG24ZXJTNIcKTNR4.png\",srcSet:\"https://framerusercontent.com/images/kmZRHZ9dkeG24ZXJTNIcKTNR4.png?scale-down-to=512 512w,https://framerusercontent.com/images/kmZRHZ9dkeG24ZXJTNIcKTNR4.png?scale-down-to=1024 1024w,https://framerusercontent.com/images/kmZRHZ9dkeG24ZXJTNIcKTNR4.png 1200w\",style:{aspectRatio:\"1200 / 300\"},width:\"600\"}),/*#__PURE__*/r(\"p\",{children:[\"Even the\\xa0\",/*#__PURE__*/e(t,{href:\"https://twitter.com/elonmusk/status/1626996774820024321?lang=en\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"biggest names\\xa0\"})}),\"with huge engineering budgets are not immune to it. For instance, Elon Musk reported that Twitter was getting scammed by phone companies for $60M/year of fake 2FA SMS messages.\"]}),/*#__PURE__*/e(\"p\",{children:\"SMS fraud is widespread and can impact businesses in many ways:\"}),/*#__PURE__*/e(\"h3\",{children:\"1. Immediate financial loss\"}),/*#__PURE__*/e(\"p\",{children:\"This one is the most obvious. Fraudulent SMS traffic leads to massive financial hits. Since businesses pay for every SMS they send, scammers can exploit this to drive up costs by routing messages to premium numbers they control.\"}),/*#__PURE__*/e(\"p\",{children:\"These costs can quickly add up to hundreds of thousands, or even millions. Worse still, if employees or customers fall victim to SMS scams, businesses may be forced to cover the fraudulent charges, creating unexpected and devastating financial liabilities.\"}),/*#__PURE__*/e(\"h3\",{children:\"2. Compromised security and privacy\"}),/*#__PURE__*/e(\"p\",{children:\"SMS pumping doesn\u2019t just impact your budget, it also jeopardizes security and privacy. Fraudsters often use tactics like SIM swapping, phishing, or smishing to gain unauthorized access to sensitive customer data.\"}),/*#__PURE__*/e(\"p\",{children:\"When a business fails to protect this information, the consequences are severe:\"}),/*#__PURE__*/r(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Customer identity theft\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Unauthorized access to company accounts\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Violations of privacy regulations (like GDPR)\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Loss of intellectual property\"})})]}),/*#__PURE__*/e(\"p\",{children:\"Let\u2019s face it: no brand can survive a reputation for poor security, especially in an era where digital privacy concerns are at an all-time high.\"}),/*#__PURE__*/e(\"h3\",{children:\"3. Lower conversion rates\"}),/*#__PURE__*/e(\"p\",{children:\"At first, it might seem like you\u2019re gaining a flood of new users, but don\u2019t be fooled. If your company is targeted by an SMS pumping attack, those signups are fake accounts created by bots \u2014 users who will never convert into paying customers.\"}),/*#__PURE__*/e(\"p\",{children:\"Your user base gets inflated with fake profiles. Your conversion rate plummets while your cost per conversion skyrockets, making it harder to justify marketing spend. Your reporting and analytics become unreliable, and bad data leads to bad decisions.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"In short, fake traffic poisons your performance metrics and makes it impossible to gauge true customer behavior. Without accurate data, your marketing and sales strategies suffer, and you end up wasting time, money, and resources chasing ghosts.\"}),/*#__PURE__*/e(\"h3\",{children:\"4. Saturation of communication channels\"}),/*#__PURE__*/r(\"p\",{children:[\"When fraudsters flood your SMS traffic, it's like an all-you-can-eat buffet for bots. \",/*#__PURE__*/e(\"strong\",{children:\"And your real users are left starving.\"})]}),/*#__PURE__*/e(\"p\",{children:\"A large-scale SMS pumping attack overwhelms your messaging system, clogging it with fake traffic. Your SMS provider gets overloaded, causing delays or even total service interruptions.\"}),/*#__PURE__*/e(\"p\",{children:\"Real users can\u2019t receive critical messages, whether it\u2019s a login code, a payment confirmation, or a password reset. Customers trying to validate their online purchases or financial transactions are left in the dark.\"}),/*#__PURE__*/e(\"p\",{children:\"The result? Frustrated users, abandoned carts, and dwindling trust in your brand. Worse, these delays often hit at the worst times, like peak shopping seasons or crucial app updates.\"}),/*#__PURE__*/e(\"h3\",{children:\"5. Erosion of brand reputation\"}),/*#__PURE__*/e(\"p\",{children:\"Fraud doesn\u2019t just hurt your bottom line, it destroys trust. Whether it's customers or employees, once trust is broken, it\u2019s incredibly difficult to rebuild.\"}),/*#__PURE__*/e(\"p\",{children:\"Customers will stop buying from businesses that can\u2019t keep their data safe, and employees will feel vulnerable if their personal contact details are exposed to scammers. This leads to lost revenue, damaged brand credibility and a decline in customer loyalty and retention.\"}),/*#__PURE__*/e(\"p\",{children:\"Put simply: trust takes years to build and seconds to lose. SMS pumping fraud is one of the quickest ways to dismantle your reputation.\"}),/*#__PURE__*/e(\"h3\",{children:\"6. Added operational costs\"}),/*#__PURE__*/e(\"p\",{children:\"Dealing with the consequences of SMS pumping fraud doesn\u2019t just eat into your financial resources. It will also make huge demands on your employees\u2019 productivity because cybersecurity personnel will have their hands full fixing issues for every fraud victim.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"They also have to investigate each fraudulent charge, manage justifiably irate customers, implement more robust security mechanisms for the future, and, if possible, trigger lawsuits against the fraudsters (if they can be identified).\"}),/*#__PURE__*/e(\"h2\",{children:\"How to detect SMS pumping fraud?\"}),/*#__PURE__*/e(\"p\",{children:\"Fraud prevention is a never-ending game of cat and mouse, and SMS pumping fraud is no exception. However, there are clear warning signs that your business might be under attack. Here's what to look out for:\"}),/*#__PURE__*/e(\"img\",{alt:\"how to detect sms pumping fraud\",className:\"framer-image\",height:\"300\",src:\"https://framerusercontent.com/images/qh9rIQD8pR2CgJQVyqANRuzk.png\",srcSet:\"https://framerusercontent.com/images/qh9rIQD8pR2CgJQVyqANRuzk.png?scale-down-to=512 512w,https://framerusercontent.com/images/qh9rIQD8pR2CgJQVyqANRuzk.png?scale-down-to=1024 1024w,https://framerusercontent.com/images/qh9rIQD8pR2CgJQVyqANRuzk.png 1200w\",style:{aspectRatio:\"1200 / 600\"},width:\"600\"}),/*#__PURE__*/e(\"h3\",{children:\"1. Unexplained spikes in SMS traffic\"}),/*#__PURE__*/e(\"p\",{children:\"Notice a sudden surge in SMS traffic, especially outside of peak hours? That\u2019s a red flag.\"}),/*#__PURE__*/e(\"p\",{children:\"If your OTP requests or SMS messages increase without a matching rise in legitimate user activity or a marketing campaign, it\u2019s likely that fraudsters are behind it.\"}),/*#__PURE__*/e(\"h3\",{children:\"2. SMS messages sent to unusual countries\"}),/*#__PURE__*/e(\"p\",{children:\"If you notice a high volume of SMS messages being sent to countries where your business does not operate or have a significant customer base, it could be a sign of fraudsters exploiting your SMS services.\"}),/*#__PURE__*/e(\"h3\",{children:\"3. Sequential or patterned phone numbers\"}),/*#__PURE__*/e(\"p\",{children:\"If the phone numbers requesting OTPs look suspiciously similar or follow sequential patterns (e.g., +1234567801, +1234567802, +1234567803), this isn\u2019t just a coincidence.\"}),/*#__PURE__*/e(\"p\",{children:\"Bots often use automated number lists to request OTPs, so spotting these patterns is a clear sign of SMS pumping fraud.\"}),/*#__PURE__*/e(\"h3\",{children:\"4. Lower conversion rates\"}),/*#__PURE__*/e(\"p\",{children:\"SMS pumping fraud can be reflected by your conversion rates. Once fraudsters receive the OTP SMS, they won\u2019t bother following through with it since they already got what they wanted.\"}),/*#__PURE__*/e(\"p\",{children:\"If you notice a drop in conversion rate (overall or in a specific country), it\u2019s a strong indicator that fraudulent traffic is inflating your user base without delivering real value.\"}),/*#__PURE__*/e(\"h3\",{children:\"5. Customer complaints about delays\"}),/*#__PURE__*/e(\"p\",{children:\"Fraudsters clogging your SMS system can cause delays for real users trying to receive their verification codes.\"}),/*#__PURE__*/e(\"p\",{children:\"If your customer support team starts receiving complaints about slow OTP deliveries, your system may be overloaded with fake requests.\"}),/*#__PURE__*/e(\"h3\",{children:\"6. Your SMS budget is leaking\"}),/*#__PURE__*/e(\"p\",{children:\"Finally, if your SMS budget drains faster than usual or your monthly bill skyrockets without any corresponding increase in user activity, your company has certainly paid fraudsters for a nice holiday.\"}),/*#__PURE__*/e(\"h2\",{children:\"How to prevent SMS pumping fraud?\"}),/*#__PURE__*/e(\"p\",{children:\"Detecting SMS pumping is a first step in the right direction. But now you're probably wondering \\\"How do I prevent fraud before it impacts my bill?\u201D\"}),/*#__PURE__*/e(\"p\",{children:\"Here are some ways you can prevent fraud to protect your company and your users.\"}),/*#__PURE__*/e(\"h3\",{children:\"1. Set a daily balance limit with your provider\"}),/*#__PURE__*/e(\"p\",{children:\"One of the most used ways to prevent SMS pumping fraud is by implementing rate limiting. This involves setting a cap on daily message volume or spending thresholds.\"}),/*#__PURE__*/e(\"p\",{children:\"For instance, you could establish a policy that your SMS spend should never exceed $300 per day for OTP verifications and SMS-based authentications. This safeguard prevents you from getting hit with a shocking bill at the end of the month or year.\"}),/*#__PURE__*/e(\"p\",{children:\"However, handle this carefully. While rate limiting can block fraudulent activity, it can also trigger false positives, preventing genuine users from completing their transactions, especially if your app experiences an unexpected surge in real traffic. Regular monitoring and adjusting limits in line with growth is key to striking the right balance between security and user experience.\"}),/*#__PURE__*/e(\"h3\",{children:\"2. Build a block list\"}),/*#__PURE__*/e(\"p\",{children:\"Creating a manual block list allows you to flag and block users you\u2019ve identified as fraudulent. However, this approach comes with a major downside: it\u2019s reactive, not proactive. You\u2019re essentially shutting the door after the fraudster has already stepped in, and maintaining the list can be time-consuming.\"}),/*#__PURE__*/e(\"h3\",{children:\"3. Block specific countries\"}),/*#__PURE__*/e(\"p\",{children:\"Another option is to block SMS traffic to specific countries, especially if your business doesn\u2019t operate there.\\xa0\"}),/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"But proceed with caution.\"}),\" This method can frustrate legitimate users in those regions and may result in lost business opportunities. Unless you have strong data indicating fraud from a specific country, we don\u2019t recommend country bans. Precision is key.\"]}),/*#__PURE__*/e(\"h3\",{children:\"4. Use Prelude Verify API\"}),/*#__PURE__*/e(\"p\",{children:\"Built directly within our OTP API, our fraud prevention system uses an adaptive machine learning algorithm to assess real-time risk for each login attempt.\"}),/*#__PURE__*/e(\"p\",{children:\"Prelude assesses risk signals for every OTP request \u2014 drawing from a vast database of phone numbers and fraudulent activity patterns.\"}),/*#__PURE__*/e(\"p\",{children:\"For each login or authentication attempt, the system combines your user data with our risk insights to flag suspicious behavior. This means detecting bots, spam, and fraud attempts before they cause damage, without interrupting your genuine users.\"}),/*#__PURE__*/e(\"p\",{children:\"If we identify suspicious users, we take immediate action by blocking those numbers, preventing your business from sending any further messages to them. This means no more interactions with fake users and no more money wasted on fraudulent SMS traffic.\"}),/*#__PURE__*/e(\"p\",{children:\"For example, we helped our customer BeReal to reduce its fraudulent traffic by 95%, resulting in a 75% reduction in its SMS verification costs.\"}),/*#__PURE__*/e(\"h4\",{children:\"Example of a blocked SMS pumping attack\"}),/*#__PURE__*/e(\"p\",{children:\"Here\u2019s an example of an attack we recently blocked on one of our customers, a European foodtech company.\\xa0\"}),/*#__PURE__*/e(\"img\",{alt:\"example of sms pumping attack\",className:\"framer-image\",height:\"150\",src:\"https://framerusercontent.com/images/nojjdYcGwxjj6oK9XsoNoErrDo.png\",srcSet:\"https://framerusercontent.com/images/nojjdYcGwxjj6oK9XsoNoErrDo.png?scale-down-to=512 512w,https://framerusercontent.com/images/nojjdYcGwxjj6oK9XsoNoErrDo.png?scale-down-to=1024 1024w,https://framerusercontent.com/images/nojjdYcGwxjj6oK9XsoNoErrDo.png 1200w\",style:{aspectRatio:\"1200 / 300\"},width:\"600\"}),/*#__PURE__*/e(\"p\",{children:\"The attack originated from phone numbers registered in the United Kingdom, one of the markets in which our customer operates. While the location wasn\u2019t an immediate red flag, our advanced algorithm flagged an anomaly: dozens of numbers within the same range were showing suspiciously low conversion rates.\"}),/*#__PURE__*/e(\"p\",{children:\"Thanks to this early detection, we were able to proactively block these numbers before the attack gained momentum. The fraudulent activity continued for several days, but as soon as the fraudsters realized it wasn\u2019t succeeding, they abandoned the attack.\"}),/*#__PURE__*/e(\"p\",{children:\"In the end, we prevented a volume of fraudulent messages nearly equivalent to our customer\u2019s entire normal monthly traffic, saving them several thousand dollars that would have been lost to the attack.\"}),/*#__PURE__*/e(\"h2\",{children:\"How does Prelude help with SMS pumping?\"}),/*#__PURE__*/e(\"p\",{children:\"Prelude protects your business from SMS pumping by detecting and blocking fraudulent OTP requests in real time. Our Verify API uses machine learning to analyze phone numbers, flag suspicious patterns, and stop fake traffic before it reaches your SMS provider.\"}),/*#__PURE__*/e(\"p\",{children:\"Through open-source intelligence, strategic partnerships and R&D, we continuously update our blocklist of known fraudulent numbers, preventing you from sending SMS to scammers and ensuring you only pay for legitimate users.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"If any suspicious activity is detected, we block the interaction instantly, helping you avoid unexpected SMS bills and keep your conversion rates high.\"}),/*#__PURE__*/e(\"p\",{children:\"With Prelude, you get proactive fraud prevention without disrupting the experience of real users.\"}),/*#__PURE__*/r(\"p\",{children:[\"If you\u2019re ready to protect your business from SMS fraud, \",/*#__PURE__*/e(t,{href:\"https://app.prelude.so/sign-in\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:/*#__PURE__*/e(\"strong\",{children:\"sign up for free\"})})}),\" and start testing Prelude\u2019s API today \u2014 no credit card required!\"]}),/*#__PURE__*/r(\"p\",{children:[\"Have questions? \",/*#__PURE__*/e(t,{href:{webPageId:\"AJeysDBnf\"},motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:/*#__PURE__*/e(\"strong\",{children:\"Our sales team is here to help.\"})})}),\" Whether you need more details about SMS fraud prevention or want to explore how Prelude can fit your business needs, we\u2019ve got you covered.\"]})]});export const richText3=/*#__PURE__*/r(i.Fragment,{children:[/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Ecommerce fraud \"}),\"poses \",/*#__PURE__*/e(\"strong\",{children:\"a significant threat in today\u2019s digital marketplace\"}),\". As online shopping expands, fraudsters have developed increasingly sophisticated methods to exploit vulnerabilities, from fake transactions to stolen payment details. \",/*#__PURE__*/e(\"strong\",{children:\"Fraudulent activities continue to rise\"}),\", with the e-commerce fraud detection and prevention market forecast \",/*#__PURE__*/e(t,{href:\"https://www.statista.com/statistics/1273278/market-size-e-commerce-fraud-detection-prevention-market/\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"to more than double between 2023 and 2027, exceeding $100 billion\"})}),\". These attacks disrupt not only finances but also customer trust and business reputation.\"]}),/*#__PURE__*/r(\"p\",{children:[\"The consequences of fraud can be severe from revenue loss to chargeback penalties. For businesses, \",/*#__PURE__*/e(\"strong\",{children:\"understanding the types of fraud and implementing effective defenses is crucial\"}),\". In this article, we\u2019ll break down key types of ecommerce fraud, highlight warning signs, and share strategies to safeguard your platform. Whether you\u2019re a startup or a well-established marketplace, \",/*#__PURE__*/e(\"strong\",{children:\"protecting your platform is essential to ensuring security\"}),\" and customer confidence.\"]}),/*#__PURE__*/e(\"h2\",{children:\"What are the 8 most common types of ecommerce fraud?\"}),/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Ecommerce fraud comes in many forms\"}),\", each targeting vulnerabilities in online systems. Whether it\u2019s exploiting return policies or testing stolen credit cards, fraudsters are constantly evolving their tactics. Below, we break down \",/*#__PURE__*/e(\"strong\",{children:\"the most common types of ecommerce fraud \"}),\"and how they affect businesses.\"]}),/*#__PURE__*/e(\"h3\",{children:\"1. Chargeback fraud\"}),/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Chargeback fraud, also known as \u201Cfriendly fraud\u201D\"}),\", occurs when a customer disputes a legitimate transaction, often claiming they never received the product or didn\u2019t authorize the payment.\"]}),/*#__PURE__*/r(\"p\",{children:[\"Businesses face financial losses from refunding the transaction and paying chargeback fees, \",/*#__PURE__*/e(\"strong\",{children:\"not to mention reputational damage with payment providers.\"})]}),/*#__PURE__*/e(\"p\",{children:\"It\u2019s like dining at a restaurant, enjoying the meal, and later demanding a refund by claiming the food never arrived. The merchant ends up footing the bill twice - once for the service and again for the refund.