{"version":3,"file":"RxkZ6cAsR-20.372o6qMn.mjs","names":["n","r"],"sources":["https:/framerusercontent.com/modules/16RLLbqxysVo0DzErswr/Aa68qOtdPx238M8zEb2x/RxkZ6cAsR-20.js"],"sourcesContent":["import{jsx as e,jsxs as t}from\"react/jsx-runtime\";import{Link as n}from\"framer\";import{motion as r}from\"framer-motion\";import*as i from\"react\";export const richText=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[\"Now imagine a high-security vault. Before letting anyone inside, the guard asks two critical questions: \",/*#__PURE__*/e(\"strong\",{children:\"“Who are you?” \"}),\"and\",/*#__PURE__*/e(\"strong\",{children:\" “Can you prove you belong here?”. \"}),\"This is the essence of authentication and verification. While they often work in tandem, they serve distinct purposes.\"]}),/*#__PURE__*/t(\"p\",{children:[\"With the global identity verification market projected to grow to \",/*#__PURE__*/e(\"strong\",{children:\"$24.46 billion by 2028\"}),\", driven by the rapid expansion of digital services and stricter compliance regulations, these processes have become indispensable. Organizations across sectors are increasingly investing in advanced verification and authentication tools to meet security demands and enhance user trust.\"]}),/*#__PURE__*/t(\"p\",{children:[\"For companies managing large user bases - whether in e-commerce, fintech, or SaaS - understanding these processes is critical. This article breaks down \",/*#__PURE__*/e(\"strong\",{children:\"the nuances of authentication and verification\"}),\", when to use each, and best practices to ensure your business remains secure while delivering a seamless user experience. Let’s dive in.\"]}),/*#__PURE__*/e(\"h2\",{children:\"1. What is authentication?\"}),/*#__PURE__*/t(\"p\",{children:[\"Authentication is the process of verifying that someone or something is who or what they claim to be. It acts as a digital checkpoint,\",/*#__PURE__*/e(\"strong\",{children:\" ensuring only authorized users can access a system\"}),\", application, or account. By confirming identity, authentication protects sensitive data, reduces fraud risks, and fosters trust between users and platforms.\"]}),/*#__PURE__*/e(\"h3\",{children:\"How does authentication work?\"}),/*#__PURE__*/e(\"p\",{children:\"At its core, authentication relies on one or more of the following factors to establish identity:\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Something you know:\"})}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"This includes passwords, PINs, or answers to security questions, \"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"While easy to implement, this method is susceptible to attacks like phishing or brute force if not combined with additional factors.\"})})]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Something you have:\"})}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Physical items like a smartphone, a security token, or a smart card fall under this category, \"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"These add an extra layer of protection by requiring users to possess a unique device or object.\"})})]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Something you are:\"})}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Biometric data such as fingerprints, facial recognition, or voice patterns, \"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"This is the most secure method, as it relies on traits unique to each individual.\"})})]}),/*#__PURE__*/t(\"p\",{children:[\"By leveraging one or more of these categories, businesses can build robust authentication systems that determine \",/*#__PURE__*/e(\"strong\",{children:\"“who” the user is\"}),\" with confidence.\"]}),/*#__PURE__*/e(\"h3\",{children:\"What are the common authentication methods?\"}),/*#__PURE__*/e(\"p\",{children:\"Authentication methods translate these principles into practical tools that businesses and individuals use daily. Here’s an overview:\"}),/*#__PURE__*/e(\"h4\",{children:\"Passwords:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"A classic “something you know” factor, passwords are the simplest and most familiar method, \"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Despite their widespread use, they’re increasingly vulnerable to hacks, requiring additional layers of security for sensitive applications.\"})})]}),/*#__PURE__*/e(\"h4\",{children:\"Two-Factor Authentication (2FA):\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Adds an extra step by combining a password with “something you have,” like a code sent to your phone or an authentication app, \"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Significantly reduces the risk of unauthorized access.\"})})]}),/*#__PURE__*/e(\"h4\",{children:\"Biometric authentication:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Relies on unique physical characteristics, such as fingerprints, facial recognition, or voice patterns, \"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Often used for smartphones and secure applications due to its high level of accuracy and convenience.\"})})]}),/*#__PURE__*/e(\"h4\",{children:\"Single Sign-On (SSO):\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Enables users to log in once and access multiple systems or applications, \"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Balances convenience and security, especially in environments with interconnected platforms.\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"How are authentication methods used in real life?\"}),/*#__PURE__*/e(\"p\",{children:\"Authentication methods are deeply embedded in our digital routines, ensuring security across various scenarios:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Passwords:\"}),\" often used to access everyday platforms like email accounts or subscription services. However, they are best paired with additional security layers for sensitive activities, \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Two-Factor Authentication (2FA):\"}),\" regularly implemented for online banking, social media accounts, and e-commerce platforms. It adds a crucial second layer of defense for transactions and logins, \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Biometric Authentication:\"}),\" a go-to choice for unlocking devices, authorizing online payments, and securing sensitive apps like healthcare or finance tools. Its seamless nature makes it highly user-friendly, \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Single Sign-On (SSO):\"}),\" simplifies access in corporate settings, allowing users to log in once and access multiple business tools securely and efficiently.\"]})})]}),/*#__PURE__*/e(\"p\",{children:\"By strategically combining these methods, businesses can deliver authentication systems that meet both security and user experience expectations.\"}),/*#__PURE__*/e(\"h2\",{children:\"2. What is verification?\"}),/*#__PURE__*/t(\"p\",{children:[\"Verification is the process of ensuring that the information provided by a user is valid, accurate, and trustworthy. While \",/*#__PURE__*/e(\"strong\",{children:\"authentication\"}),\" focuses on verifying \",/*#__PURE__*/e(\"strong\",{children:\"who\"}),\" the user is, \",/*#__PURE__*/e(\"strong\",{children:\"verification\"}),\" goes further by confirming the legitimacy of the details they provide—like contact information, addresses, or official documents.\"]}),/*#__PURE__*/t(\"p\",{children:[\"Think of it as a one-time quality check performed at critical moments, such as onboarding new users or processing sensitive transactions. By validating this information upfront, \",/*#__PURE__*/e(\"strong\",{children:\"businesses can reduce fraud risks, ensure compliance\"}),\", and \",/*#__PURE__*/e(\"strong\",{children:\"build a foundation of trust with their users\"}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"What are the main types of verification?\"}),/*#__PURE__*/e(\"p\",{children:\"Verification processes come in many forms, each designed to confirm specific aspects of user-provided information. Here are the most common types:\"}),/*#__PURE__*/e(\"ul\",{children:/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Email or phone verification:\"})})})}),/*#__PURE__*/e(\"p\",{children:\"Email or phone verification ensures that the contact details provided by a user are genuine and accessible. A code is sent to the user’s email or phone number, and they must enter it to confirm ownership.\"}),/*#__PURE__*/t(\"p\",{children:[\"This type of verification is essential for creating secure communication channels, enabling account recovery, and reducing the risks of spam or \",/*#__PURE__*/e(n,{href:\"https://prelude.so/blog/fake-account-creation\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"fake accounts\"})}),\".\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"strong\",{children:/*#__PURE__*/e(\"br\",{})}),\"When registering on an e-commerce platform, users often verify their email address or phone number to activate their account and receive order updates or password recovery options.\"]}),/*#__PURE__*/e(\"ul\",{children:/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Document verification:\"})})})}),/*#__PURE__*/e(\"p\",{children:\"Document verification validates a user’s identity by confirming the authenticity of official documents like passports, driver’s licenses, or certifications. Businesses often use advanced tools, including AI or manual reviews, to ensure accuracy and detect forgeries.\"}),/*#__PURE__*/t(\"p\",{children:[\"This method is widely used in industries where compliance is critical, such as finance, healthcare, or legal services.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"strong\",{children:/*#__PURE__*/e(\"br\",{})}),\"For example, a fintech app may require users to upload an ID to verify their identity before enabling access to sensitive features, like money transfers or account creation.\"]}),/*#__PURE__*/e(\"ul\",{children:/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Address Verification:\"})})})}),/*#__PURE__*/e(\"p\",{children:\"Address verification confirms that users reside at the address they claim. This is often done by requesting proof, such as utility bills, geolocation data, or even sending a verification code to the physical address.\"}),/*#__PURE__*/t(\"p\",{children:[\"This type of verification is crucial for ensuring compliance with legal requirements, preventing fraud, and guaranteeing accurate service delivery.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),\"Online marketplaces may verify sellers' addresses to ensure accountability, comply with tax regulations, and reduce the risk of fraudulent listings.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Why does verification matter?\"}),/*#__PURE__*/e(\"p\",{children:\"Verification plays a vital role in reducing fraud, ensuring regulatory compliance, and improving user trust. By confirming key details upfront, businesses can:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Enhance security:\"}),\" minimize risks of fake accounts, inaccurate information, and unauthorized access, \",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Streamline compliance:\"}),\" meet industry regulations like KYC (Know Your Customer) or AML (Anti-Money Laundering), \",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Boost trust:\"}),\" show users that their data and interactions are handled securely and responsibly.\"]})})]}),/*#__PURE__*/t(\"p\",{children:[\"Additionally, regulatory frameworks such as KYC and AML are major drivers of market growth, prompting businesses to adopt advanced verification tools. With \",/*#__PURE__*/e(n,{href:\"https://www.thebusinessresearchcompany.com/market-insights/global-identity-verification-and-authentication-market-2024\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/t(r.a,{children:[\"the global identity verification market projected t\",/*#__PURE__*/e(\"strong\",{children:\"o reach $24.46 billion by 2028\"})]})}),\", companies that prioritize these processes not only enhance security but also align with industry trends, fostering trust and transparency.\"]}),/*#__PURE__*/t(\"p\",{children:[\"By implementing robust verification processes, businesses lay a strong foundation for secure and trustworthy user interactions. In today’s digital landscape, verification is not just a process - \",/*#__PURE__*/e(\"strong\",{children:\"it’s a cornerstone for building secure, compliant, and reliable user experiences.\"})]}),/*#__PURE__*/e(\"h2\",{children:\"3. What are the key differences between authentication and verification?\"}),/*#__PURE__*/e(\"p\",{children:\"Authentication and verification play distinct but complementary roles in digital security. While both ensure the safety of user data and systems, their purposes, timing, and frequency differ significantly.\"}),/*#__PURE__*/t(\"p\",{children:[\"Verification is typically a \",/*#__PURE__*/e(\"strong\",{children:\"one-time process\"}),\", often performed during onboarding or account setup. Its purpose is to validate the authenticity of the user or the accuracy of their details, such as an email address, phone number, or ID document. For example, when creating an account on an e-commerce platform, users might verify their email address to ensure it’s legitimate and reachable.\"]}),/*#__PURE__*/t(\"p\",{children:[\"In contrast, authentication is an \",/*#__PURE__*/e(\"strong\",{children:\"ongoing process\"}),\" that occurs each time access is requested. Its role is to confirm that the individual attempting to log in or perform an action is indeed the authorized user. This process uses tools like passwords, biometrics, or multi-factor authentication. Logging into a banking app, for instance, requires authentication every session to maintain security.\"]}),/*#__PURE__*/t(\"p\",{children:[\"The key distinction lies in \",/*#__PURE__*/e(\"strong\",{children:\"timing and purpose\"}),\": verification is about establishing trust at the outset, while authentication focuses on maintaining that trust throughout the user’s interactions. Together, they form the backbone of a robust security framework, ensuring both initial and continuous protection.\"]}),/*#__PURE__*/e(\"h2\",{children:\"4. When to use authentication vs. verification?\"}),/*#__PURE__*/e(\"p\",{children:\"Knowing when to use authentication or verification depends on the specific needs of your business and the user’s journey. While both enhance security, they serve different purposes at different stages.\"}),/*#__PURE__*/e(\"h3\",{children:\"Authentication: continuous security\"}),/*#__PURE__*/e(\"p\",{children:\"Authentication is essential for ongoing identity validation and is used whenever continuous access control is required. Common scenarios include:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"When a user logs in:\"}),\" ensures only authorized users can access their accounts or platforms. For example, logging into an e-commerce platform or a financial app, \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"For session continuity:\"}),\" maintains a user’s access without requiring constant re-logins while ensuring the session remains secure. Like staying signed in to a customer dashboard, \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"For multi-factor authentication (MFA):\"}),\" adds an extra layer of security by requiring multiple authentication factors for high-risk actions. For example, authorizing a payment with both a password and a code sent via SMS.\"]})})]}),/*#__PURE__*/e(\"h3\",{children:\"Verification: establishing trust upfront\"}),/*#__PURE__*/e(\"p\",{children:\"Verification is used during critical moments in the user lifecycle to confirm the accuracy and legitimacy of information provided. Scenarios include:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Validating contact details during registration:\"}),\" ensures users provide genuine email addresses or phone numbers, reducing the risk of spam or fake accounts. For example, verifying an email address before activating a new account, \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Confirming billing information before processing payments:\"}),\" reduces the risk of fraudulent transactions and ensures compliance with payment regulations. Like validating credit card details or billing addresses, \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Checking credentials or certifications for compliance:\"}),\" meets legal or industry standards, particularly in regulated sectors like finance or healthcare. By verifying a user’s ID before granting access to sensitive features for example.\"]})})]}),/*#__PURE__*/e(\"h3\",{children:\"Why are both necessary?\"}),/*#__PURE__*/e(\"p\",{children:\"While authentication and verification serve different purposes, both are critical to a comprehensive security strategy. Together, they provide:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Enhanced security:\"}),\" verification ensures that initial user details are accurate, while authentication protects accounts over time from unauthorized access, \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Regulatory compliance:\"}),\" many industries, such as finance, require both processes to meet standards like KYC (Know Your Customer) or AML (Anti-Money Laundering), \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"User trust:\"}),\" implementing these measures shows users that their data and interactions are safeguarded, building long-term loyalty.\"]})})]}),/*#__PURE__*/e(\"p\",{children:\"By combining these processes, you can secure both the onboarding experience and ongoing interactions, ensuring a seamless and trustworthy user journey.\"}),/*#__PURE__*/e(\"h2\",{children:\"5. What are the best practices for authentication and verification?\"}),/*#__PURE__*/e(\"p\",{children:\"To implement authentication and verification effectively, businesses should focus on strategies that ensure security, compliance, and user satisfaction. Here are the key practices to consider:\"}),/*#__PURE__*/e(\"h3\",{children:\"1. Layer security with Multi-Factor Authentication (MFA)\"}),/*#__PURE__*/t(\"p\",{children:[\"Multi-factor authentication enhances security by requiring two or more elements to verify user identity, such as a password, a fingerprint, or a code sent to a phone. This approach provides \",/*#__PURE__*/e(\"strong\",{children:\"an additional safeguard, especially for high-risk actions\"}),\" like accessing financial accounts or authorizing payments.\"]}),/*#__PURE__*/e(\"h3\",{children:\"2. Regularly update and re-verify user information\"}),/*#__PURE__*/t(\"p\",{children:[\"As user details evolve, it’s essential to periodically verify contact information, billing details, and identity documents. This ensures that\",/*#__PURE__*/e(\"strong\",{children:\" records remain accurate and trustworthy\"}),\", which is especially important for maintaining compliance with regulations like KYC (Know Your Customer) or AML (Anti-Money Laundering).\"]}),/*#__PURE__*/e(\"h3\",{children:\"3. Automate verification processes\"}),/*#__PURE__*/t(\"p\",{children:[\"Automation eliminates the inefficiencies and errors associated with manual verification. Tools such as real-time ID validation and phone number checks help businesses \",/*#__PURE__*/e(\"strong\",{children:\"streamline onboarding, improve accuracy\"}),\", and \",/*#__PURE__*/e(\"strong\",{children:\"detect fraudulent activities at scale.\"})]}),/*#__PURE__*/e(\"h3\",{children:\"4. Educate users about the importance of security\"}),/*#__PURE__*/t(\"p\",{children:[\"Clear and transparent communication about authentication and verification processes builds user trust. Providing simple explanations of \",/*#__PURE__*/e(\"strong\",{children:\"how these measures protect accounts encourages users\"}),\" to engage more positively with these systems.\"]}),/*#__PURE__*/e(\"h3\",{children:\"5. Simplify and optimize verification with Prelude\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(n,{href:\"https://prelude.so/\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"Prelude offers a streamlined solution for businesses\"})}),\" aiming to reduce verification complexity and cost. By integrating Prelude’s intelligent SMS API, you can:\"]}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Deliver verification codes reliably across 230+ countries,\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Minimize costs with optimized message routing,\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Enhance security with built-in anti-fraud technology.\"})})]}),/*#__PURE__*/e(\"p\",{children:\"By simplifying verification workflows, we help businesses focus on growth while maintaining robust security and user trust.\"}),/*#__PURE__*/t(\"p\",{children:[\"Authentication and verification are\",/*#__PURE__*/e(\"strong\",{children:\" essential pillars of \"}),/*#__PURE__*/e(n,{href:\"https://prelude.so/blog/credential-stuffing-attacks\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:/*#__PURE__*/e(\"strong\",{children:\"digital security\"})})}),\", each playing a unique role in protecting platforms and fostering user trust. Verification lays the foundation by confirming the legitimacy of user-provided information during onboarding, while authentication ensures ongoing protection with secure access validation. Together, \",/*#__PURE__*/e(\"strong\",{children:\"they create a robust framework to prevent fraud, enhance compliance\"}),\", and \",/*#__PURE__*/e(\"strong\",{children:\"maintain a seamless user experience.\"})]}),/*#__PURE__*/t(\"p\",{children:[\"Whether you’re ensuring data accuracy, securing logins with multi-factor authentication, or streamlining user onboarding, these processes are vital for modern businesses managing large user bases. By adopting best practices and leveraging the right tools, \",/*#__PURE__*/e(\"strong\",{children:\"you can build a security strategy that prioritizes both safety and usability.\"})]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Ready to strengthen your authentication and verification processes? Explore how Prelude can help you streamline workflows, reduce costs, and enhance security - empowering your business to grow with confidence. Try \"}),/*#__PURE__*/e(n,{href:\"https://app.prelude.so/sign-up\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:/*#__PURE__*/e(\"strong\",{children:\"Prelude\"})})}),/*#__PURE__*/e(\"strong\",{children:\" for free or \"}),/*#__PURE__*/e(n,{href:\"https://prelude.so/contact\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:/*#__PURE__*/e(\"strong\",{children:\"contact us\"})})}),/*#__PURE__*/e(\"strong\",{children:\" to learn more.\"})]})]});export const richText1=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"MNOs play a critical role in enabling wireless communication. These companies own and operate the physical infrastructure—like cell towers and radio frequency spectrums—that make mobile services possible.