{
  "version": 3,
  "sources": ["ssg:https://framerusercontent.com/modules/xlqQQCxLalqMQmwmsOx0/DcZgIbsWIUw9emT7MDcn/gbFXbRxxW-24.js"],
  "sourcesContent": ["import{jsx as e,jsxs as i}from\"react/jsx-runtime\";import{Link as t}from\"framer\";import{motion as a}from\"framer-motion\";import*as n from\"react\";export const richText=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/i(\"p\",{children:[\"Imagine you\u2019ve crafted the perfect email. You\u2019ve written engaging content, personalized it for your target audience, and ensured your design is visually appealing. But once you hit send, your email goes nowhere. Instead of landing in your subscribers\u2019 inboxes, it\u2019s met with a quiet demise, sent straight to the spam folder. This can happen for several reasons, but a poor email sender reputation is often to blame. In this post, we\u2019ll explore how to improve your email sender reputation so you can stop worrying about \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/inbox-delivery\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"inbox delivery\"})}),\" and start focusing on engaging your audience. \"]}),/*#__PURE__*/i(\"p\",{children:[\"Inframail\u2019s \",/*#__PURE__*/e(t,{href:\"https://inframail.io/\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"email infrastructure\"})}),\" solution can help you improve your sender reputation so your emails get delivered and your audience can engage with your content.\"]}),/*#__PURE__*/e(\"h2\",{children:\"Table of Contents\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/email-sender-reputation#:~:text=Email%20Infrastructure%20Today-,What%20Is%20Email%20Sender%20Reputation%3F,-Email%20sender%20reputation\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"What Is Email Sender Reputation?\"})})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/email-sender-reputation#:~:text=Going%20To%20Spam-,4%20Ways%20to%20Check%20Your%20Email%20Sender%20Reputation,-1.%20Use%20Tools\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"4 Ways to Check Your Email Sender Reputation\"})})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/email-sender-reputation#:~:text=DMARC%20vs%20DKIM-,How%20to%20Improve%20Sender%20Reputation,-Identify%20the%20Problematic\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"How to Improve Sender Reputation\"})})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/email-sender-reputation#:~:text=Soft%20Bounce%20Reasons-,Start%20Buying%20Domains%20Now%20and%20Setup%20Your%20Email%20Infrastructure%20Today,-Inframail%20revolutionizes%20cold\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Start Buying Domains Now and Setup Your Email Infrastructure Today\"})})})})]}),/*#__PURE__*/e(\"h2\",{children:\"What Is Email Sender Reputation?\"}),/*#__PURE__*/e(\"img\",{alt:\"email of a person - Email Sender Reputation\",className:\"framer-image\",height:\"800\",src:\"https://framerusercontent.com/images/N71YDwHoiqAmfIBGte1jD9Vwrc.jpg\",srcSet:\"https://framerusercontent.com/images/N71YDwHoiqAmfIBGte1jD9Vwrc.jpg?scale-down-to=512 512w,https://framerusercontent.com/images/N71YDwHoiqAmfIBGte1jD9Vwrc.jpg?scale-down-to=1024 1024w,https://framerusercontent.com/images/N71YDwHoiqAmfIBGte1jD9Vwrc.jpg?scale-down-to=2048 2048w,https://framerusercontent.com/images/N71YDwHoiqAmfIBGte1jD9Vwrc.jpg 2400w\",style:{aspectRatio:\"2400 / 1600\"},width:\"1200\"}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(t,{href:\"https://www.linkedin.com/pulse/what-sender-reputation-why-important-email-hippo-ltd-c8jlf#:~:text=It%20reflects%20the%20sender's%20trustworthiness,spam%20folders%20or%20even%20blocked.\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Email sender reputation\"})}),\" refers to the score or trust level assigned to an email sender by Internet Service Providers (ISPs) based on the sender's behavior, including:\\xa0\"]}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Email practices\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Engagement rates\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Complaint history\"})})]}),/*#__PURE__*/e(\"p\",{children:\"A good sender reputation ensures that emails land in inboxes rather than spam folders. Various factors affect the email sender\u2019s reputation.\"}),/*#__PURE__*/e(\"h3\",{children:\"The Components of Email Sender Reputation\"}),/*#__PURE__*/e(\"p\",{children:\"Email sender reputation is a combination of IP reputation and domain reputation. Let\u2019s discuss them separately.\"}),/*#__PURE__*/e(\"h3\",{children:\"IP Reputation: What Is It and Why Is It Important?\\xa0\"}),/*#__PURE__*/i(\"p\",{children:[\"Each email service provider (ESP) offers a \",/*#__PURE__*/e(t,{href:\"https://www.linkedin.com/pulse/why-ip-reputation-important-email-marketers-michael-batalha\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"set of IPs they use\"})}),\" to send emails. The majority of them are shared between thousands of accounts. Purchasing dedicated IPs is also an option, but the latter is much more costly, so most senders rely on a shared IP. Each address has a reputation on the Internet that tells mail servers if they should trust emails from that source.\\xa0The servers take it seriously, as most failed deliveries result from poor reputations. This reputation doesn\u2019t appear out of nowhere. It\u2019s also not something you can build overnight. A good reputation takes years to build, yet it can be ruined with a failed email campaign.\\xa0\"]}),/*#__PURE__*/e(\"h3\",{children:\"Domain Reputation: What Is It and Why Is It Important?\"}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(t,{href:\"https://www.linkedin.com/pulse/domain-reputation-why-its-important-blake-bidar\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Domain reputation\"})}),\" is also closely related to your sender\u2019s reputation. Using a battle-tested IP from one of the best ESPs or mailbox providers won\u2019t help much if your sending domain is known in the network for mailing unsolicited messages.\\xa0Similarly, having a great sending history behind your domain name won\u2019t guarantee excellent results if the IP you use has a poor reputation. This is relevant, for example, to free Gmail, Outlook, or Yahoo! accounts that are commonly used for sending spam. If you\u2019re sending a high volume of emails, you want to use more sophisticated solutions.\"]}),/*#__PURE__*/e(\"h3\",{children:\"What Factors Affect Email Sender Reputation?\"}),/*#__PURE__*/e(\"p\",{children:\"Here are some key metrics that impact your email sender\u2019s reputation:\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Spam complaints:\"}),\" The number of recipients that hit \u2018Report as Spam\u2019 on your marketing emails. The more frequent such behavior is, the worse your email spam reputation will be.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Spam traps:\"}),\" accounts set up by Internet Service Providers (ISPs). They look just like any other email account, but sending an email to one is likely to get you on one of the publicly available blacklists.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Bounce rates:\"}),\" The number of emails that fail to get delivered. Bounces can be soft or hard. The former implies temporary email delivery problems, while the latter usually occurs when an address you\u2019re emailing doesn\u2019t exist. Read more about soft and hard bounces in this article.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Sending history:\"}),\" This broad term covers things like sending volume and frequency. Spam filters pay particular attention to this factor.\\xa0\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Engagement:\"}),\" Focuses on your past performance and considers click, open, and reply frequency.\\xa0\\xa0\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Unsubscribe rates:\"}),\" The rate at which your readers have previously unsubscribed. Your employees could unsubscribe from your emails, hurting your reputation.\\xa0\\xa0\"]})})]}),/*#__PURE__*/e(\"p\",{children:\"It all comes down to the performance of your previous campaigns. Do you have an organic mailing list with engaged recipients? Your sender\u2019s reputation will most likely flourish. Are you receiving frequent complaints and landing in the spam folder because you bought a mailing list on one of those sketchy websites? Say hello to the poor sender reputation.\"}),/*#__PURE__*/e(\"img\",{alt:\"Inframail\",className:\"framer-image\",height:\"540\",src:\"https://framerusercontent.com/images/K1gnYqkG0SbjGZOl2WHlhtrFo.png\",srcSet:\"https://framerusercontent.com/images/K1gnYqkG0SbjGZOl2WHlhtrFo.png?scale-down-to=512 512w,https://framerusercontent.com/images/K1gnYqkG0SbjGZOl2WHlhtrFo.png?scale-down-to=1024 1024w,https://framerusercontent.com/images/K1gnYqkG0SbjGZOl2WHlhtrFo.png 1920w\",style:{aspectRatio:\"1920 / 1080\"},width:\"960\"}),/*#__PURE__*/e(\"h3\",{children:\"Related Reading\"}),/*#__PURE__*/i(\"p\",{children:[\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/why-are-my-emails-going-to-spam-guide\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Why Are My Emails Going To Spam\"})}),/*#__PURE__*/e(\"br\",{}),\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/email-deliverability-rate\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Email Deliverability Rate\"})}),/*#__PURE__*/e(\"br\",{}),\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/email-monitoring\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Email Monitoring\"})}),/*#__PURE__*/e(\"br\",{}),\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/email-deliverability-issues\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Email Deliverability Issues\"})}),/*#__PURE__*/e(\"br\",{}),\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/email-quality-score\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Email Quality Score\"})}),/*#__PURE__*/e(\"br\",{}),\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/bounce-rate-in-email-marketing\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Bounce Rate in Email Marketing\"})}),/*#__PURE__*/e(\"br\",{}),\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/how-to-avoid-email-going-to-spam\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"How To Avoid Email Going To Spam\"})}),/*#__PURE__*/e(\"br\",{}),\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/why-do-emails-bounce\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Why Do Emails Bounce\"})}),/*#__PURE__*/e(\"br\",{}),\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/spf-or-dkim\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"SPF or DKIM\"})}),/*#__PURE__*/e(\"br\",{}),\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/how-to-check-if-your-emails-are-going-to-spam\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"How To Check If Your Emails Are Going To Spam\"})})]}),/*#__PURE__*/e(\"h2\",{children:\"4 Ways to Check Your Email Sender Reputation\"}),/*#__PURE__*/e(\"img\",{alt:\"person fixing issues - Email Sender Reputation\",className:\"framer-image\",height:\"800\",src:\"https://framerusercontent.com/images/7WJxrk6F7WNyHTdaLCuwEyq4Pw.jpg\",srcSet:\"https://framerusercontent.com/images/7WJxrk6F7WNyHTdaLCuwEyq4Pw.jpg?scale-down-to=512 512w,https://framerusercontent.com/images/7WJxrk6F7WNyHTdaLCuwEyq4Pw.jpg?scale-down-to=1024 1024w,https://framerusercontent.com/images/7WJxrk6F7WNyHTdaLCuwEyq4Pw.jpg?scale-down-to=2048 2048w,https://framerusercontent.com/images/7WJxrk6F7WNyHTdaLCuwEyq4Pw.jpg 2400w\",style:{aspectRatio:\"2400 / 1600\"},width:\"1200\"}),/*#__PURE__*/e(\"h3\",{children:\"1. Use Tools to Measure Your Sender Score\"}),/*#__PURE__*/e(\"p\",{children:\"Measuring your sender score is a great place to start when checking your email reputation. Specialized tools can help you analyze your email-sending behavior and understand how your domain and IP reputation scores compare to others.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Here are some to get you started:\\xa0\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Sender Score:\"}),\" This tool assigns you a sender reputation score from 0 to 100 (much like a credit score) and \",/*#__PURE__*/e(t,{href:\"https://www.linkedin.com/pulse/what-sender-score-how-improve-bright-livingstone\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"shows how your IP address ranks\"})}),\" against the email sender score of others.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Barracuda Central:\"}),\" This tool provides businesses with an IP reputation and domain reputation checkup.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"TrustedSource:\"}),\" This service, run by McAfee, provides basic insight into your sender reputation score and data about the DNS and mail server.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Google Postmaster Tools:\"}),\" This tool helps senders track email data, such as their IP and domain reputation, delivery errors, and more.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Microsoft Smart Network Data Services (SDNS):\"}),\" \",/*#__PURE__*/e(t,{href:\"https://www.forbes.com/2005/06/23/microsoft-spam-offensive-cx_vnu_0623microsoft.html\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Microsoft\u2019s SNDS\"})}),\" provides insight into data points like the IP reputation, the number of spam traps you deliver to, and spam complaint rates.\"]})})]}),/*#__PURE__*/e(\"h3\",{children:\"2. Send Messages to Yourself\"}),/*#__PURE__*/e(\"p\",{children:\"Another great way to check if you have a high reputation score or a bad reputation with inbox providers is to send messages to yourself. You can set up multiple email addresses with several mailbox provider services to test how your reputation affects email deliverability. Then, you can send emails to these new email addresses and analyze the results.\\xa0You have a good sender reputation if all emails arrive in the inbox. But if most of my emails are in the spam folder, that\u2019s a sign that my sender score is low.\"}),/*#__PURE__*/e(\"h3\",{children:\"3. Check Deny Listings of Your IP Address and Domain\"}),/*#__PURE__*/i(\"p\",{children:[\"A deny list is a collection of IP addresses or domains that have been caught sending out unsolicited emails. Your domain can be added to \",/*#__PURE__*/e(t,{href:\"https://www.linkedin.com/pulse/understanding-email-blacklists-how-avoid-them-webbula-hzchf\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"deny listings if the emails you send\"})}),\" end up as spam trap hits or are marked as spam emails by recipients.\\xa0You can use tools like MxToolbox, DNS Checker, and Netcore to see if your IP or domain names are on any black listings, which can cause deliverability issues. If your details are on a denied listing, your email reputation has a higher chance of declining.\"]}),/*#__PURE__*/e(\"h3\",{children:\"4. Analyze Statistics and Identify Patterns\"}),/*#__PURE__*/e(\"p\",{children:\"Sender reputation has much to do with how recipients interact with your emails. For example, if you see metrics like your open rate and click-through rate decreasing and more emails being marked as spam, you can expect your reputation score to drop.\\xa0On the other hand, higher engagement from recipients is a good sign for your sender\u2019s reputation, and you can expect more emails to end up in recipient\u2019s and subscribers\u2019 inboxes. Use these patterns to determine what you\u2019re doing right and what you can improve. Pair it with the other measures I discussed above to get an accurate idea of the sender\u2019s reputation.\"}),/*#__PURE__*/e(\"img\",{alt:\"Inframail\",className:\"framer-image\",height:\"540\",src:\"https://framerusercontent.com/images/McxpYZPka7w4sDflIrgzCYfAtZM.png\",srcSet:\"https://framerusercontent.com/images/McxpYZPka7w4sDflIrgzCYfAtZM.png?scale-down-to=512 512w,https://framerusercontent.com/images/McxpYZPka7w4sDflIrgzCYfAtZM.png?scale-down-to=1024 1024w,https://framerusercontent.com/images/McxpYZPka7w4sDflIrgzCYfAtZM.png 1920w\",style:{aspectRatio:\"1920 / 1080\"},width:\"960\"}),/*#__PURE__*/e(\"h3\",{children:\"Related Reading\"}),/*#__PURE__*/i(\"p\",{children:[\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/dmarc-vs-dkim\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"DMARC vs DKIM\"})}),/*#__PURE__*/e(\"br\",{}),\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/importance-of-dmarc\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Importance Of DMARC\"})}),/*#__PURE__*/e(\"br\",{}),\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/what-is-a-soft-bounce-email\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"What Is a Soft Bounce Email\"})}),/*#__PURE__*/e(\"br\",{}),\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/email-deliverability-checklist\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Email Deliverability Checklist\"})}),/*#__PURE__*/e(\"br\",{}),\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/what-affects-email-deliverability\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"What Affects Email Deliverability\"})}),/*#__PURE__*/e(\"br\",{}),\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/why-is-email-deliverability-important\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Why Is Email Deliverability Important\"})}),/*#__PURE__*/e(\"br\",{}),\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/email-bounce-rate\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Email Bounce Rate\"})}),/*#__PURE__*/e(\"br\",{}),\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/fix-email-reputation\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Fix Email Reputation\"})}),/*#__PURE__*/e(\"br\",{}),\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/improve-sender-reputation\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Improve Sender Reputation\"})}),/*#__PURE__*/e(\"br\",{}),\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/email-hard-bounce\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Email Hard Bounce\"})}),/*#__PURE__*/e(\"br\",{}),\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/email-deliverability-tools\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Email Deliverability Tools\"})}),/*#__PURE__*/e(\"br\",{}),\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/email-deliverability-best-practices\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Email Deliverability Best Practices\"})}),/*#__PURE__*/e(\"br\",{}),\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/best-email-domains\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Best Email Domains\"})})]}),/*#__PURE__*/e(\"h2\",{children:\"How to Improve Sender Reputation\"}),/*#__PURE__*/e(\"img\",{alt:\"man helping a friend - Email Sender Reputation\",className:\"framer-image\",height:\"800\",src:\"https://framerusercontent.com/images/CNyLLrbK0wodT4xcwsVpNqIY9s.jpg\",srcSet:\"https://framerusercontent.com/images/CNyLLrbK0wodT4xcwsVpNqIY9s.jpg?scale-down-to=512 512w,https://framerusercontent.com/images/CNyLLrbK0wodT4xcwsVpNqIY9s.jpg?scale-down-to=1024 1024w,https://framerusercontent.com/images/CNyLLrbK0wodT4xcwsVpNqIY9s.jpg?scale-down-to=2048 2048w,https://framerusercontent.com/images/CNyLLrbK0wodT4xcwsVpNqIY9s.jpg 2400w\",style:{aspectRatio:\"2400 / 1600\"},width:\"1200\"}),/*#__PURE__*/e(\"h3\",{children:\"Identify the Problematic ISP ASAP\"}),/*#__PURE__*/i(\"p\",{children:[\"Poor sender reputation can happen to anyone. In June 2022, we experienced an issue with our email reputation as we noticed our inbox placement had gone from 98-99% to less than 90%. Uh-oh. If this is happening to you right now, here\u2019s what to do: The key here is to identify which \",/*#__PURE__*/e(t,{href:\"https://www.linkedin.com/advice/3/what-do-you-your-internet-service-provider-resolving-3loef\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"ISP you\u2019re having difficulty\"})}),\" with and send only to your most engaged audiences for that ISP.\\xa0\"]}),/*#__PURE__*/e(\"h4\",{children:\"Optimizing Email Deliverability: Leveraging Engagement-Based Segmentation\"}),/*#__PURE__*/e(\"p\",{children:\"While this will drastically reduce the number of people you\u2019re reaching with your emails, it will improve your engagement rates and ensure inbox placement. This step will indicate to your mailbox provider that your emails are not spam and that your readers engage with them.\\xa0We used Litmus Email Analytics to identify subscribers who use Gmail to open our emails and segmented that audience into those who engaged in the last 10/30/45/60/90 days. We then suppressed Gmail subscribers who hadn\u2019t opened in the previous 10 days. Then, we slowly increased volume, week by week, and tracked engagement.\"}),/*#__PURE__*/e(\"h3\",{children:\"Identify Risky Email Automations and Turn Those Off\"}),/*#__PURE__*/i(\"p\",{children:[\"Campaigns such as win-back email campaigns are risky. After all, they are reaching out to an already disinterested audience. The chances of them opening your emails and engaging with your content could be higher. \",/*#__PURE__*/e(t,{href:\"https://www.wordstream.com/blog/ws/2020/09/01/automated-email-marketing\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Email automations your subscribers\"})}),\" and customers might not engage with include:\\xa0\"]}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Cart abandonment emails\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Re-engagement campaigns\\xa0\"})})]}),/*#__PURE__*/e(\"p\",{children:\"Even though these email flows can sometimes work to revive disengaged customers and subscribers, they have a higher likelihood of going unopened and not clicked on than transactional or other emails in the promotions tab in Gmail. If these campaign emails do not lead to engagement, it will further harm your email reputation. Turn these campaigns off to improve your engagement rates if you have a reputation crisis.\"}),/*#__PURE__*/e(\"h3\",{children:\"Contact Your Postmasters for Help\"}),/*#__PURE__*/e(\"p\",{children:\"Once you\u2019ve taken steps to remedy your deliverability issues, but it\u2019s still not working, you can also contact your ISP postmasters. A postmaster is the administrator of an email service. They deal with spam emails and sender reputation. Once you\u2019ve identified your problematic ISP, send them a report using these forms: Gmail and Yahoo Mail.\\xa0\"}),/*#__PURE__*/e(\"h4\",{children:\"Navigating Postmaster Communications to Resolve Email Deliverability Issues\"}),/*#__PURE__*/e(\"p\",{children:\"Outlook Gmail\u2019s postmasters may not respond. So, until you see an improvement in your inbox placement, keep notifying Gmail of your issues through their postmaster contact form\u2014advisably every week.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Outlook and Yahoo Mail will likely respond to you via email within three to four days. Their response will indicate whether they\u2019ve found issues with your email domain and are working on a fix or haven\u2019t seen any problems.