\"}),/*#__PURE__*/r(\"p\",{children:[\"Chargeback fraud is a growing problem. It is estimated that 2023 saw \",/*#__PURE__*/e(t,{href:\"https://www.paymentscardsandmobile.com/wp-content/uploads/2023/10/2023-Chargeback-Outlook-Report.pdf\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"238 million chargebacks globally\"})}),\", with that number expected \",/*#__PURE__*/e(\"strong\",{children:\"to rise to 337 million by 2026, a 42% increase. \"}),\"On average, \",/*#__PURE__*/e(t,{href:\"https://www.clearlypayments.com/blog/chargeback-statistics-in-credit-card-processing/\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"chargebacks impact 6 in every 1,000 transactions\"})}),\", which highlights the widespread nature of the issue.\"]}),/*#__PURE__*/e(\"h3\",{children:\"2. Return fraud\"}),/*#__PURE__*/r(\"p\",{children:[\"Return fraud exploits refund and exchange policies. Fraudsters may return stolen merchandise, counterfeit items, or even empty boxes, claiming refunds or replacements. \",/*#__PURE__*/e(\"strong\",{children:\"This type of fraud disproportionately affects businesses with flexible return policies.\"})]}),/*#__PURE__*/r(\"p\",{children:[\"For example, fraudsters might purchase high-end clothing for a one-time event and then return it as \u201Cunused.\u201D Others might take advantage of lenient policies \",/*#__PURE__*/e(\"strong\",{children:\"to replace broken items with cheaper knockoffs.\"})]}),/*#__PURE__*/r(\"p\",{children:[\"In fact, return fraud is particularly rampant in the retail industry. Retailers estimate that \",/*#__PURE__*/e(t,{href:\"https://www.cnbc.com/2024/01/29/retail-return-fraud-is-rising-as-key-holiday-deadline-approaches.html\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"13.7% of returns, or $101 billion worth, were fraudulent last year (2023),\"})}),\" according to a survey by Appriss Retail and the National Retail Federation. The share of returns expected to be fraudulent during the peak holiday season was even higher, \",/*#__PURE__*/e(\"strong\",{children:\"at 16.5%, or $24.5 billion worth.\"})]}),/*#__PURE__*/e(\"h3\",{children:\"3. Account Takeover fraud (ATO)\"}),/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(t,{href:\"https://prelude.so/blog/account-takeover-fraud\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"Account takeover\"})}),\" fraud occurs when hackers gain unauthorized access to customer accounts through stolen credentials, phishing attacks, or credential stuffing. Once inside, \",/*#__PURE__*/e(\"strong\",{children:\"they can make purchases, withdraw funds, or steal personal data.\"})]}),/*#__PURE__*/e(\"p\",{children:\"Imagine someone stealing the keys to your house, not only can they take your belongings, but they can also change the locks to keep you out entirely. For businesses, this often means refunding fraudulent purchases and managing angry customers.\"}),/*#__PURE__*/r(\"p\",{children:[\"Studies show that around \",/*#__PURE__*/e(t,{href:\"https://abnormalsecurity.com/blog/account-takeover-statistics\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"26% of companies face ATO attempts on a weekly basis\"})}),\", highlighting the persistent and frequent nature of these attacks.\"]}),/*#__PURE__*/e(\"h3\",{children:\"4. Online payment fraud\"}),/*#__PURE__*/r(\"p\",{children:[\"Online payment fraud occurs when cybercriminals use stolen credit card or payment details to make unauthorized purchases. \",/*#__PURE__*/e(\"strong\",{children:\"It\u2019s one of the most widespread forms of ecommerce fraud\"}),\", often exploiting weak payment security systems.\\xa0\"]}),/*#__PURE__*/r(\"p\",{children:[\"Fraudsters might buy high-value items that are easy to resell, leaving businesses to deal with disputes, chargebacks, and inventory losses. Strengthening payment gateways and \",/*#__PURE__*/e(\"strong\",{children:\"adding authentication layers can help mitigate this risk.\"})]}),/*#__PURE__*/r(\"p\",{children:[\"For instance, in the UK, \",/*#__PURE__*/e(t,{href:\"https://risk.lexisnexis.com/insights-resources/research/global-state-of-fraud-and-identity\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"75% of retailers reported a decrease in online payment fraud\"})}),\" after the implementation of Strong Customer Authentication (SCA), highlighting the effectiveness of robust security measures in reducing fraud.\"]}),/*#__PURE__*/e(\"h3\",{children:\"5. Card testing fraud\"}),/*#__PURE__*/r(\"p\",{children:[\"Card testing fraud occurs when criminals test stolen credit card details \",/*#__PURE__*/e(\"strong\",{children:\"by making small transactions\"}),\". Once they confirm the card works, they escalate to larger purchases, often draining accounts before detection.\"]}),/*#__PURE__*/r(\"p\",{children:[\"Think of it as a burglar testing locks in a neighborhood before deciding which houses to break into. The initial tests may go unnoticed, but \",/*#__PURE__*/e(\"strong\",{children:\"the consequences can be devastating when larger amounts are stolen.\"})]}),/*#__PURE__*/e(\"h3\",{children:\"6. Bonus abuse fraud (promo, affiliate, or loyalty abuse)\"}),/*#__PURE__*/r(\"p\",{children:[\"Bonus abuse targets promotional programs, referral systems, or loyalty points. \",/*#__PURE__*/e(\"strong\",{children:\"Fraudsters create multiple fake accounts\"}),\" to claim discounts, rewards, or referral bonuses repeatedly.\"]}),/*#__PURE__*/r(\"p\",{children:[\"For instance, someone might open dozens of fake accounts \",/*#__PURE__*/e(\"strong\",{children:'to exploit a \"first-order discount\" multiple times.'}),\" While each instance may seem small, these actions accumulate, leading to substantial losses for businesses.\"]}),/*#__PURE__*/e(\"h3\",{children:\"7. Triangulation fraud\"}),/*#__PURE__*/r(\"p\",{children:[\"Triangulation fraud involves \",/*#__PURE__*/e(\"strong\",{children:\"a three-step scheme:\"})]}),/*#__PURE__*/r(\"ol\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/r(\"p\",{children:[\"Fraudsters list products at discounted prices on legitimate marketplaces or websites, \",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/r(\"p\",{children:[\"When buyers place orders, the fraudsters use stolen credit card information to purchase the products from another retailer, \",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"The items are shipped directly to the unsuspecting buyer, leaving the actual cardholder and the original retailer to deal with the fraud.\"})})]}),/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"This creates a web of confusion \"}),\"where victims may not even realize fraud has occurred until charges show up on their accounts.\"]}),/*#__PURE__*/e(\"h3\",{children:\"8. Inventory fraud (for marketplaces)\"}),/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Inventory fraud manipulates stock levels or product availability data\"}),\" to create false scarcity or demand. Fraudsters might also sell non-existent products, leaving buyers with empty orders and businesses facing reputational damage.\"]}),/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"It\u2019s like hosting an auction for items that don\u2019t exist \"}),\"- buyers bid, pay, and leave empty-handed, while sellers vanish with the proceeds. This type of fraud undermines trust in online marketplaces.\"]}),/*#__PURE__*/r(\"p\",{children:[\"Ecommerce fraud is constantly evolving, targeting businesses through both sophisticated and opportunistic schemes. From exploiting return policies to testing stolen cards,\",/*#__PURE__*/e(\"strong\",{children:\" fraudsters are always looking for weak spots.\"})]}),/*#__PURE__*/r(\"p\",{children:[\"Understanding these different types of fraud is \",/*#__PURE__*/e(\"strong\",{children:\"the first step in strengthening defenses and creating safer shopping experiences for customers. \"}),\"Businesses need to stay proactive, adopting tools like multi-factor authentication, real-time verification, and secure payment gateways to minimize risks.\"]}),/*#__PURE__*/e(\"h2\",{children:\"How to identify ecommerce fraud?\"}),/*#__PURE__*/r(\"p\",{children:[\"Detecting ecommerce fraud early is \",/*#__PURE__*/e(\"strong\",{children:\"crucial to protecting your business from losses. \"}),\"Fraudulent activities often leave behind subtle warning signs, red flags that, when recognized, can help businesses act before damage occurs. \"]}),/*#__PURE__*/r(\"p\",{children:[\"Here\u2019s \",/*#__PURE__*/e(\"strong\",{children:\"how to spot potential ecommerce fraud:\"})]}),/*#__PURE__*/e(\"h3\",{children:\"Inconsistent order data\"}),/*#__PURE__*/r(\"p\",{children:[\"Mismatched billing and shipping addresses, \",/*#__PURE__*/e(\"strong\",{children:\"incomplete contact information, or discrepancies in customer details\"}),\" can signal fraudulent behavior. For example, an order with a billing address in one country and a shipping address in another may warrant additional checks.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Larger than average orders\"}),/*#__PURE__*/r(\"p\",{children:[\"Fraudsters often make unusually large purchases\",/*#__PURE__*/e(\"strong\",{children:\" to maximize gains before detection\"}),\". These orders may include high-ticket items or bulk quantities, which stand out compared to typical customer behavior.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Unusual location or IP address changes\"}),/*#__PURE__*/r(\"p\",{children:[\"Sudden changes in a user\u2019s location, especially from regions known for high fraud rates, can indicate account compromise.\",/*#__PURE__*/e(\"strong\",{children:\" Monitoring IP address shifts during checkout can help detect suspicious activity.\"})]}),/*#__PURE__*/e(\"h3\",{children:\"Orders from unusual countries\"}),/*#__PURE__*/r(\"p\",{children:[\"Transactions originating from countries where your business doesn\u2019t typically operate may be a red flag. \",/*#__PURE__*/e(\"strong\",{children:\"Fraudsters often use VPNs or proxies to obscure their real location\"}),\", making geographic anomalies important to investigate.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Many transactions in a short timeframe\"}),/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Multiple purchases within minutes or hours\"}),\" could indicate card testing fraud or automated attacks. Legitimate customers rarely \",/*#__PURE__*/e(\"strong\",{children:\"make consecutive transactions in quick succession.\"})]}),/*#__PURE__*/e(\"h3\",{children:\"Multiple orders from different credit cards\"}),/*#__PURE__*/r(\"p\",{children:[\"Receiving several orders linked to different credit cards but using the same IP address, shipping address, or account can be a sign of stolen card usage. \",/*#__PURE__*/e(\"strong\",{children:\"Fraudsters often test stolen card details to identify valid ones.\"})]}),/*#__PURE__*/e(\"h3\",{children:\"Changes in account information\"}),/*#__PURE__*/r(\"p\",{children:[\"Sudden updates to email addresses, passwords, or shipping information, especially right before placing an order, \",/*#__PURE__*/e(\"strong\",{children:\"can indicate account takeover fraud. \"}),\"Monitoring account changes helps detect unauthorized access early.\"]}),/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Fraudulent activity often leaves subtle traces\"}),\", from unusual orders to sudden account changes. Recognizing these red flags early enables businesses to act quickly, minimizing risks and protecting their platforms from costly attacks.\"]}),/*#__PURE__*/e(\"h2\",{children:\"How to prevent ecommerce fraud?\"}),/*#__PURE__*/r(\"p\",{children:[\"Preventing ecommerce fraud requires\",/*#__PURE__*/e(\"strong\",{children:\" a proactive, multi-layered approach\"}),\". By combining technology and best practices, businesses can create stronger defenses against fraudulent activities. Below are \",/*#__PURE__*/e(\"strong\",{children:\"some effective strategies to protect your platform and customer data\"}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"1. Use Multi-Factor Authentication (MFA)\"}),/*#__PURE__*/r(\"p\",{children:[\"Adding \",/*#__PURE__*/e(\"strong\",{children:\"multi-factor authentication (MFA)\"}),\" is like installing multiple locks on your front door: it forces fraudsters to break through several layers of security instead of just one.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"strong\",{children:/*#__PURE__*/e(\"br\",{})}),\"MFA requires users to verify their identity through multiple steps. For example, after entering a password, they might need to input \",/*#__PURE__*/e(t,{href:\"https://prelude.so/blog/otp-best-practices\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"a one-time password (OTP)\"})}),\" sent via SMS.\"]}),/*#__PURE__*/r(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"SMS verification codes\"}),\" provide an extra layer of security by linking authentication to a physical device (the user\u2019s phone), making it harder for attackers to gain access, \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"It also deters bots and automated attacks by requiring manual input of the verification code.\"})})]}),/*#__PURE__*/e(\"p\",{children:\"This approach helps protect sensitive accounts, especially those with saved payment information or personal data.\"}),/*#__PURE__*/e(\"h3\",{children:\"2. Real-time phone number verification\"}),/*#__PURE__*/r(\"p\",{children:[\"Fraudsters often rely on \",/*#__PURE__*/e(\"strong\",{children:\"temporary or stolen phone numbers\"}),\" to bypass security checks. Real-time phone number verification acts as a \",/*#__PURE__*/e(\"strong\",{children:\"gatekeeper\"}),\", ensuring that users are who they claim to be:\\xa0\"]}),/*#__PURE__*/r(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"It verifies phone numbers instantly, blocking suspicious or disposable numbers before they can be used, \"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/r(\"p\",{children:[\"It\u2019s particularly useful for preventing \",/*#__PURE__*/e(\"strong\",{children:\"account takeover fraud\"}),\" and \",/*#__PURE__*/e(\"strong\",{children:\"card testing fraud\"}),\".\"]})})]}),/*#__PURE__*/r(\"p\",{children:[\"By integrating tools like \",/*#__PURE__*/e(\"strong\",{children:\"Prelude\u2019s AI-driven verification systems\"}),\", businesses can check risk scores in real time and reduce fraudulent activity without disrupting the user experience.\"]}),/*#__PURE__*/e(\"h3\",{children:\"3. Use secure payment gateways with fraud detection\"}),/*#__PURE__*/r(\"p\",{children:[\"Secure payment gateways act as \",/*#__PURE__*/e(\"strong\",{children:\"fraud prevention hubs\"}),\", analyzing transactions for suspicious patterns before processing payments. They not only streamline the checkout process but also act as a \",/*#__PURE__*/e(\"strong\",{children:\"watchtower\"}),\", keeping a close eye on unusual behavior. \"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"What makes a payment gateway secure?\"})}),/*#__PURE__*/r(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Encryption and tokenization: \"}),\"these technologies protect payment details, ensuring sensitive information isn\u2019t exposed, \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Fraud detection algorithms: \"}),\"built-in systems flag anomalies, such as unusual locations or mismatched billing and shipping addresses, \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Chargeback protection: \"}),\"features designed to minimize losses from disputes caused by chargeback fraud.\"]})})]}),/*#__PURE__*/r(\"p\",{children:[\"This added layer of scrutiny ensures payments are verified before funds are transferred, \",/*#__PURE__*/e(\"strong\",{children:\"reducing the risk of online payment fraud\"}),\" while maintaining a seamless experience for legitimate customers.\"]}),/*#__PURE__*/e(\"h3\",{children:\"4. Implement Address Verification Systems (AVS)\"}),/*#__PURE__*/r(\"p\",{children:[\"An \",/*#__PURE__*/e(\"strong\",{children:\"Address Verification System (AVS)\"}),\" works like a background check for customer addresses. It compares the billing address provided during checkout to the one associated with the credit card on file at the bank. \",/*#__PURE__*/e(\"strong\",{children:\"Why is this important?\"})]}),/*#__PURE__*/r(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Mismatched addresses are often a red flag for stolen card usage, \"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/r(\"p\",{children:[\"AVS helps prevent \",/*#__PURE__*/e(\"strong\",{children:\"chargeback fraud\"}),\" and \",/*#__PURE__*/e(\"strong\",{children:\"card testing fraud\"}),\" by verifying address authenticity before approving a transaction.\"]})})]}),/*#__PURE__*/r(\"p\",{children:[\"For even stronger protection, pair AVS with \",/*#__PURE__*/e(\"strong\",{children:\"CVV verification\"}),\", which checks the security code on the back of the card.\"]}),/*#__PURE__*/e(\"h3\",{children:\"5. Require verification for high-risk transactions\"}),/*#__PURE__*/r(\"p\",{children:[\"High-risk transactions - such as unusually large orders or purchases from new locations - deserve extra scrutiny to minimize exposure to fraud. Implementing additional verification steps for \",/*#__PURE__*/e(\"strong\",{children:\"these cases provides a safety net without disrupting legitimate buyers\"}),\". \"]}),/*#__PURE__*/e(\"p\",{children:\"High-risk scenarios include:\"}),/*#__PURE__*/r(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Orders that exceed a predefined monetary threshold, \"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Transactions involving expedited shipping to unfamiliar addresses, \"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Purchases from regions with higher fraud activity.\"})})]}),/*#__PURE__*/r(\"p\",{children:[\"By adding \",/*#__PURE__*/e(\"strong\",{children:\"identity checks\"}),\" or requiring customers to re-verify payment details, businesses can filter out fraudsters while ensuring seamless service for trusted users.\"]}),/*#__PURE__*/e(\"p\",{children:\"In a fast-paced digital world, staying ahead of ecommerce fraud is a must. With the right mix of smart tools and proactive strategies, you can fortify your platform, protect your customers, and keep things running smoothly. By staying vigilant and adaptable, you\u2019re not just fighting fraud \u2013 you're building trust and ensuring a secure shopping experience for everyone.\"}),/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Ready to reduce fraud and streamline your verification process? Start for free with \"}),/*#__PURE__*/e(t,{href:\"https://app.prelude.so/sign-up\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:/*#__PURE__*/e(\"strong\",{children:\"Prelude\"})})}),/*#__PURE__*/e(\"strong\",{children:\" or \"}),/*#__PURE__*/e(t,{href:\"https://prelude.so/contact\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:/*#__PURE__*/e(\"strong\",{children:\"contact our sales team\"})})}),/*#__PURE__*/e(\"strong\",{children:\" to learn more.