Re: Authorized Issuer Lists

Great thread and it’s going to take me a while to digest it all.



Thanks for accepting this input as a newcomer.



Steve what resonates with me… it’s up to the verifier for what data they trust a credential issuer.   I see it as important for the verifiers to be able to communicate to the holder in a standard way whom they accept as issuers for specific claims/credentials. For example,

* what issuers I trust for a fair trade certification

* what issuers I trust for product planogram data



These may not be tied specifically to any higher level governance, and might be a declaration of company or individual policy.



A verifier may want to communicate this to the holder via some references(links) to a machine readable governance framework/trust registry/ecosystem, which of course must also be verifiable.  For example:

  *   Proof over ownership over a GTIN that complies with the GS1 Digital License Ecosystem rules
  *   GoodProduct proof from the XXXGoodProduct Aliiance rules
  *   Bank Transfer information must be provided by XXX Certified bank.



It necessary to have this communicated during a credential/presentation exchange process (i.e. we only accept email proof credentials from A,B,C and that’s why we aren’t accepting the one from D in your wallet). But it’s probably prudent to have a standard way to communicate this ahead of the transaction time much like these kind of pages do for humans  (https://www.dmv.ca.gov/portal/driver-licenses-identification-cards/real-id/how-do-i-get-a-real-id/real-id-checklist/ )  since obtaining the credentials may not be instantaneous or free.



As use cases grow, I could see many verifiers applying both of these methods simultaneously.  Chaining is important.  A credential needs to have the ability to point upstream towards an authorization chain for both of these mechanisms to work.



Steve, the idea of volumes here is intriguing and I’m going to have to think about how that might apply in supply chain.  (e.g. 200 likes from these sources or  a specific certification from XYZ).


From: steve.e.magennis@gmail.com <steve.e.magennis@gmail.com>
Date: Monday, August 15, 2022 at 8:56 AM
To: 'Phillip Long' <pdlong2@asu.edu>, 'W3C Credentials CG' <public-credentials@w3.org>
Subject: RE: Authorized Issuer Lists
CAUTION: This email originated from outside of the organization. Do not click links or open attachments unless you recognize the sender and know the content is safe.

I’ve missed parts of this great thread, but I’ve seen at least two folks now that have made the distinction between a credential issued by a recognized trusted authority and one that is issued by an authority that doesn’t have the same magnitude of trusted reputation (my family members, Facebook likes, a community member that is not recognized outside my community). Ultimately the verifier decides if an Amazon prime delivery receipt, or my driver’s license is an acceptable form of address verification and if 200 Facebook likes outweighs a formal complaint filed with the Better Business Bureau. I honestly think these are two different beasts and are not entirely fungible when it comes to usage.

$0.02
-S

From: Phillip Long <pdlong2@asu.edu>
Sent: Monday, August 15, 2022 8:23 AM
To: W3C Credentials CG <public-credentials@w3.org>
Subject: Re: Authorized Issuer Lists

Manu - you’ve hit a very significant nerve in the ecosystem.  It has generated a rich set of responses over a period of less than 24 hour! There is a lot to parse as Kerri noted, along with several others. The interests and concerns for formal institutional issuers may overlap with others but in many respects the differences from their interests wrt other use cases are important.

One of the attributes that tends to be overlooked, though I’m very happy to see it was picked up in the richness of the thread here, is the importance of how the uncredentialed can participate and get value from this ecosystem. Here uncredentialied means those who have not been able to or for whatever reasons simply have not participated in a formal training experience culminating in a credential issued to acknowledge their completion of an achievement by a formal institution or organization.

That’s one of the primary use cases for the Verifiable Credential<https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2FWebOfTrustInfo%2Frwot11-the-hague%2Fblob%2Fmaster%2Fadvance-readings%2Fendorsements.md&data=05%7C01%7Cpdietrich%40gs1us.org%7C61ef04ecc41c4d3838d308da7ed6c464%7C862adc931361478abb32c28d2d00df8d%7C0%7C0%7C637961758158964533%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=3YnM3nwyBzRFpY7U2wSGb5HSAbZ82%2Ftt3WBPR1nkEMQ%3D&reserved=0> Dmitri, Kerri, and i have contributed a paper to RWOT, mentioned at the outset by Manu’s kick off message.