\"}),/*#__PURE__*/e(\"h3\",{children:\"Start Increasing Send Volume When Engagement Rates Increase\"}),/*#__PURE__*/i(\"p\",{children:[\"Only once you see an \",/*#__PURE__*/e(t,{href:\"https://www.linkedin.com/business/marketing/blog/measurement/top-tips-for-measuring-and-improving-engagement-on-linkedin\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"uptick in engagement rates\"})}),\" can you start sending emails to more people again. For example, if you previously only sent my campaigns to people who had opened my emails in the last 15 days, I can now raise the bar to 30 days. Monitor the new results and then rinse and repeat until you hit your typical, full sending volume.\\xa0\"]}),/*#__PURE__*/e(\"p\",{children:\"For acquisition-related campaigns (where you\u2019re contacting new/unengaged subscribers), having a secondary dedicated IP address can protect your primary IP address (used for campaigns that drive business goals and need to have reasonable inbox placement rates). At Litmus, we\u2019ve onboarded a secondary IP address and a secondary sending subdomain for acquisition programs, cart abandon programs, and re-engagement nurtures.\"}),/*#__PURE__*/e(\"h3\",{children:\"Email Sender Reputation: Best Practices to Avoid Future Issues\"}),/*#__PURE__*/i(\"p\",{children:[\"Hopefully, you\u2019ll never have to deal with a dip in reputation like we did. (Phew, we\u2019re so glad that\u2019s over.) In the meantime, though, there are proactive steps you can take for your email marketing program: \",/*#__PURE__*/e(t,{href:\"https://support.google.com/a/answer/81126?hl=en#:~:text=Avoid%20sending%20email%20in%20bursts,and%20the%20sending%20domain's%20reputation.\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Think about your send frequency:\"})}),\" Subscribers who see your brand name pop up again and again in their inbox may start to get annoyed\u2014especially if you\u2019re using segmentation or personalization in your emails.\\xa0\"]}),/*#__PURE__*/e(\"h4\",{children:\"Personalized Email Preferences: Boosting Engagement While Protecting Sender Reputation\"}),/*#__PURE__*/e(\"p\",{children:\"The game\u2019s name is Engagement, so give your subscribers the option to choose which emails they receive from you. This example from underwear brand ThirdLove is a great way not only to gather more first-party data from your subscribers but also to make sure that you\u2019re sending the right emails to the right people:\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"\u201CThere\u2019s this expectation that you always need to send an email,\u201D says Email Marketing Manager Tracie Pang. \u201CBut if you\u2019re continuing to send emails without engagement, it\u2019s going to affect your sender reputation. Sending to your list multiple days in a row like that could lead to more than one spam complaint because they\u2019re tired of hearing from you.\u201D\"}),/*#__PURE__*/e(\"h3\",{children:\"Make the Unsubscribe Easy\"}),/*#__PURE__*/i(\"p\",{children:[\"Similarly, make it as \",/*#__PURE__*/e(t,{href:\"https://www.uschamber.com/co/grow/marketing/email-marketing-unsubscribe-laws\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"easy as possible to unsubscribe\"})}),\". No more \u201Chacks\u201D to get around legal requirements. Don\u2019t fear the unsubscribe email list! It\u2019s much better to have a slightly smaller list with higher engagement than an extensive list of people who don\u2019t want to hear from you. If you don\u2019t make it easy to unsubscribe, you\u2019ll just see a spike in spam complaints\u2014hitting your sender reputation hard.\\xa0\"]}),/*#__PURE__*/e(\"p\",{children:\"\u201CSome spam complaints could come from not having an easy unsubscribe,\u201D says Pang. \u201CYou should have a one-click unsubscribe button to comply with Gmail and Yahoo, but also because it\u2019s the best way to make sure someone isn\u2019t just marking you as spam out of frustration.\u201D Focus on minimizing those instead. To comply with Gmail and Yahoo\u2019s sender requirements (including deliverability rules), you must maintain a spam complaint rate of 0.3% or no more than three spam reports for every 1,000 messages. Your deliverability (and your bottom line) will thank you.\"}),/*#__PURE__*/e(\"h3\",{children:\"Clean Your Email List Regularly\"}),/*#__PURE__*/i(\"p\",{children:[\"Make it a regular to-do to \",/*#__PURE__*/e(t,{href:\"https://www.linkedin.com/advice/0/how-can-you-maintain-clean-effective-email-list-5od6f\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"clean out those email lists\"})}),\". First, you\u2019ll want to filter out common typos (like gmial.com or yaho.com) or bounced email addresses. If you\u2019re seeing many of these emails, consider doing double opt-in instead of single opt-in for your email acquisition. Yes, it adds an extra step for subscribers\u2014but it also ensures you\u2019ll never add a fake email address to your list.\"]}),/*#__PURE__*/e(\"p\",{children:\"After that, sift through your email list based on engagement. Anyone who hasn\u2019t opened an email in 60 days should be tagged for a re-engagement email campaign. Sending a re-engagement campaign is a last-ditch effort to see if they want to stay on your list. If they don\u2019t engage with that email, it\u2019s time to say goodbye.\"}),/*#__PURE__*/e(\"h3\",{children:\"Don\u2019t Send Out Spammy-Looking Content\"}),/*#__PURE__*/e(\"p\",{children:\"If it looks like spam, ISPs will likely treat it as spam. Don\u2019t use all-image emails, spammy words, too many exclamation points, or too many emojis. If your message looks spam, ISPs could refuse to place it in your reader\u2019s inbox. This will negatively impact your reputation.\"}),/*#__PURE__*/e(\"h3\",{children:\"Don\u2019t Forget to Remove Disengaged Users\"}),/*#__PURE__*/e(\"p\",{children:\"Keep tabs on your email marketing metrics to determine if your readers are still engaged like:\\xa0\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Open rate\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Click-through rate\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Conversion rate\"})})]}),/*#__PURE__*/i(\"p\",{children:[\"If your readers \",/*#__PURE__*/e(t,{href:\"https://www.forbes.com/councils/forbesbusinesscouncil/2020/10/01/16-effective-ways-to-reconnect-with-disengaged-email-subscribers/\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"have become disengaged\"})}),\", you can send a re-engagement email or create a sunset policy to remove them from your email list.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Don\u2019t Use a Shared IP Address\"}),/*#__PURE__*/i(\"p\",{children:[\"As mentioned above, \",/*#__PURE__*/e(t,{href:\"https://www.linkedin.com/pulse/shared-ip-vs-dedicated-which-one-better-your-company-unfilteredai-vlkzc\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"using a shared IP\"})}),\" means sharing your IP reputation with other senders. Of course, this can be good if you\u2019re a new sender and want to piggyback off an IP with an established reputation. This can backfire if the other senders on your IP have bad email-sending habits. Use a dedicated IP address to avoid these problems.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Don\u2019t Buy Email Lists\"}),/*#__PURE__*/i(\"p\",{children:[\"This is a surefire way to disaster. Purchasing email lists will likely \",/*#__PURE__*/e(t,{href:\"https://www.forbes.com/councils/forbesagencycouncil/2020/12/03/why-you-should-never-buy-an-email-list/\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"lead to higher complaint rates\"})}),\" \u2013 when recipients mark your content as spam if the emails you bought are all legitimate. Purchased lists are not validated, and the recipients on them have yet to opt-in to receive messages from your service. Even if you think these lists might contain some legitimate leads, the risk to your sender reputation is too high.\"]}),/*#__PURE__*/e(\"img\",{alt:\"Inframail\",className:\"framer-image\",height:\"540\",src:\"https://framerusercontent.com/images/K1gnYqkG0SbjGZOl2WHlhtrFo.png\",srcSet:\"https://framerusercontent.com/images/K1gnYqkG0SbjGZOl2WHlhtrFo.png?scale-down-to=512 512w,https://framerusercontent.com/images/K1gnYqkG0SbjGZOl2WHlhtrFo.png?scale-down-to=1024 1024w,https://framerusercontent.com/images/K1gnYqkG0SbjGZOl2WHlhtrFo.png 1920w\",style:{aspectRatio:\"1920 / 1080\"},width:\"960\"}),/*#__PURE__*/e(\"h3\",{children:\"Related Reading\"}),/*#__PURE__*/i(\"p\",{children:[\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/email-monitoring-software\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Email Monitoring Software\"})}),/*#__PURE__*/e(\"br\",{}),\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/soft-bounce-reasons\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Soft Bounce Reasons\"})}),/*#__PURE__*/e(\"br\",{}),\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/check-email-deliverability-score\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Check Email Deliverability Score\"})}),/*#__PURE__*/e(\"br\",{}),\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/soft-bounce-vs-hard-bounce-email\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Soft Bounce vs Hard Bounce Email\"})}),/*#__PURE__*/e(\"br\",{}),\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/saleshandy-alternatives\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"SalesHandy Alternatives\"})}),/*#__PURE__*/e(\"br\",{}),\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/glockapps-alternative\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"GlockApps Alternative\"})}),/*#__PURE__*/e(\"br\",{}),\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/mailgenius-alternative\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"MailGenius Alternative\"})}),/*#__PURE__*/e(\"br\",{}),\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/mxtoolbox-alternative\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"MxToolbox Alternative\"})}),/*#__PURE__*/e(\"br\",{}),\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/maildoso-alternatives\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Maildoso Alternatives\"})})]}),/*#__PURE__*/e(\"h2\",{children:\"Start Buying Domains Now and Setup Your Email Infrastructure Today\"}),/*#__PURE__*/i(\"p\",{children:[\"Inframail revolutionizes cold \",/*#__PURE__*/e(t,{href:\"https://inframail.io/\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"email infrastructure\"})}),\", offering unlimited inboxes at a flat rate. Microsoft powers the deliverability. Inframail also provides dedicated IP addresses and it scales its cold email outreach efforts efficiently:\"]}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Agencies\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Recruiters\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"SDRs\\xa0\\xa0\\xa0\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"What Are the Benefits of Using Inframail?\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Inframail boasts an array of features designed to simplify cold email deliverability. First, the SPF, DKIM, and DMARC setup is automated to ensure your emails get delivered and that you avoid the spam folder. Every Inframail user has dedicated email servers for optimal sender reputation. The company offers 16-hour daily priority support for any deliverability issues that may arise.\\xa0\"}),/*#__PURE__*/e(\"h3\",{children:\"How Does Inframail Simplify Cold Email Deliverability?\\xa0\"}),/*#__PURE__*/i(\"p\",{children:[\"Traditional email providers charge per inbox, leaving you wrestling with technical configurations. Instead, \",/*#__PURE__*/e(t,{href:\"https://inframail.io/\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Inframail\"})}),\" streamlines the entire process. The company handles the complex infrastructure setup while you focus on reaching more prospects.\"]})]});export const richText1=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/i(\"p\",{children:[\"Nothing is more frustrating than not knowing whether your emails are getting through to the recipients that matter. You've crafted the perfect message, hit send, and ... nothing. No replies, no engagement, no interaction whatsoever. Instead, your carefully crafted emails seem to have vanished into thin air. The truth? They may have ended up in the spam folder of your recipient's email account. In this blog, we'll explore how to check if your emails are going to spam so you can confidently identify and resolve \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/inbox-delivery\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"inbox delivery\"})}),\" issues, ensuring your messages reach the intended recipients and improve engagement.   \"]}),/*#__PURE__*/i(\"p\",{children:[\"Inframail's \",/*#__PURE__*/e(t,{href:\"https://inframail.io/\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"email infrastructure\"})}),\" solution can help you achieve your deliverability goals. The tool offers easy-to-understand metrics to help you identify deliverability issues and fix them fast, so you can get back to business.\"]}),/*#__PURE__*/e(\"h2\",{children:\"Table of Contents\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/how-to-check-if-your-emails-are-going-to-spam#:~:text=Email%20Infrastructure%20Today-,Why%20Should%20You%20Care%20about%20Not%20Going%20to%20the%20Spam%20Folder%3F,-Email%20deliverability%20is\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Why Should You Care about Not Going to the Spam Folder?\"})})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/how-to-check-if-your-emails-are-going-to-spam#:~:text=Email%20Sender%20Reputation-,How%20To%20Check%20If%20Your%20Emails%20Are%20Going%20To%20Spam,-When%20assessing%20email\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"How To Check If Your Emails Are Going To Spam\"})})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/how-to-check-if-your-emails-are-going-to-spam#:~:text=Soft%20Bounce%20Email-,What%20to%20Do%20if%20Emails%20Go%20to%20Spam,-Mark%20Messages%20as\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"What to Do if Emails Go to Spam\"})})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/how-to-check-if-your-emails-are-going-to-spam#:~:text=Transactional%20emails-,Start%20Buying%20Domains%20Now%20and%20Setup%20Your%20Email%20Infrastructure%20Today,-Inframail%20revolutionizes%20cold\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Start Buying Domains Now and Setup Your Email Infrastructure Today\"})})})})]}),/*#__PURE__*/e(\"h2\",{children:\"Why Should You Care about Not Going to the Spam Folder?\"}),/*#__PURE__*/e(\"img\",{alt:\"person focused on his task - How To Check If Your Emails Are Going To Spam \",className:\"framer-image\",height:\"800\",src:\"https://framerusercontent.com/images/ARkC0srVlolg620I9r2YNol7Fs.jpg\",srcSet:\"https://framerusercontent.com/images/ARkC0srVlolg620I9r2YNol7Fs.jpg?scale-down-to=512 512w,https://framerusercontent.com/images/ARkC0srVlolg620I9r2YNol7Fs.jpg?scale-down-to=1024 1024w,https://framerusercontent.com/images/ARkC0srVlolg620I9r2YNol7Fs.jpg?scale-down-to=2048 2048w,https://framerusercontent.com/images/ARkC0srVlolg620I9r2YNol7Fs.jpg 2400w\",style:{aspectRatio:\"2400 / 1600\"},width:\"1200\"}),/*#__PURE__*/e(\"p\",{children:\"Email deliverability is the cornerstone of successful email marketing. When your marketing emails land in the recipient's inbox, you're more likely to engage your target audience. It's a great scenario. But here's the catch \u2013 email service providers are equipped with sophisticated spam filters.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"These filters analyze:\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Your emails from different angles\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Spam trigger words\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Lack of sender information\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Clickbait subject line\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"The balance of images\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Attachments in the text\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"Spam Filters\"}),/*#__PURE__*/e(\"p\",{children:\"If your email triggers these filters, it's a one-way ticket to the spam folder. Keeping your low spam score low is essential.\\xa0You will minimize your email's chances of being seen and read. If the recipient's provider thinks you're sending spam emails, your engagement rates and your domain reputation will tank.\\xa0\"}),/*#__PURE__*/e(\"h3\",{children:\"Protect Your Sender Reputation to Improve Email Deliverability\"}),/*#__PURE__*/e(\"p\",{children:\"Internet service providers and email service providers keep tabs on your sending habits. If your emails frequently trigger spam complaints or are marked as spam by recipients, your sender's reputation takes a hit.\\xa0This can lead to future campaigns being flagged by spam filters, regardless of their content. A high spam rate means that something is wrong:\\xa0\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"You have a deceiving email subject\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"You're not providing an unsubscribe link\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"You send to your mailing list too often\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"A range of other spam issues\"})})]}),/*#__PURE__*/e(\"h4\",{children:\"Sender Reputation\"}),/*#__PURE__*/i(\"p\",{children:[\"You can protect your sender's reputation. Follow the rules and guidelines like the \",/*#__PURE__*/e(t,{href:\"https://www.ftc.gov/business-guidance/resources/can-spam-act-compliance-guide-business\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"CAN-SPAM Act\"})}),\", avoid poor ploys like those unfortunate clickbait headlines, and ensure your email content is relevant. This will result in better spam reports, and mailbox providers won't put emails from your IP address into spam boxes.\\xa0\"]}),/*#__PURE__*/e(\"h3\",{children:\"Stay Out of Spam to Improve Your Email Marketing ROI\"}),/*#__PURE__*/e(\"p\",{children:\"One of the top goals of any marketing campaign is to see a return on investment. When your emails bypass the recipient's spam folder:\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Your chances of engagement\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Conversions\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[\"A \",/*#__PURE__*/e(t,{href:\"https://www.investopedia.com/terms/r/returnoninvestment.asp\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"higher ROI\"})}),\" increase\"]})})]}),/*#__PURE__*/e(\"p\",{children:\"Landing in the spam folder automatically:\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Reduces visibility\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Leads to lower open and click-through rates\"})})]}),/*#__PURE__*/e(\"h4\",{children:\"Technical Know-How\"}),/*#__PURE__*/e(\"p\",{children:\"Email marketing requires:\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Crafting compelling content\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Understanding and navigating the technical aspects\"})})]}),/*#__PURE__*/e(\"p\",{children:\"It's a safe way to prevent potential issues with emails in the future. You don't have to be a technical expert right away. Just understand the:\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Workings of email spam filters\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Use the goodness of technology such as automation or email authentication\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Properly use a reputable email service provider\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"Improve Communication by Staying Out of the Spam Folder\"}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(t,{href:\"https://mailchimp.com/marketing-glossary/email-marketing/\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Email marketing\"})}),\" is also about more than just selling. It helps build relationships with your audience. Effective communication through email can establish trust, keep your audience informed, and encourage loyalty.\\xa0For this to happen, your emails need to be seen. That's the long and short of it. If your emails alert spam filters, you lose the opportunity to connect with your audience. Regularly cleaning your email list and avoiding inactive email addresses can help you.\"]}),/*#__PURE__*/e(\"h4\",{children:\"Audience Engagement\"}),/*#__PURE__*/e(\"p\",{children:\"The point is that it's about more than avoiding the spam folder, getting the email to the customer, and improving inbox placement. All of this has a purpose: to ensure that your message is read and appreciated by the right people, who will perform a specific action. You want to ensure that users do not flag your message as spam, as mail servers may interpret it as being sent to the wrong audience.\"}),/*#__PURE__*/e(\"img\",{alt:\"Inframail\",className:\"framer-image\",height:\"540\",src:\"https://framerusercontent.com/images/K1gnYqkG0SbjGZOl2WHlhtrFo.png\",srcSet:\"https://framerusercontent.com/images/K1gnYqkG0SbjGZOl2WHlhtrFo.png?scale-down-to=512 512w,https://framerusercontent.com/images/K1gnYqkG0SbjGZOl2WHlhtrFo.png?scale-down-to=1024 1024w,https://framerusercontent.com/images/K1gnYqkG0SbjGZOl2WHlhtrFo.png 1920w\",style:{aspectRatio:\"1920 / 1080\"},width:\"960\"}),/*#__PURE__*/e(\"h3\",{children:\"Related Reading\"}),/*#__PURE__*/i(\"p\",{children:[\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/why-are-my-emails-going-to-spam-guide\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Why Are My Emails Going To Spam\"})}),/*#__PURE__*/e(\"br\",{}),\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/email-deliverability-rate\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Email Deliverability Rate\"})}),/*#__PURE__*/e(\"br\",{}),\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/email-monitoring\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Email Monitoring\"})}),/*#__PURE__*/e(\"br\",{}),\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/email-deliverability-issues\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Email Deliverability Issues\"})}),/*#__PURE__*/e(\"br\",{}),\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/email-quality-score\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Email Quality Score\"})}),/*#__PURE__*/e(\"br\",{}),\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/bounce-rate-in-email-marketing\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Bounce Rate in Email Marketing\"})}),/*#__PURE__*/e(\"br\",{}),\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/how-to-avoid-email-going-to-spam\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"How To Avoid Email Going To Spam\"})}),/*#__PURE__*/e(\"br\",{}),\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/why-do-emails-bounce\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Why Do Emails Bounce\"})}),/*#__PURE__*/e(\"br\",{}),\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/spf-or-dkim\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"SPF or DKIM\"})})]}),/*#__PURE__*/e(\"h2\",{children:\"How To Check If Your Emails Are Going To Spam\"}),/*#__PURE__*/e(\"img\",{alt:\"person looking worried - How To Check If Your Emails Are Going To Spam \",className:\"framer-image\",height:\"800\",src:\"https://framerusercontent.com/images/c5y1pSjY2ZILtlSFT0APhcXvoI.jpg\",srcSet:\"https://framerusercontent.com/images/c5y1pSjY2ZILtlSFT0APhcXvoI.jpg?scale-down-to=512 512w,https://framerusercontent.com/images/c5y1pSjY2ZILtlSFT0APhcXvoI.jpg?scale-down-to=1024 1024w,https://framerusercontent.com/images/c5y1pSjY2ZILtlSFT0APhcXvoI.jpg?scale-down-to=2048 2048w,https://framerusercontent.com/images/c5y1pSjY2ZILtlSFT0APhcXvoI.jpg 2400w\",style:{aspectRatio:\"2400 / 1600\"},width:\"1200\"}),/*#__PURE__*/i(\"p\",{children:[\"When assessing email deliverability, there isn\u2019t a reliable way to know what happens to an email message once it has been delivered. When a message is sent between a sender and recipient, an \",/*#__PURE__*/e(t,{href:\"https://en.wikipedia.org/wiki/Simple_Mail_Transfer_Protocol#:~:text=SMTP%20is%20a%20connection%2Doriented,Control%20Protocol%20(TCP)%20connection.