\"})]})]});export const richText4=/*#__PURE__*/r(i.Fragment,{children:[/*#__PURE__*/r(\"p\",{children:[\"In today\u2019s digital world, phone numbers are more than just contact details - \",/*#__PURE__*/e(\"strong\",{children:\"they are gateways to secure accounts\"}),\", financial transactions, and user identities.\",/*#__PURE__*/e(\"strong\",{children:\" Phone number verification\"}),\" helps businesses verify t\",/*#__PURE__*/e(\"strong\",{children:\"he legitimacy of their users\"}),\", protect against fraudulent activities, and improve database accuracy.\"]}),/*#__PURE__*/r(\"p\",{children:[\"Fraudsters often exploit weaknesses in registration systems by using \",/*#__PURE__*/e(t,{href:\"https://prelude.so/blog/identify-virtual-phone-numbers\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:/*#__PURE__*/e(\"strong\",{children:\"fake or disposable numbers\"})})}),/*#__PURE__*/e(\"strong\",{children:\".\"}),\" This can lead to account takeovers, false identities, and spam. \",/*#__PURE__*/e(\"strong\",{children:\"Phone number verification acts as the first line of defense\"}),\", ensuring that only genuine users gain access.\"]}),/*#__PURE__*/r(\"p\",{children:[\"Beyond security,\",/*#__PURE__*/e(\"strong\",{children:\" it also enhances customer experience by providing seamless communication channels\"}),\" for transactional updates, order confirmations, and password recovery. With multiple verification methods available, such as SMS, voice calls, and silent network authentication, businesses can tailor their approach to meet user preferences and security needs.\"]}),/*#__PURE__*/e(\"h2\",{children:\"What is phone verification?\"}),/*#__PURE__*/r(\"p\",{children:[\"Phone verification is \",/*#__PURE__*/e(\"strong\",{children:\"the process of confirming that the number provided by a client is valid\"}),\", accessible, and tied to a real user. It establishes trust by verifying ownership of the number, ensuring that it belongs to the person claiming it.\"]}),/*#__PURE__*/e(\"p\",{children:\"This process is designed to:\"}),/*#__PURE__*/r(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Validate user identity\"}),\" : verifies that the user is legitimate, reducing the risk of impersonation or unauthorized access, \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Prevent fraud and abuse\"}),\" : blocks attempts to create fake accounts, execute scams, or carry out account takeovers, \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Strengthen security measures\"}),\" : acts as an added layer of protection for sensitive accounts and transactions,\\xa0\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Improve communication reliability\"}),\" : guarantees that important notifications, such as payment confirmations or security alerts, reach users without delays, \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Simplify user onboarding\"}),\" : provides a quick and intuitive way for users to authenticate themselves during registration or login.\"]})})]}),/*#__PURE__*/r(\"p\",{children:[\"Phone verification acts as \",/*#__PURE__*/e(\"strong\",{children:\"a security checkpoint, confirming that the user behind the number is genuine and authorized\"}),\". It not only validates the identity but also acts as a filter, allowing only trusted users to access your platform securely.\"]}),/*#__PURE__*/e(\"h2\",{children:\"What are the different methods of phone number verification?\"}),/*#__PURE__*/r(\"p\",{children:[\"Verifying a phone number can be achieved \",/*#__PURE__*/e(\"strong\",{children:\"through several methods\"}),\", each offering different levels of security and convenience. Choosing the right approach depends on your platform\u2019s needs and your users\u2019 preferences.\"]}),/*#__PURE__*/e(\"h3\",{children:\"How does SMS verification work?\"}),/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(t,{href:\"https://prelude.so/blog/sms-verification-guide\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"SMS verification is one of the most widely used methods\"})}),\". It sends \",/*#__PURE__*/e(\"strong\",{children:\"a one-time password (OTP)\"}),\" to the user\u2019s phone via text message. The user then enters this code to confirm ownership of the number. It\u2019s quick, convenient, and ideal for most use cases.\"]}),/*#__PURE__*/e(\"h3\",{children:\"What is voice call verification?\"}),/*#__PURE__*/r(\"p\",{children:[\"Voice call verification works similarly to SMS verification, but the OTP is delivered through an automated phone call. This method is useful f\",/*#__PURE__*/e(\"strong\",{children:\"or users who prefer voice interactions or when SMS delivery isn\u2019t reliable\"}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"What is silent network authentication?\"}),/*#__PURE__*/r(\"p\",{children:[\"Silent network authentication verifies the user\u2019s phone number in the background using mobile network data. \",/*#__PURE__*/e(\"strong\",{children:\"It doesn\u2019t require any user interaction\"}),\", providing a seamless experience. \",/*#__PURE__*/e(\"strong\",{children:\"This method is highly secure\"}),\" and ideal for reducing friction during verification.\"]}),/*#__PURE__*/r(\"p\",{children:[\"While each method has its strengths, phone number verification as a whole functions like a bouncer at the door, checking IDs to make sure only the right people get inside, \",/*#__PURE__*/e(\"strong\",{children:\"keeping your platform safe and secure\"}),\".\"]}),/*#__PURE__*/e(\"h2\",{children:\"How does phone number verification work?\"}),/*#__PURE__*/r(\"p\",{children:[\"Phone number verification follows \",/*#__PURE__*/e(\"strong\",{children:\"a few key steps to ensure both security and ease of use\"}),\". Whether users register for the first time or log in, the process quickly validates ownership without friction. \"]}),/*#__PURE__*/e(\"p\",{children:\"Here\u2019s how it typically works:\"}),/*#__PURE__*/r(\"ol\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"User input: \"}),\"the user provides their phone number during registration or login, \",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Database lookup:\"}),\" the verification service checks the number against a comprehensive database to detect disposable, invalid, or high-risk numbers. This step helps filter out potentially fraudulent entries before moving forward, \",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"OTP generation and delivery:\"}),\" if no red flags are identified, a one-time password (OTP) is generated and sent to the provided phone number via SMS or voice call, \",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"User confirmation: \"}),\"the user enters \",/*#__PURE__*/e(t,{href:\"https://prelude.so/blog/sms-otp-definition\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"the OTP received on their device\"})}),\" to confirm ownership of the number, \",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Verification success:\"}),\" if the code matches, the phone number is verified, granting the user access.\"]})})]}),/*#__PURE__*/r(\"p\",{children:[\"This process acts as a digital handshake - secure, simple, and reliable - ensuring only trusted users can access your platform. \",/*#__PURE__*/e(\"strong\",{children:\"It combines user-friendly steps with robust security checks \"}),\"in the background to protect against fraud and unauthorized access.\"]}),/*#__PURE__*/e(\"h2\",{children:\"What are the risk factors affecting phone verification?\"}),/*#__PURE__*/r(\"p\",{children:[\"Phone number verification services evaluate multiple factors to assess the risk associated with a given number. These assessments help \",/*#__PURE__*/e(\"strong\",{children:\"determine whether a number is legitimate or potentially fraudulent\"}),\". Here are the key risk factors analyzed:\"]}),/*#__PURE__*/r(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Temporary or disposable numbers:\"}),\" numbers that are created for short-term use can be easily discarded, making them a common tool for fraudsters looking to bypass verification systems, \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Blocklists and fraud flags:\"}),\" phone numbers that appear on global blocklists or are flagged as fraudulent by services like GSMA IRSF Prevention raise immediate red flags, signaling potential risks. Platforms like \",/*#__PURE__*/e(t,{href:{webPageId:\"nSTrDjT9o\"},motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"Prelude enhance this protection by leveraging AI-driven analysis\"})}),\", enriched databases, and cross-signal risk scoring to block fake traffic and IRSF attempts, ensuring only real users access your platform,\\xa0\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Usage patterns:\"}),\" suspicious activity, such as repeated registration attempts or high-frequency verifications, may indicate automated bots or fraudulent behavior, \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"IP address associations:\"}),\" phone numbers linked to IP addresses with questionable histories or originating from high-risk regions can also trigger warnings.\"]})})]}),/*#__PURE__*/r(\"p\",{children:[\"By analyzing these risk factors, \",/*#__PURE__*/e(\"strong\",{children:\"verification systems provide a risk score for each number\"}),\", enabling businesses to make informed decisions about granting access or requesting additional verification steps. \",/*#__PURE__*/e(\"strong\",{children:\"This proactive approach helps to prevent fraud\"}),\" and ensure only legitimate users interact with your platform.\"]}),/*#__PURE__*/e(\"h2\",{children:\"What are the benefits of phone number verification?\"}),/*#__PURE__*/r(\"p\",{children:[\"Phone number verification offers \",/*#__PURE__*/e(\"strong\",{children:\"multiple advantages for businesses looking to strengthen security\"}),\" and improve user experience. Let\u2019s explore the main advantages:\"]}),/*#__PURE__*/r(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Fraud prevention: \"}),\"verifying phone numbers prevents fake registrations, identity theft, and \",/*#__PURE__*/e(t,{href:\"https://prelude.so/blog/account-takeover-fraud\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"account takeovers\"})}),\". By filtering out invalid or high-risk numbers, businesses can reduce fraud attempts and secure sensitive data, \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Customer trust:\"}),\" building trust is critical for user retention. Verification reassures customers that your platform values security and takes proactive measures to protect their accounts, \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"User-friendly authentication:\"}),\" phone verification provides an intuitive and seamless user experience. It simplifies the registration and login process without compromising security, making it ideal for modern platforms, \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Better user database quality:\"}),\" ensuring that only valid phone numbers are stored improves the accuracy of customer databases. This leads to more effective communication, better marketing strategies, and enhanced customer support,\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Enhanced account recovery options: \"}),\"verified phone numbers simplify account recovery, making it easier for users to reset passwords and regain access to locked accounts quickly and securely, \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Scalability and automation:\"}),\" phone verification solutions integrate seamlessly with APIs, allowing businesses to automate processes and scale effortlessly as their user base grows.\"]})})]}),/*#__PURE__*/r(\"p\",{children:[\"Integrating phone number verification into your processes, businesses create a safer, more reliable platform that\",/*#__PURE__*/e(\"strong\",{children:\" boosts customer satisfaction while mitigating risks associated with fraud and invalid data\"}),\".\"]}),/*#__PURE__*/e(\"h2\",{children:\"How to implement phone number verification?\"}),/*#__PURE__*/r(\"p\",{children:[\"Implementing phone number verification doesn\u2019t have to be complex. \",/*#__PURE__*/e(\"strong\",{children:\"It\u2019s like\"}),\" \",/*#__PURE__*/e(\"strong\",{children:\"installing a gatekeeper for your platform\"}),\" - one that verifies identities before granting access.\"]}),/*#__PURE__*/e(\"p\",{children:\"Follow these steps to integrate the process effectively:\"}),/*#__PURE__*/r(\"ol\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Choose a phone number verification API provider: \"}),\"research and select a provider that offers scalable, reliable, and secure verification solutions. Look for features like SMS, voice call verification, and silent network authentication, \",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Set up API access: \"}),\"obtain API credentials from your provider and configure the access settings based on your platform\u2019s requirements. Ensure proper authentication methods are in place, \",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Implement the API on your platform:\"}),\" integrate the API into your registration, login, and recovery workflows. Most providers offer detailed documentation and SDKs to simplify the process, \",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Monitor and optimize:\"}),\" track performance metrics like verification success rates, delivery times, and error rates. Use this data to refine your implementation and improve efficiency.\"]})})]}),/*#__PURE__*/r(\"p\",{children:[\"Many providers also offer \",/*#__PURE__*/e(\"strong\",{children:\"look-up APIs\"}),\", which allow you to verify large batches of phone numbers in bulk. This is particularly useful for cleaning up existing databases and maintaining accuracy at scale.\"]}),/*#__PURE__*/r(\"p\",{children:[\"With these steps in place, \",/*#__PURE__*/e(\"strong\",{children:\"businesses can quickly deploy phone number verification systems\"}),\", ensuring a seamless user experience while strengthening security and fraud prevention measures.\"]}),/*#__PURE__*/r(\"p\",{children:[\"Phone number verification is \",/*#__PURE__*/e(\"strong\",{children:\"an essential tool for businesses aiming to improve security, prevent fraud, and streamline user authentication\"}),\". By verifying phone numbers, companies not only protect sensitive data but also build trust and provide \",/*#__PURE__*/e(\"strong\",{children:\"a better user experience.\"})]}),/*#__PURE__*/r(\"p\",{children:[\"With flexible implementation options and scalable solutions, \",/*#__PURE__*/e(\"strong\",{children:\"phone verification adapts to your business needs\"}),\" - whether you\u2019re securing user accounts, improving database accuracy, or simplifying account recovery.\"]}),/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Ready to enhance your security and reduce verification costs? Try \"}),/*#__PURE__*/e(t,{href:\"https://app.prelude.so/sign-up\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:/*#__PURE__*/e(\"strong\",{children:\"Prelude for free\"})})}),/*#__PURE__*/e(\"strong\",{children:\" or \"}),/*#__PURE__*/e(t,{href:\"https://prelude.so/contact\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:/*#__PURE__*/e(\"strong\",{children:\"contact our sales team\"})})}),/*#__PURE__*/e(\"strong\",{children:\" to learn how our advanced phone number verification can safeguard your platform and scale with your growth.\"})]})]});export const richText5=/*#__PURE__*/r(i.Fragment,{children:[/*#__PURE__*/r(\"p\",{children:[\"Account Takeover (ATO) fraud happens when \",/*#__PURE__*/e(\"strong\",{children:\"cybercriminals gain access to legitimate user accounts using stolen credentials\"}),\", often through methods like \",/*#__PURE__*/e(t,{href:\"https://prelude.so/blog/credential-stuffing-attacks\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"credential stuffing\"})}),\". From making unauthorized purchases to stealing sensitive data, attackers can wreak havoc without the user ever knowing.\\xa0\"]}),/*#__PURE__*/r(\"p\",{children:[\"With weak security practices and password reuse, attackers find it easier to break into accounts than ever before. Now, it\u2019s essential to understand \",/*#__PURE__*/e(\"strong\",{children:\"how ATO fraud occurs and what steps you can take to protect your business \"}),\"from this growing threat.\"]}),/*#__PURE__*/e(\"h2\",{children:\"What is Account Takeover fraud?\"}),/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Account Takeover (ATO) fraud\"}),\" occurs when \",/*#__PURE__*/e(\"strong\",{children:\"an attacker gains unauthorized access to a legitimate user's account by stealing their login credentials.\"}),\" Once inside, they can carry out fraudulent transactions, change account settings, or lock the rightful user out. This type of fraud relies heavily on attackers using stolen data, often obtained through previous data breaches or phishing attacks.\"]}),/*#__PURE__*/r(\"p\",{children:[\"Unlike other types of cybercrime, \",/*#__PURE__*/e(\"strong\",{children:\"ATO doesn\u2019t require a lot of technical expertise.\"}),\" It's more about exploiting weak security practices, like reused passwords, to gain entry into multiple accounts. Once the attacker is in, \",/*#__PURE__*/e(\"strong\",{children:\"they can cause significant damage\"}),\", including financial loss or data theft, all while remaining undetected for long periods.\"]}),/*#__PURE__*/r(\"p\",{children:[\"In fact, approximately \",/*#__PURE__*/e(t,{href:\"https://abnormalsecurity.com/blog/account-takeover-statistics\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"26% of companies are targeted by weekly ATO attempts\"})}),\", emphasizing the frequency and persistence of these attacks.\"]}),/*#__PURE__*/e(\"h2\",{children:\"How does it work?\"}),/*#__PURE__*/r(\"p\",{children:[\"Account Takeover fraud is \",/*#__PURE__*/e(\"strong\",{children:\"all about gaining access to a user's account using stolen credentials. \"}),\"But how exactly do attackers manage to break into these accounts? Let's take a look at the common techniques they use to bypass security measures and take control.\"]}),/*#__PURE__*/e(\"h3\",{children:\"1. Credential stuffing\"}),/*#__PURE__*/r(\"p\",{children:[\"Credential stuffing is a technique where attackers use large sets of stolen usernames and passwords from previous data breaches \",/*#__PURE__*/e(\"strong\",{children:\"to try and access multiple accounts across different platforms.