Steve Cappell introduced the linked data model leading to trust chains, though the notion that a trust chain will provide the provenance to a initial trust anchor is problematic, at least in the case of modeling this problem within a community seeking corroboration of self-issued claims (supported by different examples of evidence of their performance).  In this case that seems to be more meaningful is the graph of trust ensemble and not a definitive trust anchor.

in order for the formally uncredentialed community to have an entry into this ecosystem some variant of the trust graph of endorsers with their bona fides clearly detailed (perhaps with the endorsers own independence evidence to contribute) is a step toward validating (in Joosten’s terms)  the endorsee’s claim has merit  Illuminating how we might accomplihs this is a crucial step toward inclusion and equity for participants otherwise left out of LER/VC ecosystem.

And +1 to Joosten’s suggestion we consider the idea of Self-Sovereign Trust!

Phil


Orchard - Adaptive Learning Library & LxP Consultant
EdPlus/ASU
https://edplus.asu.edu/what-we-do/orchard-adaptive-learning-experience<https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fedplus.asu.edu%2Fwhat-we-do%2Forchard-adaptive-learning-experience&data=05%7C01%7Cpdietrich%40gs1us.org%7C61ef04ecc41c4d3838d308da7ed6c464%7C862adc931361478abb32c28d2d00df8d%7C0%7C0%7C637961758158964533%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=r%2BzsOObNNbUFk4kclh5UL3NIXp8t453PaWZ2VvbQWbc%3D&reserved=0>
e: pdlong2@asu.edu<mailto:pdlong2@asu.edu>
—
LER Network Facilitator
T3 Innovation Network, US Chamber of Commerce Foundation
e:phil@rhzconsulting.com<mailto:phil@rhzconsulting.com>
SNS:  https://www.linkedin.com/in/longpd<https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.linkedin.com%2Fin%2Flongpd&data=05%7C01%7Cpdietrich%40gs1us.org%7C61ef04ecc41c4d3838d308da7ed6c464%7C862adc931361478abb32c28d2d00df8d%7C0%7C0%7C637961758159120727%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=7GBIuCPYOgnUMC9j8DU9He8%2BVGNWGzfALjTQr7gPopg%3D&reserved=0>
—
Phillip Long, Ph.D . Senior Scholar
Center for New Designs in Learning & Scholarship, (CNDLS)
e: pl673@georgetown.edu<mailto:pl673@georgetown.edu>
Twitter/Telegram: @RadHertz
—
ICoBC - International Council on Badges & Credentials
e: plong@icobc.net<mailto:plong@icobc.net>









On Aug 14, 2022, at 8:44 PM, Reed, Drummond <drummond.reed@avast.com<mailto:drummond.reed@avast.com>> wrote:

+1 — this is why ToIP uses "trust registry". Also, to another point made on this thread, the ToIP Trust Registry Protocol Specification notes that trust registries and chained credentials are not mutually exclusive approaches to verifying the authority of an issuer. In fact they can be highly complementary; they are just different paths for navigating a trust chain.


On Sun, Aug 14, 2022 at 3:29 PM Tobias Looker <tobias.looker@mattr.global<mailto:tobias.looker@mattr.global>> wrote:
This is a great and much needed initiative for the credential space. I would note that I think language like "authorized issuer lists" does tend to setup the possible misconception that there is a singular arbiter around who to trust for a particular credential type when in reality trust is contextual. Therefore, I think "trust lists" or "trust registries" are perhaps a better language framing of what we are looking for an interoperable solution to.