\"}),/*#__PURE__*/e(\"p\",{children:\"From managing SIM cards to building international roaming partnerships, MNOs provide the backbone for everything from streaming videos to sending real-time notifications. In this article, we’ll explore what an MNO is, how they work, and how they differ from Mobile Virtual Network Operators (MVNOs).\"}),/*#__PURE__*/e(\"h2\",{children:/*#__PURE__*/e(\"strong\",{children:\"Definition: What is the meaning of Mobile Network Operator (MNO)?\"})}),/*#__PURE__*/t(\"p\",{children:[\"A \",/*#__PURE__*/e(\"strong\",{children:\"Mobile Network Operator (MNO)\"}),\" is a company that provides wireless communication services, including voice calls, text messaging, and mobile data. These companies don’t just resell connectivity; they build and maintain the entire infrastructure that makes these services possible.\"]}),/*#__PURE__*/t(\"p\",{children:[\"Think of an MNO as the \",/*#__PURE__*/e(\"strong\",{children:\"architect and operator\"}),\" of the mobile world. They design, build, and manage the systems that ensure smooth communication. Here’s what they do:\"]}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Building and maintaining networks\"}),\": MNOs invest in physical infrastructure like cell towers and base stations, which form the backbone of wireless communication. Without them, your phone wouldn’t connect to the nearest network, let alone send a text or load a web page, \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Managing radio frequencies\"}),\": each MNO operates on licensed radio frequencies to transmit calls and data. This careful management ensures there’s no interference and that millions of users can connect simultaneously, \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Issuing SIM cards and authenticating users\"}),\": the SIM card in your phone isn’t just a tiny chip—it’s your unique identifier on the network. MNOs manage these identifiers to keep connections secure and personalized.\"]})})]}),/*#__PURE__*/e(\"p\",{children:\"In short, MNOs are the reason you can make a call from the top of a skyscraper or post a photo from a remote hiking trail. Their infrastructure doesn’t just connect people; it powers the seamless communication we now take for granted.\"}),/*#__PURE__*/e(\"h2\",{children:/*#__PURE__*/e(\"strong\",{children:\"How do MNOs deliver services?\"})}),/*#__PURE__*/t(\"p\",{children:[\"MNOs juggle multiple responsibilities behind the scenes to ensure your phone is always connected, whether you’re making a call, streaming a video, or checking your emails. \",/*#__PURE__*/e(\"strong\",{children:\"Here’s a closer look at how they deliver seamless connectivity:\"})]}),/*#__PURE__*/e(\"h3\",{children:/*#__PURE__*/e(\"strong\",{children:\"Network infrastructure\"})}),/*#__PURE__*/e(\"p\",{children:\"MNOs invest heavily in the physical backbone of wireless communication. This includes:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Cell towers\"}),\": strategically placed to provide reliable coverage, even in challenging environments, \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Base stations\"}),\": the hubs that manage and route mobile traffic to ensure smooth communication, \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Radio frequency spectrum\"}),\": a finite resource carefully allocated to avoid interference and ensure millions of devices can connect simultaneously.\"]})})]}),/*#__PURE__*/e(\"p\",{children:\"Together, these components create a vast, interconnected network that allows you to make calls or stream videos without interruption, even in high-demand areas.\"}),/*#__PURE__*/e(\"h3\",{children:/*#__PURE__*/e(\"strong\",{children:\"SIM cards and user identity management\"})}),/*#__PURE__*/t(\"p\",{children:[\"A SIM card issued by an MNO isn’t just a piece of plastic—it’s your \",/*#__PURE__*/e(\"strong\",{children:\"digital passport\"}),\". It securely links your device to the network and assigns you a unique identity, allowing:\"]}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Personalized services\"}),\": tailored billing, data plans, and usage tracking based on your profile, \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Security\"}),\": encryption and authentication to protect your connection from unauthorized access.\"]})})]}),/*#__PURE__*/e(\"p\",{children:\"Without this, your phone would be like an unsigned letter, unable to reach its destination.\"}),/*#__PURE__*/e(\"h3\",{children:/*#__PURE__*/e(\"strong\",{children:\"Service provisioning\"})}),/*#__PURE__*/e(\"p\",{children:\"MNOs go beyond connectivity to offer a suite of services designed to meet diverse customer needs:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Calling plans\"}),\": from pay-as-you-go to unlimited talk-time bundles, \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Data packages\"}),\": options ranging from light browsing to high-speed 5G plans for heavy data users,\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Advanced features\"}),\": mobile hotspots, tethering, and cloud integration to enhance productivity and flexibility.\"]})})]}),/*#__PURE__*/e(\"p\",{children:\"This adaptability ensures businesses and consumers alike have access to the tools they need, no matter their requirements.\"}),/*#__PURE__*/e(\"h3\",{children:/*#__PURE__*/e(\"strong\",{children:\"Roaming and global partnerships\"})}),/*#__PURE__*/t(\"p\",{children:[\"Traveling abroad? Thanks to \",/*#__PURE__*/e(\"strong\",{children:\"roaming agreements\"}),\", MNOs allow you\",/*#__PURE__*/e(\"strong\",{children:\" to stay connected almost anywhere in the world\"}),\". These partnerships mean your \",/*#__PURE__*/e(n,{href:\"https://prelude.so/blog/identify-virtual-phone-numbers\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"phone\"})}),\" can seamlessly switch to a local network while maintaining access to your home number and services. Whether it’s for work emails, video calls, or vacation photos, you’re never out of touch.\"]}),/*#__PURE__*/e(\"p\",{children:\"Roaming agreements also benefit businesses, ensuring uninterrupted communication for teams working across borders or in global markets\"}),/*#__PURE__*/e(\"h2\",{children:/*#__PURE__*/e(\"strong\",{children:\"What are the different types of MNOs?\"})}),/*#__PURE__*/t(\"p\",{children:[\"Not all Mobile Network Operators are created equal. While \",/*#__PURE__*/e(\"strong\",{children:\"they all aim to keep you connected, the way they operate can vary significantly. \"}),\"Here’s a breakdown of the main types of MNOs:\"]}),/*#__PURE__*/e(\"h3\",{children:/*#__PURE__*/e(\"strong\",{children:\"Traditional MNOs\"})}),/*#__PURE__*/t(\"p\",{children:[\"Companies like \",/*#__PURE__*/e(\"strong\",{children:\"Vodafone\"}),\", \",/*#__PURE__*/e(\"strong\",{children:\"Orange\"}),\", or \",/*#__PURE__*/e(\"strong\",{children:\"Verizon\"}),\" are the classic examples of full-fledged MNOs. They own and operate their entire network infrastructure, from \",/*#__PURE__*/e(\"strong\",{children:\"cell towers\"}),\" to \",/*#__PURE__*/e(\"strong\",{children:\"radio frequency spectrum\"}),\". This vertical integration gives them:\"]}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Full control\"}),\": they manage every aspect of the network, from coverage to quality, \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Broad coverage\"}),\": their extensive investments in infrastructure allow them to serve both urban and rural areas effectively, \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Service innovation\"}),\": with complete ownership, they can roll out cutting-edge technologies like \",/*#__PURE__*/e(\"strong\",{children:\"5G\"}),\" faster than other operators.\"]})})]}),/*#__PURE__*/e(\"p\",{children:\"These MNOs are the backbone of the industry, ensuring reliable connectivity for millions of users worldwide.\"}),/*#__PURE__*/e(\"h3\",{children:/*#__PURE__*/e(\"strong\",{children:\"Mobile Virtual Network Operators (MVNOs)\"})}),/*#__PURE__*/t(\"p\",{children:[\"The global \",/*#__PURE__*/e(\"strong\",{children:\"MVNO market\"}),\" was valued at \",/*#__PURE__*/e(\"strong\",{children:\"USD 81.81 billion in 2023\"}),\" and is expected to grow at \",/*#__PURE__*/e(n,{href:\"https://www.grandviewresearch.com/industry-analysis/mobile-virtual-network-operator-mvno-market\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/t(r.a,{children:[\"a \",/*#__PURE__*/e(\"strong\",{children:\"CAGR of 7.7%\"}),\" through 2030\"]})}),\". This rapid growth is fueled by increasing demand for affordable and flexible mobile plans, as well as specialized services tailored to specific customer needs. MVNOs excel at offering cost-effective options without compromising on quality, making them a key player in the evolving telecom industry.\"]}),/*#__PURE__*/e(\"p\",{children:\"MVNOs don’t own any physical network infrastructure. Instead, they lease it from MNOs to offer their services. This model allows them to focus on:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Competitive pricing\"}),\": by avoiding the high costs of building and maintaining a network, MVNOs can offer significantly lower rates. These savings make them especially attractive to budget-conscious customers, whether individuals or small businesses, \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Niche markets\"}),\": MVNOs often target specific customer segments with tailored offerings, such as prepaid plans, international calling packages, or data bundles for light users. Their ability to adapt to market demands sets them apart from traditional MNOs, \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Brand differentiation\"}),\": operating under their own brand, MVNOs provide personalized customer experiences. Features like flexible billing options or unique service plans help them stand out in a competitive marketplace.\"]})})]}),/*#__PURE__*/t(\"p\",{children:[\"By leveraging the infrastructure of established MNOs, MVNOs can deliver high-quality services at reduced costs. This approach enables them\",/*#__PURE__*/e(\"strong\",{children:\" to cater to diverse markets while driving innovation in pricing and service models.\"}),\" Together, MVNOs and MNOs create a balanced telecom ecosystem, meeting the varied needs of today’s connected world.\"]}),/*#__PURE__*/e(\"h3\",{children:/*#__PURE__*/e(\"strong\",{children:\"Hybrid Operators\"})}),/*#__PURE__*/e(\"p\",{children:\"Hybrid operators are a mix between traditional MNOs and MVNOs. They own part of their infrastructure but extend their coverage by partnering with other MNOs in certain regions. This model allows them to:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Expand quickly\"}),\": instead of investing in new infrastructure, they can enter new markets by leveraging existing networks, \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Share costs\"}),\": partnerships reduce operational expenses, making this approach more cost-efficient, \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Maintain control in core areas\"}),\": hybrid operators often reserve their owned infrastructure for high-priority markets while relying on agreements for broader coverage.\"]})})]}),/*#__PURE__*/e(\"p\",{children:\"This strategy is particularly useful for operators looking to balance growth and cost-effectiveness.\"}),/*#__PURE__*/e(\"h2\",{children:/*#__PURE__*/e(\"strong\",{children:\"What’s the difference between MNOs and MVNOs?\"})}),/*#__PURE__*/t(\"p\",{children:[\"While MNOs (Mobile Network Operators) and MVNOs (Mobile Virtual Network Operators) both provide mobile services, \",/*#__PURE__*/e(\"strong\",{children:\"their roles and operations are fundamentally different.\"}),\" Here’s how:\"]}),/*#__PURE__*/e(\"h3\",{children:/*#__PURE__*/e(\"strong\",{children:\"Infrastructure\"})}),/*#__PURE__*/t(\"p\",{children:[\"MNOs build, own, and maintain the physical infrastructure, such as cell towers, base stations, and radio spectrum licenses. This ownership gives them\",/*#__PURE__*/e(\"strong\",{children:\" complete control over their networks.\"})]}),/*#__PURE__*/t(\"p\",{children:[\"MVNOs, on the other hand, do not own infrastructure. They lease it from MNOs to offer services under their own brand. This allows MVNOs\",/*#__PURE__*/e(\"strong\",{children:\" to focus on marketing and customer service while avoiding the significant costs \"}),\"and complexities of managing a network.\"]}),/*#__PURE__*/e(\"h3\",{children:/*#__PURE__*/e(\"strong\",{children:\"Costs\"})}),/*#__PURE__*/t(\"p\",{children:[\"MNOs face substantial costs associated with building and maintaining networks, including infrastructure upgrades, regulatory fees, and spectrum acquisition. These investments are necessary\",/*#__PURE__*/e(\"strong\",{children:\" to provide broad coverage and support advanced technologies\"}),\" like 5G.\"]}),/*#__PURE__*/t(\"p\",{children:[\"MVNOs bypass these costs, making their business model more cost-efficient. By leasing access to MNO infrastructure, \",/*#__PURE__*/e(\"strong\",{children:\"they can offer competitive pricing to customers. \"}),\"This is particularly attractive for price-sensitive markets or niche segments.\"]}),/*#__PURE__*/e(\"h3\",{children:/*#__PURE__*/e(\"strong\",{children:\"Control\"})}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"MNOs have full control over their network configuration\"}),\", quality, and coverage. They manage everything from signal strength to troubleshooting and can quickly implement new features, such as enhanced data speeds or expanded coverage areas.\"]}),/*#__PURE__*/t(\"p\",{children:[\"In contrast, MVNOs operate within the boundaries set by their agreements with MNOs. \",/*#__PURE__*/e(\"strong\",{children:\"They rely on their MNO partner\"}),\" for network quality and performance, which limits their ability to customize services or improve network reliability independently.\"]}),/*#__PURE__*/e(\"h3\",{children:/*#__PURE__*/e(\"strong\",{children:\"Service Delivery\"})}),/*#__PURE__*/t(\"p\",{children:[\"MNOs typically sell services directly to customers through their own brands. They cater to\",/*#__PURE__*/e(\"strong\",{children:\" a wide audience with a variety of plans\"}),\", from individual users to businesses requiring enterprise-grade solutions.\"]}),/*#__PURE__*/t(\"p\",{children:[\"MVNOs resell these services under their own branding, often targeting specific customer needs. For example, an MVNO might specialize in budget-friendly plans, international calling options, or prepaid services. This ability\",/*#__PURE__*/e(\"strong\",{children:\" to focus on niche markets gives MVNOs a unique edge in the competitive telecom landscape.\"})]}),/*#__PURE__*/e(\"h3\",{children:/*#__PURE__*/e(\"strong\",{children:\"Who benefits from each?\"})}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"MNOs\"}),\" are ideal for businesses and individuals who prioritize network quality, advanced features, and broad coverage. They are the go-to choice for enterprise clients needing reliable and secure communication infrastructure, \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"MVNOs\"}),\" are better suited for price-sensitive consumers or businesses looking for specialized services at a lower cost. Their flexibility and focus on specific markets make them an attractive alternative for certain user groups.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:/*#__PURE__*/e(\"strong\",{children:\"Why do MNOs matter?\"})}),/*#__PURE__*/t(\"p\",{children:[\"Mobile Network Operators (MNOs) are\",/*#__PURE__*/e(\"strong\",{children:\" the backbone of global communication\"}),\". Beyond connecting urban centers, they play a pivotal role in bridging the digital divide by extending reliable internet access to remote regions. This connectivity enables \",/*#__PURE__*/e(\"strong\",{children:\"vital services like education, healthcare, and commerce\"}),\", empowering individuals and communities worldwide.\"]}),/*#__PURE__*/t(\"p\",{children:[\"MNOs are also at the forefront of technological progress. By driving innovations such as 5G networks and IoT (Internet of Things) devices,\",/*#__PURE__*/e(\"strong\",{children:\" they pave the way for smarter cities\"}),\", more efficient industries, and \",/*#__PURE__*/e(\"strong\",{children:\"a truly connected future.\"})]}),/*#__PURE__*/t(\"p\",{children:[\"Meanwhile, Mobile Virtual Network Operators (MVNOs) add \",/*#__PURE__*/e(\"strong\",{children:\"much-needed flexibility to the telecom landscape\"}),\". By offering tailored plans and competitive pricing, they make connectivity accessible to a wider range of consumers and businesses. Together, MNOs and MVNOs form \",/*#__PURE__*/e(\"strong\",{children:\"a dynamic ecosystem\"}),\" that balances innovation, accessibility, and diversity.\"]}),/*#__PURE__*/e(\"p\",{children:\"MNOs are the architects of our digital-first world. Their infrastructure supports everything from seamless video calls to advanced smart technologies, ensuring connectivity remains reliable and scalable.\"}),/*#__PURE__*/e(\"p\",{children:\"MVNOs, on the other hand, complement this foundation by addressing specific market needs, offering cost-effective solutions and customized services. This collaboration between MNOs and MVNOs not only fuels progress but also ensures a competitive, user-focused telecom industry.\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Looking to simplify your SMS verification process? Try \"}),/*#__PURE__*/e(n,{href:\"https://app.prelude.so/sign-up\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:/*#__PURE__*/e(\"strong\",{children:\"Prelude\"})})}),/*#__PURE__*/e(\"strong\",{children:\" for free or\"}),/*#__PURE__*/e(n,{href:\"https://prelude.so/contact\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:/*#__PURE__*/e(\"strong\",{children:\" contact our team\"})})}),/*#__PURE__*/e(\"strong\",{children:\" to discover how we can help you reduce costs and improve conversions with reliable, fraud-free solutions.\"})]})]});export const richText2=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[\"In an increasingly connected world, \",/*#__PURE__*/e(\"strong\",{children:\"SMS APIs have become indispensable tools for businesses \"}),\"that rely on efficient, real-time communication. With 23 to 27 billion text messages sent daily worldwide, SMS is a channel that guarantees unparalleled reach. It’s also highly effective: SMS boasts a 98% open rate, making it the most efficient tool for sending brand messages globally.\"]}),/*#__PURE__*/t(\"p\",{children:[\"From confirming transactions to reminding customers of appointments, SMS messaging reaches users in an instant. An SMS API enables companies \",/*#__PURE__*/e(\"strong\",{children:\"to automate these messages within their apps\"}),\", creating a direct line to users that’s both simple and powerful.\"]}),/*#__PURE__*/e(\"p\",{children:\"Think of an SMS API as the postal service for your digital messages—getting important updates delivered reliably, without delay. This article breaks down SMS APIs: how they work, when to use them, and why they’re essential for keeping customers engaged.\"}),/*#__PURE__*/e(\"h2\",{children:/*#__PURE__*/e(\"strong\",{children:\"What is an SMS API?\\xa0\"})}),/*#__PURE__*/t(\"p\",{children:[\"An SMS API is a type of API that allows businesses to integrate SMS messaging functionalities directly into their software, websites, or applications. Think of it as a digital courier service: the API picks up messages from your application and “delivers” them straight to your customers' phones, \",/*#__PURE__*/e(\"strong\",{children:\"without the need for any extra telecom software or middleman services.\"})]}),/*#__PURE__*/t(\"p\",{children:[\"In essence, an SMS API serves as a bridge between telecom networks and the digital world, making it easy \",/*#__PURE__*/e(n,{href:\"https://prelude.so/blog/sms-verification-guide\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"to send and receive SMS messages\"})}),\" in real time. This connection allows companies t\",/*#__PURE__*/e(\"strong\",{children:\"o automate messages—like notifications, alerts, or reminders\"}),\"—just as easily as they would send an email.\"]}),/*#__PURE__*/t(\"p\",{children:[\"By using an SMS API, businesses can \",/*#__PURE__*/e(\"strong\",{children:\"deliver critical information quickly and effortlessly,\"}),\" keeping customers informed and engaged with minimal intervention.\"]}),/*#__PURE__*/e(\"h2\",{children:/*#__PURE__*/e(\"strong\",{children:\"How does an SMS API work?\"})}),/*#__PURE__*/t(\"p\",{children:[\"An SMS API acts as a seamless bridge between telecom networks and the internet, enabling businesses to send SMS messages in real time without manual intervention. Think of it as \",/*#__PURE__*/e(\"strong\",{children:\"an efficient system that ensures your messages travel directly from your application\"}),\" to your customer’s phone, quickly and reliably. Here’s how it works in three simple steps:\"]}),/*#__PURE__*/t(\"ol\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Send a request\"}),\": When your app wants to send an SMS, it generates an API request. This request includes essential details such as the recipient’s phone number, message content, and any additional parameters like sender ID or scheduling options—like creating a digital “envelope” with everything needed for delivery, \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Process the request\"}),\": The API receives the request and communicates with an SMS gateway, which acts as the “sorting office,” directing the message to the correct telecom network, \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Receive a response\"}),\": Once the SMS is sent, the API sends a response back to your application, confirming whether the message was successfully delivered or if any issues occurred. This feedback loop allows businesses to monitor delivery status and resolve any potential issues quickly.\"]})})]}),/*#__PURE__*/t(\"p\",{children:[\"By automating this flow, \",/*#__PURE__*/e(\"strong\",{children:\"businesses can send thousands of messages per second\"}),\", efficiently and securely, without needing to manage each message individually.\"]}),/*#__PURE__*/e(\"h2\",{children:/*#__PURE__*/e(\"strong\",{children:\"When to use an SMS API?\"})}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"SMS APIs are incredibly versatile and are suitable \"}),\"for a wide range of applications where timely, automated communication is critical. Here are some key use cases to consider:\"]}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"One-Time Passwords (OTP) and Multi-Factor Authentication (MFA)\"}),\": Security-sensitive applications, such as banking, e-commerce, and social media, \",/*#__PURE__*/e(n,{href:\"https://prelude.so/blog/sms-otp-definition\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"use SMS APIs to send OTPs\"})}),\" for verifying user identity and enabling secure logins. This added layer of security helps prevent unauthorized access, particularly when used as part of a multi-factor authentication process, \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Transactional messages\"}),\": With SMS APIs, companies can send real-time updates such as order confirmations and appointment reminders, improving customer satisfaction. For example, a logistics company might send real-time tracking updates to customers, while a healthcare provider could remind patients of upcoming appointments to reduce no-shows,\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Promotional campaigns\"}),\": Many brands leverage SMS APIs to send targeted promotions or discount offers to their customer base, particularly for time-sensitive deals or special events. Unlike email marketing, SMS messages have a higher open rate, making it an effective channel for direct marketing, \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Customer service and support\"}),\": Integrating SMS APIs into customer service workflows improves client communication and streamlines processes. This could involve sending updates about support ticket statuses, scheduling appointments, or providing answers to frequently asked questions through automated responses.