\"}),\" Since many people reuse the same password across multiple sites, attackers can quickly gain access to several accounts using the same credentials. \",/*#__PURE__*/e(\"strong\",{children:\"It's like trying a single key in every lock until it fits.\"})]}),/*#__PURE__*/r(\"p\",{children:[\"Integrating \",/*#__PURE__*/e(t,{href:\"https://prelude.so/blog/what-is-an-sms-api\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"secure SMS API solutions\"})}),\" for example can help businesses validate users and block unauthorized access before it happens.\"]}),/*#__PURE__*/e(\"h3\",{children:\"2. Phishing\"}),/*#__PURE__*/r(\"p\",{children:[\"Phishing is a more deceptive tactic. \",/*#__PURE__*/e(\"strong\",{children:\"Attackers impersonate trusted organizations\"}),\", such as banks or social media platforms, and send fraudulent emails or messages designed\",/*#__PURE__*/e(\"strong\",{children:\" to trick users into revealing their login details.\\xa0\"})]}),/*#__PURE__*/r(\"p\",{children:[\"These messages often contain a link to \",/*#__PURE__*/e(\"strong\",{children:\"a fake login page \"}),\"that looks legitimate but is designed to capture your credentials. It\u2019s like receiving an official-looking letter asking you \",/*#__PURE__*/e(\"strong\",{children:'to \"verify\" your personal information'}),\", only to realize too late that it was a trap.\"]}),/*#__PURE__*/e(\"h3\",{children:\"3. Malware\"}),/*#__PURE__*/r(\"p\",{children:[\"Malware, such as keyloggers or spyware, is used \",/*#__PURE__*/e(\"strong\",{children:\"to infect a user\u2019s device and secretly capture their keystrokes\"}),\", login credentials, or other sensitive information. This allows attackers to steal login data in real time, often without the user\u2019s knowledge.\\xa0\"]}),/*#__PURE__*/r(\"p\",{children:[\"It's similar to \",/*#__PURE__*/e(\"strong\",{children:\"someone secretly watching your every move on your computer and recording everything you type\"}),\", especially those precious login details.\"]}),/*#__PURE__*/e(\"h3\",{children:\"4. Man-in-the-Middle (MitM)\"}),/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"A Man-in-the-Middle (MitM)\"}),\" attack occurs when an attacker intercepts communication between the user and a website or service. The attacker can capture login details or session cookies during the login process, allowing them to take over the account.\"]}),/*#__PURE__*/r(\"p\",{children:[\"Think of it like\",/*#__PURE__*/e(\"strong\",{children:\" someone eavesdropping on your conversation\"}),\", gathering sensitive information, and then impersonating you without you ever knowing.\"]}),/*#__PURE__*/e(\"h2\",{children:\"Who are the usual targets of Account Takeover attacks?\"}),/*#__PURE__*/r(\"p\",{children:[\"Account Takeover fraud doesn\u2019t play favorites, \",/*#__PURE__*/e(\"strong\",{children:\"it targets any platform where users have accounts and store sensitive information.\"}),\" However, some industries are particularly attractive to cybercriminals due to the high value of the accounts involved. Let\u2019s take a look at some of the most common targets.\"]}),/*#__PURE__*/e(\"h3\",{children:\"1. Financial\"}),/*#__PURE__*/r(\"p\",{children:[\"Financial institutions are prime targets for ATO attacks. Whether it\u2019s bank accounts, credit card information, or investment accounts, \",/*#__PURE__*/e(\"strong\",{children:\"attackers can access significant funds and valuable data \"}),\"with just a few stolen credentials.\\xa0\"]}),/*#__PURE__*/r(\"p\",{children:[\"Once inside,\",/*#__PURE__*/e(\"strong\",{children:\" they can make unauthorized transactions, transfer money, or even drain entire accounts.\"}),\" It\u2019s like gaining the keys to a vault, making financial services one of the top targets for cybercriminals.\"]}),/*#__PURE__*/e(\"h3\",{children:\"2. Travel (Flyer miles)\"}),/*#__PURE__*/r(\"p\",{children:[\"Loyalty programs, particularly frequent flyer miles, are another popular target. Attackers love to target travel accounts because\",/*#__PURE__*/e(\"strong\",{children:\" the rewards stored in these accounts\"}),\", such as airline miles or hotel points, are often highly valuable and can be used for free travel or sold on the black market.\\xa0\"]}),/*#__PURE__*/r(\"p\",{children:[\"If attackers can take over an account, they may redeem these rewards or even sell them, making it a lucrative option for fraudsters. \",/*#__PURE__*/e(\"strong\",{children:\"It's like finding a treasure chest filled with miles to the next exotic vacation.\"})]}),/*#__PURE__*/e(\"h3\",{children:\"3. Retail\"}),/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Retail and e-commerce platforms are prime targets for ATO attackers. \"}),\"Once fraudsters gain access to user accounts, they can make unauthorized purchases, redeem loyalty points, and exploit promotional offers. These platforms hold valuable customer data and financial information, making them highly attractive to attackers. \"]}),/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Unauthorized transactions can lead to significant financial losses,\"}),\" and stolen products are often sold on the black market or used by the fraudsters themselves.\"]}),/*#__PURE__*/e(\"h3\",{children:\"4. Other sectors\"}),/*#__PURE__*/e(\"p\",{children:\"In addition to these industries, many other sectors are also at risk. \"}),/*#__PURE__*/r(\"p\",{children:[\"Social media platforms, subscription services, and online marketplaces are often targeted, as they all hold valuable user data that can be exploited for various purposes. If a user has an account where they store personal information, financial details, or rewards points,\",/*#__PURE__*/e(\"strong\",{children:\" it\u2019s a potential target for ATO fraud.\"})]}),/*#__PURE__*/e(\"h2\",{children:\"How to detect Account Takeover fraud?\"}),/*#__PURE__*/r(\"p\",{children:[\"Detecting Account Takeover fraud early is crucial to minimizing the damage. Fortunately, \",/*#__PURE__*/e(\"strong\",{children:\"there are key signs to watch for that can help you spot an attack\"}),\" before it escalates. For more on how to identify suspicious activities like fake account creation, check out \",/*#__PURE__*/e(t,{href:\"https://prelude.so/blog/fake-account-creation\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"our article on how to detect and prevent fake account creation\"})}),\". \"]}),/*#__PURE__*/r(\"p\",{children:[\"Here are \",/*#__PURE__*/e(\"strong\",{children:\"some red flags to keep an eye on:\"})]}),/*#__PURE__*/r(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Unusual login activity:\"}),\" a sudden spike in failed login attempts, especially from unfamiliar IP addresses or locations, can indicate that someone is attempting to break into multiple accounts, \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Account changes:\"}),\" users may report unexpected changes to their accounts, such as a new email address, password reset, or unauthorized transactions. If these changes happen without the user's knowledge, it's a strong indicator of an attack, \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Unfamiliar devices or locations:\"}),\" if your system detects logins from new or suspicious devices, especially if they are geographically distant from the user\u2019s typical location, this could signal an ATO attempt, \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Sudden transactions or purchases:\"}),\" unusual transactions - such as high-value purchases or unauthorized withdrawals - are a clear sign that an attacker has taken control of an account, \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Increased support requests:\"}),\" if users start reporting issues with their accounts, like not being able to log in or noticing unauthorized activity, this may indicate that ATO fraud is taking place.\"]})})]}),/*#__PURE__*/e(\"p\",{children:\"By actively monitoring these signs, businesses can quickly identify potential ATO attacks and take action to prevent further damage.\"}),/*#__PURE__*/e(\"h2\",{children:\"How to prevent Account Takeover fraud?\"}),/*#__PURE__*/r(\"p\",{children:[\"Preventing Account Takeover fraud is all about being proactive. By implementing the right security measures, \",/*#__PURE__*/e(\"strong\",{children:\"you can stay one step ahead and avoid major issues down the line\"}),\". \"]}),/*#__PURE__*/e(\"p\",{children:\"Here are the essential steps to keep your platform secure:\"}),/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"1. Educate users: \"}),\"your users are your first line of defense, so make sure they understand the importance of using strong, unique passwords. Encourage them to avoid reusing passwords across multiple platforms - it's a small habit that can make a big difference.\"]}),/*#__PURE__*/e(\"p\",{children:\"Regular reminders about password security and recognizing phishing attempts can help users stay vigilant and protect their accounts more effectively.\"}),/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"2. Strengthen authentication: \"}),\"Multi-factor authentication (MFA) adds an extra layer of protection. Think of it as an additional safeguard that makes it harder for attackers to gain access even if they have the correct password. MFA is a straightforward but highly effective way to keep things secure.\"]}),/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"3. Protect verification processes: \"}),\"when users change account details or reset passwords, ensure there are extra verification steps in place. This could include confirming changes via email or SMS. By adding a layer of verification, you make it significantly more difficult for attackers to take control, even if they\u2019ve gained access to the account.\"]}),/*#__PURE__*/e(\"p\",{children:\"By implementing these straightforward measures, you\u2019ll significantly reduce the risk of Account Takeover fraud and keep your platform secure.\"}),/*#__PURE__*/e(\"h2\",{children:\"What tools can help combat Account Takeover fraud?\"}),/*#__PURE__*/r(\"p\",{children:[\"To effectively prevent Account Takeover (ATO) fraud, \",/*#__PURE__*/e(\"strong\",{children:\"it\u2019s important to leverage a range of tools designed to detect and block suspicious activities in real-time\"}),\". \"]}),/*#__PURE__*/e(\"p\",{children:\"Here are some key tools that can help secure your platform:\"}),/*#__PURE__*/r(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(t,{href:{webPageId:\"Fn_57vtl3\"},motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:/*#__PURE__*/e(\"strong\",{children:\"Fraud prevention API\"})})}),/*#__PURE__*/e(\"strong\",{children:\" \"}),\"are designed to monitor user activity continuously, analyzing data points like IP addresses, login times, and device fingerprints. These tools help detect unusual or malicious login attempts, allowing businesses to take immediate action, such as blocking access or requiring further verification steps, before fraudsters can exploit the account.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Behavioral analytics tools \"}),\"analyze the typical behaviors of legitimate users, such as their typing speed, mouse movements, and navigation patterns. By establishing baseline user behaviors, these tools can quickly identify anomalies that suggest account takeover attempts, providing alerts for further investigation or automatic countermeasures.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Risk-Based Authentication (RBA) \"}),\"dynamically adjusts the level of security based on the risk of a login attempt. If a login is attempted from an unfamiliar device, location, or IP address, RBA can prompt the user for additional verification, such as a one-time password (OTP) or biometric confirmation, ensuring that only legitimate users can access their accounts, \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"IP geolocation tools \"}),\"track the physical location of users based on their IP addresses. If a login attempt is made from a location far outside the user\u2019s usual pattern, it triggers an alert or a request for additional authentication, helping prevent unauthorized access from unfamiliar or high-risk locations.\"]})})]}),/*#__PURE__*/e(\"p\",{children:\"By utilizing these tools, businesses can significantly reduce the risk of Account Takeover fraud, ensuring a secure environment for both their users and their data.\"}),/*#__PURE__*/e(\"p\",{children:\"Account Takeover (ATO) fraud is a serious and growing threat, but with the right tools and proactive measures, businesses can protect themselves and their users from significant losses. By educating users, strengthening authentication processes, and utilizing advanced fraud detection tools, you can stay one step ahead of attackers and safeguard your platform.\"}),/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Ready to enhance your platform\u2019s protection against ATO fraud? Try Prelude \"}),/*#__PURE__*/e(t,{href:\"https://app.prelude.so/sign-up\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:/*#__PURE__*/e(\"strong\",{children:\"for free\"})})}),/*#__PURE__*/e(\"strong\",{children:\" or \"}),/*#__PURE__*/e(t,{href:\"https://prelude.so/contact\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:/*#__PURE__*/e(\"strong\",{children:\"contact our sales team\"})})}),/*#__PURE__*/e(\"strong\",{children:\" to learn more about how we can help safeguard your platform.\"})]})]});export const richText6=/*#__PURE__*/r(i.Fragment,{children:[/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"OTPs are essential for keeping accounts secure\"}),\", even if passwords have been compromised. But here\u2019s the catch - managing OTP systems isn\u2019t always smooth sailing. Businesses often face challenges like delivery failures, rising costs, fraud schemes, and frustrated users dealing with delayed or expired codes.\"]}),/*#__PURE__*/r(\"p\",{children:[\"In this article, we\u2019ll dive into these challenges and share tried-and-tested \",/*#__PURE__*/e(\"strong\",{children:\"best practices to help you optimize your OTP system.\"}),\" By the end, you\u2019ll know how to make your OTPs cost-effective, user-friendly, and secure - all while avoiding common pitfalls.\"]}),/*#__PURE__*/e(\"h2\",{children:\"What are the key challenges of implementing OTPs?\"}),/*#__PURE__*/r(\"p\",{children:[\"Implementing an \",/*#__PURE__*/e(t,{href:\"https://prelude.so/blog/sms-otp-definition\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:/*#__PURE__*/e(\"strong\",{children:\"OTP system\"})})}),\" may seem straightforward at first, but it often comes with\",/*#__PURE__*/e(\"strong\",{children:\" hidden complexities that can impact both your bottom line and user satisfaction.\"}),\" \"]}),/*#__PURE__*/e(\"p\",{children:\"From ensuring reliable delivery to managing costs and tackling fraud, here are the key challenges businesses face when deploying OTP systems:\"}),/*#__PURE__*/r(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Delivery failures:\"}),\" issues with SMS or email not being received by users due to network errors, spam filters, or incorrect contact information, \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Managing costs:\"}),\" carrier fees, service provider margins, global reach, and user behavior all contribute to rising expenses, \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Fraud:\"}),\" techniques like IRSF and SMS pumping can inflate costs by generating fake traffic, \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"User experience concerns:\"}),\" challenges like long delays, expired codes, or user frustration with complex workflows can harm conversions and satisfaction.\"]})})]}),/*#__PURE__*/e(\"p\",{children:\"While these challenges may seem daunting, they\u2019re far from insurmountable. \"}),/*#__PURE__*/r(\"p\",{children:[\"By leveraging the right strategies, \",/*#__PURE__*/e(\"strong\",{children:\"businesses can not only overcome these obstacles but also optimize their OTP systems\"}),\" for better performance, lower costs, and improved user satisfaction. Let\u2019s explore how you can achieve this.\"]}),/*#__PURE__*/e(\"h2\",{children:\"6 best practices for OTPs to overcome common challenges\"}),/*#__PURE__*/e(\"p\",{children:\"After delivering hundreds of millions of OTPs globally, we\u2019ve learned a thing or two about optimizing your OTP system. \"}),/*#__PURE__*/r(\"p\",{children:[\"From crafting cost-effective messages to preventing fraud and enhancing deliverability, here are \",/*#__PURE__*/e(\"strong\",{children:\"6 proven practices to tackle common challenges\"}),\" head-on.\"]}),/*#__PURE__*/e(\"h3\",{children:\"1/ Optimize your OTP message to reduce costs and increase conversions\"}),/*#__PURE__*/r(\"p\",{children:[\"When crafting OTP messages, \",/*#__PURE__*/e(\"strong\",{children:\"every character counts, literally.\"}),\" A well-optimized message not only ensures clear communication but also helps control costs. Here\u2019s how to keep it efficient:\"]}),/*#__PURE__*/e(\"h4\",{children:\"Keep it short\"}),/*#__PURE__*/r(\"p\",{children:[\"SMS costs are calculated based on message length, with charges applied per \",/*#__PURE__*/e(\"strong\",{children:\"160-character segment\"}),\". Exceeding this limit\u2014even by a single character\u2014can double your charges.\"]}),/*#__PURE__*/e(\"p\",{children:\"For example:\"}),/*#__PURE__*/r(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/r(\"p\",{children:['\"123456 is your OTP for MyApp\". Fits in ',/*#__PURE__*/e(\"strong\",{children:\"1 segment\"}),\", keeping costs low, \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/r(\"p\",{children:['\"Your one-time password is 123456. Thank you for using our service\". Spills into ',/*#__PURE__*/e(\"strong\",{children:\"2 segments\"}),\", increasing costs.\"]})})]}),/*#__PURE__*/e(\"img\",{alt:\"sms otp length\",className:\"framer-image\",height:\"182\",src:\"https://framerusercontent.com/images/p1o9v3GIXzOll0VVyUCuyDUUrk.png\",srcSet:\"https://framerusercontent.com/images/p1o9v3GIXzOll0VVyUCuyDUUrk.png?scale-down-to=512 512w,https://framerusercontent.com/images/p1o9v3GIXzOll0VVyUCuyDUUrk.png 830w\",style:{aspectRatio:\"830 / 364\"},width:\"415\"}),/*#__PURE__*/e(\"p\",{children:\"While it might be tempting to add a catchy tagline or extra branding, remember that every additional character impacts your budget. Keep your messages concise and focused on delivering the essential information.