Thanks,
[Mattr website]<https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Furldefense.com%2Fv3%2F__https%3A%2Faus01.safelinks.protection.outlook.com%2F%3Furl%3Dhttps*3A*2F*2Fscanmail.trustwave.com*2F*3Fc*3D15517*26d*3Dw46s4eMXULV_ns1ZfAKYLbVKcqey_PHiW1WeN4boYw*26u*3Dhttps*253a*252f*252fmattr.global*252f%26data%3D04*7C01*7CSteve.Lowes*40mbie.govt.nz*7C5a65fe33c70b41fd8ba908d976f3a2f1*7C78b2bd11e42b47eab0112e04c3af5ec1*7C0*7C0*7C637671611076709977*7CUnknown*7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0*3D*7C1000%26sdata%3DtKqCMzLUQNCeORd908YqfqZoT7tCy*2FMVwXdjpch1sDY*3D%26reserved%3D0__%3BJSUlJSUlJSUlJSUlJSUlJSUlJSUlJSUlJSUlJQ!!IKRxdwAv5BmarQ!bb5xHfCDMOhD0QhUSA_1hY-K6vHFYtLs9R0I6t39UEfdjRqGqXZV-HoE4rCLxO0iJ5nAO4ve2QbBq3iS56hH_pg%24&data=05%7C01%7Cpdietrich%40gs1us.org%7C61ef04ecc41c4d3838d308da7ed6c464%7C862adc931361478abb32c28d2d00df8d%7C0%7C0%7C637961758159120727%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=asKusXRXGDrSSnH%2BEoROMc0b8E%2FtQY%2BtWqCoV%2BjKmrw%3D&reserved=0>