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Surveys and feedback requests\"}),\": Gathering customer feedback is vital for improving service quality, and SMS APIs make it easy to send post-interaction surveys. For instance, after a customer receives a delivery, a quick SMS survey can collect feedback on their experience, providing valuable insights with minimal disruption, \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Internal notifications for teams\"}),\": Beyond customer-facing applications, SMS APIs are also useful for internal communications. Businesses can send SMS alerts to team members about critical updates, system outages, or meeting reminders, ensuring that important information is quickly relayed.\"]})})]}),/*#__PURE__*/e(\"p\",{children:\"By integrating an SMS API, companies can create a seamless, efficient communication channel that keeps customers informed, engaged, and satisfied at every step of their journey.\"}),/*#__PURE__*/e(\"h2\",{children:/*#__PURE__*/e(\"strong\",{children:\"What are the benefits of an SMS API?\"})}),/*#__PURE__*/e(\"p\",{children:\"An SMS API provides several key advantages, making it an invaluable tool for enhancing customer engagement and streamlining business operations. Here are the main benefits:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Reliability and speed\"}),\": With a reliable SMS API, especially one that connects to multiple providers (like Prelude), your messages have fallback options to ensure they’re delivered even if one network experiences an outage. This redundancy minimizes failed message attempts and ensures that critical updates reach your customers quickly, \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Automation\"}),\": By automating SMS messages for reminders, notifications, and alerts, businesses save time and engage customers consistently. This is particularly valuable for high-volume messaging needs, where automated messages can provide timely updates without manual intervention, \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Easy integration\"}),\": Many SMS APIs, including Prelude’s, are designed for easy integration and can be set up in less than a day. As \",/*#__PURE__*/e(n,{href:\"https://prelude.so/blog/cubzh-case-study\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"Adrien Duermael, CEO of Cubzh\"})}),\", explains, “The Prelude API is really easy to use, we were able to implement the solution in less than a day. Since then, we've seen a real improvement in the quality of our user base and in our user’s churn rate.” This level of simplicity allows businesses to focus on growth rather than getting bogged down in technical complexity.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Global reach\"}),\": SMS APIs allow businesses to send messages globally, removing the need to navigate the complexities of international telecom regulations and providers. This provides a scalable way to reach customers across multiple regions with a single API, \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Cost-effective\"}),\": Automating SMS messaging reduces the need for manual communication, offering a scalable and cost-effective solution for businesses, especially as they grow. With SMS APIs, companies can minimize operational costs while maximizing the effectiveness of their messaging strategy.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:/*#__PURE__*/e(\"strong\",{children:\"How to get started with an SMS API?\"})}),/*#__PURE__*/e(\"p\",{children:\"Setting up an SMS API is straightforward and can be done in just a few steps. Here’s how to get started:\"}),/*#__PURE__*/t(\"ol\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Choose an SMS API provider\"}),\": Begin by selecting a provider that aligns with your business requirements, such as reliability, global reach, ease of integration, and cost-effectiveness. If you’re exploring options, consulting \",/*#__PURE__*/e(n,{href:\"https://prelude.so/blog/the-best-otp-service-providers\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"a comparative guide on OTP service providers\"})}),\" can help you make an informed decision, \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Sign up and obtain API credentials\"}),\": Once registered, you’ll receive API keys or tokens that allow secure access to the SMS service. These credentials are essential for ensuring that only authorized applications can interact with the API, so make sure to store them securely, \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Install the API SDK\"}),\": Many providers, including Prelude, offer Software Development Kits (SDKs) in popular programming languages like Python, JavaScript, and others. These SDKs simplify the setup process and enable quick integration within your existing application environment,\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Test with sample code\"}),\": Before launching, run test messages to verify that the integration works correctly. Testing ensures that messages are delivered accurately and allows you to troubleshoot any issues before going live, \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Launch and monitor\"}),\": Once your SMS API is live, actively monitor its performance. Track message delivery rates, response times, and any errors to optimize the API’s performance and ensure a seamless experience for your customers.\"]})})]}),/*#__PURE__*/t(\"p\",{children:[\"SMS APIs are powerful tools that enable businesses t\",/*#__PURE__*/e(\"strong\",{children:\"o streamline communication with their customers\"}),\", automating everything from secure logins to transaction updates and reminders. By implementing an SMS API, you can connect with users in real-time, ensuring they’re informed and engaged at every step.\"]}),/*#__PURE__*/t(\"p\",{children:[\"Whether you’re looking to enhance security with one-time passwords, \",/*#__PURE__*/e(\"strong\",{children:\"improve customer service, or boost engagement\"}),\" with timely notifications, an SMS API offers a reliable and cost-effective solution for modern businesses.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Ready to optimize your messaging strategy? Try \"}),/*#__PURE__*/e(n,{href:\"https://app.prelude.so/sign-up\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:/*#__PURE__*/e(\"strong\",{children:\"Prelude\"})})}),/*#__PURE__*/e(\"strong\",{children:\" for free or \"}),/*#__PURE__*/e(n,{href:\"https://prelude.so/contact\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:/*#__PURE__*/e(\"strong\",{children:\"contact our sales team\"})})}),/*#__PURE__*/e(\"strong\",{children:\" to learn how we can support your growth with reliable, cost-effective SMS solutions.\"})]})]});export const richText3=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Big news: We just closed an $8 million seed funding round led by Singular and Seedcamp!\"}),/*#__PURE__*/e(\"p\",{children:\"With this support, we’re ready to introduce new mobile-first onboarding tools that make signing up (and staying secure) even smoother for users everywhere.\"}),/*#__PURE__*/e(\"h3\",{children:\"Why we started Prelude\"}),/*#__PURE__*/t(\"p\",{children:[\"Prelude was born in 2022 from our founders Matias and Quentin’s experience at Zenly. Back then, SMS verification was one of Zenly’s biggest expenses—and there was almost no transparency around costs. Even worse, about 30% of the budget was being lost to fraud! Existing providers just weren’t set up to protect against this, so Matias and Quentin thought, \",/*#__PURE__*/e(\"em\",{children:\"why not build something better?\"})]}),/*#__PURE__*/e(\"p\",{children:\"That’s how Prelude came to be! Think of us as a “Skyscanner” for SMS verification: we route messages along the most efficient, cost-effective paths, keeping verification costs low and transparency high. Our clients save about 40% on their messaging costs, while boosting conversion rates on verification messages to 95%.\"}),/*#__PURE__*/e(\"h3\",{children:\"SMS verification is just the beginning\"}),/*#__PURE__*/e(\"p\",{children:\"We know one of the toughest parts of growth is turning new users into loyal ones—and we’re tackling that problem head-on.\"}),/*#__PURE__*/e(\"p\",{children:\"“We’re committed to tackling SMS fraud at its core and using our experience to go beyond just SMS verification,” says our CEO, Matias. “Our goal is to help customers master user onboarding, trust, and retention with a suite of mobile-first services designed for seamless user experiences.”\"}),/*#__PURE__*/e(\"p\",{children:\"So, in addition to SMS verification, we’re building new tools to make the whole onboarding experience better, helping businesses retain trust with their users from that first “Welcome!” message onward.\"}),/*#__PURE__*/t(\"p\",{children:[\"Our investors get our mission, and we’re stoked to have \",/*#__PURE__*/e(\"strong\",{children:\"Singular\"}),\" backing us. Henri Tilloy, Partner at Singular, put it perfectly: “Prelude is transforming phone verification and authentication. With just a single line of code, businesses can cut costs, improve fraud protection, and increase conversion rates.”\"]}),/*#__PURE__*/e(\"p\",{children:\"With this fresh funding, we’re going to continue streamlining and scaling our API to bring tangible results to our clients—all while keeping it simple and efficient for developers.\"}),/*#__PURE__*/e(\"h3\",{children:\"What’s next?\"}),/*#__PURE__*/e(\"p\",{children:\"This funding isn’t just helping us grow our SMS verification solutions; we’re building out a full suite of APIs to make user onboarding as seamless, trustworthy, and efficient as possible.\"}),/*#__PURE__*/e(\"p\",{children:\"From verifying users to onboarding them smoothly, our mission is to bring next-gen onboarding tools to every business looking to grow their user base securely and transparently. We’re committed to continually enhancing the quality of our service and customer support, while expanding our offerings to meet even more of our customers’ needs.\"}),/*#__PURE__*/e(\"p\",{children:\"So stay tune for what’s ahead!\"})]});export const richText4=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(n,{href:\"https://sundayapp.com/fr/\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:/*#__PURE__*/e(\"strong\",{children:\"Sunday\"})})}),\" is a comprehensive checkout solution that enhances the dining experience by integrating payment, ordering, menu management, reputation management, tipping and loyalty programs. Founded by former hospitality professionals, Sunday aims to help restaurants and their customers save time and streamline interactions. With over 50M users annually, Sunday helps more than 2,000 restaurants to connect and engage with their guests.\"]}),/*#__PURE__*/e(\"h2\",{children:\"Building guest engagement, one OTP at a time\"}),/*#__PURE__*/e(\"p\",{children:\"As Sunday scaled its operations, ensuring high service availability and resilience during peak demand became a top priority. The team needed an authentication solution that could handle global OTP messages efficiently without requiring extensive support or complex implementation.\"}),/*#__PURE__*/t(\"p\",{children:[\"Sunday’s goal was to make \",/*#__PURE__*/e(n,{href:\"https://prelude.so/blog/sms-otp-definition\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"OTP messages\"})}),\" the backbone of their restaurants’ loyalty strategy. By verifying their phone number at a restaurant, guests could seamlessly join its loyalty program and access related benefits.\"]}),/*#__PURE__*/e(\"p\",{children:\"OTPs are integrated throughout the entire guest journey—from start to finish. For example, when guests view a restaurant’s menu, they are invited to join the loyalty program by entering their phone number, verified via an OTP message. Similarly, after paying their bill, guests can redeem loyalty points by verifying their number once more.\"}),/*#__PURE__*/e(\"p\",{children:\"Given the critical role OTPs play in Sunday’s strategy, they needed a provider they could rely on.\"}),/*#__PURE__*/e(\"p\",{children:\"While Sunday’s team was developing their new flows, they encountered growing frustrations with their SMS API provider. Prices were rising, and at the same time, they experienced a noticeable decline in service quality and support.\"}),/*#__PURE__*/t(\"p\",{children:['\"',/*#__PURE__*/e(\"em\",{children:\"When Twilio, our previous provider, increased their prices and restructured their support team, the service fell short of our expectations—costs were high, and support was lacking. We knew it was time to make a change\"}),'\" added Arnaud Lemaire, Sunday’s CTO.']}),/*#__PURE__*/e(\"h2\",{children:\"Simplifying global user authentication with Prelude\"}),/*#__PURE__*/e(\"p\",{children:\"After a swift integration process, Prelude now handles all of Sunday’s SMS traffic, ensuring seamless guest interactions at every stage.\"}),/*#__PURE__*/e(\"h3\",{children:/*#__PURE__*/e(\"strong\",{children:\"Reaching customers globally\"})}),/*#__PURE__*/e(\"p\",{children:\"While Sunday operates across Europe and North America, the restaurants they work with have international guests. They needed a solution that could reliably send OTP messages to phone numbers from all around the globe.\"}),/*#__PURE__*/e(\"p\",{children:\"Prelude’s API connects Sunday to over 30 local and global providers, offering access to more than 1,000 routes across 230 countries. Prelude also supports multiple channels, including WhatsApp, Viber, and RCS, ensuring guests can receive their messages even without roaming data. This guarantees that someone from Brazil enjoying a nice meal in Paris will always receive their OTP message on time.\"}),/*#__PURE__*/t(\"p\",{children:[\"“\",/*#__PURE__*/e(\"em\",{children:\"Deliverability is our top priority. Being in the hospitality business, we handle phone numbers from all over the world, as many of our customers are international and bring their local numbers—even from some rather exotic regions. Prelude meets our needs by offering reliable coverage across all these diverse geographical areas.\"}),\"”\"]}),/*#__PURE__*/e(\"h3\",{children:/*#__PURE__*/e(\"strong\",{children:\"Premium customer support at no extra cost\"})}),/*#__PURE__*/e(\"p\",{children:\"Sunday’s team has direct access to Prelude’s support through a dedicated Slack channel. Whenever a question or issue arises, they can quickly reach out and get a prompt response from Prelude. This helps Sunday minimizing downtime for their users while improving efficiency for their team.\"}),/*#__PURE__*/e(\"p\",{children:\"At Prelude, we prioritize customer support. All of our clients receive premium support at no extra cost. Whether via Slack, email, or phone, our team is here to guide clients every step of the way—making their challenges our own.\"}),/*#__PURE__*/t(\"p\",{children:['\"',/*#__PURE__*/e(\"em\",{children:\"Our relationship with Prelude’s support team is incredibly smooth. We can Slack them whenever needed, and they’re always ready to help, keeping us on track\"}),',\" said Arnaud.']}),/*#__PURE__*/e(\"h3\",{children:/*#__PURE__*/e(\"strong\",{children:\"Sending SMS at lower prices\"})}),/*#__PURE__*/e(\"p\",{children:\"By switching from Twilio to Prelude, Sunday’s team achieved significant savings on their user verification budget.\"}),/*#__PURE__*/e(\"p\",{children:\"Prelude connects Sunday to multiple routes, selecting the most cost-effective option for each OTP request. We negotiate pricing with providers on behalf of our clients, and because we don’t add margins to message costs, our routing is unbiased—always choosing the best route based on price and performance.\"}),/*#__PURE__*/t(\"p\",{children:[\"“\",/*#__PURE__*/e(\"em\",{children:\"With Prelude, we've completely transformed our messaging strategy. Now, we send OTPs worldwide effortlessly, with full visibility into deliverability and conversion rates. Prelude has truly helped us level up our B2C engagement program\"}),'\", concluded Arnaud.']})]});export const richText5=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Credential stuffing attacks\"}),\" exploit stolen usernames and passwords from data breaches to gain unauthorized access to accounts. \",/*#__PURE__*/e(\"strong\",{children:\"This growing threat affects businesses\"}),\" across various industries, from e-commerce and social media to financial services.\"]}),/*#__PURE__*/t(\"p\",{children:[\"As more users continue to reuse passwords across different platforms, \",/*#__PURE__*/e(\"strong\",{children:\"attackers find it easier to exploit this vulnerability.\"}),\" By automating login attempts with bots, hackers can test millions of credentials in a short period, leading to account takeovers, fraud, and reputational damage.\"]}),/*#__PURE__*/t(\"p\",{children:[\"But what exactly is credential stuffing, and how do these attacks differ from other cyber threats? Most importantly, \",/*#__PURE__*/e(\"strong\",{children:\"how can businesses detect and prevent them?\"}),\" Let’s dive into the details of credential stuffing and explore how you can safeguard your platform.\"]}),/*#__PURE__*/e(\"h2\",{children:\"What is a credential stuffing attack?\\xa0\"}),/*#__PURE__*/t(\"p\",{children:[\"Credential stuffing is \",/*#__PURE__*/e(\"strong\",{children:\"a type of cyber attack\"}),\" where hackers use stolen usernames and passwords from previous data breaches to gain unauthorized access to user accounts across various platforms. Attackers exploit the fact that many users reuse\",/*#__PURE__*/e(\"strong\",{children:\" the same passwords across different websites and apps\"}),\", making it easier for them to breach multiple accounts with the same credentials.\"]}),/*#__PURE__*/t(\"p\",{children:[\"According to \",/*#__PURE__*/e(n,{href:\"https://www.f5.com/labs/articles/threat-intelligence/2023-identity-threat-report-the-unpatchables\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"the 2023 Identity Threat Report by F5 Labs\"})}),\", \",/*#__PURE__*/e(\"strong\",{children:\"credential stuffing accounted for an average of 19.4% of unmitigated traffic\"}),\" across organizations in various sectors. Even after mitigation efforts, \",/*#__PURE__*/e(\"strong\",{children:\"6.0% of traffic\"}),\" was still composed of credential stuffing attempts.\\xa0\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"According to Kaspersky\"}),\", one authentication provider reported an average of \",/*#__PURE__*/e(n,{href:\"https://usa.kaspersky.com/blog/what-is-credential-stuffing/30089/\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"one credential stuffing attempt for every two legitimate logins in 2022\"})}),\", highlighting how widespread this method has become. This ongoing trend underscores the persistent risk to businesses, particularly in industries like travel, telecommunications, and technology, which experience higher attack rates than other sectors.\"]}),/*#__PURE__*/t(\"p\",{children:[\"But to understand how to protect against credential stuffing, it’s crucial to first understand \",/*#__PURE__*/e(\"strong\",{children:\"how these attacks operate\"}),\" and the techniques attackers use.\"]}),/*#__PURE__*/e(\"h2\",{children:\"How do credential stuffing attacks work?\"}),/*#__PURE__*/t(\"p\",{children:[\"Credential stuffing attacks exploit password reuse by using automated tools, often called \",/*#__PURE__*/e(\"strong\",{children:\"bots\"}),\", to test large lists of stolen credentials on various websites. When they find a match, hackers gain \",/*#__PURE__*/e(\"strong\",{children:\"unauthorized access to the user’s account\"}),\". This automated approach allows them to test millions of credential pairs in a short period.\"]}),/*#__PURE__*/e(\"h4\",{children:\"Difference from brute force attacks:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Brute force attacks\"}),\": attempt to guess passwords by trying random combinations of characters until the correct password is found, \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Credential stuffing\"}),\": utilizes \",/*#__PURE__*/e(\"strong\",{children:\"real credentials\"}),\" from data breaches, making the process faster and more efficient,\\xa0\"]})})]}),/*#__PURE__*/e(\"h4\",{children:\"Common techniques used in credential stuffing:\"}),/*#__PURE__*/t(\"ol\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Botnets\"}),\": attackers use networks of compromised computers (botnets) to distribute login attempts across multiple IP addresses, making it harder to detect and block the attack, \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Proxy networks\"}),\": proxies are employed to obscure the origin of the login attempts, allowing attackers to bypass security measures, \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Credential dumps\"}),\": lists of stolen credentials from past data breaches are sold or shared on the dark web, giving attackers ready access to usernames and passwords.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"What are some notable recent credential stuffing attacks?\"}),/*#__PURE__*/t(\"p\",{children:[\"Credential stuffing remains \",/*#__PURE__*/e(\"strong\",{children:\"a serious threat to businesses\"}),\" across many sectors, with attackers successfully breaching accounts by exploiting stolen login credentials. In recent years, \",/*#__PURE__*/e(\"strong\",{children:\"several high-profile companies\"}),\" have fallen victim to these types of attacks, illustrating the widespread and ongoing nature of the problem. Let’s explore three recent examples:\"]}),/*#__PURE__*/e(\"h3\",{children:\"1. PayPal (2022)\"}),/*#__PURE__*/t(\"p\",{children:[\"In December 2022, \",/*#__PURE__*/e(n,{href:\"https://www.documentcloud.org/documents/23578067-paypal-notice?responsive=1&title=1\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"PayPal was targeted in a credential stuffing attack\"})}),\" that compromised nearly \",/*#__PURE__*/e(\"strong\",{children:\"35,000 accounts\"}),\". The attackers used credentials obtained from breaches on unrelated websites to gain unauthorized access to PayPal accounts.