\"}),/*#__PURE__*/e(\"h4\",{children:\"Avoid emojis and UCS-2 encoding\"}),/*#__PURE__*/e(\"p\",{children:\"Emojis and non-standard characters might make your message stand out, but they come with a cost. \"}),/*#__PURE__*/e(\"p\",{children:\"SMS encoding works in two formats:\"}),/*#__PURE__*/r(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"GSM-7:\"}),\" Supports most Latin-based characters and allows \",/*#__PURE__*/e(\"strong\",{children:\"160 characters per segment\"}),\", \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"UCS-2:\"}),\" Required for emojis and special characters but reduces the limit to \",/*#__PURE__*/e(\"strong\",{children:\"70 characters per segment\"}),\", doubling costs for every additional 70 characters.\"]})})]}),/*#__PURE__*/e(\"p\",{children:\"For example:\"}),/*#__PURE__*/r(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/r(\"p\",{children:['\"123456 is your OTP for MyApp\" (GSM-7). Fits in ',/*#__PURE__*/e(\"strong\",{children:\"1 segment\"}),\", \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/r(\"p\",{children:['\"123456 is your OTP for MyApp \uD83D\uDE0A\" (UCS-2). Requires ',/*#__PURE__*/e(\"strong\",{children:\"2 segments\"}),\".\"]})})]}),/*#__PURE__*/e(\"p\",{children:\"To minimize costs, avoid emojis and only use UCS-2 when absolutely necessary, such as in regions with non-Latin scripts.\"}),/*#__PURE__*/e(\"h4\",{children:\"How does Prelude help you save?\"}),/*#__PURE__*/r(\"p\",{children:[\"If you\u2019re using Prelude,\",/*#__PURE__*/e(\"strong\",{children:\" your messages are automatically encoded \"}),\"in the most efficient format. By default, they are sent in GSM-7, ensuring maximum character capacity. If UCS-2 encoding is required, Prelude handles the switch seamlessly, keeping your costs as low as possible. \"]}),/*#__PURE__*/e(\"p\",{children:\"This approach ensures your OTP messages are clear, cost-effective, and optimized for seamless delivery.\"}),/*#__PURE__*/e(\"h3\",{children:\"2/ Optimize the content for conversion\"}),/*#__PURE__*/r(\"p\",{children:[\"Human errors, such as not opening SMSs promptly or entering incorrect codes, can lead to multiple authentication attempts. This not only frustrates users but also increases your message costs. To minimize these issues, \",/*#__PURE__*/e(\"strong\",{children:\"your SMS content must be optimized for conversions, ensuring users verify their OTP on the first attempt.\"})]}),/*#__PURE__*/e(\"h4\",{children:\"The secret to effective OTP messages\"}),/*#__PURE__*/r(\"p\",{children:[\"After delivering hundreds of millions of authentication messages, we\u2019ve identified \",/*#__PURE__*/e(\"strong\",{children:\"a winning formula\"}),\": \"]}),/*#__PURE__*/e(\"blockquote\",{children:/*#__PURE__*/e(\"p\",{children:\"\u201C{{Code}} is your validation code for {{App Name}}\u201D.\"})}),/*#__PURE__*/r(\"p\",{children:[\"This format is concise, clear, and immediately actionable. It puts the critical information - the code - front and center, making it easy for users\",/*#__PURE__*/e(\"strong\",{children:\" to find and enter without delay.\"})]}),/*#__PURE__*/r(\"p\",{children:[\"If you want to go a step further, consider adding a tagline that reflects your brand\u2019s identity. For example, \",/*#__PURE__*/e(t,{href:\"https://prelude.so/blog/why-bereal-chose-prelude-to-better-serve-customer-increase-conversion\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"Prelude\u2019s client BeReal\"})}),\" adds a tagline to its OTP messages: \"]}),/*#__PURE__*/e(\"blockquote\",{children:/*#__PURE__*/e(\"p\",{children:\"\u201C7860 is your validation code for BeReal. Your friends for real\u201D.\"})}),/*#__PURE__*/r(\"p\",{children:[\"This message structure helped BeReal achieve a \",/*#__PURE__*/e(\"strong\",{children:\"90% global conversion rate\"}),\" for user verification.\"]}),/*#__PURE__*/e(\"h4\",{children:\"Why does this work so well?\\xa0\"}),/*#__PURE__*/r(\"ol\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Code visibility: \"}),\"placing the code at the start of the message ensures it\u2019s instantly visible in SMS notifications. Users can access and input the code without having to search for it or exit your app, \",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})]})}),/*#__PURE__*/r(\"li\",{\"data-preset-tag\":\"p\",children:[/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Clarity and brevity: \"}),\"a short, straightforward message prevents confusion and minimizes the risk of errors. Users know exactly what to do as soon as they read the message, \"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Brand alignment: \"}),\"adding a tagline enhances the overall user experience by reinforcing your brand identity. However, it\u2019s crucial to keep it short to avoid distracting from the main purpose: delivering the verification code.\"]})})]}),/*#__PURE__*/e(\"h4\",{children:\"Make every word count\"}),/*#__PURE__*/r(\"p\",{children:[\"By focusing on clarity and efficiency, your OTP messages can do more than verify users - \",/*#__PURE__*/e(\"strong\",{children:\"they can enhance their overall experience with your brand. \"}),\"Optimizing for conversion not only reduces costs but also improves user satisfaction by making the process seamless.\"]}),/*#__PURE__*/e(\"h3\",{children:\"3/ Optimize your delivery strategy\"}),/*#__PURE__*/r(\"p\",{children:[\"When it comes to OTP delivery, ensuring reliability and efficiency is key. By optimizing your \",/*#__PURE__*/e(t,{href:\"https://prelude.so/blog/sms-delivery-rate\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"delivery strategy\"})}),\", \",/*#__PURE__*/e(\"strong\",{children:\"you can reduce costs, avoid disruptions, and guarantee your OTPs reach users promptly, regardless of their location.\"})]}),/*#__PURE__*/e(\"h4\",{children:\"Use multiple routes to maximize efficiency\"}),/*#__PURE__*/r(\"p\",{children:[\"Relying on a single SMS provider might seem straightforward, but \",/*#__PURE__*/e(\"strong\",{children:\"it comes with significant risks\"}),\", especially when it comes to cost, reliability, and coverage. Multi-routing - distributing traffic across several providers - offers a smarter, more resilient approach. \"]}),/*#__PURE__*/e(\"p\",{children:\"Here\u2019s why:\"}),/*#__PURE__*/r(\"ol\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Optimizing costs: \"}),\"different providers offer different rates depending on the region or volume of traffic. By distributing your messages strategically, you can take advantage of these variations to get the best possible price for your SMS OTPs, \",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Increasing deliverability: \"}),\"even the best providers experience occasional downtime or deliverability issues. Multi-routing ensures your messages have a fallback option\u2014if one provider fails, traffic can automatically be rerouted through another without causing delays or disruptions, \",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Expanding coverage: \"}),\"some providers perform better in specific countries or regions. Multi-routing allows you to select providers that excel in targeted areas, ensuring your OTPs are reliably delivered wherever your users are located.\"]})})]}),/*#__PURE__*/e(\"h4\",{children:\"How does this work in practice?\"}),/*#__PURE__*/e(\"p\",{children:\"Imagine a global company sending OTPs to users in Europe, South America, and Asia. Provider A may offer competitive rates in Europe but struggle with deliverability in remote areas of South America.\\xa0\"}),/*#__PURE__*/r(\"p\",{children:[\"Meanwhile, Provider B might specialize in Asian markets with superior regional coverage. By leveraging both providers, \",/*#__PURE__*/e(\"strong\",{children:\"the company ensures cost efficiency and reliable delivery across all regions.\"})]}),/*#__PURE__*/e(\"h4\",{children:\"Why is this essential for your business?\"}),/*#__PURE__*/r(\"p\",{children:[\"An optimized delivery strategy is more than a technical choice - \",/*#__PURE__*/e(\"strong\",{children:\"it\u2019s a way to ensure that your users have a seamless experience\"}),\", no matter where they are. Multi-routing reduces the risks associated with downtime or network issues while helping you stay within budget.\"]}),/*#__PURE__*/e(\"h3\",{children:\"4/ Use multiple channels\"}),/*#__PURE__*/r(\"p\",{children:[\"When it comes to delivering OTPs, \",/*#__PURE__*/e(\"strong\",{children:\"SMS is a reliable choice but it\u2019s not always the best option.\"}),\" Online messaging channels such as WhatsApp, \",/*#__PURE__*/e(t,{href:\"https://prelude.so/blog/rcs-vs-sms\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"RCS\"})}),\", or Viber can be more cost-effective and equally efficient, especially when tailored to user preferences and regional conditions.\"]}),/*#__PURE__*/e(\"h4\",{children:\"Why diversify your channels?\"}),/*#__PURE__*/e(\"p\",{children:\"Not all users have consistent cellular coverage, and not all regions have the same level of SMS reliability. \"}),/*#__PURE__*/e(\"p\",{children:\"Online messaging channels offer several advantages:\"}),/*#__PURE__*/r(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Cost efficiency:\"}),\" platforms like WhatsApp and RCS are often cheaper than SMS, especially for high volumes, \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Enhanced reach:\"}),\" these channels can bypass issues like poor cellular network coverage, making them more reliable in specific regions, \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"User preference:\"}),\" messaging apps are widely used and often preferred by users, offering a familiar and convenient experience.\"]})})]}),/*#__PURE__*/r(\"p\",{children:[\"Imagine your user base includes individuals in Brazil, where cellular networks in some areas can be unreliable. In these cases, delivering an OTP through WhatsApp, which has widespread adoption and better connectivity, \",/*#__PURE__*/e(\"strong\",{children:\"can ensure the code reaches the user quickly and reliably.\"})]}),/*#__PURE__*/e(\"p\",{children:\"Similarly, in regions where RCS is supported and widely used, leveraging this channel can provide faster and more seamless OTP delivery.\"}),/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Using multiple channels expands your reach, reduces costs, and ensures OTPs are delivered efficiently\"}),\", even in challenging environments. By diversifying your delivery methods, you can provide a seamless experience for all users, regardless of their location or network conditions.\"]}),/*#__PURE__*/e(\"h3\",{children:\"5/ Prevent fraud before it impacts your bill\"}),/*#__PURE__*/r(\"p\",{children:[\"Fraudulent activities, such as SMS pumping, can severely inflate your OTP costs and disrupt user trust. Proactively detecting and preventing these issues is \",/*#__PURE__*/e(\"strong\",{children:\"key to safeguarding your system and budget.\"})]}),/*#__PURE__*/e(\"h4\",{children:\"What is SMS pumping?\"}),/*#__PURE__*/r(\"p\",{children:[\"SMS pumping, also known as \",/*#__PURE__*/e(t,{href:\"https://prelude.so/blog/what-is-international-revenue-share-fraud-(irsf)-an-overview\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"International Revenue Share Fraud (IRSF)\"})}),\", is a scheme where attackers exploit OTP systems to generate illegitimate SMS traffic. \"]}),/*#__PURE__*/e(\"p\",{children:\"Here\u2019s how it works:\"}),/*#__PURE__*/r(\"ol\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Collusion with telecom operators:\"}),\" fraudsters partner with certain telecom providers to profit from high-rate international SMS traffic, \",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Triggering fake requests:\"}),\" by repeatedly requesting OTPs to numbers under these agreements, attackers generate excessive traffic, \",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"You pay, they profit:\"}),\" every SMS sent to these fraudulent numbers increases your costs, leaving you with inflated bills.\"]})})]}),/*#__PURE__*/e(\"p\",{children:\"This form of fraud not only impacts your bottom line but also strains your infrastructure, potentially leading to delays for legitimate users.\"}),/*#__PURE__*/e(\"h4\",{children:\"How to detect SMS pumping?\"}),/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(t,{href:\"https://prelude.so/blog/preventing-sms-pumping-fraud\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"Detecting SMS pumping\"})}),\" early can prevent significant financial and operational damage. Watch out for:\"]}),/*#__PURE__*/r(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Unusual traffic spikes:\"}),\" sudden, unexplained increases in OTP requests, especially from specific regions or prefixes, often signal fraudulent activity,\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"High failure rates:\"}),\" a large number of undeliverable messages to the same region or set of numbers could indicate misuse, \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Suspicious patterns:\"}),\" repeated requests from the same users or IP addresses within a short time frame should raise red flags.\"]})})]}),/*#__PURE__*/e(\"h4\",{children:\"How to prevent SMS pumping?\"}),/*#__PURE__*/e(\"p\",{children:\"To stay ahead of fraudsters, deploy a multi-layered defense strategy:\"}),/*#__PURE__*/r(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Rate limiting:\"}),\" restrict the number of OTP requests per user, phone number, or IP address within a given timeframe, \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Geographic filtering:\"}),\" block or flag requests originating from high-risk regions known for fraudulent activity, \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Phone number verification:\"}),\" use lookup tools to validate numbers and detect disposable or fraudulent ones before sending OTPs, \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Real-time monitoring:\"}),\" leverage analytics to detect anomalies and receive alerts for suspicious behavior.\"]})})]}),/*#__PURE__*/e(\"h4\",{children:\"How Prelude helps protect against fraud?\"}),/*#__PURE__*/r(\"p\",{children:[\"Prelude integrates advanced \",/*#__PURE__*/e(t,{href:{webPageId:\"nSTrDjT9o\"},motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"anti-fraud measures to ensure your OTP system stays secure\"})}),\" and cost-efficient. Here\u2019s what sets it apart:\"]}),/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Four-layer protection:\"}),\" Prelude combines heuristics, AI models, commercial data providers, and shared intelligence from its client network to block fraudulent traffic with accuracy :\\xa0\"]}),/*#__PURE__*/r(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Heuristics:\"}),\" basic rules to block up to 70% of attacks, \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"AI models:\"}),\" advanced algorithms to stop an additional 99% of threats beyond heuristics, \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Data enrichment:\"}),\" commercial databases for precise fraud detection, \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Shared knowledge:\"}),\" a collaborative approach ensures that fraud detected for one client benefits all, \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Granular blocking:\"}),\" rather than shutting out entire regions, Prelude pinpoints and blocks fraudulent traffic while allowing legitimate users to connect.\"]})})]}),/*#__PURE__*/e(\"h4\",{children:\"Why proactive fraud prevention matters?\\xa0\"}),/*#__PURE__*/r(\"p\",{children:[\"Fraud prevention isn\u2019t just about saving money, it\u2019s about maintaining\",/*#__PURE__*/e(\"strong\",{children:\" the integrity of your system and ensuring a smooth experience for your users. \"}),\"By addressing fraud proactively, you protect your budget, enhance system reliability, and build trust with your audience. Make sure to always choose a \",/*#__PURE__*/e(t,{href:\"https://prelude.so/blog/secure-otp\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"secure OTP provider\"})}),\". \"]}),/*#__PURE__*/e(\"h3\",{children:\"Choose the right OTP (One-Time Password) service provider\"}),/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(t,{href:\"https://prelude.so/blog/the-best-otp-service-providers\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"Selecting the right OTP service provider\"})}),\" is critical for ensuring smooth, reliable, and cost-effective delivery of OTPs to your users. The right provider will offer more than just high-quality delivery; \",/*#__PURE__*/e(\"strong\",{children:\"they\u2019ll also align with your business needs, scalability, and budget. \"}),\"Here\u2019s what to consider:\"]}),/*#__PURE__*/e(\"h4\",{children:\"Delivery rates and speed\"}),/*#__PURE__*/r(\"p\",{children:[\"When it comes to OTPs, speed and reliability are non-negotiable. Your users expect to receive their OTPs instantly, without delays. A provider that delivers fast OTPs \",/*#__PURE__*/e(\"strong\",{children:\"helps reduce the chances of codes expiring\"}),\", which can frustrate users.\"]}),/*#__PURE__*/r(\"p\",{children:[\"Look for a provider that ensures quick delivery, ideally with a proven track record for high success rates. This guarantees OTPs are delivered on time, reducing the risk of failed deliveries, \",/*#__PURE__*/e(\"strong\",{children:\"which could cost you both money and user trust\"}),\".\"]}),/*#__PURE__*/e(\"h4\",{children:\"Global reach\"}),/*#__PURE__*/r(\"p\",{children:[\"Your business might have users all around the world, so it's important to choose\",/*#__PURE__*/e(\"strong\",{children:\" a provider with global reach.\"}),\" A good OTP provider will ensure that messages are sent successfully to users in any region, without worrying about the reliability of their networks.\"]}),/*#__PURE__*/r(\"p\",{children:[\"Check if your provider has strong coverage in key regions where your users are located. If your service spans across different countries, a provider with international routing capabilities and local sender IDs \",/*#__PURE__*/e(\"strong\",{children:\"can significantly enhance delivery success \"}),\"and \",/*#__PURE__*/e(t,{href:\"https://prelude.so/blog/sunday-case-study\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:\"user engagement\"})}),\".\"]}),/*#__PURE__*/e(\"h4\",{children:\"Ease of integration\"}),/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"The process of integrating your OTP system should be quick and seamless. \"}),\"Your chosen provider must offer simple integration with your existing platforms - whether it's mobile apps, websites, or customer service systems.\"]}),/*#__PURE__*/r(\"p\",{children:[\"Look for providers that offer clear and comprehensive API documentation, along with SDKs or pre-built libraries to speed up implementation. \",/*#__PURE__*/e(\"strong\",{children:\"The easier it is to integrate, the faster you can roll out OTPs across your system.