\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"SMTP connection\"})}),\" is opened between the two parties.\\xa0The recipient\u2019s mailbox provider will either send back a yes/accepted response letting the sender know the mail was accepted or a no/rejected response letting the sender know the mail was bounced back.\"]}),/*#__PURE__*/e(\"h4\",{children:\"Connection Cut\"}),/*#__PURE__*/e(\"p\",{children:\"Once this thumbs-up/thumbs-down exchange occurs, the connection between the two parties is cut. Inbox providers don\u2019t report back to senders on how mail is handled or filtered once it has been accepted.\"}),/*#__PURE__*/e(\"h3\",{children:\"Inbox Placement\"}),/*#__PURE__*/e(\"p\",{children:\"This keeps their mail filtering policies private so they can\u2019t be intentionally bypassed by bad actors or by well-meaning marketers. No Email Service Provider can accurately report on inbox placement, since this data is not provided back from any recipient.\"}),/*#__PURE__*/e(\"h3\",{children:\"How to Test Email Deliverability Before Sending a Campaign\"}),/*#__PURE__*/e(\"p\",{children:\"How do you test email deliverability? To start, you can use seed lists and inbox placement testing services.\"}),/*#__PURE__*/e(\"h4\",{children:\"Seed Lists: A Smart Way to Test Deliverability\"}),/*#__PURE__*/e(\"p\",{children:\"Seed list testing involves sending your email to a predefined list of addresses (seed list) across various email providers. This method provides a real-world scenario and shows where your email lands across different platforms.\\xa0It\u2019s an effective way to test deliverability before launching a full campaign, as it offers a direct look at how different ISPs handle your emails. If your email consistently lands in Gmail\u2019s spam but not Yahoo\u2019s, you know where to focus your optimization efforts.\\xa0\"}),/*#__PURE__*/e(\"h4\",{children:\"A/B Testing\"}),/*#__PURE__*/e(\"p\",{children:\"It\u2019s a great way to test changes in your email strategy, like different subject lines or sending times, and see their impact across various email services.\"}),/*#__PURE__*/e(\"h4\",{children:\"Inbox Placement Testing Services\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Inbox placement testing services simulate email delivery to various ISPs. They:\\xa0\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Provide detailed reports on where your emails end up\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Run a comprehensive analysis, including how different content or subject lines might perform\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Can reveal whether your emails are landing in the inbox, in the spam folder, or not being delivered at all\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Help identify different deliverability issues related to IP reputation, content, or other factors\"})})]}),/*#__PURE__*/e(\"p\",{children:\"This information helps tweak your approach to maximize inbox placement, especially when you\u2019re trying new types of content or targeting different audiences.\"}),/*#__PURE__*/e(\"h3\",{children:\"Use Email Deliverability Tools\"}),/*#__PURE__*/i(\"p\",{children:[\"You don\u2019t have to work with spam folders alone. Take advantage of available tools such as Bouncer. Mail Tester is a helpful tool for identifying issues that could be causing your emails to land in spam folders.\\xa0It also helps you improve your \",/*#__PURE__*/e(t,{href:\"https://blog.hubspot.com/blog/tabid/6307/bid/30594/a-marketer-s-guide-to-getting-past-email-spam-filters.aspx\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"email deliverability\"})}),\". To use it, send your email to a provided unique email address. Then, visit their website to get a report. This report includes a score and information on various aspects of your message.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Check Email Blacklists Regularly\"}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(t,{href:\"https://dnschecker.org/ip-blacklist-checker.php\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Blacklists\"})}),\", maintained by email service providers, are list domains and IP addresses flagged for sending spam. Email clients will consider your business emails as spammy if you\u2019re on these lists. If you\u2019re on a blacklist, your emails are more likely to fail.\\xa0This is not the best situation, as it damages your deliverability and reputation and won\u2019t look great with your email marketing service. Bet on proactive blacklist monitoring, which allows for timely issue resolution and ensures the integrity of your email campaigns.\"]}),/*#__PURE__*/e(\"h4\",{children:\"Email Hygiene\"}),/*#__PURE__*/e(\"p\",{children:\"This practice also helps:\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Understand your mass email performance\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Guide email strategy improvements\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Safeguard your brand\u2019s credibility\"})})]}),/*#__PURE__*/e(\"p\",{children:\"Regularly checking your email address against email blacklists is a key part of:\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Maintaining a healthy email marketing ecosystem\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Avoiding disruptions in your communication with customers\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"Monitor Your Email Engagement Metrics\"}),/*#__PURE__*/i(\"p\",{children:[\"Going deeper into email engagement metrics opens up a wealth of insights. Monitoring metrics like open rates, click-through rates, and bounce rates can show what is wrong and point out where your mass emails end up.\\xa0Consistently low engagement metrics, especially open rates, might indicate that your emails are being filtered into spam folders. Or a sudden drop in open rates might indicate a change in how an ISP categorizes your emails. This method allows for ongoing monitoring, can highlight trends over time, and offers insights into the health of your email marketing efforts.It also aids in \",/*#__PURE__*/e(t,{href:\"https://www.optimizely.com/optimization-glossary/ab-testing/\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"A/B testing\"})}),\" different email elements to see what resonates best with your audience. You don\u2019t need email deliverability tools to see if your emails are dangerous\u2014just looking at your email marketing app will be enough to prevent deliverability issues with your future emails.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Set Up Feedback Loops with ISPs\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Feedback loop information from this source is a goldmine for improving your email content and delivery strategy. It\u2019s invaluable for understanding how recipients perceive your emails. It helps:\\xa0\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Identify problematic practices that might trigger spam filters with every incoming email\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Pinpoint specific campaigns or content that may be causing issues\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Better segment my audience\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Tailor more engaging content and less likely to be marked as spam.\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"It also allows for targeted improvements\"})})]}),/*#__PURE__*/e(\"img\",{alt:\"Inframail\",className:\"framer-image\",height:\"540\",src:\"https://framerusercontent.com/images/McxpYZPka7w4sDflIrgzCYfAtZM.png\",srcSet:\"https://framerusercontent.com/images/McxpYZPka7w4sDflIrgzCYfAtZM.png?scale-down-to=512 512w,https://framerusercontent.com/images/McxpYZPka7w4sDflIrgzCYfAtZM.png?scale-down-to=1024 1024w,https://framerusercontent.com/images/McxpYZPka7w4sDflIrgzCYfAtZM.png 1920w\",style:{aspectRatio:\"1920 / 1080\"},width:\"960\"}),/*#__PURE__*/e(\"h3\",{children:\"Related Reading\"}),/*#__PURE__*/i(\"p\",{children:[\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/dmarc-vs-dkim\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"DMARC vs DKIM\"})}),/*#__PURE__*/e(\"br\",{}),\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/importance-of-dmarc\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Importance Of DMARC\"})}),/*#__PURE__*/e(\"br\",{}),\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/what-is-a-soft-bounce-email\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"What Is a Soft Bounce Email\"})}),/*#__PURE__*/e(\"br\",{}),\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/email-deliverability-checklist\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Email Deliverability Checklist\"})}),/*#__PURE__*/e(\"br\",{}),\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/what-affects-email-deliverability\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"What Affects Email Deliverability\"})}),/*#__PURE__*/e(\"br\",{}),\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/why-is-email-deliverability-important\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Why Is Email Deliverability Important\"})}),/*#__PURE__*/e(\"br\",{}),\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/email-bounce-rate\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Email Bounce Rate\"})}),/*#__PURE__*/e(\"br\",{}),\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/fix-email-reputation\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Fix Email Reputation\"})}),/*#__PURE__*/e(\"br\",{}),\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/improve-sender-reputation\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Improve Sender Reputation\"})}),/*#__PURE__*/e(\"br\",{}),\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/email-hard-bounce\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Email Hard Bounce\"})}),/*#__PURE__*/e(\"br\",{}),\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/email-deliverability-tools\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Email Deliverability Tools\"})}),/*#__PURE__*/e(\"br\",{}),\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/email-deliverability-best-practices\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Email Deliverability Best Practices\"})}),/*#__PURE__*/e(\"br\",{}),\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/best-email-domains\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Best Email Domains\"})})]}),/*#__PURE__*/e(\"h2\",{children:\"What to Do if Emails Go to Spam\"}),/*#__PURE__*/e(\"img\",{alt:\"man giving ideas - How To Check If Your Emails Are Going To Spam \",className:\"framer-image\",height:\"800\",src:\"https://framerusercontent.com/images/SZrvDYY8MBIrwwPwIXomfJsyKs.jpg\",srcSet:\"https://framerusercontent.com/images/SZrvDYY8MBIrwwPwIXomfJsyKs.jpg?scale-down-to=512 512w,https://framerusercontent.com/images/SZrvDYY8MBIrwwPwIXomfJsyKs.jpg?scale-down-to=1024 1024w,https://framerusercontent.com/images/SZrvDYY8MBIrwwPwIXomfJsyKs.jpg?scale-down-to=2048 2048w,https://framerusercontent.com/images/SZrvDYY8MBIrwwPwIXomfJsyKs.jpg 2400w\",style:{aspectRatio:\"2400 / 1600\"},width:\"1200\"}),/*#__PURE__*/e(\"h3\",{children:\"Mark Messages as \u2018Not Spam\u2019 to Fix the Issue at the Receiver's End\"}),/*#__PURE__*/e(\"p\",{children:\"When your emails end up in the spam folder, it can hurt your:\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Sender reputation\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Email deliverability\"})})]}),/*#__PURE__*/e(\"p\",{children:\"A quick way to fix the issue is to ask your recipients to mark your messages as Not spam. This solution solves the problem at the receiver's end. Once they do that, emails from you won\u2019t end up in their spam inbox.\"}),/*#__PURE__*/e(\"h3\",{children:\"Add DNS Verification to Improve Email Authentication\"}),/*#__PURE__*/e(\"p\",{children:\"When your emails are marked as spam, it\u2019s often due to poor sender reputation or email authentication issues. You can verify your email with the help of DNS records. Two specific DNS records are used to verify email:\"}),/*#__PURE__*/i(\"p\",{children:[\"\\xa0\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"strong\",{children:\"1. SPF (stands for Sender Policy Framework) record:\"}),\" Allows domain owners to specify which email servers are authorized to send emails on their behalf.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"strong\",{children:\"2. DKIM (stands for DomainKeys Identified Mail) record:\"}),\" Used for signing and verifying the authenticity of emails. It involves adding a digital signature to outgoing emails so that the recipient's email server can verify it. \",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),\"These records are of TXT type and should be added to your domain's DNS zone.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Don't Forget IP Warming When Changing ISPs\"}),/*#__PURE__*/e(\"p\",{children:\"ISPs and Email Service Providers (ESPs) closely monitor the behavior of senders to prevent spam and ensure the deliverability of legitimate emails to users' inboxes. And when you switch ISPs or send emails from a new IP address, you start with a clean slate regarding your sending reputation.\\xa0A poor sender reputation can lead to your emails being filtered into spam folders or blocked altogether, derailing your email marketing efforts. That's where IP warming steps in.\"}),/*#__PURE__*/e(\"h4\",{children:\"IP Warming\"}),/*#__PURE__*/e(\"p\",{children:\"IP warming helps you build and maintain a good sender reputation for email communications when switching ISPs. It can take several weeks to complete the warming process and gradually increase your email volume to normal levels.\\xa0You must follow best practices during this period and avoid sudden spikes in email activity, as this can (and most likely will) raise red flags with ISPs. Stay away from cold email blasting because some online guru told you so.\"}),/*#__PURE__*/e(\"h3\",{children:\"Why IP Warming Is a Must When Changing ISPs\"}),/*#__PURE__*/e(\"h4\",{children:\"Establishing Trust\"}),/*#__PURE__*/e(\"p\",{children:\"ISPs are wary of new IP addresses because they\u2019re often associated with spammers who create new accounts to avoid detection. IP warming allows you to gradually build trust with the (new) ISP by demonstrating responsible and legitimate email-sending practices.\"}),/*#__PURE__*/e(\"h4\",{children:\"Gradual Ramp-Up\"}),/*#__PURE__*/e(\"p\",{children:\"IP warming involves gradually increasing the volume of your email sending over time. By starting with a small volume of emails and then slowly increasing it, you show ISPs that you\u2019re a legitimate sender with actual recipients.\"}),/*#__PURE__*/e(\"h4\",{children:\"Monitoring And Adaptation\"}),/*#__PURE__*/e(\"p\",{children:\"During the IP warming process, you closely monitor your email performance and adjust your sending practices accordingly. If issues pop up \u2014 such as high bounce rates or spam complaints \u2014 you can identify and address them before your email sending volume hits full capacity.\"}),/*#__PURE__*/e(\"h4\",{children:\"Avoiding Blacklisting\"}),/*#__PURE__*/e(\"p\",{children:\"Sending a large volume of emails from a new IP address without warming it up can trigger spam filters and lead to your IP being blacklisted. Once your IP is blacklisted, it becomes challenging to get emails delivered to users of that ISP, and it can take a considerable amount of time and effort to restore your sender reputation.\"}),/*#__PURE__*/e(\"h4\",{children:\"Maintaining Deliverability\"}),/*#__PURE__*/e(\"p\",{children:\"You need a good sender reputation to maintain high deliverability rates and ensure that your emails reach your recipients' inboxes.\"}),/*#__PURE__*/e(\"h3\",{children:\"How To Do IP Warming Right\"}),/*#__PURE__*/e(\"p\",{children:\"Assess your sending history: Before switching ISPs, review your email sending history with the previous ISP. Identify your average email volume and engagement metrics like:\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Open rates\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(t,{href:\"https://support.google.com/google-ads/answer/2615875?hl=en#:~:text=Clickthrough%20rate%20(CTR)%20can%20be,%3A%20clicks%20%C3%B7%20impressions%20%3D%20CTR.\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Click-through rates\"})})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Bounce rates\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Spam complaints\"})})]}),/*#__PURE__*/e(\"p\",{children:\"This information will serve as a baseline for your IP warming plan.\"}),/*#__PURE__*/e(\"h4\",{children:\"Avoid Purchased Lists\"}),/*#__PURE__*/e(\"p\",{children:\"Never use purchased or rented email lists, as they often contain stale or low-quality addresses that can harm your IP reputation.\"}),/*#__PURE__*/e(\"h4\",{children:\"Clean Your Email List\"}),/*#__PURE__*/e(\"p\",{children:\"Before starting the warming process, ensure your email list is up-to-date and cleaned of invalid or inactive email addresses to avoid high bounce rates.\"}),/*#__PURE__*/e(\"h4\",{children:\"Create A Warming Plan\"}),/*#__PURE__*/e(\"p\",{children:\"Develop a comprehensive warming plan that outlines the schedule for gradually increasing your email sending volume over time. This will be subject to changes in real-time as you start sending emails.\\xa0The duration and specific volume increments will depend on your sending history and email list size.\"}),/*#__PURE__*/e(\"h4\",{children:\"Authenticate Your Emails\"}),/*#__PURE__*/i(\"p\",{children:[\"Implement authentication mechanisms like \",/*#__PURE__*/e(t,{href:\"https://en.wikipedia.org/wiki/Sender_Policy_Framework\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"SPF (Sender Policy Framework)\"})}),\", DKIM (DomainKeys Identified Mail), and DMARC (Domain-based Message Authentication, Reporting, and Conformance) to improve deliverability and show ISPs that you are a legitimate sender.\"]}),/*#__PURE__*/e(\"h4\",{children:\"Start With Low Volume\"}),/*#__PURE__*/e(\"p\",{children:\"Begin by sending emails to a small portion of your list, like 5%-10%. Choose your most engaged subscribers for the initial sends. This might include those who have recently interacted with your emails or have a history of opening and clicking on your messages.\"}),/*#__PURE__*/e(\"h4\",{children:\"Monitor Performance\"}),/*#__PURE__*/e(\"p\",{children:\"During the warming process, monitor your email performance metrics closely. Pay special attention to bounce rates and spam complaints. This data will help you assess the health of your sender reputation.\"}),/*#__PURE__*/e(\"h4\",{children:\"Gradually Increase Volume\"}),/*#__PURE__*/e(\"p\",{children:\"As your performance metrics remain stable and positive, gradually increase the volume of emails you send. This increase should follow the warming plan you created earlier.\\xa0You increase the volume by 10% - 20 % every few days, but the exact increments will depend on your circumstances. The warming process usually takes 4-6 weeks to complete.\"}),/*#__PURE__*/e(\"h4\",{children:\"Segment Your Email List\"}),/*#__PURE__*/e(\"p\",{children:\"As you increase sending volume, segment your email list based on engagement levels. Send to the most active and responsive segments before moving on to less engaged list members.\"}),/*#__PURE__*/e(\"h4\",{children:\"Watch Out For Red Flags\"}),/*#__PURE__*/e(\"p\",{children:\"Be alert for any signs of deliverability issues during the warming process. If you notice a sudden drop in engagement or a spike in spam complaints or bounces, it may indicate a problem that needs to be addressed immediately.\"}),/*#__PURE__*/e(\"h4\",{children:\"Warm Up Each Campaign Type\"}),/*#__PURE__*/e(\"p\",{children:\"If you have different types of email campaigns, warm up each type individually. These include:\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Newsletters\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Promotional offers\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Transactional emails\"})})]}),/*#__PURE__*/e(\"img\",{alt:\"Inframail\",className:\"framer-image\",height:\"540\",src:\"https://framerusercontent.com/images/K1gnYqkG0SbjGZOl2WHlhtrFo.png\",srcSet:\"https://framerusercontent.com/images/K1gnYqkG0SbjGZOl2WHlhtrFo.png?scale-down-to=512 512w,https://framerusercontent.com/images/K1gnYqkG0SbjGZOl2WHlhtrFo.png?scale-down-to=1024 1024w,https://framerusercontent.com/images/K1gnYqkG0SbjGZOl2WHlhtrFo.png 1920w\",style:{aspectRatio:\"1920 / 1080\"},width:\"960\"}),/*#__PURE__*/e(\"h2\",{children:\"Start Buying Domains Now and Setup Your Email Infrastructure Today\"}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(t,{href:\"https://inframail.io/\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Inframail\"})}),\" revolutionizes cold email infrastructure with unlimited inboxes at a single flat rate. With our Microsoft-backed deliverability and dedicated IP addresses, we help agencies, recruiters, and SDRs scale their outreach efforts efficiently. Unlike traditional providers that charge per inbox, Inframail streamlines the entire process.\\xa0We handle the complex infrastructure setup while you focus on reaching more prospects. Whether you're an agency looking to scale outreach, a recruiter connecting with candidates, or an SDR driving sales, Inframail provides a \",/*#__PURE__*/e(t,{href:\"https://inframail.io/\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"robust email infrastructure\"})}),\" without the usual technical headaches and per-inbox costs.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Say Goodbye to Cold Email Deliverability Headaches\"}),/*#__PURE__*/i(\"p\",{children:[\"With Inframail, you can stop worrying about deliverability issues and cold email performance. Our service comes with automated SPF, DKIM, and DMARC setups to ensure your emails arrive safely inside inboxes.\\xa0\",/*#__PURE__*/e(t,{href:\"https://inframail.io/\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Inframail\"})}),\" also provides dedicated email servers for each user to boost deliverability rates further. 16-hour daily priority support guarantees help whenever you need it.