\\xa0\"]}),/*#__PURE__*/t(\"p\",{children:[\"While PayPal confirmed that there was no evidence of customer data misuse, they offered affected users a \",/*#__PURE__*/e(\"strong\",{children:\"two-year subscription to Equifax’s identity monitoring service\"}),\" as a precaution. This incident underscores the importance of enabling \",/*#__PURE__*/e(\"strong\",{children:\"two-factor authentication (2FA)\"}),\", which adds an extra layer of protection against credential stuffing.\"]}),/*#__PURE__*/e(\"h3\",{children:\"2. 23andMe (2023)\"}),/*#__PURE__*/t(\"p\",{children:[\"In late 2023, the genetic testing company \",/*#__PURE__*/e(n,{href:\"https://www.bleepingcomputer.com/news/security/genetics-firm-23andme-says-user-data-stolen-in-credential-stuffing-attack/\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/t(r.a,{children:[/*#__PURE__*/e(\"strong\",{children:\"23andMe\"}),\" revealed that a credential stuffing attack\"]})}),\" had resulted in the theft of personal information from millions of its users. The stolen data included \",/*#__PURE__*/e(\"strong\",{children:\"names, profile photos, gender, dates of birth\"}),\", and even \",/*#__PURE__*/e(\"strong\",{children:\"genetic ancestry results\"}),\".\\xa0\"]}),/*#__PURE__*/e(\"p\",{children:\"According to 23andMe, the attackers likely obtained the login credentials from other platforms where users had reused their passwords. This case highlights the dangers of reusing login credentials across multiple services, making it easier for attackers to breach accounts.\"}),/*#__PURE__*/e(\"h3\",{children:\"3. Zoom (2020)\"}),/*#__PURE__*/t(\"p\",{children:[\"In 2020, \",/*#__PURE__*/e(n,{href:\"https://www.forbes.com/sites/daveywinder/2020/04/28/zoom-gets-stuffed-heres-how-hackers-got-hold-of-500000-passwords/?sh=755650bc5cdc\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/t(r.a,{children:[/*#__PURE__*/e(\"strong\",{children:\"Zoom\"}),\" experienced a significant credential stuffing attack\"]})}),\", compromising over \",/*#__PURE__*/e(\"strong\",{children:\"500,000 user accounts\"}),\". The attackers used credentials from breaches dating as far back as 2013, many of which were likely sold on the dark web.\\xa0\"]}),/*#__PURE__*/e(\"p\",{children:'Due to the widespread practice of password reuse, attackers successfully accessed these accounts using a \"credential checker\" tool. This attack serves as a stark reminder of the need for users to regularly update and diversify their passwords to protect their accounts from being compromised.'}),/*#__PURE__*/e(\"h2\",{children:\"How does credential stuffing impact your business?\"}),/*#__PURE__*/e(\"p\",{children:\"Credential stuffing can cause significant damage to both businesses and their users, with consequences that affect financial stability, customer trust, and operational efficiency.\"}),/*#__PURE__*/e(\"h3\",{children:\"1. Financial losses for your business\"}),/*#__PURE__*/t(\"p\",{children:[\"Credential stuffing often results in \",/*#__PURE__*/e(\"strong\",{children:\"fraudulent transactions\"}),\", which can lead to direct financial losses. Attackers who gain access to \",/*#__PURE__*/e(n,{href:\"https://prelude.so/blog/fake-account-creation\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"user accounts\"})}),\" may initiate unauthorized purchases, manipulate loyalty points, or exploit subscription services. These activities can result in \",/*#__PURE__*/e(\"strong\",{children:\"chargebacks\"}),\", \",/*#__PURE__*/e(\"strong\",{children:\"refunds\"}),\", and additional transaction fees. \",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),\"For industries like e-commerce and financial services, the cost of reversing fraudulent activities can quickly add up, impacting overall profitability. Beyond immediate financial loss, businesses may also face increased \",/*#__PURE__*/e(\"strong\",{children:\"insurance premiums\"}),\" and the need to invest in stronger fraud prevention systems.\"]}),/*#__PURE__*/e(\"h3\",{children:\"2. Loss of customer trust and reputation\"}),/*#__PURE__*/t(\"p\",{children:[\"When customer accounts are compromised, it significantly impacts user trust. Your customers expect their personal data to be secure, and a breach can cause them to \",/*#__PURE__*/e(\"strong\",{children:\"lose confidence in your platform\"}),\". This can result in \",/*#__PURE__*/e(\"strong\",{children:\"customer churn\"}),\", with users abandoning your service in favor of competitors. Negative reviews and social media backlash can further tarnish your reputation, making it harder to attract new users or retain existing ones.\\xa0\"]}),/*#__PURE__*/e(\"p\",{children:\"For businesses in highly competitive industries like social media, finance, and e-commerce, the reputational damage from a credential stuffing attack can have long-term effects on brand loyalty.\"}),/*#__PURE__*/e(\"h3\",{children:\"3. Operational disruption and increased costs\"}),/*#__PURE__*/t(\"p\",{children:[\"Credential stuffing attacks often lead to a surge in customer support inquiries as users report unauthorized activities on their accounts. \",/*#__PURE__*/e(\"strong\",{children:\"Handling account takeovers\"}),\", processing \",/*#__PURE__*/e(\"strong\",{children:\"password resets\"}),\", and resolving user complaints place a heavy burden on customer service teams. This increase in support requests can strain your resources, diverting attention from core business functions.\\xa0\"]}),/*#__PURE__*/t(\"p\",{children:[\"Additionally, businesses must invest in \",/*#__PURE__*/e(\"strong\",{children:\"cybersecurity upgrades\"}),\" to prevent future attacks, which can increase operational costs. The time and effort required to recover from a large-scale attack can disrupt normal operations and delay key projects or initiatives.\"]}),/*#__PURE__*/e(\"h2\",{children:\"How to detect credential stuffing attacks?\"}),/*#__PURE__*/e(\"p\",{children:\"Detecting credential stuffing attacks early is crucial to minimizing their impact. By keeping a close eye on specific indicators, businesses can act swiftly to mitigate the damage. Here are three key signs to watch for:\"}),/*#__PURE__*/e(\"h3\",{children:\"1. Increase in failed login attempts\"}),/*#__PURE__*/t(\"p\",{children:[\"One of the most obvious signs of a credential stuffing attack is a \",/*#__PURE__*/e(\"strong\",{children:\"sudden spike in failed login attempts\"}),\". Since attackers use automated tools to test thousands—or even millions—of stolen credentials, your system will register an abnormal increase in login failures.\\xa0\"]}),/*#__PURE__*/e(\"p\",{children:\"This pattern often involves multiple failed attempts from the same IP address or across numerous user accounts. Monitoring for such surges is essential to identifying an attack in progress.\"}),/*#__PURE__*/e(\"h3\",{children:\"2. Unusual activity on user accounts\"}),/*#__PURE__*/t(\"p\",{children:[\"Users may report \",/*#__PURE__*/e(\"strong\",{children:\"strange or unauthorized activity\"}),\" on their accounts, such as transactions they didn’t make, changes in their profile details, or access from unfamiliar devices. Attackers who successfully compromise accounts through credential stuffing often use them to carry out fraudulent actions, such as making purchases or manipulating account settings.\\xa0\"]}),/*#__PURE__*/t(\"p\",{children:[\"Implementing tools to detect \",/*#__PURE__*/e(\"strong\",{children:\"anomalies in user behavior\"}),\" can help flag suspicious activity early.\"]}),/*#__PURE__*/e(\"h3\",{children:\"3. Unexpected changes to account information\"}),/*#__PURE__*/t(\"p\",{children:[\"Once attackers gain access to an account, they may attempt to lock out the legitimate user by changing key details like \",/*#__PURE__*/e(\"strong\",{children:\"email addresses\"}),\" or \",/*#__PURE__*/e(\"strong\",{children:\"phone numbers\"}),\". These unexpected changes can be a red flag, especially if they occur after multiple failed login attempts.\"]}),/*#__PURE__*/e(\"p\",{children:\"Monitoring for sudden modifications to account information, particularly following suspicious login activity, can help prevent further damage.\"}),/*#__PURE__*/e(\"h2\",{children:\"How to prevent credential stuffing attacks to protect your users?\"}),/*#__PURE__*/e(\"p\",{children:\"Preventing credential stuffing requires a multi-layered approach. Here are some key strategies:\"}),/*#__PURE__*/e(\"h3\",{children:\"1. Enforce strong password policies\"}),/*#__PURE__*/t(\"p\",{children:[\"Encourage users \",/*#__PURE__*/e(\"strong\",{children:\"to create strong, unique passwords that are difficult to guess\"}),\". Passwords should be a combination of letters, numbers, and symbols. Remind users to avoid reusing passwords across different platforms.\"]}),/*#__PURE__*/e(\"h3\",{children:\"2. Educate users about security awareness\"}),/*#__PURE__*/t(\"p\",{children:[\"Just as the banking industry frequently reminds customers never to share their passwords, businesses should \",/*#__PURE__*/e(\"strong\",{children:\"educate their users on the importance of password security.\"}),\" Regular reminders about not reusing passwords and following best practices can go a long way in preventing credential stuffing attacks.\"]}),/*#__PURE__*/e(\"h3\",{children:\"3. Implement account lockout mechanisms\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Account lockout mechanisms can prevent automated bots\"}),\" from making continuous login attempts. After a certain number of failed login attempts, temporarily locking the account helps block further attempts until the user verifies their identity.\"]}),/*#__PURE__*/e(\"h3\",{children:\"4. Use CAPTCHA – with limitations\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"CAPTCHA can help block bots from making automated login attempts\"}),\", but it’s not a perfect solution. CAPTCHAs can negatively affect user experience and conversion rates, and sophisticated bots can sometimes bypass them using advanced techniques. We’ve explored these limitations further \",/*#__PURE__*/e(n,{href:\"https://prelude.so/blog/identify-virtual-phone-numbers\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"here\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"5. Multi-Factor Authentication (MFA)\"}),/*#__PURE__*/t(\"p\",{children:[\"Multi-factor authentication (MFA) adds \",/*#__PURE__*/e(\"strong\",{children:\"an extra layer of security by requiring users\"}),\" to verify their identity through a second factor, such as \",/*#__PURE__*/e(n,{href:\"https://prelude.so/blog/sms-otp-definition\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"a one-time password (OTP) sent via SMS\"})}),\". This makes it significantly harder for attackers to gain access to accounts, even if they have the correct credentials.\"]}),/*#__PURE__*/e(\"p\",{children:\"Credential stuffing is a serious and growing threat, but by implementing strong password policies, educating users, and using multi-factor authentication, businesses can significantly reduce the risk. Preventing these attacks protects both your users and your business from financial losses and reputational damage.\"})]});export const richText6=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(n,{href:\"https://www.appchoose.io/\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:/*#__PURE__*/e(\"strong\",{children:\"Choose\"})})}),\" is an innovative e-commerce platform that showcases emerging brands for a clientele seeking trendy and environmentally conscious products, by dropping new deals daily. With a growing community of 250,000 daily users, Choose connects a predominantly French clientele to brands that resonate with their values.\"]}),/*#__PURE__*/e(\"h2\",{children:\"The Challenge: Lack of control over their user verification performance and costs\"}),/*#__PURE__*/t(\"p\",{children:[\"As the\",/*#__PURE__*/e(\"strong\",{children:\" CTO of Choose, Thibaut\"}),\" aims to ensure scalability while effectively managing costs. With Choose experiencing rapid growth, he faced the need for a reliable SMS provider to support this expansion, particularly for user verification via OTP messages during sign-ups and within their referral program. However, they encountered multiple challenges with their previous provider, Google Firebase.\"]}),/*#__PURE__*/t(\"p\",{children:[\"As the Choose user base grew, so did their \",/*#__PURE__*/e(\"strong\",{children:\"user verification costs\"}),\". For a long time Thibaut had been attempting to benefit from more competitive volume-based pricing with Firebase. Despite numerous attempts to reach someone at Google, he was met with consistent refusals regarding better pricing options.\\xa0\"]}),/*#__PURE__*/t(\"p\",{children:[\"The Choose team also found the\",/*#__PURE__*/e(\"strong\",{children:\" lack of analytics \"}),\"and the opaque nature of their previous provider frustrating.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"em\",{children:'\"We had no insight into why messages weren’t being received and we were left digging through data on our own with inadequate tools. We realized we couldn’t scale effectively with Firebase.\"'})}),/*#__PURE__*/t(\"p\",{children:[\"A significant turning point came when a \",/*#__PURE__*/e(\"strong\",{children:\"major disruption\"}),\" affected their service, locking users out of the platform for an entire weekend. This outage coincided with a critical marketing campaign, resulting in wasted budget and missed opportunities.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"em\",{children:'\"Firebase mistakenly identified our users as spam, completely blocking SMS delivery during a crucial marketing operation. This was particularly devastating as we had planned important marketing operations and were onboarding many new users. The lack of support and transparency from their team made it clear we were losing control over our SMS communications.\"'})}),/*#__PURE__*/e(\"p\",{children:\"This lack of control over costs and service effectiveness prompted Thibaut to seek an alternative, leading him to discover Prelude. After a quick trial, he was impressed with the performance and ease of integration.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"em\",{children:'\"We restructured our infrastructure swiftly, and within five days, Prelude was live. We were thrilled with the results.\"'})}),/*#__PURE__*/e(\"h2\",{children:\"The Solution: Reducing costs while improving user conversions with Prelude\"}),/*#__PURE__*/e(\"p\",{children:\"Switching to Prelude provided Choose with several key benefits.\\xa0\"}),/*#__PURE__*/e(\"h3\",{children:\"Better transparency\"}),/*#__PURE__*/e(\"p\",{children:\"Prelude’s analytics dashboard has proven to be a useful tool for Choose.\"}),/*#__PURE__*/e(\"p\",{children:\"The dashboard offers users a comprehensive overview of budget allocation and key performance indicators, including SMS conversion rates, authentication volumes, and conversion times.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"If any troubleshooting is required, the team can easily access detailed authentication records and history.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"em\",{children:'\"I check our analytics dashboard once per week. It’s well-designed and offers a wealth of information. But as long as we don’t receive alerts, we can let Prelude run smoothly in the background.\"'})}),/*#__PURE__*/e(\"h3\",{children:\"Responsive support\"}),/*#__PURE__*/e(\"p\",{children:\"The Choose and Prelude teams collaborate through a shared Slack channel, enabling instant communication for any questions or issues that may arise. The Prelude support team proactively notifies Choose whenever they identify potential concerns.\"}),/*#__PURE__*/e(\"p\",{children:\"Customer support is a top priority at Prelude, especially considering the sensitivity of user verification. In situations where users might be locked out, prompt assistance is crucial. That's why all clients have access to support via Slack, email, or phone.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"em\",{children:\"“Whenever there's a problem, the Prelude team reaches out or we write to them, and they get back to us very quickly. Their team is friendly and responsive, providing the support we need, in contrast to more traditional providers, where responses can often be slow and unhelpful.”\"})}),/*#__PURE__*/e(\"h3\",{children:\"Saving on user verification costs\"}),/*#__PURE__*/e(\"p\",{children:\"Finally, Prelude helped Choose reduce their SMS verification budget by 25%.\\xa0\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(n,{href:{webPageId:\"jHZR0p4bq\"},motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"Prelude’s API\"})}),\" connects Choose to over 30 local and global providers, offering access to more than 1,000 routes across 230 countries. Our API automatically identifies the most cost-effective option for each OTP request, ensuring Choose’s users consistently receive their messages while enabling the Choose team to benefit from competitive pricing.\"]}),/*#__PURE__*/e(\"p\",{children:\"We negotiate pricing with providers on behalf of our clients. As we onboard new companies and increase our overall volume, we're able to lower costs for our entire customer base. Additionally, because we don’t impose margins on message costs, our routing remains unbiased—ensuring we always select the best route based on price and performance.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"em\",{children:'\"Prelude not only costs less but also takes care of routing messages efficiently, always choosing the most cost-effective and effective paths.\"'})}),/*#__PURE__*/e(\"p\",{children:\"By addressing all the pain points Choose encountered with their previous provider, Arnaud now has full confidence that Prelude can support his scalability goals while effectively managing user verification costs.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"em\",{children:'\"If you need to send SMS, use Prelude. They\\'re the most affordable option and I’d recommend it to everyone. With Prelude, we have complete control over our SMS communications, which is vital for our customer verification processes, especially during the sign-up and referral validation stages. I’d give them a solid 10/10.\"'})})]});export const richText7=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[\"Winning the attention of your customers is becoming increasingly difficult. And that’s where \",/*#__PURE__*/e(\"strong\",{children:\"A2P (Application-to-Person) messaging\"}),\" comes in. A2P messaging allows businesses to engage with customers instantly and directly via SMS. From improving customer satisfaction to driving conversions, it has become a cornerstone of modern communication strategies.\"]}),/*#__PURE__*/e(\"p\",{children:\"But how does it work, and why should your business be leveraging it? Let’s dive in!\"}),/*#__PURE__*/e(\"h2\",{children:\"What is A2P messaging?\"}),/*#__PURE__*/e(\"p\",{children:\"A2P (Application-to-Person) messaging is the process of sending SMS or text messages from an application or software to a person’s mobile device.\"}),/*#__PURE__*/e(\"p\",{children:\"Unlike traditional messaging (Person-to-Person), where communication happens between two individuals, A2P is used by businesses and organizations to deliver automated messages directly to their customers or users.\"}),/*#__PURE__*/e(\"h2\",{children:\"What are the use cases for A2P SMS?\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"A2P messaging\"}),\" plays a crucial role in various business processes.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Security and Authentication\"}),/*#__PURE__*/t(\"p\",{children:[\"A2P helps businesses enforcing two-factor authentication (2FA). Companies can send \",/*#__PURE__*/e(n,{href:{pathVariables:{g3uDruQ2t:\"sms-otp-definition\"},unresolvedPathSlugs:{g3uDruQ2t:{collectionId:\"RxkZ6cAsR\",collectionItemId:\"dOqlOqqG6\"}},webPageId:\"Io5lOVoj4\"},motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"One-Time Passwords (OTP)\"})}),\" to customers whenever they do sensitive actions. Signing up, logging in, accessing sensitive data or a financial transaction could trigger a verification.\"]}),/*#__PURE__*/e(\"p\",{children:\"With this extra layer of protection, they ensure that only authorized users can complete these actions. This helps to safeguard customer accounts and reduce fraud.\"}),/*#__PURE__*/e(\"h3\",{children:\"Notifications and Alerts\"}),/*#__PURE__*/e(\"p\",{children:\"SMS is also a great channel to sens real-time notifications that your users are sure to notice. It's often reserved for important messages and time-sensitive alerts. Key use cases include:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Confirmations\"}),\": Let your users know that their purchase, appointment, or reservation has been processed and validated.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Reminders\"}),\": Send timely alerts about upcoming appointments or reservations. This helps users stay on track and avoid missed bookings or deadlines.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Tracking\"}),\": Keep users updated on the delivery status of their orders. We can all use some peace of mind throughout a shipping process.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Suspicious Activity Alerts\"}),\": Notify users immediately if any suspicious activity is detected on their account. This can be a log in attempt or a modification to a personal information, so they can review and protect their account if needed.\"]})})]}),/*#__PURE__*/e(\"h3\",{children:\"Marketing campaigns\"}),/*#__PURE__*/e(\"p\",{children:\"Lastly, businesses use A2P messaging to run targeted marketing campaigns to promote a new offer, share a discount code, or announce a product release. SMS is an effective way to get your message directly in front of your audience, ensuring higher engagement rates.\"}),/*#__PURE__*/e(\"h2\",{children:\"How does A2P work?\"}),/*#__PURE__*/t(\"p\",{children:[\"A2P messages are not sent by an individual like in P2P messaging, but by an application or platform. Businesses connect their applications to third-party solutions: \",/*#__PURE__*/e(\"strong\",{children:\"SMS gateways or \"}),/*#__PURE__*/e(n,{href:\"https://prelude.so/blog/what-is-an-sms-api\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:/*#__PURE__*/e(\"strong\",{children:\"SMS APIs\"})})}),\" to send messages at scale.\"]}),/*#__PURE__*/e(\"p\",{children:\"A2P messages can be triggered in several ways:\"}),/*#__PURE__*/t(\"ol\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"by a user action (e.g., purchase confirmation or login verification),\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"an automated system event (e.g., daily reminders),\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"or manually for marketing campaigns.\"})})]}),/*#__PURE__*/e(\"p\",{children:\"Once a message is triggered, the application sends an API request to the third-party solution. This request contains all necessary data: recipient’s number, message, sender ID, etc.