\"})]}),/*#__PURE__*/e(\"h4\",{children:\"Transparent pricing\"}),/*#__PURE__*/r(\"p\",{children:[\"No one likes hidden costs, especially when it comes to managing large volumes of OTP messages. \",/*#__PURE__*/e(\"strong\",{children:\"Ensure your provider offers clear and transparent pricing. \"}),\"You should know exactly what you're paying for, with no surprises at the end of the month.\"]}),/*#__PURE__*/r(\"p\",{children:[\"Make sure the pricing structure is easy to understand and includes all associated costs, from the per-message price to any extra charges for international routes or retries. A provider with flexible pricing based on your volume \",/*#__PURE__*/e(\"strong\",{children:\"can also help you scale as your business grows.\"})]}),/*#__PURE__*/e(\"h4\",{children:\"Customer support\"}),/*#__PURE__*/r(\"p\",{children:[\"Even the best OTP systems can run into occasional issues, so solid customer support is essential. Choose a provider that offers \",/*#__PURE__*/e(\"strong\",{children:\"responsive and accessible support when you need it.\"})]}),/*#__PURE__*/r(\"p\",{children:[\"Look for providers who offer 24/7 support, ideally with a dedicated team familiar with OTP-related issues. Multiple support channels - like live chat, email, or phone - make it \",/*#__PURE__*/e(\"strong\",{children:\"easy to get help quickly when problems arise.\"})]}),/*#__PURE__*/r(\"p\",{children:[\"Choosing the right OTP service provider isn\u2019t just about delivery - it\u2019s about ensuring that your system is reliable, cost-effective, and ready to scale with your business. By focusing on speed, global coverage, integration ease, pricing clarity, and top-notch support, \",/*#__PURE__*/e(\"strong\",{children:\"you'll have the foundation for an OTP system that keeps both your users and budget secure.\"})]}),/*#__PURE__*/e(\"p\",{children:\"Optimizing your OTP system isn\u2019t just about security; it\u2019s about creating a seamless, cost-effective experience for your users. By implementing best practices like message optimization, multi-routing, and diversifying delivery channels, you can tackle common challenges like fraud, delivery failures, and rising costs. With the right approach, you can improve user satisfaction while keeping your system secure and efficient.\"}),/*#__PURE__*/r(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Ready to optimize your OTP system? Start \"}),/*#__PURE__*/e(t,{href:\"https://app.prelude.so/sign-up\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:/*#__PURE__*/e(\"strong\",{children:\"for free\"})})}),/*#__PURE__*/e(\"strong\",{children:\" with Prelude and see how we can help reduce your verification costs and improve conversions. Or, \"}),/*#__PURE__*/e(t,{href:\"https://prelude.so/contact\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(n.a,{children:/*#__PURE__*/e(\"strong\",{children:\"reach out to our sales team\"})})}),/*#__PURE__*/e(\"strong\",{children:\" to learn more about how we can support your OTP process!\"})]})]});\nexport const __FramerMetadata__ = {\"exports\":{\"richText5\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText1\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText4\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText3\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText6\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText2\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"__FramerMetadata__\":{\"type\":\"variable\"}}}"],
  "mappings": "+LAAsJ,IAAMA,EAAsBC,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAC,iCAA8CE,EAAE,SAAS,CAAC,SAAS,0EAA0E,CAAC,EAAE,yIAAsJA,EAAE,SAAS,CAAC,SAAS,sCAAsC,CAAC,EAAE,QAAqBA,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,0CAAkDE,EAAE,SAAS,CAAC,SAAS,qCAAqC,CAAC,EAAE,oMAA+L,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oDAAoD,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,gDAAwDE,EAAE,SAAS,CAAC,SAAS,2EAAsE,CAAC,EAAE,mDAAmD,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+BAA+B,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,WAAwBE,EAAE,SAAS,CAAC,SAAS,wCAA8B,CAAC,EAAE,8IAA8I,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,gCAA6CE,EAAE,SAAS,CAAC,SAAS,yDAAyD,CAAC,EAAE,4GAA4G,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6BAA6B,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oBAAiCE,EAAE,SAAS,CAAC,SAAS,qCAA2B,CAAC,EAAE,gKAAgK,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,+CAA4DE,EAAE,SAAS,CAAC,SAAS,mDAAmD,CAAC,EAAE,yHAAyH,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0BAA0B,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,6CAA0DE,EAAE,SAAS,CAAC,SAAS,+DAA+D,CAAC,EAAE,4DAA4D,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,8HAA2IE,EAAE,SAAS,CAAC,SAAS,mCAAmC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yCAAyC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,uDAAoEE,EAAE,SAAS,CAAC,SAAS,qEAAqE,CAAC,EAAE,8IAA8I,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,UAAuBE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,4BAA4B,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAC,YAAyBE,EAAE,SAAS,CAAC,SAAS,+DAA+D,CAAC,EAAeA,EAAEC,EAAE,CAAC,KAAK,mHAAmH,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAsBF,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,qDAAqD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAC,+CAA4DE,EAAEC,EAAE,CAAC,KAAK,0GAA0G,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAsBF,EAAE,SAAS,CAAC,SAAS,6DAA6D,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAC,oBAAiCE,EAAE,SAAS,CAAC,SAAS,0BAA0B,CAAC,EAAE,KAAkBA,EAAEC,EAAE,CAAC,KAAK,kGAAkG,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBH,EAAEI,EAAE,EAAE,CAAC,SAAS,CAAC,aAA0BF,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,sDAAsD,CAAC,CAAC,CAAC,CAAC,EAAE,yEAAyE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAC,qCAAkDE,EAAEC,EAAE,CAAC,KAAK,oFAAoF,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBH,EAAEI,EAAE,EAAE,CAAC,SAAS,CAAcF,EAAE,SAAS,CAAC,SAAS,yDAAyD,CAAC,EAAE,WAAwBA,EAAE,SAAS,CAAC,SAAS,kCAAkC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,uDAAuD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,6BAA0CE,EAAE,SAAS,CAAC,SAAS,yCAAyC,CAAC,EAAE,sIAAiI,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kCAAkC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,4BAAyCE,EAAE,SAAS,CAAC,SAAS,uCAAuC,CAAC,EAAE,2HAAsH,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6CAA6C,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,mBAAgCE,EAAE,SAAS,CAAC,SAAS,qCAAqC,CAAC,EAAE,kFAAkF,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,EAAE,+HAA+H,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAE,mIAAmI,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,uBAAuB,CAAC,EAAE,wIAAwI,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,sCAAmDE,EAAEC,EAAE,CAAC,KAAK,gDAAgD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,4CAA4C,CAAC,CAAC,CAAC,EAAE,4CAA4C,CAAC,CAAC,EAAeJ,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,0BAA0B,CAAC,EAAE,kGAAkG,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qBAAqB,CAAC,EAAE,iHAAiH,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,kGAA+GE,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,EAAE,0BAAuCA,EAAE,SAAS,CAAC,SAAS,8CAA8C,CAAC,EAAE,oFAAoF,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,8CAA2DE,EAAE,SAAS,CAAC,SAAS,uCAAuC,CAAC,EAAE,kCAAkC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,4EAA4E,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,EAAE,6EAA6E,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,EAAE,uEAAuE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,0BAA0B,CAAC,EAAE,qEAAqE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,+GAA4HE,EAAE,SAAS,CAAC,SAAS,uDAAuD,CAAC,EAAE,gFAAgF,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sDAAsD,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,+CAAuDE,EAAE,SAAS,CAAC,SAAS,0DAA0D,CAAC,EAAE,oJAA+I,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uBAAuB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oJAAoJ,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,+BAA+B,CAAC,EAAE,iCAAiC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,EAAE,2BAA2B,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,6CAA6C,CAAC,EAAE,kCAAkC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2FAA2F,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uBAAuB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kJAAkJ,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,2BAA2B,CAAC,EAAE,8BAA8B,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,2DAAsD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qBAAqB,CAAC,EAAE,gCAAgC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iHAAiH,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0BAA0B,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,8BAA2CE,EAAEC,EAAE,CAAC,KAAK,0CAA0C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,qBAAqB,CAAC,CAAC,CAAC,EAAE,sDAAsD,CAAC,CAAC,EAAeJ,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,8BAA8B,CAAC,EAAE,qBAAqB,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,6BAA6B,CAAC,EAAE,gCAAgC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,EAAE,+BAA+B,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uFAAuF,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2BAA2B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uHAAuH,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,4BAA4B,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,uBAAuB,CAAC,EAAE,qCAAqC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,EAAE,+BAA+B,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wFAAwF,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4BAA4B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uHAAuH,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAE,oBAAoB,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,0BAA0B,CAAC,EAAE,yBAAyB,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,6BAA6B,CAAC,EAAE,8CAA8C,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uHAAuH,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,sHAAmIE,EAAE,SAAS,CAAC,SAAS,kEAAkE,CAAC,EAAE,YAAY,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kCAAkC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,sCAAmDE,EAAE,SAAS,CAAC,SAAS,4BAA4B,CAAC,EAAE,kEAA+EA,EAAE,SAAS,CAAC,SAAS,2BAA2B,CAAC,EAAE,gKAA6KA,EAAE,SAAS,CAAC,SAAS,uDAAuD,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+BAA+B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qHAAqH,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,0BAA0B,CAAC,EAAE,qFAAqF,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,0BAA0B,CAAC,EAAE,6FAA6F,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qBAAqB,CAAC,EAAE,6EAA6E,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0BAA0B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mFAAmF,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mCAAmC,CAAC,EAAE,uEAAuE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,uBAAuB,CAAC,EAAE,mGAAmG,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,4BAA4B,CAAC,EAAE,2EAA2E,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,6BAA6B,CAAC,EAAE,+EAA+E,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,EAAE,wHAAwH,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qCAAqC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8HAA8H,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qBAAqB,CAAC,EAAE,uHAAuH,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,0BAA0B,CAAC,EAAE,mGAAmG,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6BAA6B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kEAAkE,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mCAAmC,CAAC,EAAE,kHAAkH,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,6BAA6B,CAAC,EAAE,0KAA0K,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wQAAwQ,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,sDAA8DE,EAAE,SAAS,CAAC,SAAS,+CAA0C,CAAC,EAAE,mKAAgLA,EAAE,SAAS,CAAC,SAAS,oCAAoC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yBAAyB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,gDAA6DE,EAAE,SAAS,CAAC,SAAS,uCAAuC,CAAC,EAAE,wHAAwH,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,2BAA2B,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,8CAA2DE,EAAEC,EAAE,CAAC,KAAK,CAAC,UAAU,WAAW,EAAE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAsBF,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,gCAA6CA,EAAE,SAAS,CAAC,SAAS,8BAA8B,CAAC,EAAE,2DAA2D,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sCAAsC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,gJAA6JE,EAAE,SAAS,CAAC,SAAS,yCAAyC,CAAC,EAAE,oDAAiEA,EAAEC,EAAE,CAAC,KAAK,4CAA4C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,2BAA2B,CAAC,CAAC,CAAC,EAAE,eAAe,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,kLAA6K,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oCAAoC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,iGAA8GE,EAAE,SAAS,CAAC,SAAS,iDAAiD,CAAC,EAAE,mCAAmC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,gCAAgC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,6DAA6D,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,gDAAgD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,+CAA+C,CAAC,EAAE,mGAAmG,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,gDAA6DE,EAAE,SAAS,CAAC,SAAS,gBAAgB,CAAC,EAAE,iLAAiL,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,wBAAqCE,EAAE,SAAS,CAAC,SAAS,kCAAkC,CAAC,EAAE,4RAA+RA,EAAE,SAAS,CAAC,SAAS,iEAA4D,CAAC,EAAE,4BAA4B,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oEAAoE,CAAC,EAAeA,EAAEC,EAAE,CAAC,KAAK,iCAAiC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAsBF,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,MAAM,CAAC,EAAeA,EAAEC,EAAE,CAAC,KAAK,6BAA6B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAsBF,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,kDAAkD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeG,EAAuBL,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAC,qCAA6CE,EAAE,SAAS,CAAC,SAAS,2BAA2B,CAAC,EAAE,+CAA+C,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yWAAoW,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0EAA0E,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wBAAwB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2QAAsQ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0NAA0N,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qBAAqB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+JAA+J,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wKAAmK,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0BAA0B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mDAA8C,CAAC,EAAeA,EAAE,MAAM,CAAC,IAAI,+BAA+B,UAAU,eAAe,OAAO,MAAM,IAAI,uEAAuE,OAAO,uQAAuQ,MAAM,CAAC,YAAY,YAAY,EAAE,MAAM,KAAK,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,sFAAsF,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,uIAAkI,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,mHAA8G,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,kFAAkF,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,uIAAkI,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iQAA4P,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,iEAAiE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,8EAA8E,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oCAAoC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,eAAe,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAC,KAAkBE,EAAEC,EAAE,CAAC,KAAK,iCAAiC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,iBAAiB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAC,OAAoBE,EAAEC,EAAE,CAAC,KAAK,+DAA+D,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,eAAe,CAAC,CAAC,CAAC,EAAE,mJAAmJ,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,eAAe,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,iDAA8DE,EAAEC,EAAE,CAAC,KAAK,0BAA0B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,YAAY,CAAC,CAAC,CAAC,EAAE,sCAAsC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,gIAAgI,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAsBA,EAAEC,EAAE,CAAC,KAAK,qCAAqC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,SAAS,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAsBA,EAAEC,EAAE,CAAC,KAAK,yCAAyC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,aAAa,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAsBA,EAAEC,EAAE,CAAC,KAAK,8CAA8C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,kBAAkB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,6CAA6C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oRAA+Q,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,mEAAgFE,EAAEC,EAAE,CAAC,KAAK,iCAAiC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,6BAA6B,CAAC,CAAC,CAAC,EAAE,OAAoBF,EAAEC,EAAE,CAAC,KAAK,6BAA6B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,wBAAwB,CAAC,CAAC,CAAC,EAAE,iBAAiB,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeE,EAAuBN,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAC,+LAA4ME,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,0EAAqE,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,wCAAgDE,EAAE,SAAS,CAAC,SAAS,2BAA2B,CAAC,EAAE,8FAA8F,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4BAA4B,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,8NAA2OE,EAAEC,EAAE,CAAC,KAAK,6CAA6C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,oBAAoB,CAAC,CAAC,CAAC,EAAE,qCAAqC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,4QAA4Q,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,iBAA8BE,EAAE,SAAS,CAAC,SAAS,gBAAgB,CAAC,EAAE,OAAoBA,EAAE,SAAS,CAAC,SAAS,qCAAqC,CAAC,EAAE,8BAA2CA,EAAEC,EAAE,CAAC,KAAK,uFAAuF,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAsBF,EAAE,SAAS,CAAC,SAAS,4CAA4C,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,oGAAoG,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4BAA4B,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,uFAAoGE,EAAE,SAAS,CAAC,SAAS,uBAAuB,CAAC,EAAeA,EAAEC,EAAE,CAAC,KAAK,kDAAkD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAsBF,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,qCAAqC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,+EAA4FE,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,EAAE,+IAA+I,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oMAAiNE,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,6TAA6T,CAAC,CAAC,EAAeA,EAAE,MAAM,CAAC,IAAI,gCAAgC,UAAU,eAAe,OAAO,MAAM,IAAI,uEAAuE,OAAO,uQAAuQ,MAAM,CAAC,YAAY,aAAa,EAAE,MAAM,KAAK,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,aAA0BE,EAAE,SAAS,CAAC,SAAS,6EAA6E,CAAC,EAAE,gDAAgD,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+BAA+B,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yBAAyB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,mCAAgDE,EAAE,KAAK,CAAC,SAAS,iFAAuE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8JAA+I,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+OAA0O,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sOAAiO,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qBAAqB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yKAAyK,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mKAA8J,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6MAA6M,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,wEAAgFE,EAAE,SAAS,CAAC,SAAS,uBAAuB,CAAC,EAAE,wHAAwH,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uRAAkR,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wCAAwC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,yCAAsDE,EAAEC,EAAE,CAAC,KAAK,wCAAwC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,KAAK,CAAC,CAAC,CAAC,EAAE,sKAAmLF,EAAEC,EAAE,CAAC,KAAK,sFAAsF,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,QAAQ,CAAC,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,EAAeF,EAAE,MAAM,CAAC,IAAI,+BAA+B,UAAU,eAAe,OAAO,MAAM,IAAI,qEAAqE,OAAO,iQAAiQ,MAAM,CAAC,YAAY,YAAY,EAAE,MAAM,KAAK,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,eAA4BE,EAAEC,EAAE,CAAC,KAAK,kEAAkE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,mBAAmB,CAAC,CAAC,CAAC,EAAE,kLAAkL,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,iEAAiE,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6BAA6B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sOAAsO,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kQAAkQ,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qCAAqC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2NAAsN,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iFAAiF,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,yBAAyB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,yCAAyC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,+CAA+C,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,+BAA+B,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uJAAkJ,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2BAA2B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mQAAoP,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iQAAiQ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uPAAuP,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yCAAyC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,yFAAsGE,EAAE,SAAS,CAAC,SAAS,wCAAwC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0LAA0L,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mOAAyN,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wLAAwL,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yKAA+J,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uRAAkR,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yIAAyI,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4BAA4B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kRAAwQ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4OAA4O,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kCAAkC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gNAAgN,CAAC,EAAeA,EAAE,MAAM,CAAC,IAAI,kCAAkC,UAAU,eAAe,OAAO,MAAM,IAAI,oEAAoE,OAAO,8PAA8P,MAAM,CAAC,YAAY,YAAY,EAAE,MAAM,KAAK,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sCAAsC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iGAA4F,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4KAAuK,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2CAA2C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8MAA8M,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0CAA0C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iLAA4K,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yHAAyH,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2BAA2B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6LAAwL,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6LAAwL,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qCAAqC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iHAAiH,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wIAAwI,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+BAA+B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0MAA0M,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0JAAsJ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kFAAkF,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iDAAiD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sKAAsK,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yPAAyP,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qYAAqY,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uBAAuB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oUAAqT,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6BAA6B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2HAAsH,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,2BAA2B,CAAC,EAAE,2OAAsO,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2BAA2B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6JAA6J,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4IAAuI,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yPAAyP,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8PAA8P,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iJAAiJ,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yCAAyC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mHAA8G,CAAC,EAAeA,EAAE,MAAM,CAAC,IAAI,gCAAgC,UAAU,eAAe,OAAO,MAAM,IAAI,sEAAsE,OAAO,oQAAoQ,MAAM,CAAC,YAAY,YAAY,EAAE,MAAM,KAAK,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wTAAmT,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qQAAgQ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gNAA2M,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yCAAyC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qQAAqQ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qOAAqO,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yJAAyJ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mGAAmG,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,iEAAyEE,EAAEC,EAAE,CAAC,KAAK,iCAAiC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAsBF,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,6EAAmE,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,mBAAgCE,EAAEC,EAAE,CAAC,KAAK,CAAC,UAAU,WAAW,EAAE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAsBF,EAAE,SAAS,CAAC,SAAS,iCAAiC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,mJAA8I,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeK,EAAuBP,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,SAAsBA,EAAE,SAAS,CAAC,SAAS,0DAAqD,CAAC,EAAE,4KAAyLA,EAAE,SAAS,CAAC,SAAS,wCAAwC,CAAC,EAAE,wEAAqFA,EAAEC,EAAE,CAAC,KAAK,wGAAwG,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,mEAAmE,CAAC,CAAC,CAAC,EAAE,4FAA4F,CAAC,CAAC,EAAeJ,EAAE,IAAI,CAAC,SAAS,CAAC,sGAAmHE,EAAE,SAAS,CAAC,SAAS,iFAAiF,CAAC,EAAE,qNAAwNA,EAAE,SAAS,CAAC,SAAS,4DAA4D,CAAC,EAAE,2BAA2B,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sDAAsD,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qCAAqC,CAAC,EAAE,2MAAmNA,EAAE,SAAS,CAAC,SAAS,2CAA2C,CAAC,EAAE,iCAAiC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qBAAqB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,4DAAkD,CAAC,EAAE,kJAA6I,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,+FAA4GE,EAAE,SAAS,CAAC,SAAS,4DAA4D,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yNAAoN,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,wEAAqFE,EAAEC,EAAE,CAAC,KAAK,uGAAuG,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,kCAAkC,CAAC,CAAC,CAAC,EAAE,+BAA4CF,EAAE,SAAS,CAAC,SAAS,kDAAkD,CAAC,EAAE,eAA4BA,EAAEC,EAAE,CAAC,KAAK,wFAAwF,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,kDAAkD,CAAC,CAAC,CAAC,EAAE,wDAAwD,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,iBAAiB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,2KAAwLE,EAAE,SAAS,CAAC,SAAS,yFAAyF,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,2KAA8KE,EAAE,SAAS,CAAC,SAAS,iDAAiD,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,iGAA8GE,EAAEC,EAAE,CAAC,KAAK,wGAAwG,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,4EAA4E,CAAC,CAAC,CAAC,EAAE,+KAA4LF,EAAE,SAAS,CAAC,SAAS,mCAAmC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAEC,EAAE,CAAC,KAAK,iDAAiD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,kBAAkB,CAAC,CAAC,CAAC,EAAE,+JAA4KF,EAAE,SAAS,CAAC,SAAS,kEAAkE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qPAAqP,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,4BAAyCE,EAAEC,EAAE,CAAC,KAAK,gEAAgE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,sDAAsD,CAAC,CAAC,CAAC,EAAE,qEAAqE,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,yBAAyB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,6HAA0IE,EAAE,SAAS,CAAC,SAAS,+DAA0D,CAAC,EAAE,uDAAuD,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,kLAA+LE,EAAE,SAAS,CAAC,SAAS,2DAA2D,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,4BAAyCE,EAAEC,EAAE,CAAC,KAAK,6FAA6F,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,8DAA8D,CAAC,CAAC,CAAC,EAAE,kJAAkJ,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,uBAAuB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,4EAAyFE,EAAE,SAAS,CAAC,SAAS,8BAA8B,CAAC,EAAE,kHAAkH,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,gJAA6JE,EAAE,SAAS,CAAC,SAAS,qEAAqE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2DAA2D,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,kFAA+FE,EAAE,SAAS,CAAC,SAAS,0CAA0C,CAAC,EAAE,+DAA+D,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,4DAAyEE,EAAE,SAAS,CAAC,SAAS,qDAAqD,CAAC,EAAE,8GAA8G,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wBAAwB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,gCAA6CE,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAC,yFAAsGE,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAC,+HAA4IE,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,2IAA2I,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kCAAkC,CAAC,EAAE,gGAAgG,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uCAAuC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,uEAAuE,CAAC,EAAE,oKAAoK,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oEAA0D,CAAC,EAAE,gJAAgJ,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,8KAA2LE,EAAE,SAAS,CAAC,SAAS,gDAAgD,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,mDAAgEE,EAAE,SAAS,CAAC,SAAS,kGAAkG,CAAC,EAAE,4JAA4J,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kCAAkC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,sCAAmDE,EAAE,SAAS,CAAC,SAAS,mDAAmD,CAAC,EAAE,gJAAgJ,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,eAAuBE,EAAE,SAAS,CAAC,SAAS,wCAAwC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yBAAyB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,8CAA2DE,EAAE,SAAS,CAAC,SAAS,sEAAsE,CAAC,EAAE,+JAA+J,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4BAA4B,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,kDAA+DE,EAAE,SAAS,CAAC,SAAS,qCAAqC,CAAC,EAAE,yHAAyH,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wCAAwC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,iIAAyIE,EAAE,SAAS,CAAC,SAAS,oFAAoF,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+BAA+B,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,iHAAyHE,EAAE,SAAS,CAAC,SAAS,qEAAqE,CAAC,EAAE,yDAAyD,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wCAAwC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,4CAA4C,CAAC,EAAE,wFAAqGA,EAAE,SAAS,CAAC,SAAS,oDAAoD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6CAA6C,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,6JAA0KE,EAAE,SAAS,CAAC,SAAS,mEAAmE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oHAAiIE,EAAE,SAAS,CAAC,SAAS,uCAAuC,CAAC,EAAE,oEAAoE,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gDAAgD,CAAC,EAAE,4LAA4L,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,sCAAmDE,EAAE,SAAS,CAAC,SAAS,sCAAsC,CAAC,EAAE,kIAA+IA,EAAE,SAAS,CAAC,SAAS,sEAAsE,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0CAA0C,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,UAAuBE,EAAE,SAAS,CAAC,SAAS,mCAAmC,CAAC,EAAE,+IAA4JA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAsBA,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,EAAE,wIAAqJA,EAAEC,EAAE,CAAC,KAAK,6CAA6C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,2BAA2B,CAAC,CAAC,CAAC,EAAE,gBAAgB,CAAC,CAAC,EAAeJ,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAE,6JAAwJ,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,+FAA+F,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mHAAmH,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wCAAwC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,4BAAyCE,EAAE,SAAS,CAAC,SAAS,mCAAmC,CAAC,EAAE,6EAA0FA,EAAE,SAAS,CAAC,SAAS,YAAY,CAAC,EAAE,qDAAqD,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,0GAA0G,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAC,gDAAwDE,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAE,QAAqBA,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,6BAA0CE,EAAE,SAAS,CAAC,SAAS,+CAA0C,CAAC,EAAE,wHAAwH,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qDAAqD,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,kCAA+CE,EAAE,SAAS,CAAC,SAAS,uBAAuB,CAAC,EAAE,gJAA6JA,EAAE,SAAS,CAAC,SAAS,YAAY,CAAC,EAAE,6CAA6C,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,sCAAsC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,+BAA+B,CAAC,EAAE,iGAA4F,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,8BAA8B,CAAC,EAAE,2GAA2G,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,EAAE,gFAAgF,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,4FAAyGE,EAAE,SAAS,CAAC,SAAS,2CAA2C,CAAC,EAAE,oEAAoE,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iDAAiD,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,MAAmBE,EAAE,SAAS,CAAC,SAAS,mCAAmC,CAAC,EAAE,mLAAgMA,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,mEAAmE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAC,qBAAkCE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,QAAqBA,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAE,oEAAoE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,+CAA4DE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,2DAA2D,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oDAAoD,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,kMAA+ME,EAAE,SAAS,CAAC,SAAS,wEAAwE,CAAC,EAAE,IAAI,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8BAA8B,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,sDAAsD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,qEAAqE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,oDAAoD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,aAA0BE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,+IAA+I,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6XAAmX,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sFAAsF,CAAC,EAAeA,EAAEC,EAAE,CAAC,KAAK,iCAAiC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAsBF,EAAE,SAAS,CAAC,SAAS,SAAS,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,MAAM,CAAC,EAAeA,EAAEC,EAAE,CAAC,KAAK,6BAA6B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAsBF,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeM,EAAuBR,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAC,qFAA6FE,EAAE,SAAS,CAAC,SAAS,sCAAsC,CAAC,EAAE,iDAA8DA,EAAE,SAAS,CAAC,SAAS,4BAA4B,CAAC,EAAE,6BAA0CA,EAAE,SAAS,CAAC,SAAS,8BAA8B,CAAC,EAAE,yEAAyE,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,wEAAqFE,EAAEC,EAAE,CAAC,KAAK,yDAAyD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAsBF,EAAE,SAAS,CAAC,SAAS,4BAA4B,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,GAAG,CAAC,EAAE,oEAAiFA,EAAE,SAAS,CAAC,SAAS,6DAA6D,CAAC,EAAE,iDAAiD,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,mBAAgCE,EAAE,SAAS,CAAC,SAAS,oFAAoF,CAAC,EAAE,sQAAsQ,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6BAA6B,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,yBAAsCE,EAAE,SAAS,CAAC,SAAS,yEAAyE,CAAC,EAAE,uJAAuJ,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8BAA8B,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAE,sGAAsG,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,EAAE,6FAA6F,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,8BAA8B,CAAC,EAAE,sFAAsF,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mCAAmC,CAAC,EAAE,4HAA4H,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,0BAA0B,CAAC,EAAE,0GAA0G,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,8BAA2CE,EAAE,SAAS,CAAC,SAAS,6FAA6F,CAAC,EAAE,+HAA+H,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8DAA8D,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,4CAAyDE,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,EAAE,mKAAyJ,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAEC,EAAE,CAAC,KAAK,iDAAiD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,yDAAyD,CAAC,CAAC,CAAC,EAAE,cAA2BF,EAAE,SAAS,CAAC,SAAS,2BAA2B,CAAC,EAAE,2KAAiK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kCAAkC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,iJAA8JE,EAAE,SAAS,CAAC,SAAS,iFAA4E,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wCAAwC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oHAA4HE,EAAE,SAAS,CAAC,SAAS,8CAAyC,CAAC,EAAE,sCAAmDA,EAAE,SAAS,CAAC,SAAS,8BAA8B,CAAC,EAAE,uDAAuD,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,+KAA4LE,EAAE,SAAS,CAAC,SAAS,uCAAuC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0CAA0C,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,qCAAkDE,EAAE,SAAS,CAAC,SAAS,yDAAyD,CAAC,EAAE,mHAAmH,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qCAAgC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAE,sEAAmFA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,sNAAmOA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,8BAA8B,CAAC,EAAE,wIAAqJA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qBAAqB,CAAC,EAAE,mBAAgCA,EAAEC,EAAE,CAAC,KAAK,6CAA6C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,kCAAkC,CAAC,CAAC,CAAC,EAAE,wCAAqDF,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,uBAAuB,CAAC,EAAE,+EAA+E,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,mIAAgJE,EAAE,SAAS,CAAC,SAAS,8DAA8D,CAAC,EAAE,qEAAqE,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yDAAyD,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,0IAAuJE,EAAE,SAAS,CAAC,SAAS,oEAAoE,CAAC,EAAE,2CAA2C,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kCAAkC,CAAC,EAAE,yJAAyJ,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,6BAA6B,CAAC,EAAE,2LAAwMA,EAAEC,EAAE,CAAC,KAAK,CAAC,UAAU,WAAW,EAAE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,kEAAkE,CAAC,CAAC,CAAC,EAAE,iJAAiJ,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,oJAAoJ,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,0BAA0B,CAAC,EAAE,oIAAoI,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oCAAiDE,EAAE,SAAS,CAAC,SAAS,2DAA2D,CAAC,EAAE,uHAAoIA,EAAE,SAAS,CAAC,SAAS,gDAAgD,CAAC,EAAE,gEAAgE,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qDAAqD,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oCAAiDE,EAAE,SAAS,CAAC,SAAS,mEAAmE,CAAC,EAAE,uEAAkE,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAE,4EAAyFA,EAAEC,EAAE,CAAC,KAAK,iDAAiD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,mBAAmB,CAAC,CAAC,CAAC,EAAE,mHAAmH,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,8KAA8K,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