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Buy Domains and Start Email Setup Today\"}),/*#__PURE__*/i(\"p\",{children:[\"Cold email success begins with a healthy email infrastructure. Inframail helps you build yours today. With our \",/*#__PURE__*/e(t,{href:\"https://support.google.com/a/answer/2466580?hl=en\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"email infrastructure tool\"})}),\", you can start buying domains and setting up your email infrastructure immediately.\\xa0Forget waiting for traditional providers to provision additional inboxes. With Inframail, you\u2019ll have unlimited inboxes to scale your cold email efforts without delays.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Related Reading\"}),/*#__PURE__*/i(\"p\",{children:[\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/email-monitoring-software\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Email Monitoring Software\"})}),/*#__PURE__*/e(\"br\",{}),\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/soft-bounce-reasons\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Soft Bounce Reasons\"})}),/*#__PURE__*/e(\"br\",{}),\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/check-email-deliverability-score\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Check Email Deliverability Score\"})}),/*#__PURE__*/e(\"br\",{}),\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/soft-bounce-vs-hard-bounce-email\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Soft Bounce vs Hard Bounce Email\"})}),/*#__PURE__*/e(\"br\",{}),\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/saleshandy-alternatives\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"SalesHandy Alternatives\"})}),/*#__PURE__*/e(\"br\",{}),\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/glockapps-alternative\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"GlockApps Alternative\"})}),/*#__PURE__*/e(\"br\",{}),\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/mailgenius-alternative\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"MailGenius Alternative\"})}),/*#__PURE__*/e(\"br\",{}),\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/mxtoolbox-alternative\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"MxToolbox Alternative\"})}),/*#__PURE__*/e(\"br\",{}),\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/maildoso-alternatives\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Maildoso Alternatives\"})})]})]});export const richText2=/*#__PURE__*/i(n.Fragment,{children:[/*#__PURE__*/i(\"p\",{children:[\"When you send an email, do you ever wonder what happens to it after you hit 'send'? The email disappears for most people, and they get on with their lives. An email's journey is critical for businesses and marketers interested in \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/inbox-delivery\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"inbox delivery\"})}),\". If an email doesn't reach its destination quickly or gets lost forever, the sender may never know what went wrong. But if they do, there's a good chance it will be unpleasant, like a phishing attack or spam folder. One way to do this is to implement email authentication protocols like SPF (Sender Policy Framework) and DKIM (DomainKeys Identified Mail). These technical measures help email clients verify the legitimacy of incoming messages to prevent phishing and spoofing attacks. This article will answer that question and help you confidently implement email protection strategies to secure your email domains, prevent phishing, and ensure reliable email delivery without technical confusion.  \"]}),/*#__PURE__*/i(\"p\",{children:[\"Inframail's \",/*#__PURE__*/e(t,{href:\"https://inframail.io/\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"email infrastructure\"})}),\" can help you achieve your goals by boosting your email security and improving your deliverability rates to prevent attacks and unwanted interruptions.\"]}),/*#__PURE__*/e(\"h2\",{children:\"Table of Contents\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/spf-or-dkim#:~:text=Email%20Infrastructure%20Today-,What%27s%20the%20Difference%20Between%20SPF%20and%20DKIM%3F,-DKIM%20stands%20for\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"What's the Difference Between SPF and DKIM?\"})})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/spf-or-dkim#:~:text=Email%20Sender%20Reputation-,Should%20I%20Use%20SPF%20or%20DKIM%20for%20Alternate%20Domain%20Authentication%3F,-DKIM%20and%20SPF\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Should I Use SPF or DKIM for Alternate Domain Authentication?\"})})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/spf-or-dkim#:~:text=Email%20Deliverability%20Checklist-,How%20Does%20DMARC%20Work%20with%20Both%20of%20These%20Protocols%3F,-DMARC%20stands%20for\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"How Does DMARC Work with Both of These Protocols?\"})})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/spf-or-dkim#:~:text=spoofing%20and%20phishing.-,Start%20Buying%20Domains%20Now%20and%20Setup%20Your%20Email%20Infrastructure%20Today,-Inframail%20revolutionizes%20cold\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Start Buying Domains Now and Setup Your Email Infrastructure Today\"})})})})]}),/*#__PURE__*/e(\"h2\",{children:\"What's the Difference Between SPF and DKIM?\"}),/*#__PURE__*/e(\"img\",{alt:\"woman giving good tips -SPF or DKIM\",className:\"framer-image\",height:\"900\",src:\"https://framerusercontent.com/images/ynUrXrBSM7VE5gFCteoSUCzfGso.jpg\",srcSet:\"https://framerusercontent.com/images/ynUrXrBSM7VE5gFCteoSUCzfGso.jpg?scale-down-to=512 512w,https://framerusercontent.com/images/ynUrXrBSM7VE5gFCteoSUCzfGso.jpg?scale-down-to=1024 1024w,https://framerusercontent.com/images/ynUrXrBSM7VE5gFCteoSUCzfGso.jpg?scale-down-to=2048 2048w,https://framerusercontent.com/images/ynUrXrBSM7VE5gFCteoSUCzfGso.jpg 2400w\",style:{aspectRatio:\"2400 / 1800\"},width:\"1200\"}),/*#__PURE__*/i(\"p\",{children:[\"DKIM stands for DomainKeys Identified Mail, which, as mentioned above, is simply an \",/*#__PURE__*/e(t,{href:\"https://www.cloudflare.com/learning/email-security/dmarc-dkim-spf/\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"authentication method\"})}),\" explicitly designed to detect when a sender's email address has been forged. Forging sender emails is a process known as email spoofing, which is used frequently in:\"]}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Email spam\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Phishing scams\"})})]}),/*#__PURE__*/e(\"p\",{children:\"DKIM acts like a gatekeeper to validate the authenticity of email messages.\"}),/*#__PURE__*/e(\"h4\",{children:\"DNS & Security\"}),/*#__PURE__*/e(\"p\",{children:\"As each email is sent, it\u2019s signed with a private key, validated by the receiving email server or Internet Service Provider (ISP) using a public key called the Domain Name System (DNS). The DNS translates domain names into IP addresses, which is a fancy way of saying it allows you to use your web browser to:\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Locate websites\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Receive emails\"})})]}),/*#__PURE__*/e(\"p\",{children:\"Its chief responsibility is ensuring the email message is not altered during transit. Email altering mid-transit is a genuine problem that occurs more often than you think.\"}),/*#__PURE__*/e(\"h4\",{children:\"DKIM & Fraud\"}),/*#__PURE__*/e(\"p\",{children:\"If you were sending an attachment with your bank account and routing number and didn\u2019t use the correct security protocols, it could be intercepted by a fraudster. Once intercepted, this hacker could insert their account and routing number and send it back to the intended recipient. The recipient would still think it came from you and pay the incorrect bank account instead. With DKIM, the unique private key used to sign emails is stored exclusively on your email server and must be kept secret and secure. If nefarious individuals got their hands on your secret key, they\u2019d have no problem forging your DKIM signatures and using them for fraudulent activities.\"}),/*#__PURE__*/e(\"h4\",{children:\"DKIM & Reputation\"}),/*#__PURE__*/i(\"p\",{children:[\"Later in the sending and receiving process, ISPs verify the integrity of messages by fetching the corresponding public key from a specific DKIM record stored in your DNS. The \",/*#__PURE__*/e(t,{href:\"https://www.fortinet.com/resources/cyberglossary/what-is-cryptography#:~:text=Cryptography%20is%20the%20process%20of,%2C%20computer%20passwords%2C%20and%20ecommerce.\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"cryptography behind the scenes\"})}),\" here is used in SSL, guaranteeing that only messages signed with your special private key will pass the public key check. Another lesser-known benefit that DKIM offers is that ISPs, like Gmail, can use this information to build a reputation score for your domain. If you\u2019ve got top-notch sending practices, you\u2019ll get a higher score. These practices include:\"]}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"High engagement\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Low spam\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Minimal bounces\"})})]}),/*#__PURE__*/e(\"h4\",{children:\"DKIM & Spam\"}),/*#__PURE__*/e(\"p\",{children:\"If you\u2019ve scored low with poor practices, it\u2019s less likely your emails will be delivered correctly, almost guaranteeing that they\u2019ll end up in that lowly spam folder nobody checks.\"}),/*#__PURE__*/e(\"h3\",{children:\"SPF: The Email Authentication Protocol That Will Help You Prevent Spoofing Attacks\"}),/*#__PURE__*/e(\"p\",{children:\"Sender Policy Framework, or SPF, is how ISPs such as Gmail and Yahoo verify that a particular mail server is authorized to send emails to a domain. It\u2019s a whitelist: a list of things considered trustworthy or acceptable for services allowed to send emails on your behalf. Similar to DKIM, SPF functions via DNS. Let\u2019s say you use a service like Mailshake to send out marketing emails. You\u2019d then insert a DNS record that includes Mailshake\u2019s mail servers as a whitelisted trusted source to send emails on behalf of your domain. \"}),/*#__PURE__*/e(\"p\",{children:\"SPF is critical to verifying who\u2019s allowed to send emails on behalf of your domain and directly impacts your email delivery. Not only do you need it for email marketing and your company email accounts, but it\u2019s also essential for support services such as:\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Helpscout\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Zendesk\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Anyone else sending emails on your behalf\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"DKIM vs. SPF: What Are the Key Differences?\"}),/*#__PURE__*/e(\"p\",{children:\"It\u2019s not all that hard for a hacker to figure out how to send email from your domain. To protect yourself from such malicious activity, you\u2019ll want to set up both:\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"SPF\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"DKIM. \"})})]}),/*#__PURE__*/e(\"p\",{children:\"DKIM is a set of keys that tell IPs you\u2019re the original sender, and nobody fraudulently intercepted my email. SPF is a unique whitelist that includes everyone authorized to send messages on your behalf. If you\u2019re curious to see this all in action, you can verify whether an email is properly signed with DKIM or passing SPF by checking the email headers.\\xa0You can see this in Gmail using the Show Original option under settings. At the top, you should see PASS next to SPF and DKIM.\"}),/*#__PURE__*/e(\"h3\",{children:\"Why Are DKIM and SPF Important for Cold Email?\"}),/*#__PURE__*/e(\"p\",{children:\"Cold emails are easy pickings for email spam filters. The recipient doesn\u2019t know you, so they\u2019re more likely to leave your emails unread or mark them spam, which ruins your online reputation. If you\u2019re looking for a way to steer clear of the spam folder, then SPF and DKIM are your allies. You can think of SPF as a VIP travel pass to the recipient\u2019s inbox. With it, email deliverability increases, and your email is far more likely to avoid:\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Bulk email filters\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Spam inboxes\"})})]}),/*#__PURE__*/e(\"h4\",{children:\"SPF & Security\"}),/*#__PURE__*/e(\"p\",{children:\"Having an SPF record also ensures that your reputation stays high because it\u2019s far less likely to get hijacked by fraudsters looking to profit off your good name. Also, if you\u2019re looking to step up your cold email game by investing in email automation software, you\u2019ll have to hand over the keys to your email account to a third-party provider.\"}),/*#__PURE__*/e(\"h4\",{children:\"SPF & DKIM\"}),/*#__PURE__*/e(\"p\",{children:\"Since the email is going through an intermediary, you can count on ISPs to flag it as fraudulent unless you give the proper clearance. That\u2019s where SPF can help \u2013 it\u2019s similar to giving your trustworthy friend a key to your house. DKIM is also crucial for cold email since it is a key of sorts. It\u2019s not a key to sending emails like SPF, but a key to opening them. DKIM is an invisible signature that ISPs use to form a reputation score, so your email is less likely to end up in the spam folder.\"}),/*#__PURE__*/e(\"h4\",{children:\"Deliverability & Success\"}),/*#__PURE__*/e(\"p\",{children:\"The best cold email in the world is only valuable if it reaches its target. Ultimately, SPF and DKIM ensure that your reputation stays high and that your cold email shows up when and where you want it.\"}),/*#__PURE__*/e(\"img\",{alt:\"Inframail\",className:\"framer-image\",height:\"540\",src:\"https://framerusercontent.com/images/K1gnYqkG0SbjGZOl2WHlhtrFo.png\",srcSet:\"https://framerusercontent.com/images/K1gnYqkG0SbjGZOl2WHlhtrFo.png?scale-down-to=512 512w,https://framerusercontent.com/images/K1gnYqkG0SbjGZOl2WHlhtrFo.png?scale-down-to=1024 1024w,https://framerusercontent.com/images/K1gnYqkG0SbjGZOl2WHlhtrFo.png 1920w\",style:{aspectRatio:\"1920 / 1080\"},width:\"960\"}),/*#__PURE__*/e(\"h3\",{children:\"Related Reading\"}),/*#__PURE__*/i(\"p\",{children:[\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/why-are-my-emails-going-to-spam-guide\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Why Are My Emails Going To Spam\"})}),/*#__PURE__*/e(\"br\",{}),\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/email-deliverability-rate\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Email Deliverability Rate\"})}),/*#__PURE__*/e(\"br\",{}),\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/email-monitoring\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Email Monitoring\"})}),/*#__PURE__*/e(\"br\",{}),\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/email-deliverability-issues\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Email Deliverability Issues\"})}),/*#__PURE__*/e(\"br\",{}),\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/email-quality-score\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Email Quality Score\"})}),/*#__PURE__*/e(\"br\",{}),\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/bounce-rate-in-email-marketing\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Bounce Rate in Email Marketing\"})}),/*#__PURE__*/e(\"br\",{}),\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/how-to-avoid-email-going-to-spam\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"How To Avoid Email Going To Spam\"})}),/*#__PURE__*/e(\"br\",{}),\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/why-do-emails-bounce\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Why Do Emails Bounce\"})}),/*#__PURE__*/e(\"br\",{}),\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/how-to-check-if-your-emails-are-going-to-spam\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"How To Check If Your Emails Are Going To Spam\"})})]}),/*#__PURE__*/e(\"h2\",{children:\"Should I Use SPF or DKIM for Alternate Domain Authentication?\"}),/*#__PURE__*/e(\"img\",{alt:\"man helping a friend - SPF or DKIM\",className:\"framer-image\",height:\"2000\",src:\"https://framerusercontent.com/images/mDQtm4RJ6h8Xt7FBnBl3AEb3LV0.jpg\",srcSet:\"https://framerusercontent.com/images/mDQtm4RJ6h8Xt7FBnBl3AEb3LV0.jpg?scale-down-to=512 512w,https://framerusercontent.com/images/mDQtm4RJ6h8Xt7FBnBl3AEb3LV0.jpg?scale-down-to=1024 1024w,https://framerusercontent.com/images/mDQtm4RJ6h8Xt7FBnBl3AEb3LV0.jpg?scale-down-to=2048 2048w,https://framerusercontent.com/images/mDQtm4RJ6h8Xt7FBnBl3AEb3LV0.jpg?scale-down-to=4096 4096w,https://framerusercontent.com/images/mDQtm4RJ6h8Xt7FBnBl3AEb3LV0.jpg 6000w\",style:{aspectRatio:\"6000 / 4000\"},width:\"3000\"}),/*#__PURE__*/e(\"p\",{children:\"DKIM and SPF are the two key players in email authentication. They work best together to prevent spoofing and phishing attacks that can wreak havoc on your business.\"}),/*#__PURE__*/e(\"h3\",{children:\"Is It DKIM vs. SPF\u2014or Both?\"}),/*#__PURE__*/i(\"p\",{children:[\"Should the battle be DKIM vs. SPF? While not mandatory, using both SPF and DKIM to protect your email domains from spoofing attacks and fraud while increasing your \",/*#__PURE__*/e(t,{href:\"https://blog.hubspot.com/blog/tabid/6307/bid/30594/a-marketer-s-guide-to-getting-past-email-spam-filters.aspx\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"email deliverability is highly recommended\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"How Does Domain Spoofing Work?\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Email spoofing is the forgery of an email header so that the message appears to have originated from someone or somewhere other than the actual source. The goal of email spoofing is often to fraudulently obtain the recipient's sensitive information, such as:\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Credit card details\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Password \"})})]}),/*#__PURE__*/e(\"p\",{children:\"Such an email often includes a scary message warning the recipient that a security breach has occurred and prompting him to take immediate action.\"}),/*#__PURE__*/e(\"h4\",{children:\"Phishing & Loss\"}),/*#__PURE__*/i(\"p\",{children:[\"Seeing that the From address is, like, support@trustedbank.com, a forged email address, the recipient clicks a link in the email and is taken to a malicious website masquerading as the bank's official \",/*#__PURE__*/e(t,{href:\"https://en.wikipedia.org/wiki/Web_portal\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"web portal\"})}),\", and enters his credentials.\\xa0The malicious website can then use the credentials and withdraw money from his bank account, inflicting financial loss upon the victim.\"]}),/*#__PURE__*/e(\"h4\",{children:\"Spoofing & Invoice\"}),/*#__PURE__*/e(\"p\",{children:\"Or, the spoofed email could appear to be coming from one of the victim company's partners while the attacker sends it. The email sends an invoice to the recipient requesting payment. The recipient is redirected to a fake website and pays the invoice without knowing he is wiring money to the attacker instead of the intended partner. What's more, fraudsters can pretend to be the senior management officers of victim companies and send fictitious emails to the staff (such as accounting officers or managers), claiming that money needs to be transferred to overseas business partners or made in business investments.\"}),/*#__PURE__*/e(\"h4\",{children:\"Fraud & Example\"}),/*#__PURE__*/e(\"p\",{children:\"The fraudsters then direct the staff to transfer the company's funds to the bank accounts designated by the fraudsters. The following is a real-life example of a spoofed email: In this email, the attacker, impersonating Google, warns the recipient of a suspicious login attempt and asks him to confirm to steal the recipient's credentials.\"}),/*#__PURE__*/e(\"h3\",{children:\"How to Stop Email Spoofing/Phishing?\"}),/*#__PURE__*/e(\"p\",{children:\"While the reality of rampant email spoofing attacks might seem scary to some, the good news is that you can prevent or block email spoofing/phishing by implementing email authentication with modern email security measures, namely:\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"SPF\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"DKIM\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"DMARC\"})})]}),/*#__PURE__*/i(\"p\",{children:[\"These protocols serve as the holy trinity of email authentication, and when deployed correctly, they can completely stop email spoofing attacks. On the highest level, an SPF/DKIM/DMARC implementation works by publishing DNS records for the domain to be secured. Together with email service providers (ESP) like Gmail, it prevents unauthorized attackers from delivering \",/*#__PURE__*/e(t,{href:\"https://www.cloudflare.com/learning/email-security/what-is-email-spoofing/#:~:text=In%20email%20spoofing%2C%20an%20attacker,recipient%2C%20and%20tracking%20data.)\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"spoofing emails\"})}),\" using your domain.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Do I Need DKIM and SPF?\"}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Quick answer:\"}),\" If you are serious about email, you do.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),\"But email spoofing and phishing are far-fetched. Even if your organization is lucky enough to stay off the spoofing/phishing radar for a while, implementing DMARC, DKIM, and SPF still offers these instant benefits:\\xa0\"]}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Microsoft Office 365 has updated its anti-spoofing policy so that unauthenticated emails go to the spam folder by default, which means if you have not set up DMARC/DKIM/SPF on your domain\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Emails originating from it are likely to not land in the inbox\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[\"A warning message like the following is displayed to the end-user \",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})]})})]}),/*#__PURE__*/e(\"p\",{children:\"Gmail marks unauthenticated emails as such with a red question mark like this\u2013our research has shown that implementing a p=reject DMARC policy boosts email deliverability by 10% or even more with some mainstream mailbox providers, including Gmail.\"}),/*#__PURE__*/e(\"h4\",{children:\"ROI & Security\"}),/*#__PURE__*/e(\"p\",{children:\"In other words, this single act of implementing p=reject increases your email campaign return by 10%. After all, your emails have to make it to the inbox.