\"}),/*#__PURE__*/e(\"p\",{children:\"The message is then forwarded to an SMS gateway. The gateway acts as the bridge between the application and the telecom networks. Its role is to:\"}),/*#__PURE__*/t(\"ol\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"convert the message into a format that can be transmitted over the mobile network\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"route the message to the appropriate mobile network operator (MNO), depending on the recipient’s country and other signals.\"})})]}),/*#__PURE__*/e(\"p\",{children:\"Message delivery is then managed by the telecom operators. They verify:\"}),/*#__PURE__*/t(\"ol\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"that the message complies with local regulations\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"the validity, activity, and reachability of the recipient's number.\"})})]}),/*#__PURE__*/e(\"p\",{children:\"Once the message is sent, a delivery report is shared back through the API. Businesses can then track the message performance and success rates.\"}),/*#__PURE__*/e(\"h2\",{children:\"Differences between A2P and P2P SMS\"}),/*#__PURE__*/e(\"p\",{children:\"The primary difference between A2P (Application-to-Person) and P2P (Person-to-Person) messaging is the origin of the message.\"}),/*#__PURE__*/e(\"p\",{children:\"P2P refers to text messages exchanged between individuals, from one phone number to another.\"}),/*#__PURE__*/e(\"p\",{children:\"A2P involves messages sent from an automated system, application, or platform to a person’s mobile device.\"}),/*#__PURE__*/e(\"p\",{children:\"While P2P messaging involves casual, conversational communication, A2P is more structured and regulated, as it is often used for business purposes.\"}),/*#__PURE__*/e(\"h2\",{children:\"Benefits of A2P messaging\"}),/*#__PURE__*/e(\"p\",{children:\"Businesses have many ways to communicate with their users: push notifications through apps, email marketing, and even traditional postal services for those willing to wait. So, what makes A2P messaging unique and compelling for businesses?\"}),/*#__PURE__*/e(\"p\",{children:\"Here are some benefits to consider:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"High open and engagement rates\"}),\": SMS messages boast a near 98% open rate, with most messages read within minutes. This ensures your message not only reaches but engages its target audience quickly.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Global reach and reliability\"}),\": Unlike push notifications, which can be silenced, or emails, which can land in spam, SMS works across all mobile devices without requiring internet access or third-party apps. This makes it an effective channel even in regions with limited connectivity.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Real-time communication\"}),\": A2P messaging is ideal for time-sensitive updates such as OTPs, delivery alerts, or security notifications, enabling immediate interaction and response.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Cost-effective at scale\"}),\": A2P SMS offers a cost-efficient way to reach large audiences, especially when sending bulk messages, reducing the per-message cost significantly.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Superior deliverability\"}),\": With smart routing and fallback to multiple channels, A2P ensures high deliverability rates, even for international recipients or in challenging network environments.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Effortless scalability\"}),\": Whether you’re sending hundreds or millions of messages, A2P messaging scales easily to meet growing demands, without compromising on delivery speed or quality.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Data-driven insights\"}),\": A2P providers like Prelude offer \",/*#__PURE__*/e(n,{href:{webPageId:\"Ybj1K_p92\"},motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"analytics and reporting\"})}),\" features, enabling businesses to track delivery, conversions, and performance in real time.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Seamless integration\"}),\": A2P platforms offer easy-to-use APIs that integrate with existing systems, allowing businesses to start sending messages with minimal development effort. For instance, our clients usually install our SMS API within one day.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"What numbers to use?\"}),/*#__PURE__*/e(\"p\",{children:\"When sending A2P messages, businesses can choose from different types of numbers:\"}),/*#__PURE__*/e(\"h3\",{children:\"10-Digit Long Codes (10DLC)\"}),/*#__PURE__*/t(\"p\",{children:[\"These are \",/*#__PURE__*/e(\"strong\",{children:\"10-digit phone numbers \"}),\"used by businesses for localized, two-way communication. Think of customer service or appointment reminders.\"]}),/*#__PURE__*/e(\"p\",{children:\"10DLC numbers are more personal and familiar to recipients. But, they have lower throughput, making them less suited for high-volume campaigns.\"}),/*#__PURE__*/e(\"p\",{children:\"Used in the U.S. and Canada for business messaging, they are a great way to send notifications and one-time passwords in this region due to their affordability and compliance with local carrier regulations.\"}),/*#__PURE__*/e(\"h3\",{children:\"Short codes\"}),/*#__PURE__*/t(\"p\",{children:[\"SMS short codes are \",/*#__PURE__*/e(\"strong\",{children:\"5 or 6-digit numbers \"}),\"designed for large-scale, high-throughput messaging. They are capable of sending thousands of SMS per second.\"]}),/*#__PURE__*/e(\"p\",{children:\"Short codes are memorable and recognizable as business communications. They are great to send a high volume of messages quickly.\"}),/*#__PURE__*/e(\"h3\",{children:\"Toll-free numbers\"}),/*#__PURE__*/e(\"p\",{children:\"These numbers are recognizable by their area codes prefixes like 800, 888, 833 or 877. They were traditionally used for voice calls but can also send and receive SMS.\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Toll-free numbers\"}),\" are a good middle ground between short codes and 10DLC. They are customer-friendly and handle moderate messaging volumes, making them ideal for customer support or transactional notifications.\"]}),/*#__PURE__*/e(\"p\",{children:\"One key advantage is that customers can both call and text the same number, creating a unified communication experience.\"}),/*#__PURE__*/e(\"h3\",{children:\"Sender ID\"}),/*#__PURE__*/t(\"p\",{children:[\"In many countries outside the U.S. and Canada, businesses can use\",/*#__PURE__*/e(\"strong\",{children:\" alphanumeric Sender IDs\"}),\" instead of phone numbers. These IDs allow a brand or company name (up to 11 characters) to be displayed as the sender, providing an added layer of trust and brand recognition.\"]}),/*#__PURE__*/e(\"p\",{children:\"They can only be used for one-way communication, such as sending one-time passwords, promotional offers or account alerts. Yet, alphanumeric Sender IDs are not supported everywhere. Businesses need their sender IDs to be pre-approved by a regulatory agency.\"}),/*#__PURE__*/e(\"h2\",{children:\"Regulations about A2P messaging\"}),/*#__PURE__*/e(\"p\",{children:\"A2P messaging is subject to several regulations and guidelines, which vary by country. This is especially true when it comes to marketing messaging. Here are some key regulatory requirements:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Explicit consent.\"}),\" Before sending any A2P message, businesses must get explicit consent from users to receive SMS communication. Transactional messages (such as OTPs or account alerts) may not need explicit opt-in in some regions, but promotional messages always do.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Consent for marketing.\"}),\" For marketing campaigns, extra consent is often required, with users opting in to receive promotional messages.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Opt-out options.\"}),\" Users must be given the option to opt-out of receiving messages at any time, typically by replying with a keyword like “STOP.”\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"How much does A2P SMS cost?\"}),/*#__PURE__*/e(\"p\",{children:\"The cost of A2P SMS varies based on many factors such as:\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Message content\"}),\": Price will vary depending on the length and the content of your message.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Carrier fees\"}),\": Each mobile carrier charges a fee for delivering SMS messages to their subscribers.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Service providers margins\"}),\": Third-party providers can apply margins on the price of SMS on top of the carrier fees. Pricing structures can include per-message fees or subscription plans, with costs lower for businesses sending large volumes of messages.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Global reach\"}),\": Costs vary from one country to another, as you can see on \",/*#__PURE__*/e(n,{href:\"https://prelude.so/pricing\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"our worldwide SMS prices list here\"})}),\" (but note that our prices are lower than the market average, as we work in partnership with several suppliers to negotiate prices for our customers). Also, if a user is in a different country from where their number is registered, extra roaming charges might apply.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Volume & scale\"}),\": Large user bases can lead to large costs if your company is charged per message.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"User behavior\"}),\": Users failing to register the OTP on time or providing the wrong phone number can increase the number of SMS sent.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Fraud\"}),\": SMS pumping and other types of fraud can artificially increase the volume of SMS sent and generate high costs for the companies targeted.\"]}),/*#__PURE__*/e(\"p\",{children:\"So it’s hard to answer this question with a definitive number.\"}),/*#__PURE__*/e(\"p\",{children:\"At Prelude, here’s how we do our pricing. There are basically two pricing models:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Pay as you go\"}),\". Our customers pay exactly for the volume of messages sent, with SMS prices billed at cost (with no added margin) + €0.02 per verification (€0.006 in US and Canada) for OTP messages. We negociate on a regular basis our prices with our providers to keep costs as low as possible for our customers. \",/*#__PURE__*/e(n,{href:\"https://prelude.so/pricing\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:/*#__PURE__*/e(\"strong\",{children:\"Our pricing list per country is available here\"})})}),\".\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Volume based\"}),\". Companies with high message volumes can enjoy annual agreements offering preferred pricing and customized rates based on volume and committed usage.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"How to get started with A2P messaging?\"}),/*#__PURE__*/e(\"p\",{children:\"Starting to send SMS to your users at scale doesn’t need to be a long and complicated project.\"}),/*#__PURE__*/t(\"ol\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"First, you need to have a clear use case in mind. Is it for user verification? Transactional notifications? Marketing campaigns? This reflexion will help you to determine your needs, whether you need one-way or two-way communication. You can also think about the messaging channels you would need, if SMS is enough or if you want to explore alternatives like WhatsApp, Viber or RCS.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[\"Then it’s time to chose your A2P messaging provider. We wrote down a list of \",/*#__PURE__*/e(n,{href:\"https://www.notion.so/1220b602719a80f0981ee5a6cd4ea03d?pvs=21\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"features to look for in your SMS provider here.\"})})]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Once you've selected a provider, integrate their API into your platform. Ideally, this process should not take to much time and resource from you. But before sending messages, make sure to run tests to ensure correct implementation and message deliverability.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Then, you can set up your message templates. Pre-define messages you’ll send for different scenarios (e.g., order confirmations, appointment reminders, marketing promotions). Some providers may require you to register these templates. At Prelude, our templates are already approved, so you can start sending from day one.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"And you’re all set! Enjoy sending messages to your users globally!\"})})]}),/*#__PURE__*/t(\"p\",{children:[\"And if you want to try Prelude to send SMS globally at lower costs, feel free to \",/*#__PURE__*/e(n,{href:\"https://app.prelude.so/sign-up\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:/*#__PURE__*/e(\"strong\",{children:\"try our API\"})})}),\" or to \",/*#__PURE__*/e(n,{href:{webPageId:\"AJeysDBnf\"},motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:/*#__PURE__*/e(\"strong\",{children:\"book a demo\"})})}),\" with our team!\"]})]});export const richText8=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(n,{href:\"https://www.onesafe.io/\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"OneSafe\"})}),\" is a neo bank offering crypto-friendly bank accounts for global businesses. With over $200 million in transaction volume and a client base of 400 businesses, OneSafe is dedicated to serve the rapidly evolving Web3 market.\"]}),/*#__PURE__*/e(\"p\",{children:\"Founded by Chris Shei and Brian Ko, OneSafe enables crypto native businesses to create virtual cards and manage company expenses.\"}),/*#__PURE__*/e(\"h2\",{children:/*#__PURE__*/e(\"strong\",{children:\"Verifying financial transactions globally and seamlessly\"})}),/*#__PURE__*/e(\"p\",{children:\"As OneSafe is onboarding more businesses and growing their user base with seamless banking experiences, they needed to find a solution for verifying user transactions through One-Time Passwords (OTPs).\"}),/*#__PURE__*/e(\"p\",{children:\"Whenever an employee of a OneSafe client company needs to buy something online, OneSafe must verify the identity of the buyer before authorizing the transaction. This helps businesses to protect their spending and OneSafe to prevent fraud and phishing attempts against their customers.\"}),/*#__PURE__*/e(\"p\",{children:\"However, in order to achieve this, they needed a fast, reliable, and global solution for verifying user transactions that wouldn’t keep their users waiting forever to receive a code.\"}),/*#__PURE__*/e(\"p\",{children:\"Before discovering Prelude, OneSafe was using other providers for OTP verifications, but found the setup process too slow and cumbersome. For a company focused on quick scalability and global reach, the need for simpler and faster implementation became a priority.\"}),/*#__PURE__*/e(\"p\",{children:'\"Before Prelude, we used Twilio and AWS, but it was taking forever to get set up on other platforms. We wanted something simpler and quicker, and most importantly global”, added Chris Shei.'}),/*#__PURE__*/e(\"h2\",{children:/*#__PURE__*/e(\"strong\",{children:\"Fast-tracking the user verification process with Prelude\"})}),/*#__PURE__*/e(\"h3\",{children:/*#__PURE__*/e(\"strong\",{children:\"A quick and seamless implementation\"})}),/*#__PURE__*/e(\"p\",{children:\"Prelude quickly became OneSafe's preferred solution for handling OTP transactions due to its simplicity and efficiency.\"}),/*#__PURE__*/t(\"p\",{children:[\"OneSafe was able to \",/*#__PURE__*/e(\"strong\",{children:\"implement Prelude API in just one day\"}),\", avoiding the delays and complexities they had experienced with previous providers. Not only was the technical set up quick, but they were also able to \",/*#__PURE__*/e(n,{href:{pathVariables:{g3uDruQ2t:\"sms-otp-definition\"},unresolvedPathSlugs:{g3uDruQ2t:{collectionId:\"RxkZ6cAsR\",collectionItemId:\"dOqlOqqG6\"}},webPageId:\"Io5lOVoj4\"},motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"send OTP messages\"})}),\" on day one.\"]}),/*#__PURE__*/t(\"p\",{children:[\"In many countries, regulators and mobile operators require documentation to ensure that businesses sending SMS comply with local laws and guidelines, to prevent spam and phishing. Companies need to send a \",/*#__PURE__*/e(\"strong\",{children:\"Letter of Authorization (LOA)\"}),\" as a formal request to the telecom provider to allow them to send SMS messages to users in that country. For certain regions, sending SMS without the necessary authorization could lead to blocked messages or fines.\"]}),/*#__PURE__*/e(\"p\",{children:\"This is a process that requires some manual work and can take from a few days to several weeks.\"}),/*#__PURE__*/t(\"p\",{children:[\"However, \",/*#__PURE__*/e(\"strong\",{children:\"Prelude is registered worldwide with all providers so you can start sending OTP right away.\"}),\" Our message templates are pre-approved and optimized for conversions, to help our customers start \",/*#__PURE__*/e(n,{href:{pathVariables:{g3uDruQ2t:\"sms-verification-guide\"},unresolvedPathSlugs:{g3uDruQ2t:{collectionId:\"RxkZ6cAsR\",collectionItemId:\"m82loUu04\"}},webPageId:\"Io5lOVoj4\"},motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"verifying users\"})}),\" as fast as needed.\"]}),/*#__PURE__*/e(\"p\",{children:\"OneSafe was able to send OTP messages to customers globally on day one, without having to go through lengthy country-specific setups.\"}),/*#__PURE__*/e(\"p\",{children:\"By removing the operational friction involved in SMS delivery, OneSafe could immediately focus on scaling its user base and expanding its transaction volume without worrying about the technical logistics of OTP messaging.\"}),/*#__PURE__*/e(\"h3\",{children:/*#__PURE__*/e(\"strong\",{children:\"A reactive customer support\"})}),/*#__PURE__*/t(\"p\",{children:[\"A key differentiator for Prelude was its \",/*#__PURE__*/e(\"strong\",{children:\"reactive customer support\"}),\". OneSafe needed to tailor the creation process of the OTPs, and Prelude support team made that possible.\"]}),/*#__PURE__*/e(\"p\",{children:'\"We had specific requirements for customizing the OTP, which meant making direct adjustments to their API. When Prelude came back the next day saying the changes were already implemented, I honestly thought they were joking—it was that fast! Their support team has been incredibly responsive whenever we\\'ve had questions, making the whole process smooth and efficient\" shared Chris Shei.'}),/*#__PURE__*/e(\"p\",{children:\"This high level of responsiveness that they didn’t have with their previous providers ensured that OneSafe could continue operating at full capacity with minimal disruptions.\"}),/*#__PURE__*/e(\"h3\",{children:/*#__PURE__*/e(\"strong\",{children:\"A global and reliable delivery\"})}),/*#__PURE__*/t(\"p\",{children:[\"With Prelude, OneSafe can now send OTPs anywhere in the world, ensuring a \",/*#__PURE__*/e(\"strong\",{children:\"near-perfect delivery rate\"}),\". Prelude’s API connects OneSafe to \",/*#__PURE__*/e(\"strong\",{children:\"30 carriers and 4 messaging channels across 230 countries\"}),\", enabling them to verify transactions swiftly, regardless of their customers' location.\"]}),/*#__PURE__*/e(\"p\",{children:\"Prelude's smart-routing technology guarantees that OTP messages reach the intended recipients efficiently, with instant fallback options to alternative routes if needed. This has enabled Prelude customers to achieve an industry-leading conversion rate of 95%.\"}),/*#__PURE__*/t(\"p\",{children:[\"By partnering with Prelude, OneSafe has significantly improved its OTP verification process. From the quick setup to seamless global delivery and customized support, Prelude has enabled OneSafe to \",/*#__PURE__*/e(\"strong\",{children:\"scale\"}),\" its operations without being bogged down by technical challenges.\"]}),/*#__PURE__*/t(\"p\",{children:['\"',/*#__PURE__*/e(\"strong\",{children:\"Prelude is a great solution to send OTPs globally and seamlessly.\"}),' We were able to send messages from day one and didn’t need to do all the usual paperwork with each country to get set up,\" Chris added.']})]});export const richText9=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"One in five account openings online are fake.\"}),\" Companies from finance, e-commerce travel, gaming or social media industries are victims of massive \",/*#__PURE__*/e(\"strong\",{children:\"fake account creation\"}),\", driven by bots and fraudsters.\"]}),/*#__PURE__*/t(\"p\",{children:[\"This can sometimes elevate to massive amounts. In 2019 alone, \",/*#__PURE__*/e(\"strong\",{children:\"Facebook removed over 2 billion fake accounts\"}),\", and LinkedIn blocked or removed \",/*#__PURE__*/e(\"strong\",{children:\"21.6 million\"}),\" fake accounts in just six months. On e-commerce platforms like Amazon and Walmart, it's estimated that \",/*#__PURE__*/e(\"strong\",{children:\"one-third of product reviews\"}),\" are fake, many coming from fraudulent accounts.\"]}),/*#__PURE__*/t(\"p\",{children:[\"Why do these fake account exist? And \",/*#__PURE__*/e(\"strong\",{children:\"how can businesses detect them and prevent them to be created \"}),\"in the first place?\"]}),/*#__PURE__*/e(\"h2\",{children:\"How does fake account creation work?\"}),/*#__PURE__*/e(\"p\",{children:\"As companies focus on user growth, they tend to make their registration process lighter and lighter, with simple forms requiring just the name and email, and sometimes a phone number. This increases their conversion rate, but also their likelihood of attracting fake accounts.\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Account registration fraud\"}),\" happens when fraudsters leverage the vulnerabilities of a website or app registration form. It’s mainly bot-driven, with automatic scripts using fake or stolen information to look like genuine users.\"]}),/*#__PURE__*/t(\"p\",{children:[\"The \",/*#__PURE__*/e(\"strong\",{children:\"automation of fake account creation \"}),\"has reached a fairly advanced stage, with bots incorporating wait times to mimic human behavior and the marketing of ‘bots as a service’ that can be hired to create hundreds of fake accounts for you.\"]}),/*#__PURE__*/e(\"p\",{children:\"The creation of fake accounts can also be man-made, whether it's someone trying to get a second free trial or fraud farms, with low-paid workers creating fake accounts all day long.\"}),/*#__PURE__*/e(\"h2\",{children:\"Why would someone create a fake account?\"}),/*#__PURE__*/e(\"p\",{children:\"There are surprisingly many ways to monetize a fake account (especially if you have thousands of them). Here are just a few examples:\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Free trial and subscription abuse:\"}),\" Many subscription-based services, like streaming platforms, fitness apps, and gaming companies, offer free trials to attract users. Fraudsters take advantage of this by creating or reselling fake accounts, allowing them to repeatedly exploit these offers.