Tobias Looker
MATTR
CTO
+64 (0) 27 378 0461
tobias.looker@mattr.global<mailto:tobias.looker@mattr.global>
[Mattr website]<https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Furldefense.com%2Fv3%2F__https%3A%2Faus01.safelinks.protection.outlook.com%2F%3Furl%3Dhttps*3A*2F*2Fscanmail.trustwave.com*2F*3Fc*3D15517*26d*3Dw46s4eMXULV_ns1ZfAKYLbVKcqey_PHiW1WeN4boYw*26u*3Dhttps*253a*252f*252fmattr.global*252f%26data%3D04*7C01*7CSteve.Lowes*40mbie.govt.nz*7C5a65fe33c70b41fd8ba908d976f3a2f1*7C78b2bd11e42b47eab0112e04c3af5ec1*7C0*7C0*7C637671611076709977*7CUnknown*7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0*3D*7C1000%26sdata%3DtKqCMzLUQNCeORd908YqfqZoT7tCy*2FMVwXdjpch1sDY*3D%26reserved%3D0__%3BJSUlJSUlJSUlJSUlJSUlJSUlJSUlJSUlJSUlJQ!!IKRxdwAv5BmarQ!bb5xHfCDMOhD0QhUSA_1hY-K6vHFYtLs9R0I6t39UEfdjRqGqXZV-HoE4rCLxO0iJ5nAO4ve2QbBq3iS56hH_pg%24&data=05%7C01%7Cpdietrich%40gs1us.org%7C61ef04ecc41c4d3838d308da7ed6c464%7C862adc931361478abb32c28d2d00df8d%7C0%7C0%7C637961758159120727%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=asKusXRXGDrSSnH%2BEoROMc0b8E%2FtQY%2BtWqCoV%2BjKmrw%3D&reserved=0>
[Mattr on LinkedIn]<https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Furldefense.com%2Fv3%2F__https%3A%2Faus01.safelinks.protection.outlook.com%2F%3Furl%3Dhttps*3A*2F*2Fscanmail.trustwave.com*2F*3Fc*3D15517*26d*3Dw46s4eMXULV_ns1ZfAKYLbVKcqey_PHiW1SbN9fvNg*26u*3Dhttps*253a*252f*252fwww.linkedin.com*252fcompany*252fmattrglobal%26data%3D04*7C01*7CSteve.Lowes*40mbie.govt.nz*7C5a65fe33c70b41fd8ba908d976f3a2f1*7C78b2bd11e42b47eab0112e04c3af5ec1*7C0*7C0*7C637671611076719975*7CUnknown*7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0*3D*7C1000%26sdata%3Dt*2BidOI32oaKuTJf1AkcG*2B*2FirIJwbrgzXVZnjOAC52Hs*3D%26reserved%3D0__%3BJSUlJSUlJSUlJSUlJSUlJSUlJSUlJSUlJSUlJSUlJQ!!IKRxdwAv5BmarQ!bb5xHfCDMOhD0QhUSA_1hY-K6vHFYtLs9R0I6t39UEfdjRqGqXZV-HoE4rCLxO0iJ5nAO4ve2QbBq3iSM0eBDkY%24&data=05%7C01%7Cpdietrich%40gs1us.org%7C61ef04ecc41c4d3838d308da7ed6c464%7C862adc931361478abb32c28d2d00df8d%7C0%7C0%7C637961758159120727%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=N%2FK76OfoCKju%2BtzV6VVuWYab9JSPazht4kFmjY2XFZg%3D&reserved=0>
[Mattr on Twitter]<https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Furldefense.com%2Fv3%2F__https%3A%2Faus01.safelinks.protection.outlook.com%2F%3Furl%3Dhttps*3A*2F*2Fscanmail.trustwave.com*2F*3Fc*3D15517*26d*3Dw46s4eMXULV_ns1ZfAKYLbVKcqey_PHiW1WdMte6ZA*26u*3Dhttps*253a*252f*252ftwitter.com*252fmattrglobal%26data%3D04*7C01*7CSteve.Lowes*40mbie.govt.nz*7C5a65fe33c70b41fd8ba908d976f3a2f1*7C78b2bd11e42b47eab0112e04c3af5ec1*7C0*7C0*7C637671611076729970*7CUnknown*7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0*3D*7C1000%26sdata%3DBD9WWyXEjVGlbpbCja93yW*2FzLJZpe*2Ff8lGooe8V6i7w*3D%26reserved%3D0__%3BJSUlJSUlJSUlJSUlJSUlJSUlJSUlJSUlJSUlJSU!!IKRxdwAv5BmarQ!bb5xHfCDMOhD0QhUSA_1hY-K6vHFYtLs9R0I6t39UEfdjRqGqXZV-HoE4rCLxO0iJ5nAO4ve2QbBq3iSxO4cadM%24&data=05%7C01%7Cpdietrich%40gs1us.org%7C61ef04ecc41c4d3838d308da7ed6c464%7C862adc931361478abb32c28d2d00df8d%7C0%7C0%7C637961758159120727%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=etu6tMqPGwqcJE%2FHjOo1yIM4ekApaICPpUvYC8aqur8%3D&reserved=0>
[Mattr on Github]<https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Furldefense.com%2Fv3%2F__https%3A%2Faus01.safelinks.protection.outlook.com%2F%3Furl%3Dhttps*3A*2F*2Fscanmail.trustwave.com*2F*3Fc*3D15517*26d*3Dw46s4eMXULV_ns1ZfAKYLbVKcqey_PHiWwGdMoDtMw*26u*3Dhttps*253a*252f*252fgithub.com*252fmattrglobal%26data%3D04*7C01*7CSteve.Lowes*40mbie.govt.nz*7C5a65fe33c70b41fd8ba908d976f3a2f1*7C78b2bd11e42b47eab0112e04c3af5ec1*7C0*7C0*7C637671611076729970*7CUnknown*7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0*3D*7C1000%26sdata%3D4AhRuXZCnU5i3hcngo4H3UiNayYUtXpRcImV4slS1mw*3D%26reserved%3D0__%3BJSUlJSUlJSUlJSUlJSUlJSUlJSUlJSUlJSUl!!IKRxdwAv5BmarQ!bb5xHfCDMOhD0QhUSA_1hY-K6vHFYtLs9R0I6t39UEfdjRqGqXZV-HoE4rCLxO0iJ5nAO4ve2QbBq3iSG1OROXM%24&data=05%7C01%7Cpdietrich%40gs1us.org%7C61ef04ecc41c4d3838d308da7ed6c464%7C862adc931361478abb32c28d2d00df8d%7C0%7C0%7C637961758159120727%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=ql7H7Cd%2BlYbonRmoUmQ6JqLWU78OWYLJGO8qVuhOAUo%3D&reserved=0>

This communication, including any attachments, is confidential. If you are not the intended recipient, you should not read it - please contact me immediately, destroy it, and do not copy or use any part of this communication or disclose anything about it. Thank you. Please note that this communication does not designate an information system for the purposes of the Electronic Transactions Act 2002.

________________________________
From: Steve Capell <steve.capell@gmail.com<mailto:steve.capell@gmail.com>>
Sent: 15 August 2022 09:39
To: Kyano Kashi <kyanokashi2@gmail.com<mailto:kyanokashi2@gmail.com>>
Cc: Manu Sporny <msporny@digitalbazaar.com<mailto:msporny@digitalbazaar.com>>; W3C Credentials CG <public-credentials@w3.org<mailto:public-credentials@w3.org>>
Subject: Re: Authorized Issuer Lists

EXTERNAL EMAIL: This email originated outside of our organisation. Do not click links or open attachments unless you recognise the sender and know the content is safe.