\\xa0SPF, DKIM, and DMARC work together to protect your brand and your users from:\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Email spoofing\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Phishing\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"A Typical Business Email Scenario\"}),/*#__PURE__*/e(\"p\",{children:\"When your business communicates with its employees or customers via email, you outsource email delivery to a third-party service like SendGrid. It is highly recommended to do so, as you will reap numerous benefits, including better deliverability, anti-spam, etc. Here is what happens when you send a business email message to a recipient using a 3rd-party service\u2013you call the email delivery service (like SendGrid) with parameters like:\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Recipient's email address\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Subject\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Message body\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Possibly attachments\"})})]}),/*#__PURE__*/e(\"p\",{children:\"With all the data:\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"The email delivery service host initiates an SMTP session with one of the servers hosted by the recipient's email service provider, such as Gmail\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"The email service provider checks the incoming request, finds the business domain, looks up the SPF/DKIM/DMARC records from the business domain's DNS entries, and performs authentication checks\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Depending on the check results, the email can land in the inbox, be moved to the spam folder, or be rejected outright\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"A Real-World SMTP Transaction\\xa0\"}),/*#__PURE__*/i(\"p\",{children:[\"Take a look at a real-world \",/*#__PURE__*/e(t,{href:\"https://mailtrap.io/blog/smtp-commands-and-responses/\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"SMTP\"})}),\" transaction between the email delivery service host and the receiving email server:\"]}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:'The host issues the hello command to identify itself. You can interpret it as saying, \"Hi, I am dmarcly.com.\"\\xa0'})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"The host then issues the mail from the command to initiate the email transfer and identify the sender.\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"The address specified in this command is called the envelope from address, and it tells mail servers where to return or bounce the message back to, if the message fails to deliver for whatever reason (recipient email account not found).\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"It issues the rcpt to command to specify the recipient.\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"This command can repeat multiple times, with each one for each recipient if there are numerous.\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"The data command starts sending the actual message.\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"The system accepts everything following the data command until it sees a single dot . on its own line, followed by a blank line.\"})})]}),/*#__PURE__*/e(\"h4\",{children:\"Headers & Body\"}),/*#__PURE__*/e(\"p\",{children:\"You can specify header fields familiar to many email end users within this command:\\xa0\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"From: \"}),\"This is the header from the address, and it appears in many email clients as the email sender. If omitted, it's the same as the envelope from the address. In this transaction, the recipient perceives the sender as \",/*#__PURE__*/e(t,{href:\"mailto:john@dmarcly.com\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"john@dmarcly.com\"})})]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Reply-to:\"}),\" optional header field to direct replies to the specified address\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Subject:\"}),\" the message's subject shown in the email client\"]})})]}),/*#__PURE__*/e(\"p\",{children:\"The rest is the message body. Email authentication has little to do with the message body. It's mostly about email header fields and SMTP commands.\"}),/*#__PURE__*/e(\"h3\",{children:\"Anatomy of an Email Message\"}),/*#__PURE__*/e(\"p\",{children:\"An email message consists of a header, which in turn consists of multiple fields and a body. The header contains the information we need to track a message's origin and authenticity. We're interested in the header part here as it's relevant to email authentication. If you are using Gmail, you can use Show original to examine the details of an email message.\"}),/*#__PURE__*/e(\"h3\",{children:\"A Tale of Two From Addresses\"}),/*#__PURE__*/e(\"p\",{children:\"Each email message comes with two from addresses:\\xa0\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"The envelope from\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"The header from\"})})]}),/*#__PURE__*/e(\"p\",{children:\"The envelope from address is the address specified by the mail from command during an SMTP transaction. It is also known as MailFrom, RFC5321. From, RFC5321.MailFrom, bounce address, reverse path, return path, return address, From_, Errors-to (and probably more).\"}),/*#__PURE__*/e(\"h4\",{children:\"From Header Field\"}),/*#__PURE__*/e(\"p\",{children:\"The header from address is the address specified in the From header field in the data command. It is also known as:\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"RFC5322\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"From\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Display from\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Some other variants\"})})]}),/*#__PURE__*/e(\"p\",{children:\"The header from address appears in most email clients. Check the following example, where Gmail displays the header from address as the sender:\"}),/*#__PURE__*/e(\"h4\",{children:\"SPF Works\"}),/*#__PURE__*/e(\"p\",{children:\"To facilitate our discussion, let's assume this setup:\\xa0\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Your business domain is business.com\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"You will send emails to your employees and customers from support@business.com\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Your email delivery server, which sends the email for you, has an IP address of 192.168.0.1\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Some attackers use scam email servers at IP address 1.2.3.4 to try to send spoofed emails.\"})})]}),/*#__PURE__*/e(\"p\",{children:\"When an email delivery service connects to the email server serving up the recipient's mailbox:\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"The email server extracts the domain name from the envelope from address. In this case, it's business.com\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"The email server checks the connecting host's IP address to see if it's listed in business.com's SPF record published in the DNS.\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"If the IP address is listed, the SPF check passes; otherwise not.\"})})]}),/*#__PURE__*/e(\"h4\",{children:\"SPF & IP\"}),/*#__PURE__*/e(\"p\",{children:\"The SPF record looks like this: v=spf1 ip4:192.168.0.1. This means only emails from IP address 192.168.0.1 can pass the SPF check, while all emails from any IP address other than 192.168.0.1 will fail. Therefore, no email from the scam server at IP address 1.2.3.4 will ever pass the SPF check.\"}),/*#__PURE__*/e(\"h4\",{children:\"How to Implement SPF\\xa0\"}),/*#__PURE__*/e(\"p\",{children:'Creating an SPF record SPF provides mechanisms, qualifiers, and modifiers to allow domain administrators to specify IP addresses in a highly flexible way. The record: v=spf1 ip4:192.168.0.1 -all v=spf1 defines the version of SPF.\\xa0It\\'s always \"spf1\". Everything that comes after is combinations of mechanisms, qualifiers, and/or modifiers that specify if a host is eligible to send emails. The ip4 mechanism specifies an IPv4 address range allowed to send emails for the domain.'}),/*#__PURE__*/e(\"h4\",{children:\"SPF Mechanisms\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"In this case, a single IP address 192.168.0.1 is allowed. The -all part at the end specifies that if none of the previous mechanisms matches, the SPF check fails. -all consists of the - qualifier and all mechanisms.\"}),/*#__PURE__*/e(\"p\",{children:\"A mechanism is a way to specify a range of IP addresses. Eight mechanisms are defined:\\xa0\"}),/*#__PURE__*/i(\"ol\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"IP4 :\"}),\" If the sender is in a given IPv4 address range, match\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"IP6:\"}),\" If the sender is in a given IPv6 address range, match\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"A: \"}),\"If the domain name has an address record (A or AAAA) that can be resolved to the sender's address, it will match\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"MX: \"}),\"If the domain name has an MX record resolving to the sender's address, match (i.e. the mail comes from one of the domain's incoming mail servers)\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"PTR:\"}),\" If the domain name (PTR record) for the client's address is in the given domain and that domain name resolves to the client's address (forward-confirmed reverse DNS), match. This mechanism is deprecated and should no longer be used.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"EXISTS: \"}),\"If the given domain name resolves to any address, match (no matter the address it resolves to). This is rarely used. Along with the SPF macro language it offers more complex matches like DNSBL-queries.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"INCLUDE: \"}),\"References the policy of another domain. If that domain's policy passes, this mechanism passes. However, if the included policy fails, processing continues. To fully delegate to another domain's policy, the redirect extension must be used.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"ALL:\"}),\" Matches always; used for a default result like -all for all IPs not matched by prior mechanisms.\"]})})]}),/*#__PURE__*/e(\"h4\",{children:\"SPF Qualifiers\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"A qualifier specifies the result of a mechanism evaluation. Each qualifier can be combined with any of the mechanisms described above. + for PASS, i.e., the SPF check passes.\\xa0This can be omitted; e.g., +mx is the same as mx; ? for a NEUTRAL result interpreted like NONE (no policy); ~ (tilde) for SOFTFAIL, a debugging aid between NEUTRAL and FAIL. Messages that return a SOFTFAIL are accepted but tagged; - for FAIL, i.e., the SPF check fails.\"}),/*#__PURE__*/e(\"h4\",{children:\"SPF Modifiers\"}),/*#__PURE__*/i(\"p\",{children:[\"There are two widely deployed modifiers: exp=some.example.com gives the name of a domain with a \",/*#__PURE__*/e(t,{href:\"https://www.cloudflare.com/learning/dns/dns-records/dns-txt-record/\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"DNS TXT record\"})}),\" (interpreted using SPF's macro language) to get an explanation for FAIL results.\\xa0Rarely used. redirect=some.example.com can be used instead of the all mechanism to link to the policy record of another domain. SPF modifiers allow for future extensions to the framework.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Example SPF Records\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"You can modify it to suit your needs. v=spf1 a mx include:_spf.example.com -all This record allows the following IP addresses to send emails on behalf of your domain business.com:\\xa0\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"If business.com has an address record (A or AAAA) that can be resolved, the resolved value is allowed (the a mechanism)\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"If business.com has an MX record that can be resolved, the resolved value is allowed (the mx mechanism)\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Any IP address passing SPF authentication using another domain's SPF record at _spf.example.com, is allowed (the include:_spf.example.com mechanism)\\xa0\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"Publishing an SPF Record\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Once you've created the SPF record, you need to publish it to the DNS before the receiving email server can receive it. Publishing an SPF record is creating a TXT record on your domain.\"}),/*#__PURE__*/e(\"h3\",{children:\"SPF DNS Lookup Limit\"}),/*#__PURE__*/i(\"p\",{children:[\"Each time an email message hits the email service host, the host looks up in the DNS to perform SPF check. Care has been taken to prevent this from turning into \",/*#__PURE__*/e(t,{href:\"https://www.investopedia.com/terms/d/denial-service-attack-dos.asp\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Denial of Service\"})}),\" (DoS) attack.\\xa0The SPF specification imposes that the number of mechanisms and modifiers that do DNS lookups must not exceed ten per SPF check, including any lookups caused by the use of the include mechanism or the edirect modifier.\"]}),/*#__PURE__*/e(\"h3\",{children:\"What If Your SPF Record Exceeds the 10-DNS-Lookup Limit?\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"If your SPF record exceeds the 10-DNS-lookup limit, SPF authentication returns a permanent error indicating too many DNS lookups. An SPF permanent error is interpreted in DMARC as fail. When this happens, it hurts your email deliverability.\"}),/*#__PURE__*/e(\"h3\",{children:\"DKIM: The Other Email Authentication Protocol\"}),/*#__PURE__*/e(\"p\",{children:\"DomainKeys Identified Mail (DKIM) is an email authentication method that helps prevent spoofing. It works by affixing a digital signature to outgoing emails, allowing receivers to check that the email actually came from the sender's domain and hasn't been tampered with during transit.\"}),/*#__PURE__*/e(\"h3\",{children:\"How DKIM Works\"}),/*#__PURE__*/e(\"p\",{children:\"One important aspect of email security is the authenticity of the message. An email message usually goes through multiple servers before it reaches the destination. How do you know the email message you got is not tampered with somewhere in the journey?\\xa0An email is sent from company 1 to company 2 requesting a 1000 USD payment to company 1's account. Some hacker alters the email downstream so that the request becomes 100,000 USD to another account, and without extra security measures, it's hard to detect such alterations.\"}),/*#__PURE__*/e(\"h4\",{children:\"DKIM & Forgery\"}),/*#__PURE__*/e(\"p\",{children:\"DKIM comes to the rescue. DKIM, which stands for DomainKeys Identified Mail, is an email authentication method to detect forged header fields and email content. DKIM enables the receiver to check if email headers and content have been altered in transit.\"}),/*#__PURE__*/e(\"h3\",{children:\"DKIM Signing\"}),/*#__PURE__*/e(\"p\",{children:\"Signing an email message on the originating email server means:\\xa0\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Choose which header fields and/or body to be included in the data\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Compute the hash sum of the data, including message headers and message body\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Encrypt the hash sum with the private key\"})})]}),/*#__PURE__*/e(\"p\",{children:\"The result is called the signature; append a DKIM-Signature header containing the signature to the email.\"}),/*#__PURE__*/e(\"h3\",{children:\"DKIM Verification\"}),/*#__PURE__*/e(\"p\",{children:\"When the email reaches the destination, the receiver checks if a DKIM-Signature field exists in the header. Here is an example of the DKIM-Signature header field revealed in Gmail\u2013DKIM signature header field in Gmail.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"If a DKIM-signature field is found, the server verifies the authenticity of the email:\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Look up the DKIM record of the domain in the DNS, using the selector in DKIM-Signature specified by the s= tag\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"If found, extract the public key which is part of the key pair from the record\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Here is an example DKIM record retrieved by a receiving server\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Compute a hash sum using the algorithm specified by the a= tag, of the incoming data specified by the h= tag\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Decrypt the signature with the public key to reveal the hash sum computed by the sender\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"If hash sum in 4 is equal to hash sum in 3, it passes the check, meaning the message hasn't been tampered with, otherwise it fails\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"Tags in DKIM-Signature\"}),/*#__PURE__*/e(\"p\",{children:\"The DKIM-signature header field in an email message header consists of a list of tag=value parts.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"An example DKIM-signature header field looks like this:\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"DKIM-Signature: v=1; a=rsa-sha256; d=example.net; s=brisbane; c=relaxed/simple; q=dns/txt; t=1117574938; x=1118006938; h=from:to:subject:date:keywords:keywords; bh=MTIzNDU2Nzg5MDEyMzQ1Njc4OTAxMjM0NTY3ODkwMTI=; b=dzdVyOfAKCdLXdJOc9G2q8LoXSlEniSbav+yuU4zGeeruD00lszZVoG4ZHRNiYzR\"}),/*#__PURE__*/e(\"h4\",{children:\"DKIM & Tags\"}),/*#__PURE__*/e(\"p\",{children:\"Here are the tags that can appear in a DKIM signature header field:\\xa0\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"v:\"}),\" version\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"a:\"}),\" signing algorithm\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"d:\"}),\" domain\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"s: \"}),\"selector\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"c: \"}),\"canonicalization algorithm(s) for header and body\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"q:\"}),\" default query method\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"t: \"}),\"signature timestamp\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"x: \"}),\"expire time\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"h: \"}),\"header fields - list of those that have been signed\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"bh: \"}),\"body hash\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"b:\"}),\" signature of headers and body\"]})})]}),/*#__PURE__*/e(\"h3\",{children:\"Tags in DKIM DNS Record\"}),/*#__PURE__*/e(\"p\",{children:\"A DKIM record published in the DNS consists of a list of tag=value parts. An example DKIM DNS record looks like this:\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"v=DKIM1; k=rsa; t=s; p=MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCnVgd0NyrRE261IIiPqi+0H1baNyKcdj8Kea/VlSP4exzvKxJ01EWMwd094FV/6OCBIf7KGKgowMnWl3tW3Z5G++uZHkdgF+6xg7b9PynmX/NTo2kx92hlGgegwyulF5B7d2FM0doaCeoO4rD05jZzwi3cXx/156Gg9Xwd/Z/QIDAQAB\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Here are the tags that can appear in a DKIM DNS record:\\xa0\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"v:\"}),' version; must be \"DKIM1\";\\xa0']})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"g:\"}),\" granularity\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"h:\"}),\" a list of mechanisms that can be used to produce a digest of message data\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"n:\"}),\" notes that might be of interest to a human\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"s:\"}),\" a list of service types to which this selector may apply\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"q:\"}),\" a list of query methods; l: body length limits\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"k:\"}),\" a list of mechanisms that can be used to decode a DKIM signature\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"t:\"}),\" a list of flags to modify interpretation of the selector\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"p: \"}),\"base64 encoded public key\"]})})]}),/*#__PURE__*/e(\"h3\",{children:\"Creating a DKIM Record\"}),/*#__PURE__*/e(\"p\",{children:\"If you are using a 3rd-party email delivery service, creating a DKIM record is easy enough: simply use their service to create the private/public key pair that will be kept with their service.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"This is how to do this in SendGrid now:\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Log in to SendGrid' dashboard\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Go to Settings/Sender Authentication/Authenticate Your Domain\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/i(\"p\",{children:[\"Choose your \",/*#__PURE__*/e(t,{href:\"https://www.ibm.com/topics/dns-server\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"DNS host\"})}),\" and click the Next button\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Authenticate email domain in SendGrid\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"Publishing a DKIM Record\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Before an email receiver can authenticate your domain using DKIM, you need to publish it to the DNS since the receiver queries the DNS for DKIM records. Publishing a DKIM record creates a CNAME record on (selector)._domainkey.example.com.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"This is how to do this step by step in GoDaddy:\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Log in to GoDaddy\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Click the domain in question, then click the DNS button\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Update DNS in GoDaddy\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"If the DKIM record doesn't exist on the domain, click the Add button under the Records section.\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Add DNS record in GoDaddy\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"DKIM Key Rotation\"}),/*#__PURE__*/e(\"p\",{children:\"DKIM has proven to be a highly effective means by which a receiver can verify that the signed fields of an email have not been modified in transit. However, DKIM is as secure as the weakest link - the private key.\\xa0One of the best-known uses of asymmetric cryptography is digital signatures, in which a message is signed with the sender's private key and can be verified by anyone with access to the sender's public key.\"}),/*#__PURE__*/e(\"h4\",{children:\"DKIM & Tampering\"}),/*#__PURE__*/e(\"p\",{children:\"This ensures that the message has not been tampered with, as the signature is bound to the message. Verification will fail for practically any other message, no matter how similar to the original message.