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Fake product reviews\"}),': A prevalent issue for marketplaces and e-commerce platforms, fake accounts are often used to post exaggerated positive or negative reviews to manipulate product rankings. A quick Google search for \"buy product reviews\" reveals just how widespread and thriving this fraudulent market is.']}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Click and engagement fraud:\"}),\" Fraudsters can be paid to generate fake clicks or fake engagement, whether it's for a company looking to squeeze its competitors' advertising budgets by clicking on all their ads, or for an inspiring influencer buying likes and comments on their posts.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Money laundering\"}),\": From gig economy platforms and cryptocurrency exchanges to \",/*#__PURE__*/e(n,{href:\"https://www.forbes.com/sites/cyrusfarivar/2023/03/30/hundreds-of-roblox-users-may-be-engaged-in-money-laundering-court-filing-says/\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"gaming rewards\"})}),\", fraudsters require a large number of fake accounts to launder money through various online channels.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Selling fake products\"}),\": Fake accounts on e-commerce platforms can be used to sell non-existing, stolen or poor quality products (like dropshipped products labelled as handmade or \",/*#__PURE__*/e(n,{href:\"https://www.wired.com/story/scammy-ai-generated-books-flooding-amazon/\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"AI-generated books\"})}),\").\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Phishing and scamming\"}),\": Up to 10% of profiles on dating apps are fake, mainly use for phishing attempts. These fake profiles aim to trick users into sharing personal information or falling for other fraudulent schemes.\"]}),/*#__PURE__*/e(\"p\",{children:\"Some industries are more targeted than others, like:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Banking and finance:\"}),\" to facilitate money laundering, fraudulent transactions, and identity theft..\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Social media and dating platforms:\"}),\" used for scams, phishing, and artificially boosting engagement.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"E-commerce:\"}),\" to manipulate reviews, exploit promotions, and sell counterfeit goods.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Education:\"}),\" to access online content or financial aid fraud.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Gaming\"}),\": to cheat, farm rewards, and engage in credit card fraud.\"]})})]}),/*#__PURE__*/e(\"p\",{children:\"We could list many other ways these accounts can be monetized, like manipulating public opinion on social media or cheating on online game. And sometimes people create fake accounts just for the pleasure of trolling online users.\"}),/*#__PURE__*/e(\"h2\",{children:\"What is the impact of fake accounts?\"}),/*#__PURE__*/e(\"h3\",{children:\"Financial losses\"}),/*#__PURE__*/e(\"p\",{children:\"Fake account creation can have a profound financial impact on businesses, primarily through direct losses. Fraudsters exploit free trials and promotional offers using fake accounts, leading to significant operational expenses for services that never reach genuine customers.\"}),/*#__PURE__*/e(\"p\",{children:\"But companies also lose money on resources like server capacity, bandwidth, and staff time needed to support these fake users.\"}),/*#__PURE__*/e(\"h3\",{children:\"Faked analytics\"}),/*#__PURE__*/e(\"p\",{children:\"Fake accounts also compromises the accuracy of key business metrics, crucial for decision-making. With inflated user numbers, businesses are often misled into believing they are growing faster than they truly are. This can prompt premature scaling of infrastructure, which leads to unnecessary investments in areas like technology and staffing.\"}),/*#__PURE__*/e(\"p\",{children:\"Beyond this, fake accounts can distort engagement data by producing inflated clicks, views, or interactions, making it difficult to assess how real customers interact with the business.\"}),/*#__PURE__*/e(\"p\",{children:\"Analytics and A/B testing, used to fine-tune customer experiences and optimize marketing strategies, also become unreliable when fake accounts skew results.\"}),/*#__PURE__*/e(\"h3\",{children:\"Wasted marketing budget\"}),/*#__PURE__*/e(\"p\",{children:\"Fake accounts can get included in audience targeting algorithms, which means marketing campaigns are directed at non-existent users. This dilutes the effectiveness of ads and results in poor return on investment.\"}),/*#__PURE__*/e(\"h3\",{children:\"Reputational damage\"}),/*#__PURE__*/e(\"p\",{children:\"If a platform is known for being overrun with fake profiles, customers may begin to question the legitimacy of its service or user base. No one wants to chat with a bot or a catfish.\"}),/*#__PURE__*/e(\"p\",{children:\"For e-commerce companies, fake accounts leaving fraudulent product reviews can undermine trust in the marketplace, eroding consumer confidence in both the business and its vendors.\"}),/*#__PURE__*/e(\"h3\",{children:\"Customer support costs\"}),/*#__PURE__*/e(\"p\",{children:\"Support staff must deal with increased inquiries related to fraudulent activities, whether it’s addressing complaints about scams, processing refunds for fraudulent transactions, or managing issues stemming from fake reviews.\"}),/*#__PURE__*/e(\"p\",{children:\"The time spent on these tasks diverts attention from supporting legitimate customers, which not only strains resources but can also diminish the quality of service for real users. Over time, this increased workload can contribute to a decline in overall customer satisfaction, further damaging the business’s reputation.\"}),/*#__PURE__*/e(\"h2\",{children:\"How to spot fake accounts?\"}),/*#__PURE__*/e(\"p\",{children:\"Detecting fake accounts is a delicate thing, as there is no one size fits all. It requires monitoring for unusual patterns and behaviors that distinguish fraudulent users from legitimate ones.\"}),/*#__PURE__*/e(\"p\",{children:\"You can usually look for one of those red flags:\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Unusual activity patterns\"}),\": Fake accounts often show irregular engagement, such as a high volume of actions in a short time, that would be manually impossible to do.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Incomplete or generic profiles\"}),': Generic profile pictures, usernames, or email addresses that seem automated or random, like \"paul1234\" (sorry if that’s really your username).']}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"IP address anomalies\"}),\": A large number of accounts created from the same IP address or region within a short timeframe (specifically if you don’t usually operate in that region) can be a red flag.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Surge in sign-ups:\"}),\" Fake accounts are often generated en masse. So before you pop the champagne to celebrate all those new users, double check if they look like legitimate users.\"]}),/*#__PURE__*/e(\"h2\",{children:\"How to prevent fake account creation in the first place?\"}),/*#__PURE__*/e(\"p\",{children:\"Spotting fake accounts is all very well, but you know what's even better? Stopping them before they're even created! Here are a few tips to help you do just that:\"}),/*#__PURE__*/e(\"h3\",{children:\"Implement CAPTCHA\"}),/*#__PURE__*/e(\"p\",{children:\"CAPTCHA can be a handy first layer to block bots during the sign-up process, but they're not foolproof. Bots are increasingly capable of bypassing CAPTCHAs using techniques like optical character recognition (OCR) to solve the challenges automatically. \"}),/*#__PURE__*/e(\"p\",{children:\"In fact, CAPTCHA-solving services are readily available online at surprisingly low costs, making them less effective as a standalone defense. Plus let’s be honest, I’ve never met another human who liked a CAPTCHA field.\"}),/*#__PURE__*/e(\"h3\",{children:\"Honeypot fields\"}),/*#__PURE__*/e(\"p\",{children:\"These are invisible form fields that legitimate users won't see or interact with, but bots often will. When an automated system fills in these hidden fields, it triggers an alert, allowing you to identify and block the bot before it completes the sign-up process. This technique is seamless for real users and highly effective at catching automated attempts.\"}),/*#__PURE__*/e(\"h3\",{children:\"Limit Account Creation\"}),/*#__PURE__*/e(\"p\",{children:\"Set a limit on how frequently users can create accounts from the same device, email domain, or phone number. This prevents scammers from mass-producing accounts with minor tweaks to data. You could also restrict the number of accounts that can be created from a single IP address within a given timeframe. But be careful as this might results in false positives depending on your business. \"}),/*#__PURE__*/e(\"h3\",{children:\"Phone number verification\"}),/*#__PURE__*/e(\"p\",{children:\"Phone verification is probably the easiest way to implement fake account prevention, as it can be implemented with an API in less than a day. Users usually have only have one phone number, scammers don't like revealing theirs and it's a great way to also prevent users creating multiple accounts.\"}),/*#__PURE__*/t(\"p\",{children:[\"Phone number verification works by sending a \",/*#__PURE__*/e(n,{href:{pathVariables:{g3uDruQ2t:\"sms-otp-definition\"},unresolvedPathSlugs:{g3uDruQ2t:{collectionId:\"RxkZ6cAsR\",collectionItemId:\"dOqlOqqG6\"}},webPageId:\"Io5lOVoj4\"},motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"one-time password (OTP)\"})}),\" by SMS or an online messaging channel like WhatsApp. By using a solution designed to limit fraud, such as \",/*#__PURE__*/e(n,{href:{webPageId:\"jHZR0p4bq\"},motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"Prelude\"})}),\", you are guaranteed to have a secure and authentic user base.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Multi-Factor Authentication (MFA)\"}),/*#__PURE__*/e(\"p\",{children:\"To go one-step further, you can introduce MFA during the account creation process to authenticate users through multiple steps, such as a password and a one-time code sent to a verified device, making it harder for bots to create accounts.\"}),/*#__PURE__*/e(\"h2\",{children:\"Case Study: How Prelude helped Cubzh prevent fake account on its gaming platform\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(n,{href:{pathVariables:{g3uDruQ2t:\"cubzh-case-study\"},unresolvedPathSlugs:{g3uDruQ2t:{collectionId:\"RxkZ6cAsR\",collectionItemId:\"qztYT_xe9\"}},webPageId:\"Io5lOVoj4\"},motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"Cubzh\"})}),\" is a gaming platform that blends the creative freedom of Minecraft with the community-driven spirit of Roblox. Unlike its competitors, Cubzh prioritizes the quality of its user base over its quantity.\"]}),/*#__PURE__*/e(\"p\",{children:\"A standout feature of the platform is the Makers’ Marketplace, where users can earn in-game currency by creating successful games and get rewarded for their contributions. Players can also earn it through consistent engagement, with daily logins and new creations being rewarded.\"}),/*#__PURE__*/e(\"p\",{children:\"However, Cubzh faced challenges with cheaters and malicious users creating fake accounts and bots, threatening its community-first approach. Some users exploited the freemium model by creating multiple accounts to maximize their in-game earnings.\"}),/*#__PURE__*/e(\"p\",{children:\"Handling these issues internally drained time and resources that could have been better spent enhancing the platform. To tackle this, Cubzh implemented Prelude’s advanced verification tools, which became crucial in their fight against fake accounts.\"}),/*#__PURE__*/e(\"p\",{children:\"Now, all new users must verify their identity by providing a phone number (or a parent's number for users under 13). Prelude’s SMS verification API ensures that each account is legitimate, allowing Cubzh to:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Protect younger players and reassure parents\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Maintain a high-quality, authentic community\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Prevent abuse of the freemium system by stopping users from creating multiple accounts\"})})]}),/*#__PURE__*/t(\"p\",{children:[\"“\",/*#__PURE__*/e(\"em\",{children:\"The Prelude API is really easy to use, we were able to implement the solution in less than a day. Since then, we've seen a real improvement in the quality of our user base and in our user’s churn rate\"}),\"”, Adrien Duermael, CEO of Cubzh\"]}),/*#__PURE__*/e(\"img\",{alt:\"phone verification in cubzh\",className:\"framer-image\",height:\"540\",src:\"https://framerusercontent.com/images/5fqjQwCr5OkcmSjfuSlQE8CQ.png\",srcSet:\"https://framerusercontent.com/images/5fqjQwCr5OkcmSjfuSlQE8CQ.png?scale-down-to=512 512w,https://framerusercontent.com/images/5fqjQwCr5OkcmSjfuSlQE8CQ.png?scale-down-to=1024 1024w,https://framerusercontent.com/images/5fqjQwCr5OkcmSjfuSlQE8CQ.png 1920w\",style:{aspectRatio:\"1920 / 1080\"},width:\"960\"}),/*#__PURE__*/e(\"h2\",{children:\"How to prevent fake account creation with phone verification?\"}),/*#__PURE__*/t(\"p\",{children:[\"Getting started is straightforward. With Prelude’s API, you can be up and running in just three steps, all outlined in our \",/*#__PURE__*/e(n,{href:\"https://docs.prelude.so/introduction/quickstart\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"Quickstart guide\"})}),\". The entire process can be completed in under a day, making it quick and hassle-free.\"]}),/*#__PURE__*/t(\"ol\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Get the SDK\"}),\": We provide SDKs for many popular languages to make your life easier, such as Node, Go, Python, Ruby, Java, PHP or C#.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Initialize the SDK \"}),\"by pasting the snippet available in our \",/*#__PURE__*/e(n,{href:\"https://docs.prelude.so/introduction/quickstart\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"quickstart guide\"})}),\".\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Send and verify a code\"}),\": call the authentication endpoint with your phone number to receive a code by SMS and verify it.\"]})})]}),/*#__PURE__*/e(\"p\",{children:\"And that’s it—you’ve successfully implemented SMS verification! From here, you can run tests to ensure the integration works smoothly, add fraud signals for enhanced protection, and connect your webhook to receive real-time notifications when an OTP is sent or billed.\"}),/*#__PURE__*/t(\"p\",{children:[\"So if you want to mitigate fake accounts on your platform, you can \",/*#__PURE__*/e(n,{href:\"https://app.prelude.so/sign-up\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"start for free with Prelude\"})}),\" or \",/*#__PURE__*/e(n,{href:\"https://prelude.so/contact\",motionChild:!0,nodeId:\"RxkZ6cAsR\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"talk to our sales team\"})}),\"!\"]})]});\nexport const __FramerMetadata__ = {\"exports\":{\"richText2\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText1\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText6\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText5\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText7\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText3\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText9\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText4\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText8\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"__FramerMetadata__\":{\"type\":\"variable\"}}}"],"mappings":"2VACa,AADb,GAAkD,IAA8B,IAAuC,IAAwB,CAAa,EAAsB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,2GAAwH,EAAE,SAAS,CAAC,SAAS,iBAAkB,EAAC,CAAC,MAAmB,EAAE,SAAS,CAAC,SAAS,qCAAsC,EAAC,CAAC,wHAAyH,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,qEAAkF,EAAE,SAAS,CAAC,SAAS,wBAAyB,EAAC,CAAC,gSAAiS,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,2JAAwK,EAAE,SAAS,CAAC,SAAS,gDAAiD,EAAC,CAAC,2IAA4I,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,4BAA6B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,yIAAsJ,EAAE,SAAS,CAAC,SAAS,qDAAsD,EAAC,CAAC,gKAAiK,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,+BAAgC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,mGAAoG,EAAC,CAAc,EAAE,IAAI,CAAC,SAAsB,EAAE,SAAS,CAAC,SAAS,qBAAsB,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,mEAAoE,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,sIAAuI,EAAC,AAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAsB,EAAE,SAAS,CAAC,SAAS,qBAAsB,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,gGAAiG,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,iGAAkG,EAAC,AAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAsB,EAAE,SAAS,CAAC,SAAS,oBAAqB,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,8EAA+E,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,mFAAoF,EAAC,AAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,oHAAiI,EAAE,SAAS,CAAC,SAAS,mBAAoB,EAAC,CAAC,mBAAoB,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,6CAA8C,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,uIAAwI,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,YAAa,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAO,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,8FAA+F,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAO,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,6IAA8I,EAAC,AAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,kCAAmC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAO,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,iIAAkI,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAO,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,wDAAyD,EAAC,AAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,2BAA4B,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAO,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,0GAA2G,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAO,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,uGAAwG,EAAC,AAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,uBAAwB,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,4EAA6E,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,8FAA+F,EAAC,AAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,mDAAoD,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,iHAAkH,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAO,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,YAAa,EAAC,CAAC,iLAAkL,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAO,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,kCAAmC,EAAC,CAAC,qKAAsK,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAO,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,2BAA4B,EAAC,CAAC,uLAAwL,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAO,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,uBAAwB,EAAC,CAAC,sIAAuI,CAAC,EAAC,AAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,mJAAoJ,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,0BAA2B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,8HAA2I,EAAE,SAAS,CAAC,SAAS,gBAAiB,EAAC,CAAC,yBAAsC,EAAE,SAAS,CAAC,SAAS,KAAM,EAAC,CAAC,iBAA8B,EAAE,SAAS,CAAC,SAAS,cAAe,EAAC,CAAC,oIAAqI,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,qLAAkM,EAAE,SAAS,CAAC,SAAS,sDAAuD,EAAC,CAAC,SAAsB,EAAE,SAAS,CAAC,SAAS,8CAA+C,EAAC,CAAC,GAAI,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,0CAA2C,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,oJAAqJ,EAAC,CAAc,EAAE,KAAK,CAAC,SAAsB,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAO,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAsB,EAAE,SAAS,CAAC,SAAS,8BAA+B,EAAC,AAAC,EAAC,AAAC,EAAC,AAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,8MAA+M,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,mJAAgK,EAAEA,EAAE,CAAC,KAAK,gDAAgD,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,eAAgB,EAAC,AAAC,EAAC,CAAC,IAAiB,EAAE,KAAK,CAAE,EAAC,CAAc,EAAE,SAAS,CAAC,SAAsB,EAAE,KAAK,CAAE,EAAC,AAAC,EAAC,CAAC,sLAAuL,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAsB,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAO,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAsB,EAAE,SAAS,CAAC,SAAS,wBAAyB,EAAC,AAAC,EAAC,AAAC,EAAC,AAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,4QAA6Q,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,yHAAsI,EAAE,KAAK,CAAE,EAAC,CAAc,EAAE,SAAS,CAAC,SAAsB,EAAE,KAAK,CAAE,EAAC,AAAC,EAAC,CAAC,+KAAgL,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAsB,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAO,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAsB,EAAE,SAAS,CAAC,SAAS,uBAAwB,EAAC,AAAC,EAAC,AAAC,EAAC,AAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,0NAA2N,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,sJAAmK,EAAE,KAAK,CAAE,EAAC,CAAc,EAAE,KAAK,CAAE,EAAC,CAAC,sJAAuJ,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,+BAAgC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,iKAAkK,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAO,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,mBAAoB,EAAC,CAAC,sFAAmG,EAAE,KAAK,CAAE,EAAC,CAAc,EAAE,KAAK,CAAC,UAAU,gBAAiB,EAAC,AAAC,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAO,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,wBAAyB,EAAC,CAAC,4FAAyG,EAAE,KAAK,CAAE,EAAC,CAAc,EAAE,KAAK,CAAC,UAAU,gBAAiB,EAAC,AAAC,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAO,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,cAAe,EAAC,CAAC,oFAAqF,CAAC,EAAC,AAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,+JAA4K,EAAED,EAAE,CAAC,KAAK,yHAAyH,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,CAAC,sDAAmE,EAAE,SAAS,CAAC,SAAS,gCAAiC,EAAC,AAAC,CAAC,EAAC,AAAC,EAAC,CAAC,8IAA+I,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,sMAAmN,EAAE,SAAS,CAAC,SAAS,mFAAoF,EAAC,AAAC,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,0EAA2E,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,+MAAgN,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,+BAA4C,EAAE,SAAS,CAAC,SAAS,kBAAmB,EAAC,CAAC,0VAA2V,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,qCAAkD,EAAE,SAAS,CAAC,SAAS,iBAAkB,EAAC,CAAC,2VAA4V,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,+BAA4C,EAAE,SAAS,CAAC,SAAS,oBAAqB,EAAC,CAAC,wQAAyQ,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,iDAAkD,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,2MAA4M,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,qCAAsC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,mJAAoJ,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAO,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,sBAAuB,EAAC,CAAC,8IAA+I,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAO,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