Yes!

And then the school includes the accreditation vc in their student credential vc

Steven Capell
Mob: 0410 437854



On 15 Aug 2022, at 7:28 am, Kyano Kashi <kyanokashi2@gmail.com<mailto:kyanokashi2@gmail.com>> wrote:

Hi Manu,

Forgive my ignorance, but couldn’t we simply have the American Bar Association issue VCs to the schools it wishes to accredit for issuing law VCs?

Best,

Kyano

On Sun, Aug 14, 2022 at 6:19 PM Manu Sporny <msporny@digitalbazaar.com<mailto:msporny@digitalbazaar.com>> wrote:
Hi all,

The topic of "lists of authorized issuers for certain types of
credentials" has been floating around the VC community for a few years
now. We don't seem to have hit a point where implementers and
customers feel they absolutely need the feature, but there has been
enough curiosity around it to perhaps have some exploratory technical
discussions at some of the upcoming conferences.

The basic concept here is: Can a verifier lean on established trust it
has in some authority, such as an accreditation body, to get a list of
issuers for particular types of credentials? To focus on a use case in
education, how would the American Bar Association publish a list of
all law schools that it has accredited to issue law degree VCs?

The following paper calls for the exploration of the topic, starting
at the upcoming RWoT in The Hague (end of September):

https://github.com/WebOfTrustInfo/rwot11-the-hague/blob/master/advance-readings/authorized-issuer-lists.md<https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Furldefense.com%2Fv3%2F__https%3A%2Fgithub.com%2FWebOfTrustInfo%2Frwot11-the-hague%2Fblob%2Fmaster%2Fadvance-readings%2Fauthorized-issuer-lists.md__%3B!!IKRxdwAv5BmarQ!bb5xHfCDMOhD0QhUSA_1hY-K6vHFYtLs9R0I6t39UEfdjRqGqXZV-HoE4rCLxO0iJ5nAO4ve2QbBq3iSE9a6gno%24&data=05%7C01%7Cpdietrich%40gs1us.org%7C61ef04ecc41c4d3838d308da7ed6c464%7C862adc931361478abb32c28d2d00df8d%7C0%7C0%7C637961758159120727%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=DwgItb%2BE3E0zFxhteF5UgfyiFAxGO1mMzgyMzh%2BxnRg%3D&reserved=0>

Thoughts, concerns, and identification of similar work, are all welcome.

-- manu

--
Manu Sporny - https://www.linkedin.com/in/manusporny/<https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Furldefense.com%2Fv3%2F__https%3A%2Fwww.linkedin.com%2Fin%2Fmanusporny%2F__%3B!!IKRxdwAv5BmarQ!bb5xHfCDMOhD0QhUSA_1hY-K6vHFYtLs9R0I6t39UEfdjRqGqXZV-HoE4rCLxO0iJ5nAO4ve2QbBq3iS0Hv2GUQ%24&data=05%7C01%7Cpdietrich%40gs1us.org%7C61ef04ecc41c4d3838d308da7ed6c464%7C862adc931361478abb32c28d2d00df8d%7C0%7C0%7C637961758159120727%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=X2Di2ALviVRh%2Bxq1wbRpLfSoxqsPSSTcKGYq2W%2B%2FQRY%3D&reserved=0>
Founder/CEO - Digital Bazaar, Inc.
News: Digital Bazaar Announces New Case Studies (2021)
https://www.digitalbazaar.com/<https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Furldefense.com%2Fv3%2F__https%3A%2Fwww.digitalbazaar.com%2F__%3B!!IKRxdwAv5BmarQ!bb5xHfCDMOhD0QhUSA_1hY-K6vHFYtLs9R0I6t39UEfdjRqGqXZV-HoE4rCLxO0iJ5nAO4ve2QbBq3iS4arbvGQ%24&data=05%7C01%7Cpdietrich%40gs1us.org%7C61ef04ecc41c4d3838d308da7ed6c464%7C862adc931361478abb32c28d2d00df8d%7C0%7C0%7C637961758159120727%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=omZTXvlAXGNB49jN1ywdNufi5BOLsVQTUi4OpwqHQV8%3D&reserved=0>

Received on Monday, 15 August 2022 17:27:44 UTC