\"}),/*#__PURE__*/e(\"h3\",{children:\"Related Reading\"}),/*#__PURE__*/i(\"p\",{children:[\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/dmarc-vs-dkim\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"DMARC vs DKIM\"})}),/*#__PURE__*/e(\"br\",{}),\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/importance-of-dmarc\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Importance Of DMARC\"})}),/*#__PURE__*/e(\"br\",{}),\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/what-is-a-soft-bounce-email\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"What Is a Soft Bounce Email\"})}),/*#__PURE__*/e(\"br\",{}),\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/email-deliverability-checklist\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Email Deliverability Checklist\"})}),/*#__PURE__*/e(\"br\",{}),\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/what-affects-email-deliverability\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"What Affects Email Deliverability\"})}),/*#__PURE__*/e(\"br\",{}),\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/why-is-email-deliverability-important\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Why Is Email Deliverability Important\"})}),/*#__PURE__*/e(\"br\",{}),\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/email-bounce-rate\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Email Bounce Rate\"})}),/*#__PURE__*/e(\"br\",{}),\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/fix-email-reputation\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Fix Email Reputation\"})}),/*#__PURE__*/e(\"br\",{}),\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/improve-sender-reputation\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Improve Sender Reputation\"})}),/*#__PURE__*/e(\"br\",{}),\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/email-hard-bounce\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Email Hard Bounce\"})}),/*#__PURE__*/e(\"br\",{}),\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/email-deliverability-tools\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Email Deliverability Tools\"})}),/*#__PURE__*/e(\"br\",{}),\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/email-deliverability-best-practices\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Email Deliverability Best Practices\"})}),/*#__PURE__*/e(\"br\",{}),\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/best-email-domains\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Best Email Domains\"})})]}),/*#__PURE__*/e(\"h2\",{children:\"How Does DMARC Work with Both of These Protocols?\"}),/*#__PURE__*/e(\"img\",{alt:\"how does it help - SPF or DKIM\",className:\"framer-image\",height:\"675\",src:\"https://framerusercontent.com/images/IimGmTVLFifSiHJgI221yB1N98.jpg\",srcSet:\"https://framerusercontent.com/images/IimGmTVLFifSiHJgI221yB1N98.jpg?scale-down-to=512 512w,https://framerusercontent.com/images/IimGmTVLFifSiHJgI221yB1N98.jpg?scale-down-to=1024 1024w,https://framerusercontent.com/images/IimGmTVLFifSiHJgI221yB1N98.jpg?scale-down-to=2048 2048w,https://framerusercontent.com/images/IimGmTVLFifSiHJgI221yB1N98.jpg 2400w\",style:{aspectRatio:\"2400 / 1350\"},width:\"1200\"}),/*#__PURE__*/e(\"p\",{children:\"DMARC stands for Domain-based Message Authentication, Reporting, and Conformance. This bizarre-sounding acronym identifies an email security measure that protects your domain against being used by the bad guys and gives you better control of your email deliverability. DMARC is based on the SPF and DKIM mechanisms.\"}),/*#__PURE__*/e(\"p\",{children:\"DMARC allows you to conclude if an email you got was legitimately sent by the person who claims to have sent it. That\u2019s the authentication part. If the email doesn\u2019t pass the DMARC test, it will be handled in line with the DMARC policy set by the receiver (I describe it in detail later on in the article).\"}),/*#__PURE__*/e(\"h4\",{children:\"DMARC & Reports\"}),/*#__PURE__*/e(\"p\",{children:\"That\u2019s the conformance part. DMARC also allows the receiver to send reports to the sender, describing how the message was handled. Was it sent through to the main inbox, did it end up in a spam folder, or was it rejected? And that\u2019s the reporting part. DMARC allows email receivers to check if the incoming email matches what they know about the sender. If it doesn't, it tells the receivers\u2019 servers what to do with the message.\"}),/*#__PURE__*/e(\"h3\",{children:\"Why Does DMARC Matter?\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"There are three reasons why DMARC is so valuable for email users:\"}),/*#__PURE__*/e(\"h4\",{children:\"1. It\u2019s A Safety Measure\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"On the sender\u2019s end, it protects your domain against unauthorized use by phishers who try to steal your personal information this way. On the receiver\u2019s end, it makes it harder for fraudulent emails to reach your main inbox. DMARC protects against domain spoofing, which occurs when somebody who isn\u2019t allowed to use your domain pretends they\u2019re you or work at your company to trick someone into believing they\u2019re you. They do this to steal personal data, such as login details or a credit card number.\"}),/*#__PURE__*/e(\"h4\",{children:\"2. It Helps You To Better Control Your Email Deliverability\"}),/*#__PURE__*/e(\"p\",{children:\"Another perk of employing DMARC is that you\u2019ll better control how many of your emails are legitimate and get to my recipients\u2019 main inboxes. And if someone\u2019s trying to impersonate you and send emails on your behalf.\"}),/*#__PURE__*/e(\"h4\",{children:\"3. It Protects Your Brand Reputation\"}),/*#__PURE__*/e(\"p\",{children:\"If someone\u2019s pretending to be you and trying to trick people into giving them money or some personal info, it reflects badly on your brand. DMARC helps to avoid that.\"}),/*#__PURE__*/e(\"h3\",{children:\"How Does DMARC Work?\"}),/*#__PURE__*/e(\"p\",{children:\"DMARC specifies what has to happen for the message to go through to the inbox and what will happen if the conditions aren\u2019t met. When DMARC is testing an email, 4 things might (or should) happen:\\xa0\"}),/*#__PURE__*/i(\"ol\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"DKIM pass: \"}),\"The additional signature in the header must be validated: the private key matches the public key published in DNS.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"DKIM alignment: \"}),\"The parent domain matches the Header From the domain.\\xa0\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"SPF pass:\"}),\" The receiving server will take the domain included in the Envelope From address and check for an existing SPF record (and it checks if the IP address is included in the SPF record).\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"SPF alignment: \"}),\"The domain in Envelope From matches the domain in the email\u2019s Header From. \"]})})]}),/*#__PURE__*/e(\"p\",{children:\"A message will fail DMARC if it fails both SPF and DKIM. If you forward a message, only the DKIM stays aligned.\"}),/*#__PURE__*/e(\"h3\",{children:\"Aren\u2019t SPF and DKIM Already Used to Protect Email?\"}),/*#__PURE__*/e(\"p\",{children:\"The SPF and DKIM mechanisms both work to protect against unauthorized use. They work in isolation. There is no universal law stating what the receiver should do when such messages fail. Every receiver handles such failed messages differently.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"One receiver may redirect it straight away to the junk folder, while another will run additional tests to determine where it should go. Not to mention, the domain owner never gets any information about his emails and whether they reached the recipient\u2019s main inbox.\"}),/*#__PURE__*/e(\"h4\",{children:\"DMARC & Rules\"}),/*#__PURE__*/e(\"p\",{children:\"DMARC allows us to define our own rules on handling an email that doesn\u2019t comply, reducing the risk of spoofing our domain. It also allows us to report back to the sender. Adding a DMARC record to DNS will allow you to set rules for the incoming emails: should they be quarantined, rejected, or let through?\"}),/*#__PURE__*/e(\"h3\",{children:\"DMARC Policies and Reporting\"}),/*#__PURE__*/i(\"p\",{children:[\"There are three possible DMARC policies: \",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),\"1. None \",/*#__PURE__*/e(\"br\",{}),\"2. Quarantine \",/*#__PURE__*/e(\"br\",{}),\"3. Reject\"]}),/*#__PURE__*/e(\"h4\",{children:\"DMARC & Policy\"}),/*#__PURE__*/e(\"p\",{children:\"In email, this means that with a none policy, all the emails will go through, even if they don\u2019t pass the SPF and/or DKIM test. With a \u2018quarantine\u2019 policy set up, the ones that don\u2019t pass will be redirected to the spam folder. And with a \u2018reject\u2019 policy, they\u2019ll bounce.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"A couple of days after you publish a DMARC record in DNS, you\u2019ll start getting reports from ISPs. Those will include stats about all emails sent from your domain (including those that claim to come from your domain). If you see more emails than you\u2019ve sent, someone else is using your domain.\"}),/*#__PURE__*/e(\"h4\",{children:\"Reports & Health\"}),/*#__PURE__*/e(\"p\",{children:\"The report will give you an overview of where the emails come from and if they\u2019d be halted by a \u201Cquarantine\u201D or \u201Creject\u201D policy. These reports will allow you to assess the health of your outgoing messages. What elements do they include?\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"How were the messages handled (in line with the DMARC policies that have been set up), IP addresses that have used your domain to send emails (as well as how many messages have been sent), and SPF and DKIM results? The reports can be read with a tool such as Postmark or dmarcian.\"}),/*#__PURE__*/e(\"h3\",{children:\"How to Set Up DMARC?\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Set up SPF and DKIM First things first. You must ensure your SPF and DKIM records are set up. If you\u2019ve thought about your deliverability before, chances are you\u2019ve already crossed that off my list.\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Generate a DMARC record. For now, choose the \u2018none\u2019 policy for all emails.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Add your DMARC record to DNS\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Modify the policy according to data as you go Analyze several reports you get, and once you know how to maneuver through the DMARC policies, switch from \u2018none\u2019 to \u2018quarantine\u2019 and later on to reject.\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"A Multi-Layered Approach\"}),/*#__PURE__*/i(\"p\",{children:[\"A combination of SPF, DKIM and DMARC is deemed to be the golden trio of email authentication. SPF and DKIM are better known and more widely used. Right now DMARC is more of a \",/*#__PURE__*/e(t,{href:\"https://learn.microsoft.com/en-us/defender-office-365/email-authentication-dmarc-configure\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"nice-to-have\"})}),\" than a must-have, but this will probably change in the future as more and more people are setting it up for better domain protection against spoofing and phishing.\"]}),/*#__PURE__*/e(\"img\",{alt:\"Inframail\",className:\"framer-image\",height:\"540\",src:\"https://framerusercontent.com/images/K1gnYqkG0SbjGZOl2WHlhtrFo.png\",srcSet:\"https://framerusercontent.com/images/K1gnYqkG0SbjGZOl2WHlhtrFo.png?scale-down-to=512 512w,https://framerusercontent.com/images/K1gnYqkG0SbjGZOl2WHlhtrFo.png?scale-down-to=1024 1024w,https://framerusercontent.com/images/K1gnYqkG0SbjGZOl2WHlhtrFo.png 1920w\",style:{aspectRatio:\"1920 / 1080\"},width:\"960\"}),/*#__PURE__*/e(\"h2\",{children:\"Start Buying Domains Now and Setup Your Email Infrastructure Today\"}),/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(t,{href:\"https://inframail.io/\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Inframail\"})}),\" revolutionizes cold email infrastructure by providing unlimited inboxes at a flat rate. The service helps agencies, recruiters, and sales development representatives scale their outreach efforts efficiently.\\xa0Inframail provides \",/*#__PURE__*/e(t,{href:\"https://inframail.io/\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Microsoft-backed email deliverability\"})}),\", dedicated IP addresses, and automated technical setup. Unlike traditional email providers that charge per inbox and leave users wrestling with technical configurations, Inframail streamlines the entire process.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Automation & Support\"}),/*#__PURE__*/e(\"p\",{children:\"The service automatically:\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Sets up SPF, DKIM, and DMARC\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Offers dedicated email servers for each user\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Provides priority support 16 hours a day\"})})]}),/*#__PURE__*/e(\"p\",{children:\"Inframail handles the complex infrastructure setup so you can focus on reaching more prospects.\"}),/*#__PURE__*/e(\"h3\",{children:\"What Makes Inframail Different?\"}),/*#__PURE__*/i(\"p\",{children:[\"Inframail's \",/*#__PURE__*/e(t,{href:\"https://inframail.io/\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"email infrastructure\"})}),\" tool provides an extensive email setup without technical headaches and per-inbox costs. You can buy domains and set up your email infrastructure today with Inframail. The service helps agencies looking to scale outreach, recruiters connect with candidates, and SDRs drive sales.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Related Reading\"}),/*#__PURE__*/i(\"p\",{children:[\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/email-monitoring-software\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Email Monitoring Software\"})}),/*#__PURE__*/e(\"br\",{}),\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/soft-bounce-reasons\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Soft Bounce Reasons\"})}),/*#__PURE__*/e(\"br\",{}),\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/check-email-deliverability-score\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Check Email Deliverability Score\"})}),/*#__PURE__*/e(\"br\",{}),\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/soft-bounce-vs-hard-bounce-email\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Soft Bounce vs Hard Bounce Email\"})}),/*#__PURE__*/e(\"br\",{}),\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/saleshandy-alternatives\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"SalesHandy Alternatives\"})}),/*#__PURE__*/e(\"br\",{}),\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/glockapps-alternative\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"GlockApps Alternative\"})}),/*#__PURE__*/e(\"br\",{}),\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/mailgenius-alternative\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"MailGenius Alternative\"})}),/*#__PURE__*/e(\"br\",{}),\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/mxtoolbox-alternative\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"MxToolbox Alternative\"})}),/*#__PURE__*/e(\"br\",{}),\"\u2022 \",/*#__PURE__*/e(t,{href:\"https://inframail.io/blog-detail/maildoso-alternatives\",motionChild:!0,nodeId:\"gbFXbRxxW\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Maildoso Alternatives\"})})]})]});\nexport const __FramerMetadata__ = {\"exports\":{\"richText1\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText2\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"__FramerMetadata__\":{\"type\":\"variable\"}}}"],
  "mappings": "yKAAAA,IAAsJ,IAAMC,EAAsBC,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAC,miBAAuhBE,EAAEC,EAAE,CAAC,KAAK,kDAAkD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,gBAAgB,CAAC,CAAC,CAAC,EAAE,iDAAiD,CAAC,CAAC,EAAeJ,EAAE,IAAI,CAAC,SAAS,CAAC,oBAA4BE,EAAEC,EAAE,CAAC,KAAK,wBAAwB,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,sBAAsB,CAAC,CAAC,CAAC,EAAE,oIAAoI,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,mBAAmB,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAsBA,EAAEC,EAAE,CAAC,KAAK,2KAA2K,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,kCAAkC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAsBA,EAAEC,EAAE,CAAC,KAAK,mKAAmK,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,8CAA8C,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAsBA,EAAEC,EAAE,CAAC,KAAK,6JAA6J,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,kCAAkC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAsBA,EAAEC,EAAE,CAAC,KAAK,oNAAoN,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,oEAAoE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,kCAAkC,CAAC,EAAeA,EAAE,MAAM,CAAC,IAAI,8CAA8C,UAAU,eAAe,OAAO,MAAM,IAAI,sEAAsE,OAAO,iWAAiW,MAAM,CAAC,YAAY,aAAa,EAAE,MAAM,MAAM,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAEC,EAAE,CAAC,KAAK,2LAA2L,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,yBAAyB,CAAC,CAAC,CAAC,EAAE,qJAAqJ,CAAC,CAAC,EAAeJ,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,iBAAiB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,kBAAkB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,mBAAmB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mJAA8I,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2CAA2C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sHAAiH,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wDAAwD,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,8CAA2DE,EAAEC,EAAE,CAAC,KAAK,6FAA6F,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,qBAAqB,CAAC,CAAC,CAAC,EAAE,6lBAAmlB,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,wDAAwD,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAEC,EAAE,CAAC,KAAK,iFAAiF,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,mBAAmB,CAAC,CAAC,CAAC,EAAE,glBAA4jB,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,8CAA8C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4EAAuE,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,2KAAiK,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,mMAAmM,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,EAAE,sRAA4Q,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,6HAA6H,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,2FAA2F,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAE,mJAAmJ,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0WAAqW,CAAC,EAAeA,EAAE,MAAM,CAAC,IAAI,YAAY,UAAU,eAAe,OAAO,MAAM,IAAI,qEAAqE,OAAO,iQAAiQ,MAAM,CAAC,YAAY,aAAa,EAAE,MAAM,KAAK,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iBAAiB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,UAAkBE,EAAEC,EAAE,CAAC,KAAK,yEAAyE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,iCAAiC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,CAAC,EAAE,UAAkBA,EAAEC,EAAE,CAAC,KAAK,6DAA6D,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,2BAA2B,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,CAAC,EAAE,UAAkBA,EAAEC,EAAE,CAAC,KAAK,oDAAoD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,kBAAkB,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,CAAC,EAAE,UAAkBA,EAAEC,EAAE,CAAC,KAAK,+DAA+D,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,6BAA6B,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,CAAC,EAAE,UAAkBA,EAAEC,EAAE,CAAC,KAAK,uDAAuD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,qBAAqB,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,CAAC,EAAE,UAAkBA,EAAEC,EAAE,CAAC,KAAK,kEAAkE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,gCAAgC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,CAAC,EAAE,UAAkBA,EAAEC,EAAE,CAAC,KAAK,oEAAoE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,kCAAkC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,CAAC,EAAE,UAAkBA,EAAEC,EAAE,CAAC,KAAK,wDAAwD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,sBAAsB,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,CAAC,EAAE,UAAkBA,EAAEC,EAAE,CAAC,KAAK,+CAA+C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,aAAa,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,CAAC,EAAE,UAAkBA,EAAEC,EAAE,CAAC,KAAK,iFAAiF,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,+CAA+C,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,8CAA8C,CAAC,EAAeA,EAAE,MAAM,CAAC,IAAI,iDAAiD,UAAU,eAAe,OAAO,MAAM,IAAI,sEAAsE,OAAO,iWAAiW,MAAM,CAAC,YAAY,aAAa,EAAE,MAAM,MAAM,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2CAA2C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8OAA8O,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uCAAuC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,EAAE,iGAA8GA,EAAEC,EAAE,CAAC,KAAK,kFAAkF,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,iCAAiC,CAAC,CAAC,CAAC,EAAE,4CAA4C,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAE,qFAAqF,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gBAAgB,CAAC,EAAE,gIAAgI,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,0BAA0B,CAAC,EAAE,+GAA+G,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,+CAA+C,CAAC,EAAE,IAAiBA,EAAEC,EAAE,CAAC,KAAK,uFAAuF,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAkB,CAAC,CAAC,CAAC,EAAE,+HAA+H,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,8BAA8B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4gBAAugB,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sDAAsD,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,4IAAyJE,EAAEC,EAAE,CAAC,KAAK,6FAA6F,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,sCAAsC,CAAC,CAAC,CAAC,EAAE,0UAA0U,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,6CAA6C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,moBAA0mB,CAAC,EAAeA,EAAE,MAAM,CAAC,IAAI,YAAY,UAAU,eAAe,OAAO,MAAM,IAAI,uEAAuE,OAAO,uQAAuQ,MAAM,CAAC,YAAY,aAAa,EAAE,MAAM,KAAK,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iBAAiB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,UAAkBE,EAAEC,EAAE,CAAC,KAAK,iDAAiD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,eAAe,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,CAAC,EAAE,UAAkBA,EAAEC,EAAE,CAAC,KAAK,uDAAuD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,qBAAqB,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,CAAC,EAAE,UAAkBA,EAAEC,EAAE,CAAC,KAAK,+DAA+D,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,6BAA6B,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,CAAC,EAAE,UAAkBA,EAAEC,EAAE,CAAC,KAAK,kEAAkE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,gCAAgC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,CAAC,EAAE,UAAkBA,EAAEC,EAAE,CAAC,KAAK,qEAAqE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,mCAAmC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,CAAC,EAAE,UAAkBA,EAAEC,EAAE,CAAC,KAAK,yEAAyE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uCAAuC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,CAAC,EAAE,UAAkBA,EAAEC,EAAE,CAAC,KAAK,qDAAqD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,mBAAmB,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,CAAC,EAAE,UAAkBA,EAAEC,EAAE,CAAC,KAAK,wDAAwD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,sBAAsB,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,CAAC,EAAE,UAAkBA,EAAEC,EAAE,CAAC,KAAK,6DAA6D,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,2BAA2B,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,CAAC,EAAE,UAAkBA,EAAEC,EAAE,CAAC,KAAK,qDAAqD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,mBAAmB,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,CAAC,EAAE,UAAkBA,EAAEC,EAAE,CAAC,KAAK,8DAA8D,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,4BAA4B,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,CAAC,EAAE,UAAkBA,EAAEC,EAAE,CAAC,KAAK,uEAAuE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,qCAAqC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,CAAC,EAAE,UAAkBA,EAAEC,EAAE,CAAC,KAAK,sDAAsD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