,yBAA0B,EAAC,CAAC,6JAA8J,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAO,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,wCAAyC,EAAC,CAAC,uLAAwL,CAAC,EAAC,AAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,0CAA2C,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,uJAAwJ,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAO,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,iDAAkD,EAAC,CAAC,wLAAyL,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAO,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,4DAA6D,EAAC,CAAC,0JAA2J,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAO,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,wDAAyD,EAAC,CAAC,sLAAuL,CAAC,EAAC,AAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,yBAA0B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,iJAAkJ,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAO,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,oBAAqB,EAAC,CAAC,2IAA4I,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAO,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,wBAAyB,EAAC,CAAC,4IAA6I,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAO,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,aAAc,EAAC,CAAC,wHAAyH,CAAC,EAAC,AAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,yJAA0J,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,qEAAsE,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,kMAAmM,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,0DAA2D,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,iMAA8M,EAAE,SAAS,CAAC,SAAS,2DAA4D,EAAC,CAAC,6DAA8D,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,oDAAqD,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,gJAA6J,EAAE,SAAS,CAAC,SAAS,0CAA2C,EAAC,CAAC,2IAA4I,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,oCAAqC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,0KAAuL,EAAE,SAAS,CAAC,SAAS,yCAA0C,EAAC,CAAC,SAAsB,EAAE,SAAS,CAAC,SAAS,wCAAyC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,mDAAoD,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,2IAAwJ,EAAE,SAAS,CAAC,SAAS,sDAAuD,EAAC,CAAC,gDAAiD,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,oDAAqD,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAED,EAAE,CAAC,KAAK,sBAAsB,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,sDAAuD,EAAC,AAAC,EAAC,CAAC,4GAA6G,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAO,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,gEAAiE,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAO,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,oDAAqD,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAO,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,uDAAwD,EAAC,AAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,6HAA8H,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,sCAAmD,EAAE,SAAS,CAAC,SAAS,wBAAyB,EAAC,CAAc,EAAED,EAAE,CAAC,KAAK,sDAAsD,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAsB,EAAE,SAAS,CAAC,SAAS,kBAAmB,EAAC,AAAC,EAAC,AAAC,EAAC,CAAC,yRAAsS,EAAE,SAAS,CAAC,SAAS,qEAAsE,EAAC,CAAC,SAAsB,EAAE,SAAS,CAAC,SAAS,sCAAuC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,mQAAgR,EAAE,SAAS,CAAC,SAAS,+EAAgF,EAAC,AAAC,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,wNAAyN,EAAC,CAAc,EAAED,EAAE,CAAC,KAAK,iCAAiC,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAsB,EAAE,SAAS,CAAC,SAAS,SAAU,EAAC,AAAC,EAAC,AAAC,EAAC,CAAc,EAAE,SAAS,CAAC,SAAS,eAAgB,EAAC,CAAc,EAAED,EAAE,CAAC,KAAK,6BAA6B,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAsB,EAAE,SAAS,CAAC,SAAS,YAAa,EAAC,AAAC,EAAC,AAAC,EAAC,CAAc,EAAE,SAAS,CAAC,SAAS,iBAAkB,EAAC,AAAC,CAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAuB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,8MAA+M,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,6SAA8S,EAAC,CAAc,EAAE,KAAK,CAAC,SAAsB,EAAE,SAAS,CAAC,SAAS,mEAAoE,EAAC,AAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,KAAkB,EAAE,SAAS,CAAC,SAAS,+BAAgC,EAAC,CAAC,4PAA6P,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,0BAAuC,EAAE,SAAS,CAAC,SAAS,wBAAyB,EAAC,CAAC,yHAA0H,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAO,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,mCAAoC,EAAC,CAAC,8OAA+O,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAO,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,4BAA6B,EAAC,CAAC,+LAAgM,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAO,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,4CAA6C,EAAC,CAAC,4KAA6K,CAAC,EAAC,AAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,4OAA6O,EAAC,CAAc,EAAE,KAAK,CAAC,SAAsB,EAAE,SAAS,CAAC,SAAS,+BAAgC,EAAC,AAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,+KAA4L,EAAE,SAAS,CAAC,SAAS,iEAAkE,EAAC,AAAC,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAsB,EAAE,SAAS,CAAC,SAAS,wBAAyB,EAAC,AAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,wFAAyF,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAO,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,aAAc,EAAC,CAAC,yFAA0F,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAO,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,eAAgB,EAAC,CAAC,kFAAmF,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAO,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,0BAA2B,EAAC,CAAC,0HAA2H,CAAC,EAAC,AAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,kKAAmK,EAAC,CAAc,EAAE,KAAK,CAAC,SAAsB,EAAE,SAAS,CAAC,SAAS,wCAAyC,EAAC,AAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,uEAAoF,EAAE,SAAS,CAAC,SAAS,kBAAmB,EAAC,CAAC,6FAA8F,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAO,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,uBAAwB,EAAC,CAAC,4EAA6E,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAO,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,UAAW,EAAC,CAAC,sFAAuF,CAAC,EAAC,AAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,6FAA8F,EAAC,CAAc,EAAE,KAAK,CAAC,SAAsB,EAAE,SAAS,CAAC,SAAS,sBAAuB,EAAC,AAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,mGAAoG,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAO,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,eAAgB,EAAC,CAAC,uDAAwD,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAO,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,eAAgB,EAAC,CAAC,oFAAqF,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAO,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,mBAAoB,EAAC,CAAC,8FAA+F,CAAC,EAAC,AAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,4HAA6H,EAAC,CAAc,EAAE,KAAK,CAAC,SAAsB,EAAE,SAAS,CAAC,SAAS,iCAAkC,EAAC,AAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,+BAA4C,EAAE,SAAS,CAAC,SAAS,oBAAqB,EAAC,CAAC,mBAAgC,EAAE,SAAS,CAAC,SAAS,iDAAkD,EAAC,CAAC,kCAA+C,EAAED,EAAE,CAAC,KAAK,yDAAyD,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,OAAQ,EAAC,AAAC,EAAC,CAAC,gMAAiM,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,wIAAyI,EAAC,CAAc,EAAE,KAAK,CAAC,SAAsB,EAAE,SAAS,CAAC,SAAS,uCAAwC,EAAC,AAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,6DAA0E,EAAE,SAAS,CAAC,SAAS,mFAAoF,EAAC,CAAC,+CAAgD,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAsB,EAAE,SAAS,CAAC,SAAS,kBAAmB,EAAC,AAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,kBAA+B,EAAE,SAAS,CAAC,SAAS,UAAW,EAAC,CAAC,KAAkB,EAAE,SAAS,CAAC,SAAS,QAAS,EAAC,CAAC,QAAqB,EAAE,SAAS,CAAC,SAAS,SAAU,EAAC,CAAC,kHAA+H,EAAE,SAAS,CAAC,SAAS,aAAc,EAAC,CAAC,OAAoB,EAAE,SAAS,CAAC,SAAS,0BAA2B,EAAC,CAAC,yCAA0C,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAO,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,cAAe,EAAC,CAAC,uEAAwE,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAO,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,gBAAiB,EAAC,CAAC,8GAA+G,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAO,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,oBAAqB,EAAC,CAAC,+EAA4F,EAAE,SAAS,CAAC,SAAS,IAAK,EAAC,CAAC,+BAAgC,CAAC,EAAC,AAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,8GAA+G,EAAC,CAAc,EAAE,KAAK,CAAC,SAAsB,EAAE,SAAS,CAAC,SAAS,0CAA2C,EAAC,AAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,cAA2B,EAAE,SAAS,CAAC,SAAS,aAAc,EAAC,CAAC,kBAA+B,EAAE,SAAS,CAAC,SAAS,2BAA4B,EAAC,CAAC,+BAA4C,EAAED,EAAE,CAAC,KAAK,kGAAkG,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,CAAC,KAAkB,EAAE,SAAS,CAAC,SAAS,cAAe,EAAC,CAAC,eAAgB,CAAC,EAAC,AAAC,EAAC,CAAC,8SAA+S,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,oJAAqJ,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAO,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,qBAAsB,EAAC,CAAC,uOAAwO,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAO,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,eAAgB,EAAC,CAAC,mPAAoP,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAO,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,uBAAwB,EAAC,CAAC,sMAAuM,CAAC,EAAC,AAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,6IAA0J,EAAE,SAAS,CAAC,SAAS,sFAAuF,EAAC,CAAC,qHAAsH,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAsB,EAAE,SAAS,CAAC,SAAS,kBAAmB,EAAC,AAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,6MAA8M,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAO,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,gBAAiB,EAAC,CAAC,4GAA6G,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAO,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,aAAc,EAAC,CAAC,wFAAyF,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAO,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,gCAAiC,EAAC,CAAC,yIAA0I,CAAC,EAAC,AAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,sGAAuG,EAAC,CAAc,EAAE,KAAK,CAAC,SAAsB,EAAE,SAAS,CAAC,SAAS,+CAAgD,EAAC,AAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,oHAAiI,EAAE,SAAS,CAAC,SAAS,yDAA0D,EAAC,CAAC,cAAe,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAsB,EAAE,SAAS,CAAC,SAAS,gBAAiB,EAAC,AAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,wJAAqK,EAAE,SAAS,CAAC,SAAS,wCAAyC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,0IAAuJ,EAAE,SAAS,CAAC,SAAS,mFAAoF,EAAC,CAAC,yCAA0C,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAsB,EAAE,SAAS,CAAC,SAAS,OAAQ,EAAC,AAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,+LAA4M,EAAE,SAAS,CAAC,SAAS,8DAA+D,EAAC,CAAC,WAAY,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,uHAAoI,EAAE,SAAS,CAAC,SAAS,mDAAoD,EAAC,CAAC,gFAAiF,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAsB,EAAE,SAAS,CAAC,SAAS,SAAU,EAAC,AAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,yDAA0D,EAAC,CAAC,0LAA2L,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,uFAAoG,EAAE,SAAS,CAAC,SAAS,gCAAiC,EAAC,CAAC,sIAAuI,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAsB,EAAE,SAAS,CAAC,SAAS,kBAAmB,EAAC,AAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,6FAA0G,EAAE,SAAS,CAAC,SAAS,0CAA2C,EAAC,CAAC,6EAA8E,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,kOAA+O,EAAE,SAAS,CAAC,SAAS,4FAA6F,EAAC,AAAC,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAsB,EAAE,SAAS,CAAC,SAAS,yBAA0B,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAO,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,MAAO,EAAC,CAAC,8NAA+N,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAO,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,OAAQ,EAAC,CAAC,+NAAgO,CAAC,EAAC,AAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAsB,EAAE,SAAS,CAAC,SAAS,qBAAsB,EAAC,AAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,sCAAmD,EAAE,SAAS,CAAC,SAAS,uCAAwC,EAAC,CAAC,iLAA8L,EAAE,SAAS,CAAC,SAAS,yDAA0D,EAAC,CAAC,qDAAsD,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,6IAA0J,EAAE,SAAS,CAAC,SAAS,uCAAwC,EAAC,CAAC,oCAAiD,EAAE,SAAS,CAAC,SAAS,2BAA4B,EAAC,AAAC,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,2DAAwE,EAAE,SAAS,CAAC,SAAS,kDAAmD,EAAC,CAAC,uKAAoL,EAAE,SAAS,CAAC,SAAS,qBAAsB,EAAC,CAAC,0DAA2D,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,6MAA8M,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,uRAAwR,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,yDAA0D,EAAC,CAAc,EAAED,EAAE,CAAC,KAAK,iCAAiC,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAsB,EAAE,SAAS,CAAC,SAAS,SAAU,EAAC,AAAC,EAAC,AAAC,EAAC,CAAc,EAAE,SAAS,CAAC,SAAS,cAAe,EAAC,CAAc,EAAED,EAAE,CAAC,KAAK,6BAA6B,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAsB,EAAE,SAAS,CAAC,SAAS,mBAAoB,EAAC,AAAC,EAAC,AAAC,EAAC,CAAc,EAAE,SAAS,CAAC,SAAS,4GAA6G,EAAC,AAAC,CAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAuB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,uCAAoD,EAAE,SAAS,CAAC,SAAS,0DAA2D,EAAC,CAAC,gSAAiS,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,gJAA6J,EAAE,SAAS,CAAC,SAAS,8CAA+C,EAAC,CAAC,oEAAqE,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,+PAAgQ,EAAC,CAAc,EAAE,KAAK,CAAC,SAAsB,EAAE,SAAS,CAAC,SAAS,yBAA0B,EAAC,AAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,4SAAyT,EAAE,SAAS,CAAC,SAAS,wEAAyE,EAAC,AAAC,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,4GAAyH,EAAED,EAAE,CAAC,KAAK,iDAAiD,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,kCAAmC,EAAC,AAAC,EAAC,CAAC,oDAAiE,EAAE,SAAS,CAAC,SAAS,8DAA+D,EAAC,CAAC,8CAA+C,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,uCAAoD,EAAE,SAAS,CAAC,SAAS,wDAAyD,EAAC,CAAC,oEAAqE,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAsB,EAAE,SAAS,CAAC,SAAS,2BAA4B,EAAC,AAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,qLAAkM,EAAE,SAAS,CAAC,SAAS,sFAAuF,EAAC,CAAC,6FAA8F,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAO,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,gBAAiB,EAAC,CAAC,+SAAgT,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAO,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,qBAAsB,EAAC,CAAC,iKAAkK,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAO,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,oBAAqB,EAAC,CAAC,2QAA4Q,CAAC,EAAC,AAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,4BAAyC,EAAE,SAAS,CAAC,SAAS,sDAAuD,EAAC,CAAC,kFAAmF,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAsB,EAAE,SAAS,CAAC,SAAS,yBAA0B,EAAC,AAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,qDAAsD,EAAC,CAAC,8HAA+H,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAO,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,gEAAiE,EAAC,CAAC,qFAAkG,EAAED,EAAE,CAAC,KAAK,6CAA6C,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,2BAA4B,EAAC,AAAC,EAAC,CAAC,oMAAqM,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAO,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,wBAAyB,EAAC,CAAC,mUAAoU,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAO,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,uBAAwB,EAAC,CAAC,qRAAsR,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAO,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,8BAA+B,EAAC,CAAC,4RAA6R,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAO,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,+BAAgC,EAAC,CAAC,0SAA2S,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAO,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,kCAAmC,EAAC,CAAC,mQAAoQ,CAAC,EAAC,AAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,mLAAoL,EAAC,CAAc,EAAE,KAAK,CAAC,SAAsB,EAAE,SAAS,CAAC,SAAS,sCAAuC,EAAC,AAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,8KAA+K,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAO,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,uBAAwB,EAAC,CAAC,6TAA8T,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAO,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,YAAa,EAAC,CAAC,iRAAkR,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAO,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,kBAAmB,EAAC,CAAC,oHAAiI,EAAED,EAAE,CAAC,KAAK,2CAA2C,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,+BAAgC,EAAC,AAAC,EAAC,CAAC,gVAAiV,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAO,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,cAAe,EAAC,CAAC,uPAAwP,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAO,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,gBAAiB,EAAC,CAAC,wRAAyR,CAAC,EAAC,AAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAsB,EAAE,SAAS,CAAC,SAAS,qCAAsC,EAAC,AAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,0GAA2G,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAO,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,4BAA6B,EAAC,CAAC,wMAAqN,EAAED,EAAE,CAAC,KAAK,yDAAyD,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,8CAA+C,EAAC,AAAC,EAAC,CAAC,2CAA4C,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAO,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,oCAAqC,EAAC,CAAC,mPAAoP,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAO,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,qBAAsB,EAAC,CAAC,oQAAqQ,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAO,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,uBAAwB,EAAC,CAAC,4MAA6M,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAO,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,oBAAqB,EAAC,CAAC,oNAAqN,CAAC,EAAC,AAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,uDAAoE,EAAE,SAAS,CAAC,SAAS,iDAAkD,EAAC,CAAC,4MAA6M,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,uEAAoF,EAAE,SAAS,CAAC,SAAS,+CAAgD,EAAC,CAAC,6GAA8G,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,iDAAkD,EAAC,CAAc,EAAED,EAAE,CAAC,KAAK,iCAAiC,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAsB,EAAE,SAAS,CAAC,SAAS,SAAU,EAAC,AAAC,EAAC,AAAC,EAAC,CAAc,EAAE,SAAS,CAAC,SAAS,eAAgB,EAAC,CAAc,EAAED,EAAE,CAAC,KAAK,6BAA6B,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAsB,EAAE,SAAS,CAAC,SAAS,wBAAyB,EAAC,AAAC,EAAC,AAAC,EAAC,CAAc,EAAE,SAAS,CAAC,SAAS,uFAAwF,EAAC,AAAC,CAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAuB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,yFAA0F,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,6JAA8J,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,wBAAyB,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,uWAAoX,EAAE,KAAK,CAAC,SAAS,iCAAkC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,kUAAmU,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,wCAAyC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,2HAA4H,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,mSAAoS,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,2MAA4M,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,2DAAwE,EAAE,SAAS,CAAC,SAAS,UAAW,EAAC,CAAC,wPAAyP,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,sLAAuL,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,cAAe,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,8LAA+L,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,sVAAuV,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,gCAAiC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAuB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAED,EAAE,CAAC,KAAK,4BAA4B,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAsB,EAAE,SAAS,CAAC,SAAS,QAAS,EAAC,AAAC,EAAC,AAAC,EAAC,CAAC,2aAA4a,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,8CAA+C,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,0RAA2R,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,6BAA0C,EAAED,EAAE,CAAC,KAAK,6CAA6C,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,cAAe,EAAC,AAAC,EAAC,CAAC,sLAAuL,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,sVAAuV,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,oGAAqG,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,wOAAyO,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,IAAiB,EAAE,KAAK,CAAC,SAAS,2NAA4N,EAAC,CAAC,uCAAwC,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,qDAAsD,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,0IAA2I,EAAC,CAAc,EAAE,KAAK,CAAC,SAAsB,EAAE,SAAS,CAAC,SAAS,6BAA8B,EAAC,AAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,2NAA4N,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,+YAAgZ,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,IAAiB,EAAE,KAAK,CAAC,SAAS,2UAA4U,EAAC,CAAC,GAAI,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAsB,EAAE,SAAS,CAAC,SAAS,2CAA4C,EAAC,AAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,kSAAmS,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,uOAAwO,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,IAAiB,EAAE,KAAK,CAAC,SAAS,6JAA8J,EAAC,CAAC,iBAAkB,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAsB,EAAE,SAAS,CAAC,SAAS,6BAA8B,EAAC,AAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,oHAAqH,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,oTAAqT,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,IAAiB,EAAE,KAAK,CAAC,SAAS,6OAA8O,EAAC,CAAC,sBAAuB,CAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAuB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,6BAA8B,EAAC,CAAC,uGAAoH,EAAE,SAAS,CAAC,SAAS,wCAAyC,EAAC,CAAC,qFAAsF,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,yEAAsF,EAAE,SAAS,CAAC,SAAS,yDAA0D,EAAC,CAAC,oKAAqK,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,wHAAqI,EAAE,SAAS,CAAC,SAAS,6CAA8C,EAAC,CAAC,sGAAuG,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,2CAA4C,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,0BAAuC,EAAE,SAAS,CAAC,SAAS,wBAAyB,EAAC,CAAC,wMAAqN,EAAE,SAAS,CAAC,SAAS,wDAAyD,EAAC,CAAC,oFAAqF,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,gBAA6B,EAAED,EAAE,CAAC,KAAK,oGAAoG,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,4CAA6C,EAAC,AAAC,EAAC,CAAC,KAAkB,EAAE,SAAS,CAAC,SAAS,8EAA+E,EAAC,CAAC,4EAAyF,EAAE,SAAS,CAAC,SAAS,iBAAkB,EAAC,CAAC,0DAA2D,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,wBAAyB,EAAC,CAAC,wDAAqE,EAAED,EAAE,CAAC,KAAK,oEAAoE,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,yEAA0E,EAAC,AAAC,EAAC,CAAC,8PAA+P,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,kGAA+G,EAAE,SAAS,CAAC,SAAS,2BAA4B,EAAC,CAAC,oCAAqC,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,0CAA2C,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,6FAA0G,EAAE,SAAS,CAAC,SAAS,MAAO,EAAC,CAAC,yGAAsH,EAAE,SAAS,CAAC,SAAS,2CAA4C,EAAC,CAAC,+FAAgG,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,sCAAuC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAO,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,qBAAsB,EAAC,CAAC,gHAAiH,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAO,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,qBAAsB,EAAC,CAAC,cAA2B,EAAE,SAAS,CAAC,SAAS,kBAAmB,EAAC,CAAC,wEAAyE,CAAC,EAAC,AAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,gDAAiD,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAO,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,SAAU,EAAC,CAAC,0KAA2K,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAO,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,gBAAiB,EAAC,CAAC,sHAAuH,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAO,EAAC,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,kBAAmB,EAAC,CAAC,qJAAsJ,CAAC,EAAC,AAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,2DAA4D,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,+BAA4C,EAAE,SAAS,CAAC,SAAS,gCAAiC,EAAC,CAAC,iIAA8I,EAAE,SAAS,CAAC,SAAS,gCAAiC,EAAC,CAAC,oJAAqJ,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,kBAAmB,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,qBAAkC,EAAED,EAAE,CAAC,KAAK,sFAAsF,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,qDAAsD,EAAC,AAAC,EAAC,CAAC,4BAAyC,EAAE,SAAS,CAAC,SAAS,iBAAkB,EAAC,CAAC,mIAAoI,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,4GAAyH,EAAE,SAAS,CAAC,SAAS,gEAAiE,EAAC,CAAC,0EAAuF,EAAE,SAAS,CAAC,SAAS,iCAAkC,EAAC,CAAC,wEAAyE,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