,+BAA+B,CAAC,EAAE,gMAAgM,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,+BAA+B,CAAC,EAAE,yMAAyM,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qCAAqC,CAAC,EAAE,6JAA6J,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,6BAA6B,CAAC,EAAE,0JAA0J,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oHAAiIE,EAAE,SAAS,CAAC,SAAS,6FAA6F,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6CAA6C,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,2EAAmFE,EAAE,SAAS,CAAC,SAAS,gBAAW,CAAC,EAAE,IAAiBA,EAAE,SAAS,CAAC,SAAS,2CAA2C,CAAC,EAAE,yDAAyD,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0DAA0D,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mDAAmD,CAAC,EAAE,6LAA0MA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qBAAqB,CAAC,EAAE,8KAAsLA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qCAAqC,CAAC,EAAE,2JAAwKA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,uBAAuB,CAAC,EAAE,kKAAkK,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,6BAA0CE,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAE,uKAAuK,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,8BAA2CE,EAAE,SAAS,CAAC,SAAS,iEAAiE,CAAC,EAAE,mGAAmG,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,gCAA6CE,EAAE,SAAS,CAAC,SAAS,gHAAgH,CAAC,EAAE,4GAAyHA,EAAE,SAAS,CAAC,SAAS,2BAA2B,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,gEAA6EE,EAAE,SAAS,CAAC,SAAS,kDAAkD,CAAC,EAAE,8GAAyG,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oEAAoE,CAAC,EAAeA,EAAEC,EAAE,CAAC,KAAK,iCAAiC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAsBF,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,MAAM,CAAC,EAAeA,EAAEC,EAAE,CAAC,KAAK,6BAA6B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAsBF,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,8GAA8G,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeO,EAAuBT,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAC,6CAA0DE,EAAE,SAAS,CAAC,SAAS,iFAAiF,CAAC,EAAE,gCAA6CA,EAAEC,EAAE,CAAC,KAAK,sDAAsD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,qBAAqB,CAAC,CAAC,CAAC,EAAE,+HAA+H,CAAC,CAAC,EAAeJ,EAAE,IAAI,CAAC,SAAS,CAAC,6JAAqKE,EAAE,SAAS,CAAC,SAAS,4EAA4E,CAAC,EAAE,2BAA2B,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,8BAA8B,CAAC,EAAE,gBAA6BA,EAAE,SAAS,CAAC,SAAS,2GAA2G,CAAC,EAAE,wPAAwP,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,qCAAkDE,EAAE,SAAS,CAAC,SAAS,wDAAmD,CAAC,EAAE,8IAA2JA,EAAE,SAAS,CAAC,SAAS,mCAAmC,CAAC,EAAE,4FAA4F,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,0BAAuCE,EAAEC,EAAE,CAAC,KAAK,gEAAgE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,sDAAsD,CAAC,CAAC,CAAC,EAAE,+DAA+D,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,mBAAmB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,6BAA0CE,EAAE,SAAS,CAAC,SAAS,yEAAyE,CAAC,EAAE,qKAAqK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wBAAwB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,mIAAgJE,EAAE,SAAS,CAAC,SAAS,iEAAiE,CAAC,EAAE,uJAAoKA,EAAE,SAAS,CAAC,SAAS,4DAA4D,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,eAA4BE,EAAEC,EAAE,CAAC,KAAK,6CAA6C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,0BAA0B,CAAC,CAAC,CAAC,EAAE,kGAAkG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,aAAa,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,wCAAqDE,EAAE,SAAS,CAAC,SAAS,6CAA6C,CAAC,EAAE,6FAA0GA,EAAE,SAAS,CAAC,SAAS,yDAAyD,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,0CAAuDE,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAE,qIAA6IA,EAAE,SAAS,CAAC,SAAS,uCAAuC,CAAC,EAAE,gDAAgD,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,YAAY,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,mDAAgEE,EAAE,SAAS,CAAC,SAAS,sEAAiE,CAAC,EAAE,2JAAsJ,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,mBAAgCE,EAAE,SAAS,CAAC,SAAS,8FAA8F,CAAC,EAAE,4CAA4C,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6BAA6B,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,4BAA4B,CAAC,EAAE,iOAAiO,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,mBAAgCE,EAAE,SAAS,CAAC,SAAS,6CAA6C,CAAC,EAAE,yFAAyF,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wDAAwD,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,uDAA+DE,EAAE,SAAS,CAAC,SAAS,oFAAoF,CAAC,EAAE,oLAA+K,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,cAAc,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,+IAAuJE,EAAE,SAAS,CAAC,SAAS,2DAA2D,CAAC,EAAE,yCAAyC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,eAA4BE,EAAE,SAAS,CAAC,SAAS,0FAA0F,CAAC,EAAE,mHAA8G,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yBAAyB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oIAAiJE,EAAE,SAAS,CAAC,SAAS,uCAAuC,CAAC,EAAE,qIAAqI,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,wIAAqJE,EAAE,SAAS,CAAC,SAAS,mFAAmF,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,WAAW,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,uEAAuE,CAAC,EAAE,gQAAgQ,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qEAAqE,CAAC,EAAE,+FAA+F,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kBAAkB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wEAAwE,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,mRAAgSE,EAAE,SAAS,CAAC,SAAS,8CAAyC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uCAAuC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,4FAAyGE,EAAE,SAAS,CAAC,SAAS,mEAAmE,CAAC,EAAE,iHAA8HA,EAAEC,EAAE,CAAC,KAAK,gDAAgD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,gEAAgE,CAAC,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,EAAeJ,EAAE,IAAI,CAAC,SAAS,CAAC,YAAyBE,EAAE,SAAS,CAAC,SAAS,mCAAmC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,EAAE,2KAA2K,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,iOAAiO,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kCAAkC,CAAC,EAAE,wLAAmL,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mCAAmC,CAAC,EAAE,wJAAwJ,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,6BAA6B,CAAC,EAAE,0KAA0K,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sIAAsI,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wCAAwC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,gHAA6HE,EAAE,SAAS,CAAC,SAAS,kEAAkE,CAAC,EAAE,IAAI,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4DAA4D,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAE,oPAAoP,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uJAAuJ,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gCAAgC,CAAC,EAAE,gRAAgR,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qCAAqC,CAAC,EAAE,iUAA4T,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oJAA+I,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oDAAoD,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,wDAAqEE,EAAE,SAAS,CAAC,SAAS,kHAA6G,CAAC,EAAE,IAAI,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6DAA6D,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAEC,EAAE,CAAC,KAAK,CAAC,UAAU,WAAW,EAAE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAsBF,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,GAAG,CAAC,EAAE,2VAA2V,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,6BAA6B,CAAC,EAAE,+TAA+T,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kCAAkC,CAAC,EAAE,+UAA+U,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,uBAAuB,CAAC,EAAE,sSAAiS,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sKAAsK,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2WAA2W,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kFAA6E,CAAC,EAAeA,EAAEC,EAAE,CAAC,KAAK,iCAAiC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAsBF,EAAE,SAAS,CAAC,SAAS,UAAU,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,MAAM,CAAC,EAAeA,EAAEC,EAAE,CAAC,KAAK,6BAA6B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAsBF,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,+DAA+D,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeQ,EAAuBV,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gDAAgD,CAAC,EAAE,iRAAuQ,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,qFAA6FE,EAAE,SAAS,CAAC,SAAS,sDAAsD,CAAC,EAAE,qIAAgI,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mDAAmD,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,mBAAgCE,EAAEC,EAAE,CAAC,KAAK,6CAA6C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAsBF,EAAE,SAAS,CAAC,SAAS,YAAY,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,8DAA2EA,EAAE,SAAS,CAAC,SAAS,mFAAmF,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+IAA+I,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAE,+HAA+H,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,8GAA8G,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,QAAQ,CAAC,EAAE,sFAAsF,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,2BAA2B,CAAC,EAAE,gIAAgI,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kFAA6E,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,uCAAoDE,EAAE,SAAS,CAAC,SAAS,sFAAsF,CAAC,EAAE,oHAA+G,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yDAAyD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8HAAyH,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oGAAiHE,EAAE,SAAS,CAAC,SAAS,gDAAgD,CAAC,EAAE,WAAW,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uEAAuE,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,+BAA4CE,EAAE,SAAS,CAAC,SAAS,oCAAoC,CAAC,EAAE,oIAA+H,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,eAAe,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,8EAA2FE,EAAE,SAAS,CAAC,SAAS,uBAAuB,CAAC,EAAE,sFAA4E,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,cAAc,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAC,2CAAwDE,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,EAAE,uBAAuB,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAC,oFAAiGE,EAAE,SAAS,CAAC,SAAS,YAAY,CAAC,EAAE,qBAAqB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,MAAM,CAAC,IAAI,iBAAiB,UAAU,eAAe,OAAO,MAAM,IAAI,sEAAsE,OAAO,sKAAsK,MAAM,CAAC,YAAY,WAAW,EAAE,MAAM,KAAK,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qNAAqN,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mGAAmG,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oCAAoC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,QAAQ,CAAC,EAAE,oDAAiEA,EAAE,SAAS,CAAC,SAAS,4BAA4B,CAAC,EAAE,IAAI,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,QAAQ,CAAC,EAAE,wEAAqFA,EAAE,SAAS,CAAC,SAAS,2BAA2B,CAAC,EAAE,sDAAsD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,cAAc,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAC,mDAAgEE,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,EAAE,IAAI,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAC,8DAAoEE,EAAE,SAAS,CAAC,SAAS,YAAY,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0HAA0H,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,gCAAwCE,EAAE,SAAS,CAAC,SAAS,2CAA2C,CAAC,EAAE,sNAAsN,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yGAAyG,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wCAAwC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,8NAA2OE,EAAE,SAAS,CAAC,SAAS,2GAA2G,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sCAAsC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,2FAAmGE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,IAAI,CAAC,CAAC,EAAeA,EAAE,aAAa,CAAC,SAAsBA,EAAE,IAAI,CAAC,SAAS,gEAAsD,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,sJAAmKE,EAAE,SAAS,CAAC,SAAS,mCAAmC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,sHAA8HE,EAAEC,EAAE,CAAC,KAAK,gGAAgG,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,8BAAyB,CAAC,CAAC,CAAC,EAAE,uCAAuC,CAAC,CAAC,EAAeF,EAAE,aAAa,CAAC,SAAsBA,EAAE,IAAI,CAAC,SAAS,6EAAmE,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,kDAA+DE,EAAE,SAAS,CAAC,SAAS,4BAA4B,CAAC,EAAE,yBAAyB,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,gMAAwMA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAS,CAAcA,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,uBAAuB,CAAC,EAAE,wJAAwJ,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,qNAAgN,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uBAAuB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,4FAAyGE,EAAE,SAAS,CAAC,SAAS,6DAA6D,CAAC,EAAE,sHAAsH,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oCAAoC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,iGAA8GE,EAAEC,EAAE,CAAC,KAAK,4CAA4C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,mBAAmB,CAAC,CAAC,CAAC,EAAE,KAAkBF,EAAE,SAAS,CAAC,SAAS,sHAAsH,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4CAA4C,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oEAAiFE,EAAE,SAAS,CAAC,SAAS,iCAAiC,CAAC,EAAE,4KAA4K,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kBAAa,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAE,qOAAkPA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,6BAA6B,CAAC,EAAE,wQAAgRA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,EAAE,uNAAuN,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4MAA4M,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,0HAAuIE,EAAE,SAAS,CAAC,SAAS,+EAA+E,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0CAA0C,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oEAAiFE,EAAE,SAAS,CAAC,SAAS,sEAAiE,CAAC,EAAE,8IAA8I,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0BAA0B,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,qCAAkDE,EAAE,SAAS,CAAC,SAAS,oEAA+D,CAAC,EAAE,gDAA6DA,EAAEC,EAAE,CAAC,KAAK,qCAAqC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,KAAK,CAAC,CAAC,CAAC,EAAE,oIAAoI,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,8BAA8B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+GAA+G,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qDAAqD,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,4FAA4F,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,wHAAwH,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,8GAA8G,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,8NAA2OE,EAAE,SAAS,CAAC,SAAS,4DAA4D,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0IAA0I,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,uGAAuG,CAAC,EAAE,qLAAqL,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8CAA8C,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,gKAA6KE,EAAE,SAAS,CAAC,SAAS,6CAA6C,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,8BAA2CE,EAAEC,EAAE,CAAC,KAAK,uFAAuF,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,0CAA0C,CAAC,CAAC,CAAC,EAAE,0FAA0F,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,2BAAsB,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mCAAmC,CAAC,EAAE,0GAAuHA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,2BAA2B,CAAC,EAAE,2GAAwHA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,uBAAuB,CAAC,EAAE,oGAAoG,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gJAAgJ,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4BAA4B,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAEC,EAAE,CAAC,KAAK,uDAAuD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,iFAAiF,CAAC,CAAC,EAAeJ,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,EAAE,iIAAiI,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qBAAqB,CAAC,EAAE,wGAAwG,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,EAAE,0GAA0G,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6BAA6B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uEAAuE,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gBAAgB,CAAC,EAAE,uGAAuG,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,uBAAuB,CAAC,EAAE,4FAA4F,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,4BAA4B,CAAC,EAAE,sGAAsG,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,uBAAuB,CAAC,EAAE,qFAAqF,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0CAA0C,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,+BAA4CE,EAAEC,EAAE,CAAC,KAAK,CAAC,UAAU,WAAW,EAAE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,4DAA4D,CAAC,CAAC,CAAC,EAAE,sDAAiD,CAAC,CAAC,EAAeJ,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAE,qKAAqK,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,8CAA8C,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,YAAY,CAAC,EAAE,+EAA+E,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,qDAAqD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,qFAAqF,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAE,uIAAuI,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6CAA6C,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,mFAAsFE,EAAE,SAAS,CAAC,SAAS,iFAAiF,CAAC,EAAE,0JAAuKA,EAAEC,EAAE,CAAC,KAAK,qCAAqC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,qBAAqB,CAAC,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,2DAA2D,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAEC,EAAE,CAAC,KAAK,yDAAyD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,0CAA0C,CAAC,CAAC,CAAC,EAAE,sKAAmLF,EAAE,SAAS,CAAC,SAAS,6EAAwE,CAAC,EAAE,+BAA0B,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0BAA0B,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,0KAAuLE,EAAE,SAAS,CAAC,SAAS,4CAA4C,CAAC,EAAE,8BAA8B,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,mMAAgNE,EAAE,SAAS,CAAC,SAAS,gDAAgD,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,cAAc,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,mFAAgGE,EAAE,SAAS,CAAC,SAAS,gCAAgC,CAAC,EAAE,wJAAwJ,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,qNAAkOE,EAAE,SAAS,CAAC,SAAS,6CAA6C,CAAC,EAAE,OAAoBA,EAAEC,EAAE,CAAC,KAAK,4CAA4C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,iBAAiB,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,qBAAqB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,2EAA2E,CAAC,EAAE,oJAAoJ,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,+IAA4JE,EAAE,SAAS,CAAC,SAAS,qFAAqF,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qBAAqB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,kGAA+GE,EAAE,SAAS,CAAC,SAAS,6DAA6D,CAAC,EAAE,4FAA4F,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,uOAAoPE,EAAE,SAAS,CAAC,SAAS,iDAAiD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kBAAkB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,mIAAgJE,EAAE,SAAS,CAAC,SAAS,qDAAqD,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oLAAiME,EAAE,SAAS,CAAC,SAAS,+CAA+C,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,2RAA8RE,EAAE,SAAS,CAAC,SAAS,4FAA4F,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qbAA2a,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,2CAA2C,CAAC,EAAeA,EAAEC,EAAE,CAAC,KAAK,iCAAiC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAsBF,EAAE,SAAS,CAAC,SAAS,UAAU,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,oGAAoG,CAAC,EAAeA,EAAEC,EAAE,CAAC,KAAK,6BAA6B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAsBF,EAAE,SAAS,CAAC,SAAS,6BAA6B,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,2DAA2D,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EACvuyJS,EAAqB,CAAC,QAAU,CAAC,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,SAAW,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,mBAAqB,CAAC,KAAO,UAAU,CAAC,CAAC",
  "names": ["richText", "u", "x", "p", "Link", "motion", "richText1", "richText2", "richText3", "richText4", "richText5", "richText6", "__FramerMetadata__"]
}