,oBAAoB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,kCAAkC,CAAC,EAAeA,EAAE,MAAM,CAAC,IAAI,iDAAiD,UAAU,eAAe,OAAO,MAAM,IAAI,sEAAsE,OAAO,iWAAiW,MAAM,CAAC,YAAY,aAAa,EAAE,MAAM,MAAM,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,iSAAySE,EAAEC,EAAE,CAAC,KAAK,+FAA+F,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,mCAA8B,CAAC,CAAC,CAAC,EAAE,sEAAsE,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,2EAA2E,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qmBAA2lB,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qDAAqD,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,wNAAqOE,EAAEC,EAAE,CAAC,KAAK,0EAA0E,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,oCAAoC,CAAC,CAAC,CAAC,EAAE,mDAAmD,CAAC,CAAC,EAAeJ,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,6BAA6B,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,6BAA6B,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,maAAma,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2WAA4V,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6EAA6E,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sNAA4M,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0OAAgO,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6DAA6D,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,wBAAqCE,EAAEC,EAAE,CAAC,KAAK,2HAA2H,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,4BAA4B,CAAC,CAAC,CAAC,EAAE,8SAA8S,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,ibAAua,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gEAAgE,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,kOAAgOE,EAAEC,EAAE,CAAC,KAAK,6IAA6I,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,kCAAkC,CAAC,CAAC,CAAC,EAAE,8LAAoL,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,wFAAwF,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0UAAgU,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4YAAoW,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2BAA2B,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,yBAAsCE,EAAEC,EAAE,CAAC,KAAK,+EAA+E,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,iCAAiC,CAAC,CAAC,CAAC,EAAE,4YAAoW,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,olBAAijB,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,8BAA2CE,EAAEC,EAAE,CAAC,KAAK,0FAA0F,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,6BAA6B,CAAC,CAAC,CAAC,EAAE,0WAAsV,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,kVAAmU,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4CAAuC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+RAAqR,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8CAAyC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oGAAoG,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,WAAW,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,oBAAoB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,iBAAiB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,mBAAgCE,EAAEC,EAAE,CAAC,KAAK,qIAAqI,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,wBAAwB,CAAC,CAAC,CAAC,EAAE,qGAAqG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,oCAA+B,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,uBAAoCE,EAAEC,EAAE,CAAC,KAAK,yGAAyG,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,mBAAmB,CAAC,CAAC,CAAC,EAAE,oTAA+S,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,4BAAuB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,0EAAuFE,EAAEC,EAAE,CAAC,KAAK,yGAAyG,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,gCAAgC,CAAC,CAAC,CAAC,EAAE,2UAAsU,CAAC,CAAC,EAAeF,EAAE,MAAM,CAAC,IAAI,YAAY,UAAU,eAAe,OAAO,MAAM,IAAI,qEAAqE,OAAO,iQAAiQ,MAAM,CAAC,YAAY,aAAa,EAAE,MAAM,KAAK,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iBAAiB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,UAAkBE,EAAEC,EAAE,CAAC,KAAK,6DAA6D,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,2BAA2B,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,CAAC,EAAE,UAAkBA,EAAEC,EAAE,CAAC,KAAK,uDAAuD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,qBAAqB,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,CAAC,EAAE,UAAkBA,EAAEC,EAAE,CAAC,KAAK,oEAAoE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,kCAAkC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,CAAC,EAAE,UAAkBA,EAAEC,EAAE,CAAC,KAAK,oEAAoE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,kCAAkC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,CAAC,EAAE,UAAkBA,EAAEC,EAAE,CAAC,KAAK,2DAA2D,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,yBAAyB,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,CAAC,EAAE,UAAkBA,EAAEC,EAAE,CAAC,KAAK,yDAAyD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,CAAC,EAAE,UAAkBA,EAAEC,EAAE,CAAC,KAAK,0DAA0D,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,wBAAwB,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,CAAC,EAAE,UAAkBA,EAAEC,EAAE,CAAC,KAAK,yDAAyD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,CAAC,EAAE,UAAkBA,EAAEC,EAAE,CAAC,KAAK,yDAAyD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,oEAAoE,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,iCAA8CE,EAAEC,EAAE,CAAC,KAAK,wBAAwB,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,sBAAsB,CAAC,CAAC,CAAC,EAAE,6LAA6L,CAAC,CAAC,EAAeJ,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,UAAU,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,YAAY,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,kBAAkB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+CAA+C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sYAAsY,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4DAA4D,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,+GAA4HE,EAAEC,EAAE,CAAC,KAAK,wBAAwB,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,WAAW,CAAC,CAAC,CAAC,EAAE,mIAAmI,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeC,EAAuBL,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAC,sgBAAmhBE,EAAEC,EAAE,CAAC,KAAK,kDAAkD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,gBAAgB,CAAC,CAAC,CAAC,EAAE,0FAA0F,CAAC,CAAC,EAAeJ,EAAE,IAAI,CAAC,SAAS,CAAC,eAA4BE,EAAEC,EAAE,CAAC,KAAK,wBAAwB,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,sBAAsB,CAAC,CAAC,CAAC,EAAE,qMAAqM,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,mBAAmB,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAsBA,EAAEC,EAAE,CAAC,KAAK,oOAAoO,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,yDAAyD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAsBA,EAAEC,EAAE,CAAC,KAAK,gNAAgN,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,+CAA+C,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAsBA,EAAEC,EAAE,CAAC,KAAK,oLAAoL,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,iCAAiC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAsBA,EAAEC,EAAE,CAAC,KAAK,yOAAyO,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,oEAAoE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,yDAAyD,CAAC,EAAeA,EAAE,MAAM,CAAC,IAAI,8EAA8E,UAAU,eAAe,OAAO,MAAM,IAAI,sEAAsE,OAAO,iWAAiW,MAAM,CAAC,YAAY,aAAa,EAAE,MAAM,MAAM,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kTAA6S,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wBAAwB,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,mCAAmC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,oBAAoB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,4BAA4B,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,wBAAwB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,2BAA2B,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,yBAAyB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,cAAc,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gUAAgU,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gEAAgE,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4WAA4W,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,oCAAoC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,0CAA0C,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,yCAAyC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,8BAA8B,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mBAAmB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,sFAAmGE,EAAEC,EAAE,CAAC,KAAK,yFAAyF,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,cAAc,CAAC,CAAC,CAAC,EAAE,qOAAqO,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,sDAAsD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uIAAuI,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,4BAA4B,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,aAAa,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAC,KAAkBE,EAAEC,EAAE,CAAC,KAAK,8DAA8D,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,YAAY,CAAC,CAAC,CAAC,EAAE,WAAW,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,2CAA2C,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,wBAAwB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,6CAA6C,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2BAA2B,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,6BAA6B,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,oDAAoD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iJAAiJ,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gCAAgC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,2EAA2E,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,iDAAiD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yDAAyD,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAEC,EAAE,CAAC,KAAK,4DAA4D,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,iBAAiB,CAAC,CAAC,CAAC,EAAE,+cAA+c,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,qBAAqB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kZAAkZ,CAAC,EAAeA,EAAE,MAAM,CAAC,IAAI,YAAY,UAAU,eAAe,OAAO,MAAM,IAAI,qEAAqE,OAAO,iQAAiQ,MAAM,CAAC,YAAY,aAAa,EAAE,MAAM,KAAK,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iBAAiB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,UAAkBE,EAAEC,EAAE,CAAC,KAAK,yEAAyE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,iCAAiC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,CAAC,EAAE,UAAkBA,EAAEC,EAAE,CAAC,KAAK,6DAA6D,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,2BAA2B,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,CAAC,EAAE,UAAkBA,EAAEC,EAAE,CAAC,KAAK,oDAAoD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,kBAAkB,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,CAAC,EAAE,UAAkBA,EAAEC,EAAE,CAAC,KAAK,+DAA+D,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,6BAA6B,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,CAAC,EAAE,UAAkBA,EAAEC,EAAE,CAAC,KAAK,uDAAuD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,qBAAqB,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,CAAC,EAAE,UAAkBA,EAAEC,EAAE,CAAC,KAAK,kEAAkE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,gCAAgC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,CAAC,EAAE,UAAkBA,EAAEC,EAAE,CAAC,KAAK,oEAAoE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,kCAAkC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,CAAC,EAAE,UAAkBA,EAAEC,EAAE,CAAC,KAAK,wDAAwD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,sBAAsB,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,CAAC,EAAE,UAAkBA,EAAEC,EAAE,CAAC,KAAK,+CAA+C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,aAAa,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,+CAA+C,CAAC,EAAeA,EAAE,MAAM,CAAC,IAAI,0EAA0E,UAAU,eAAe,OAAO,MAAM,IAAI,sEAAsE,OAAO,iWAAiW,MAAM,CAAC,YAAY,aAAa,EAAE,MAAM,MAAM,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,uMAA+ME,EAAEC,EAAE,CAAC,KAAK,qJAAqJ,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,iBAAiB,CAAC,CAAC,CAAC,EAAE,uPAAkP,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,gBAAgB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iNAA4M,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iBAAiB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wQAAmQ,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4DAA4D,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8GAA8G,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gDAAgD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,ogBAAqf,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,aAAa,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kKAA6J,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sCAAsC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qFAAqF,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,sDAAsD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,8FAA8F,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,4GAA4G,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,mGAAmG,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mKAA8J,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,6PAAqQE,EAAEC,EAAE,CAAC,KAAK,gHAAgH,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,sBAAsB,CAAC,CAAC,CAAC,EAAE,8LAA8L,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,kCAAkC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAEC,EAAE,CAAC,KAAK,kDAAkD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,YAAY,CAAC,CAAC,CAAC,EAAE,whBAAygB,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,eAAe,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2BAA2B,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,wCAAwC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,mCAAmC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,yCAAoC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kFAAkF,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,iDAAiD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,2DAA2D,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uCAAuC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,6lBAA0mBE,EAAEC,EAAE,CAAC,KAAK,+DAA+D,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,aAAa,CAAC,CAAC,CAAC,EAAE,oRAA0Q,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,qCAAqC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4MAAuM,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,0FAA0F,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,mEAAmE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,4BAA4B,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,wEAAwE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,0CAA0C,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,MAAM,CAAC,IAAI,YAAY,UAAU,eAAe,OAAO,MAAM,IAAI,uEAAuE,OAAO,uQAAuQ,MAAM,CAAC,YAAY,aAAa,EAAE,MAAM,KAAK,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iBAAiB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,UAAkBE,EAAEC,EAAE,CAAC,KAAK,iDAAiD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,eAAe,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,CAAC,EAAE,UAAkBA,EAAEC,EAAE,CAAC,KAAK,uDAAuD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,qBAAqB,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,CAAC,EAAE,UAAkBA,EAAEC,EAAE,CAAC,KAAK,+DAA+D,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,6BAA6B,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,CAAC,EAAE,UAAkBA,EAAEC,EAAE,CAAC,KAAK,kEAAkE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,gCAAgC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,CAAC,EAAE,UAAkBA,EAAEC,EAAE,CAAC,KAAK,qEAAqE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,mCAAmC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,CAAC,EAAE,UAAkBA,EAAEC,EAAE,CAAC,KAAK,yEAAyE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uCAAuC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,CAAC,EAAE,UAAkBA,EAAEC,EAAE,CAAC,KAAK,qDAAqD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,mBAAmB,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,CAAC,EAAE,UAAkBA,EAAEC,EAAE,CAAC,KAAK,wDAAwD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,sBAAsB,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,CAAC,EAAE,UAAkBA,EAAEC,EAAE,CAAC,KAAK,6DAA6D,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,2BAA2B,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,CAAC,EAAE,UAAkBA,EAAEC,EAAE,CAAC,KAAK,qDAAqD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,mBAAmB,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,CAAC,EAAE,UAAkBA,EAAEC,EAAE,CAAC,KAAK,8DAA8D,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,4BAA4B,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,CAAC,EAAE,UAAkBA,EAAEC,EAAE,CAAC,KAAK,uEAAuE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,qCAAqC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,CAAC,EAAE,UAAkBA,EAAEC,EAAE,CAAC,KAAK,sDAAsD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,oBAAoB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,EAAeA,EAAE,MAAM,CAAC,IAAI,oEAAoE,UAAU,eAAe,OAAO,MAAM,IAAI,sEAAsE,OAAO,iWAAiW,MAAM,CAAC,YAAY,aAAa,EAAE,MAAM,MAAM,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8EAAoE,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+DAA+D,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,mBAAmB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,sBAAsB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6NAAwN,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sDAAsD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+NAA0N,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,OAAoBE,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,qDAAqD,CAAC,EAAE,sGAAmHA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,yDAAyD,CAAC,EAAE,6KAA0LA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,8EAA8E,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4CAA4C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4dAA4d,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,YAAY,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4cAA4c,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6CAA6C,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0QAAqQ,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iBAAiB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0OAAqO,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2BAA2B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6RAAmR,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uBAAuB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4UAA4U,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4BAA4B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qIAAqI,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4BAA4B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8KAA8K,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,YAAY,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAsBA,EAAEC,EAAE,CAAC,KAAK,6JAA6J,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,qBAAqB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,cAAc,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,iBAAiB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qEAAqE,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uBAAuB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mIAAmI,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uBAAuB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0JAA0J,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uBAAuB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iTAAiT,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0BAA0B,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,4CAAyDE,EAAEC,EAAE,CAAC,KAAK,wDAAwD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,+BAA+B,CAAC,CAAC,CAAC,EAAE,4LAA4L,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,uBAAuB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sQAAsQ,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qBAAqB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6MAA6M,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2BAA2B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2VAA2V,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yBAAyB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oLAAoL,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yBAAyB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mOAAmO,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4BAA4B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gGAAgG,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,aAAa,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,oBAAoB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,sBAAsB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,MAAM,CAAC,IAAI,YAAY,UAAU,eAAe,OAAO,MAAM,IAAI,qEAAqE,OAAO,iQAAiQ,MAAM,CAAC,YAAY,aAAa,EAAE,MAAM,KAAK,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oEAAoE,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAEC,EAAE,CAAC,KAAK,wBAAwB,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,WAAW,CAAC,CAAC,CAAC,EAAE,mjBAAgkBF,EAAEC,EAAE,CAAC,KAAK,wBAAwB,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,6BAA6B,CAAC,CAAC,CAAC,EAAE,6DAA6D,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,oDAAoD,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,qNAAkOE,EAAEC,EAAE,CAAC,KAAK,wBAAwB,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,WAAW,CAAC,CAAC,CAAC,EAAE,kKAAkK,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,yCAAyC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,kHAA+HE,EAAEC,EAAE,CAAC,KAAK,oDAAoD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,2BAA2B,CAAC,CAAC,CAAC,EAAE,uQAAkQ,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,iBAAiB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,UAAkBE,EAAEC,EAAE,CAAC,KAAK,6DAA6D,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,2BAA2B,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,CAAC,EAAE,UAAkBA,EAAEC,EAAE,CAAC,KAAK,uDAAuD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,qBAAqB,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,CAAC,EAAE,UAAkBA,EAAEC,EAAE,CAAC,KAAK,oEAAoE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,kCAAkC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,CAAC,EAAE,UAAkBA,EAAEC,EAAE,CAAC,KAAK,oEAAoE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,kCAAkC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,CAAC,EAAE,UAAkBA,EAAEC,EAAE,CAAC,KAAK,2DAA2D,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,yBAAyB,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,CAAC,EAAE,UAAkBA,EAAEC,EAAE,CAAC,KAAK,yDAAyD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,CAAC,EAAE,UAAkBA,EAAEC,EAAE,CAAC,KAAK,0DAA0D,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,wBAAwB,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,CAAC,EAAE,UAAkBA,EAAEC,EAAE,CAAC,KAAK,yDAAyD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,CAAC,EAAE,UAAkBA,EAAEC,EAAE,CAAC,KAAK,yDAAyD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeE,EAAuBN,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAC,yOAAsPE,EAAEC,EAAE,CAAC,KAAK,kDAAkD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,gBAAgB,CAAC,CAAC,CAAC,EAAE,+rBAA+rB,CAAC,CAAC,EAAeJ,EAAE,IAAI,CAAC,SAAS,CAAC,eAA4BE,EAAEC,EAAE,CAAC,KAAK,wBAAwB,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,sBAAsB,CAAC,CAAC,CAAC,EAAE,yJAAyJ,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,mBAAmB,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAsBA,EAAEC,EAAE,CAAC,KAAK,wKAAwK,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,6CAA6C,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAsBA,EAAEC,EAAE,CAAC,KAAK,wLAAwL,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,+DAA+D,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAsBA,EAAEC,EAAE,CAAC,KAAK,qLAAqL,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,mDAAmD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAsBA,EAAEC,EAAE,CAAC,KAAK,2MAA2M,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,oEAAoE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,6CAA6C,CAAC,EAAeA,EAAE,MAAM,CAAC,IAAI,sCAAsC,UAAU,eAAe,OAAO,MAAM,IAAI,uEAAuE,OAAO,qWAAqW,MAAM,CAAC,YAAY,aAAa,EAAE,MAAM,MAAM,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,uFAAoGE,EAAEC,EAAE,CAAC,KAAK,qEAAqE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,wKAAwK,CAAC,CAAC,EAAeJ,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,YAAY,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6EAA6E,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gBAAgB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4TAAuT,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qBAAqB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8KAA8K,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,cAAc,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mqBAAypB,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mBAAmB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,kLAA+LE,EAAEC,EAAE,CAAC,KAAK,wKAAwK,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,gCAAgC,CAAC,CAAC,CAAC,EAAE,mXAAyW,CAAC,CAAC,EAAeJ,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,iBAAiB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,UAAU,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,iBAAiB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,aAAa,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qMAAsL,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oFAAoF,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,siBAAkhB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2QAAiQ,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,WAAW,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,SAAS,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,2CAA2C,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6CAA6C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+KAAqK,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,KAAK,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,QAAQ,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gfAAse,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gDAAgD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gdAA4b,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,wBAAwB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,cAAc,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gBAAgB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yWAA0V,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,YAAY,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sgBAAkf,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0BAA0B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2MAA2M,CAAC,EAAeA,EAAE,MAAM,CAAC,IAAI,YAAY,UAAU,eAAe,OAAO,MAAM,IAAI,qEAAqE,OAAO,iQAAiQ,MAAM,CAAC,YAAY,aAAa,EAAE,MAAM,KAAK,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iBAAiB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,UAAkBE,EAAEC,EAAE,CAAC,KAAK,yEAAyE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,iCAAiC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,CAAC,EAAE,UAAkBA,EAAEC,EAAE,CAAC,KAAK,6DAA6D,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,2BAA2B,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,CAAC,EAAE,UAAkBA,EAAEC,EAAE,CAAC,KAAK,oDAAoD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,kBAAkB,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,CAAC,EAAE,UAAkBA,EAAEC,EAAE,CAAC,KAAK,+DAA+D,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,6BAA6B,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,CAAC,EAAE,UAAkBA,EAAEC,EAAE,CAAC,KAAK,uDAAuD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,qBAAqB,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,CAAC,EAAE,UAAkBA,EAAEC,EAAE,CAAC,KAAK,kEAAkE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,gCAAgC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,CAAC,EAAE,UAAkBA,EAAEC,EAAE,CAAC,KAAK,oEAAoE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,kCAAkC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,CAAC,EAAE,UAAkBA,EAAEC,EAAE,CAAC,KAAK,wDAAwD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,sBAAsB,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,CAAC,EAAE,UAAkBA,EAAEC,EAAE,CAAC,KAAK,iFAAiF,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,+CAA+C,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,+DAA+D,CAAC,EAAeA,EAAE,MAAM,CAAC,IAAI,qCAAqC,UAAU,eAAe,OAAO,OAAO,IAAI,uEAAuE,OAAO,mcAAmc,MAAM,CAAC,YAAY,aAAa,EAAE,MAAM,MAAM,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uKAAuK,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kCAA6B,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,uKAAoLE,EAAEC,EAAE,CAAC,KAAK,gHAAgH,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,4CAA4C,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,oCAAoC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oQAAoQ,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qBAAqB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,WAAW,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oJAAoJ,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iBAAiB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,4MAAyNE,EAAEC,EAAE,CAAC,KAAK,2CAA2C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,YAAY,CAAC,CAAC,CAAC,EAAE,0KAA0K,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0mBAA0mB,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iBAAiB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qVAAqV,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sCAAsC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wOAAwO,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,KAAK,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,MAAM,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,OAAO,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oXAAiYE,EAAEC,EAAE,CAAC,KAAK,qKAAqK,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,iBAAiB,CAAC,CAAC,CAAC,EAAE,qBAAqB,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,yBAAyB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,EAAE,2CAAwDA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,4NAA4N,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,6LAA6L,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gEAAgE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAC,qEAAkFE,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8PAAyP,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gBAAgB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6OAA6O,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,oBAAoB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,UAAU,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6bAAwb,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,2BAA2B,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,SAAS,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,cAAc,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,sBAAsB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oBAAoB,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,mJAAmJ,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,mMAAmM,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,uHAAuH,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,+BAA4CE,EAAEC,EAAE,CAAC,KAAK,wDAAwD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,MAAM,CAAC,CAAC,CAAC,EAAE,sFAAsF,CAAC,CAAC,EAAeJ,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,mHAAmH,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,4GAA4G,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,kPAAkP,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,6DAA6D,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qGAAqG,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,yDAAyD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,kIAAkI,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gBAAgB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yFAAyF,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,QAAQ,CAAC,EAAE,yNAAsOA,EAAEC,EAAE,CAAC,KAAK,0BAA0B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,kBAAkB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,EAAE,mEAAmE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,UAAU,CAAC,EAAE,kDAAkD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qJAAqJ,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6BAA6B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yWAAyW,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8BAA8B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uDAAuD,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,mBAAmB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,iBAAiB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yQAAyQ,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mBAAmB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qHAAqH,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,SAAS,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,MAAM,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,cAAc,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qBAAqB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iJAAiJ,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,WAAW,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4DAA4D,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,sCAAsC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gFAAgF,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,6FAA6F,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,4FAA4F,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iGAAiG,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,2GAA2G,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,uIAAuI,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,mEAAmE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,UAAU,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wSAAwS,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0BAA0B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,keAAme,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yNAAyN,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4FAA4F,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,OAAO,CAAC,EAAE,wDAAwD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,MAAM,CAAC,EAAE,wDAAwD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,KAAK,CAAC,EAAE,kHAAkH,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,MAAM,CAAC,EAAE,mJAAmJ,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,MAAM,CAAC,EAAE,2OAA2O,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,UAAU,CAAC,EAAE,2MAA2M,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,EAAE,iPAAiP,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,MAAM,CAAC,EAAE,mGAAmG,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,icAAic,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,eAAe,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,mGAAgHE,EAAEC,EAAE,CAAC,KAAK,sEAAsE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,gBAAgB,CAAC,CAAC,CAAC,EAAE,kRAAkR,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,yBAAyB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yLAAyL,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,yHAAyH,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,yGAAyG,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,0JAA0J,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8BAA8B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2LAA2L,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oKAAiLE,EAAEC,EAAE,CAAC,KAAK,qEAAqE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,mBAAmB,CAAC,CAAC,CAAC,EAAE,8OAA8O,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,8DAA8D,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kPAAkP,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+CAA+C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+RAA+R,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gBAAgB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,ohBAAohB,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gBAAgB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gQAAgQ,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,cAAc,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qEAAqE,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,mEAAmE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,8EAA8E,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,2CAA2C,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2GAA2G,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mBAAmB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oOAA+N,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wFAAwF,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gHAAgH,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gFAAgF,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gEAAgE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,8GAA8G,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,yFAAyF,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,oIAAoI,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wBAAwB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uGAAuG,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6DAA6D,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sRAAsR,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,aAAa,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yEAAyE,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,IAAI,CAAC,EAAE,UAAU,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,IAAI,CAAC,EAAE,oBAAoB,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,IAAI,CAAC,EAAE,SAAS,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,KAAK,CAAC,EAAE,UAAU,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,KAAK,CAAC,EAAE,mDAAmD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,IAAI,CAAC,EAAE,uBAAuB,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,KAAK,CAAC,EAAE,qBAAqB,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,KAAK,CAAC,EAAE,aAAa,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,KAAK,CAAC,EAAE,qDAAqD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,MAAM,CAAC,EAAE,WAAW,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,IAAI,CAAC,EAAE,gCAAgC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yBAAyB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2HAA2H,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mPAAmP,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6DAA6D,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,IAAI,CAAC,EAAE,gCAAgC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,IAAI,CAAC,EAAE,cAAc,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,IAAI,CAAC,EAAE,4EAA4E,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,IAAI,CAAC,EAAE,6CAA6C,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,IAAI,CAAC,EAAE,2DAA2D,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,IAAI,CAAC,EAAE,iDAAiD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,IAAI,CAAC,EAAE,mEAAmE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,IAAI,CAAC,EAAE,2DAA2D,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,KAAK,CAAC,EAAE,2BAA2B,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wBAAwB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sMAAsM,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yCAAyC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,+BAA+B,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,+DAA+D,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAC,eAA4BE,EAAEC,EAAE,CAAC,KAAK,wCAAwC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,UAAU,CAAC,CAAC,CAAC,EAAE,4BAA4B,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,uCAAuC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8BAA8B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oPAAoP,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iDAAiD,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,mBAAmB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,yDAAyD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,2BAA2B,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qGAAqG,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,2BAA2B,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mBAAmB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,waAAwa,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kBAAkB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8MAA8M,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iBAAiB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,UAAkBE,EAAEC,EAAE,CAAC,KAAK,iDAAiD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,eAAe,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,CAAC,EAAE,UAAkBA,EAAEC,EAAE,CAAC,KAAK,uDAAuD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,qBAAqB,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,CAAC,EAAE,UAAkBA,EAAEC,EAAE,CAAC,KAAK,+DAA+D,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,6BAA6B,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,CAAC,EAAE,UAAkBA,EAAEC,EAAE,CAAC,KAAK,kEAAkE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,gCAAgC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,CAAC,EAAE,UAAkBA,EAAEC,EAAE,CAAC,KAAK,qEAAqE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,mCAAmC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,CAAC,EAAE,UAAkBA,EAAEC,EAAE,CAAC,KAAK,yEAAyE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uCAAuC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,CAAC,EAAE,UAAkBA,EAAEC,EAAE,CAAC,KAAK,qDAAqD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,mBAAmB,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,CAAC,EAAE,UAAkBA,EAAEC,EAAE,CAAC,KAAK,wDAAwD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,sBAAsB,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,CAAC,EAAE,UAAkBA,EAAEC,EAAE,CAAC,KAAK,6DAA6D,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,2BAA2B,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,CAAC,EAAE,UAAkBA,EAAEC,EAAE,CAAC,KAAK,qDAAqD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,mBAAmB,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,CAAC,EAAE,UAAkBA,EAAEC,EAAE,CAAC,KAAK,8DAA8D,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,4BAA4B,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,CAAC,EAAE,UAAkBA,EAAEC,EAAE,CAAC,KAAK,uEAAuE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,qCAAqC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,CAAC,EAAE,UAAkBA,EAAEC,EAAE,CAAC,KAAK,sDAAsD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,oBAAoB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,mDAAmD,CAAC,EAAeA,EAAE,MAAM,CAAC,IAAI,iCAAiC,UAAU,eAAe,OAAO,MAAM,IAAI,sEAAsE,OAAO,iWAAiW,MAAM,CAAC,YAAY,aAAa,EAAE,MAAM,MAAM,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6TAA6T,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8TAAoT,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iBAAiB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8bAA+a,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4BAA4B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mEAAmE,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mCAA8B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,ihBAAwf,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6DAA6D,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wOAAyN,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sCAAsC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6KAAwK,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8MAAyM,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,oHAAoH,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,2DAA2D,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,EAAE,wLAAwL,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,kFAA6E,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iHAAiH,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yDAAoD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wPAAwP,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gRAA2Q,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,eAAe,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0TAAqT,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8BAA8B,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,4CAAyDE,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,WAAwBA,EAAE,KAAK,CAAC,CAAC,EAAE,iBAA8BA,EAAE,KAAK,CAAC,CAAC,EAAE,WAAW,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gBAAgB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uTAAoR,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gTAAsS,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kBAAkB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2QAAkP,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0RAA0R,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,sNAA4M,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,sFAA4E,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,kCAAkC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,6NAAyM,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0BAA0B,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,kLAA+LE,EAAEC,EAAE,CAAC,KAAK,6FAA6F,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,cAAc,CAAC,CAAC,CAAC,EAAE,sKAAsK,CAAC,CAAC,EAAeF,EAAE,MAAM,CAAC,IAAI,YAAY,UAAU,eAAe,OAAO,MAAM,IAAI,qEAAqE,OAAO,iQAAiQ,MAAM,CAAC,YAAY,aAAa,EAAE,MAAM,KAAK,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oEAAoE,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAEC,EAAE,CAAC,KAAK,wBAAwB,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,WAAW,CAAC,CAAC,CAAC,EAAE,0OAAuPF,EAAEC,EAAE,CAAC,KAAK,wBAAwB,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uCAAuC,CAAC,CAAC,CAAC,EAAE,sNAAsN,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4BAA4B,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,8BAA8B,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,8CAA8C,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,0CAA0C,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iGAAiG,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,eAA4BE,EAAEC,EAAE,CAAC,KAAK,wBAAwB,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,sBAAsB,CAAC,CAAC,CAAC,EAAE,yRAAyR,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,iBAAiB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,UAAkBE,EAAEC,EAAE,CAAC,KAAK,6DAA6D,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,2BAA2B,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,CAAC,EAAE,UAAkBA,EAAEC,EAAE,CAAC,KAAK,uDAAuD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,qBAAqB,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,CAAC,EAAE,UAAkBA,EAAEC,EAAE,CAAC,KAAK,oEAAoE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,kCAAkC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,CAAC,EAAE,UAAkBA,EAAEC,EAAE,CAAC,KAAK,oEAAoE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,kCAAkC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,CAAC,EAAE,UAAkBA,EAAEC,EAAE,CAAC,KAAK,2DAA2D,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,yBAAyB,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,CAAC,EAAE,UAAkBA,EAAEC,EAAE,CAAC,KAAK,yDAAyD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,CAAC,EAAE,UAAkBA,EAAEC,EAAE,CAAC,KAAK,0DAA0D,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,wBAAwB,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,CAAC,EAAE,UAAkBA,EAAEC,EAAE,CAAC,KAAK,yDAAyD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,CAAC,EAAE,UAAkBA,EAAEC,EAAE,CAAC,KAAK,yDAAyD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAC50oJG,EAAqB,CAAC,QAAU,CAAC,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,SAAW,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,mBAAqB,CAAC,KAAO,UAAU,CAAC,CAAC",
  "names": ["init_ssg_sandbox_shims", "richText", "u", "x", "p", "Link", "motion", "richText1", "richText2", "__FramerMetadata__"]
}