,mBAAoB,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,6CAA0D,EAAED,EAAE,CAAC,KAAK,4HAA4H,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,SAAU,EAAC,CAAC,6CAA8C,CAAC,EAAC,AAAC,EAAC,CAAC,2GAAwH,EAAE,SAAS,CAAC,SAAS,+CAAgD,EAAC,CAAC,cAA2B,EAAE,SAAS,CAAC,SAAS,0BAA2B,EAAC,CAAC,OAAQ,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,mRAAoR,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,gBAAiB,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,YAAyB,EAAED,EAAE,CAAC,KAAK,wIAAwI,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,MAAO,EAAC,CAAC,uDAAwD,CAAC,EAAC,AAAC,EAAC,CAAC,uBAAoC,EAAE,SAAS,CAAC,SAAS,uBAAwB,EAAC,CAAC,gIAAiI,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,sSAAuS,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,oDAAqD,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,qLAAsL,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,uCAAwC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,wCAAqD,EAAE,SAAS,CAAC,SAAS,yBAA0B,EAAC,CAAC,6EAA0F,EAAED,EAAE,CAAC,KAAK,gDAAgD,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,eAAgB,EAAC,AAAC,EAAC,CAAC,qIAAkJ,EAAE,SAAS,CAAC,SAAS,aAAc,EAAC,CAAC,KAAkB,EAAE,SAAS,CAAC,SAAS,SAAU,EAAC,CAAC,sCAAmD,EAAE,KAAK,CAAE,EAAC,CAAc,EAAE,KAAK,CAAE,EAAC,CAAC,+NAA4O,EAAE,SAAS,CAAC,SAAS,oBAAqB,EAAC,CAAC,+DAAgE,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,0CAA2C,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,uKAAoL,EAAE,SAAS,CAAC,SAAS,kCAAmC,EAAC,CAAC,wBAAqC,EAAE,SAAS,CAAC,SAAS,gBAAiB,EAAC,CAAC,kNAAmN,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,oMAAqM,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,+CAAgD,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,8IAA2J,EAAE,SAAS,CAAC,SAAS,4BAA6B,EAAC,CAAC,gBAA6B,EAAE,SAAS,CAAC,SAAS,iBAAkB,EAAC,CAAC,oMAAqM,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,2CAAwD,EAAE,SAAS,CAAC,SAAS,wBAAyB,EAAC,CAAC,0MAA2M,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,4CAA6C,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,6NAA8N,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,sCAAuC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,sEAAmF,EAAE,SAAS,CAAC,SAAS,uCAAwC,EAAC,CAAC,uKAAwK,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,+LAAgM,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,sCAAuC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,oBAAiC,EAAE,SAAS,CAAC,SAAS,kCAAmC,EAAC,CAAC,2TAA4T,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,gCAA6C,EAAE,SAAS,CAAC,SAAS,4BAA6B,EAAC,CAAC,2CAA4C,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,8CAA+C,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,2HAAwI,EAAE,SAAS,CAAC,SAAS,iBAAkB,EAAC,CAAC,OAAoB,EAAE,SAAS,CAAC,SAAS,eAAgB,EAAC,CAAC,8GAA+G,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,gJAAiJ,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,mEAAoE,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,iGAAkG,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,qCAAsC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,mBAAgC,EAAE,SAAS,CAAC,SAAS,gEAAiE,EAAC,CAAC,2IAA4I,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,2CAA4C,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,+GAA4H,EAAE,SAAS,CAAC,SAAS,6DAA8D,EAAC,CAAC,0IAA2I,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,yCAA0C,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,uDAAwD,EAAC,CAAC,+LAAgM,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,mCAAoC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,kEAAmE,EAAC,CAAC,gOAA6O,EAAED,EAAE,CAAC,KAAK,yDAAyD,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,MAAO,EAAC,AAAC,EAAC,CAAC,GAAI,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,sCAAuC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,0CAAuD,EAAE,SAAS,CAAC,SAAS,+CAAgD,EAAC,CAAC,8DAA2E,EAAED,EAAE,CAAC,KAAK,6CAA6C,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,wCAAyC,EAAC,AAAC,EAAC,CAAC,2HAA4H,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,6TAA8T,EAAC,AAAC,CAAC,EAAC,CAAc,EAAuB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAED,EAAE,CAAC,KAAK,4BAA4B,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAsB,EAAE,SAAS,CAAC,SAAS,QAAS,EAAC,AAAC,EAAC,AAAC,EAAC,CAAC,uTAAwT,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,mFAAoF,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,SAAsB,EAAE,SAAS,CAAC,SAAS,yBAA0B,EAAC,CAAC,mXAAoX,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,8CAA2D,EAAE,SAAS,CAAC,SAAS,yBAA0B,EAAC,CAAC,oPAAqP,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,iCAA8C,EAAE,SAAS,CAAC,SAAS,qBAAsB,EAAC,CAAC,+DAAgE,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAsB,EAAE,KAAK,CAAC,SAAS,+LAAgM,EAAC,AAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,2CAAwD,EAAE,SAAS,CAAC,SAAS,kBAAmB,EAAC,CAAC,kMAAmM,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAsB,EAAE,KAAK,CAAC,SAAS,0WAA2W,EAAC,AAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,yNAA0N,EAAC,CAAc,EAAE,IAAI,CAAC,SAAsB,EAAE,KAAK,CAAC,SAAS,0HAA2H,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,4EAA6E,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,qEAAsE,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,qBAAsB,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,0EAA2E,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,4LAA6L,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,6GAA8G,EAAC,CAAc,EAAE,IAAI,CAAC,SAAsB,EAAE,KAAK,CAAC,SAAS,oMAAqM,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,oBAAqB,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,qPAAsP,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,oQAAqQ,EAAC,CAAc,EAAE,IAAI,CAAC,SAAsB,EAAE,KAAK,CAAC,SAAS,yRAA0R,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,mCAAoC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,iFAAkF,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAED,EAAE,CAAC,KAAK,CAAC,UAAU,WAAY,EAAC,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,eAAgB,EAAC,AAAC,EAAC,CAAC,+UAAgV,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,0VAA2V,EAAC,CAAc,EAAE,IAAI,CAAC,SAAsB,EAAE,KAAK,CAAC,SAAS,iJAAkJ,EAAC,AAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,sNAAuN,EAAC,CAAc,EAAE,IAAI,CAAC,SAAsB,EAAE,KAAK,CAAC,SAAS,qUAAuU,EAAC,AAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAuB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,gGAA6G,EAAE,SAAS,CAAC,SAAS,uCAAwC,EAAC,CAAC,kOAAmO,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,qFAAsF,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,wBAAyB,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,mJAAoJ,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,uNAAwN,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,qCAAsC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,eAAgB,EAAC,CAAC,sDAAuD,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,6BAA8B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,sFAAmG,EAAED,EAAE,CAAC,KAAK,CAAC,cAAc,CAAC,UAAU,oBAAqB,EAAC,oBAAoB,CAAC,UAAU,CAAC,aAAa,YAAY,iBAAiB,WAAY,CAAC,EAAC,UAAU,WAAY,EAAC,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,0BAA2B,EAAC,AAAC,EAAC,CAAC,6JAA8J,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,qKAAsK,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,0BAA2B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,8LAA+L,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,eAAgB,EAAC,CAAC,0GAA2G,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,WAAY,EAAC,CAAC,0IAA2I,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,UAAW,EAAC,CAAC,+HAAgI,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,4BAA6B,EAAC,CAAC,uNAAwN,CAAC,EAAC,AAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,qBAAsB,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,0QAA2Q,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,oBAAqB,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,wKAAqL,EAAE,SAAS,CAAC,SAAS,kBAAmB,EAAC,CAAc,EAAED,EAAE,CAAC,KAAK,6CAA6C,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAsB,EAAE,SAAS,CAAC,SAAS,UAAW,EAAC,AAAC,EAAC,AAAC,EAAC,CAAC,6BAA8B,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,gDAAiD,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,uEAAwE,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,oDAAqD,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,sCAAuC,EAAC,AAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,uLAAwL,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,mJAAoJ,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,mFAAoF,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,6HAA8H,EAAC,AAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,yEAA0E,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,kDAAmD,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,qEAAsE,EAAC,AAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,kJAAmJ,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,qCAAsC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,+HAAgI,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,8FAA+F,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,4GAA6G,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,qJAAsJ,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,2BAA4B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,iPAAkP,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,qCAAsC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,gCAAiC,EAAC,CAAC,wKAAyK,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,8BAA+B,EAAC,CAAC,iQAAkQ,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,yBAA0B,EAAC,CAAC,4JAA6J,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,yBAA0B,EAAC,CAAC,qJAAsJ,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,yBAA0B,EAAC,CAAC,0KAA2K,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,wBAAyB,EAAC,CAAC,oKAAqK,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,sBAAuB,EAAC,CAAC,sCAAmD,EAAED,EAAE,CAAC,KAAK,CAAC,UAAU,WAAY,EAAC,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,yBAA0B,EAAC,AAAC,EAAC,CAAC,8FAA+F,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,sBAAuB,EAAC,CAAC,mOAAoO,CAAC,EAAC,AAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,sBAAuB,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,mFAAoF,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,6BAA8B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,aAA0B,EAAE,SAAS,CAAC,SAAS,yBAA0B,EAAC,CAAC,8GAA+G,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,iJAAkJ,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,gNAAiN,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,aAAc,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,uBAAoC,EAAE,SAAS,CAAC,SAAS,uBAAwB,EAAC,CAAC,+GAAgH,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,kIAAmI,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,mBAAoB,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,wKAAyK,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,mBAAoB,EAAC,CAAC,mMAAoM,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,0HAA2H,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,WAAY,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,oEAAiF,EAAE,SAAS,CAAC,SAAS,0BAA2B,EAAC,CAAC,kLAAmL,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,mQAAoQ,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,iCAAkC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,iMAAkM,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,mBAAoB,EAAC,CAAC,0PAA2P,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,wBAAyB,EAAC,CAAC,kHAAmH,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,kBAAmB,EAAC,CAAC,iIAAkI,CAAC,EAAC,AAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,6BAA8B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,2DAA4D,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,iBAAkB,EAAC,CAAC,4EAA6E,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,cAAe,EAAC,CAAC,uFAAwF,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,2BAA4B,EAAC,CAAC,qOAAsO,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,cAAe,EAAC,CAAC,+DAA4E,EAAED,EAAE,CAAC,KAAK,6BAA6B,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,oCAAqC,EAAC,AAAC,EAAC,CAAC,4QAA6Q,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,gBAAiB,EAAC,CAAC,oFAAqF,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,eAAgB,EAAC,CAAC,sHAAuH,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,OAAQ,EAAC,CAAC,6IAA8I,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,gEAAiE,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,mFAAoF,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,eAAgB,EAAC,CAAC,6SAA0T,EAAED,EAAE,CAAC,KAAK,6BAA6B,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAsB,EAAE,SAAS,CAAC,SAAS,gDAAiD,EAAC,AAAC,EAAC,AAAC,EAAC,CAAC,GAAI,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,cAAe,EAAC,CAAC,wJAAyJ,CAAC,EAAC,AAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,wCAAyC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,gGAAiG,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,gYAAiY,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAC,gFAA6F,EAAED,EAAE,CAAC,KAAK,gEAAgE,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,iDAAkD,EAAC,AAAC,EAAC,AAAC,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,qQAAsQ,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,mUAAoU,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,oEAAqE,EAAC,AAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,oFAAiG,EAAED,EAAE,CAAC,KAAK,iCAAiC,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAsB,EAAE,SAAS,CAAC,SAAS,aAAc,EAAC,AAAC,EAAC,AAAC,EAAC,CAAC,UAAuB,EAAED,EAAE,CAAC,KAAK,CAAC,UAAU,WAAY,EAAC,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAsB,EAAE,SAAS,CAAC,SAAS,aAAc,EAAC,AAAC,EAAC,AAAC,EAAC,CAAC,iBAAkB,CAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAuB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAED,EAAE,CAAC,KAAK,0BAA0B,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,SAAU,EAAC,AAAC,EAAC,CAAC,gOAAiO,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,mIAAoI,EAAC,CAAc,EAAE,KAAK,CAAC,SAAsB,EAAE,SAAS,CAAC,SAAS,0DAA2D,EAAC,AAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,2MAA4M,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,+RAAgS,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,wLAAyL,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,0QAA2Q,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,+LAAgM,EAAC,CAAc,EAAE,KAAK,CAAC,SAAsB,EAAE,SAAS,CAAC,SAAS,0DAA2D,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAsB,EAAE,SAAS,CAAC,SAAS,qCAAsC,EAAC,AAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,yHAA0H,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,uBAAoC,EAAE,SAAS,CAAC,SAAS,uCAAwC,EAAC,CAAC,4JAAyK,EAAED,EAAE,CAAC,KAAK,CAAC,cAAc,CAAC,UAAU,oBAAqB,EAAC,oBAAoB,CAAC,UAAU,CAAC,aAAa,YAAY,iBAAiB,WAAY,CAAC,EAAC,UAAU,WAAY,EAAC,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,mBAAoB,EAAC,AAAC,EAAC,CAAC,cAAe,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,gNAA6N,EAAE,SAAS,CAAC,SAAS,+BAAgC,EAAC,CAAC,yNAA0N,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,iGAAkG,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,YAAyB,EAAE,SAAS,CAAC,SAAS,6FAA8F,EAAC,CAAC,sGAAmH,EAAED,EAAE,CAAC,KAAK,CAAC,cAAc,CAAC,UAAU,wBAAyB,EAAC,oBAAoB,CAAC,UAAU,CAAC,aAAa,YAAY,iBAAiB,WAAY,CAAC,EAAC,UAAU,WAAY,EAAC,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,iBAAkB,EAAC,AAAC,EAAC,CAAC,qBAAsB,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,uIAAwI,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,+NAAgO,EAAC,CAAc,EAAE,KAAK,CAAC,SAAsB,EAAE,SAAS,CAAC,SAAS,6BAA8B,EAAC,AAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,4CAAyD,EAAE,SAAS,CAAC,SAAS,2BAA4B,EAAC,CAAC,2GAA4G,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,qYAAuY,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,gLAAiL,EAAC,CAAc,EAAE,KAAK,CAAC,SAAsB,EAAE,SAAS,CAAC,SAAS,gCAAiC,EAAC,AAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,6EAA0F,EAAE,SAAS,CAAC,SAAS,4BAA6B,EAAC,CAAC,uCAAoD,EAAE,SAAS,CAAC,SAAS,2DAA4D,EAAC,CAAC,0FAA2F,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,qQAAsQ,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,wMAAqN,EAAE,SAAS,CAAC,SAAS,OAAQ,EAAC,CAAC,oEAAqE,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,IAAiB,EAAE,SAAS,CAAC,SAAS,mEAAoE,EAAC,CAAC,0IAA2I,CAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAuB,EAAA,EAAa,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,+CAAgD,EAAC,CAAC,wGAAqH,EAAE,SAAS,CAAC,SAAS,uBAAwB,EAAC,CAAC,kCAAmC,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,iEAA8E,EAAE,SAAS,CAAC,SAAS,+CAAgD,EAAC,CAAC,qCAAkD,EAAE,SAAS,CAAC,SAAS,cAAe,EAAC,CAAC,2GAAwH,EAAE,SAAS,CAAC,SAAS,8BAA+B,EAAC,CAAC,kDAAmD,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,wCAAqD,EAAE,SAAS,CAAC,SAAS,gEAAiE,EAAC,CAAC,qBAAsB,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,sCAAuC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,sRAAuR,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,4BAA6B,EAAC,CAAC,0MAA2M,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,OAAoB,EAAE,SAAS,CAAC,SAAS,sCAAuC,EAAC,CAAC,yMAA0M,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,uLAAwL,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,0CAA2C,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,uIAAwI,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,oCAAqC,EAAC,CAAC,kQAAmQ,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,sBAAuB,EAAC,CAAC,kSAAmS,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,6BAA8B,EAAC,CAAC,+PAAgQ,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,kBAAmB,EAAC,CAAC,gEAA6E,EAAED,EAAE,CAAC,KAAK,sIAAsI,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,gBAAiB,EAAC,AAAC,EAAC,CAAC,wGAAyG,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,uBAAwB,EAAC,CAAC,gKAA6K,EAAED,EAAE,CAAC,KAAK,yEAAyE,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,oBAAqB,EAAC,AAAC,EAAC,CAAC,IAAK,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,uBAAwB,EAAC,CAAC,sMAAuM,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,sDAAuD,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,sBAAuB,EAAC,CAAC,gFAAiF,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,oCAAqC,EAAC,CAAC,kEAAmE,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,aAAc,EAAC,CAAC,yEAA0E,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,YAAa,EAAC,CAAC,mDAAoD,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,QAAS,EAAC,CAAC,4DAA6D,CAAC,EAAC,AAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,uOAAwO,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,sCAAuC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,kBAAmB,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,oRAAqR,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,gIAAiI,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,iBAAkB,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,0VAA2V,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,2LAA4L,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,8JAA+J,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,yBAA0B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,sNAAuN,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,qBAAsB,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,wLAAyL,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,sLAAuL,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,wBAAyB,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,mOAAoO,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,kUAAmU,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,4BAA6B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,kMAAmM,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,kDAAmD,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,2BAA4B,EAAC,CAAC,6IAA8I,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,gCAAiC,EAAC,CAAC,kJAAmJ,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,sBAAuB,EAAC,CAAC,gLAAiL,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,oBAAqB,EAAC,CAAC,iKAAkK,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,0DAA2D,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,oKAAqK,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,mBAAoB,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,+PAAgQ,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,6NAA8N,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,iBAAkB,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,wWAAyW,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,wBAAyB,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,wYAAyY,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,2BAA4B,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,0SAA2S,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,gDAA6D,EAAED,EAAE,CAAC,KAAK,CAAC,cAAc,CAAC,UAAU,oBAAqB,EAAC,oBAAoB,CAAC,UAAU,CAAC,aAAa,YAAY,iBAAiB,WAAY,CAAC,EAAC,UAAU,WAAY,EAAC,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,yBAA0B,EAAC,AAAC,EAAC,CAAC,8GAA2H,EAAED,EAAE,CAAC,KAAK,CAAC,UAAU,WAAY,EAAC,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,SAAU,EAAC,AAAC,EAAC,CAAC,gEAAiE,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,mCAAoC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,iPAAkP,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,kFAAmF,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAc,EAAED,EAAE,CAAC,KAAK,CAAC,cAAc,CAAC,UAAU,kBAAmB,EAAC,oBAAoB,CAAC,UAAU,CAAC,aAAa,YAAY,iBAAiB,WAAY,CAAC,EAAC,UAAU,WAAY,EAAC,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,OAAQ,EAAC,AAAC,EAAC,CAAC,2MAA4M,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,yRAA0R,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,wPAAyP,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,2PAA4P,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,iNAAkN,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,8CAA+C,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,8CAA+C,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,wFAAyF,EAAC,AAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,IAAiB,EAAE,KAAK,CAAC,SAAS,0MAA2M,EAAC,CAAC,kCAAmC,CAAC,EAAC,CAAc,EAAE,MAAM,CAAC,IAAI,8BAA8B,UAAU,eAAe,OAAO,MAAM,IAAI,oEAAoE,OAAO,8PAA8P,MAAM,CAAC,YAAY,aAAc,EAAC,MAAM,KAAM,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,+DAAgE,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,8HAA2I,EAAED,EAAE,CAAC,KAAK,kDAAkD,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,kBAAmB,EAAC,AAAC,EAAC,CAAC,wFAAyF,CAAC,EAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,aAAc,EAAC,CAAC,yHAA0H,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,qBAAsB,EAAC,CAAC,2CAAwD,EAAED,EAAE,CAAC,KAAK,kDAAkD,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,kBAAmB,EAAC,AAAC,EAAC,CAAC,GAAI,CAAC,EAAC,AAAC,EAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,wBAAyB,EAAC,CAAC,mGAAoG,CAAC,EAAC,AAAC,EAAC,AAAC,CAAC,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,8QAA+Q,EAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,sEAAmF,EAAED,EAAE,CAAC,KAAK,iCAAiC,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,6BAA8B,EAAC,AAAC,EAAC,CAAC,OAAoB,EAAED,EAAE,CAAC,KAAK,6BAA6B,aAAa,EAAE,OAAO,YAAY,cAAc,EAAE,UAAU,CAAE,EAAC,QAAQ,oBAAoB,cAAc,EAAE,SAAsB,EAAEC,EAAE,EAAE,CAAC,SAAS,wBAAyB,EAAC,AAAC,EAAC,CAAC,GAAI,CAAC,EAAC,AAAC,CAAC,EAAC,CAC1rkJ,EAAqB,CAAC,QAAU,CAAC,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,SAAW,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAI,CAAC,EAAC,mBAAqB,CAAC,KAAO,UAAW,CAAC,CAAC"}