 Good morning, good afternoon, good evening, depending upon, depending upon which part of the world you are very, very happy to talk about one of the largest implementation of blockchain in the world. Before I get into the subject in terms of how we are leveraging blockchain for unsolicited commercial communication which is primarily spam calls and spam text. When I was speaking at Hyperledger Foundation up early this year in the month of March, there was a media panel that was moderated by a gentleman from Forbes, I think his name is Michael, and Michael had asked a question to me on that particular particular media panel, when will be the point of arrival, when you can use blockchain and then you can pull out a let use from a neighborhood store and say that this let use is safe because it has been tracked on blockchain and they're not genetically modified ingredients, or this particular let use head has not been grown organically, has been grown organically and has not been grown in organically. So I told him Michael, I don't know when that that will come, but if you're talking about blockchain impacting the common man on the street, and blockchain being leveraged from a social good and from a social impact, I told him to come over to India. And when you come to India and if you take a SIM card from any of the local telco companies, and then I can tell you that after you've taken the SIM card I can tell you that you're being insulated from spam calls and spam text by using the blockchain solution. You know, as we know spam is invading the handsets globally. I thought that spam is a problem that has been invented in India, but when I started traveling to different places speaking in various forums about this particular implementation. People have told me that spam calls and spam text is a global problem. For instance in United Kingdom, a lot of people get unsolicited calls on their landlines in, in United States, a lot of people get robo calls, the robo calls are either for technical support, or they are for, you know, trying to cheat people on the pretext of IRS filings. So it is a global problem and this global problem needs to be tackled and needs to be tackled, especially using emerging technologies because the traditional technologies have failed simply in terms of tackling the problem. So in India as well, spam has reached, you know, a very heightened proportion, and people were completely vexed because they were getting more spam calls, rather than the normal calls or normal text messages. So I put things in perspective on an average, an Indian telco subscriber receives about 10 to 20 spam text messages every day, and probably 10 calls every, every day. And when, when this became a problem, people started complaining to telcos, telcos have not been that efficient in providing a solution for the spam calls and spam text because they were not sharing information with each other. I will explain that in a bit. But before that, there have been a lot of cases in India when these, when these innocent or gullible spam text messages seemingly innocent text messages were causing a lot of financial crime. And you may wonder how, how a small text message can lead to financial crime. This was primarily by a couple of, not couple, many smart operators who used to, who used to send text messages, maybe to 50,000 people or 100,000 people, asking them to invest in a particular script on the stock exchange, saying that this script is going to break the circuit, and then they have to, they can invest in that or they should invest in that particular, particular script or stock because it is going to break the circuit and it will, it is going to witness a bull run. And when, when people who are recipient of that messages out of 100,000 maybe 10,000 think that it is not a spam text, because that particular message or text has come from a telco. So they believe that it is a, it is a genuine message. Somebody is trying to give them tips in terms of investing and out of these people, probably 5,000 people or 10,000 people will go and invest in that particular stock. And the person who has sent that stock obviously is sitting on lot of that stock. And since there is a demand, sudden demand for the stock on the stock exchange, there is a bull run. And the bull run results in appreciation of the stock price. And when the stock price appreciates the person who is sitting on that stock offloads, and they make a killing, and then they vanish. So this has been happening for quite some time. And eventually the consumers, which are basically the telco subscribers, they have gone and complained to the telco. And they have also gone and complained to the consumer quote, saying that we have complained to the telcos and telcos are not that effective in providing a solution. And when the, when the court intervened and asked for an explanation, then they called the telecom regulatory authority of India, which is basically the government body regulating telecommunications in India equivalent of office of communications in UK or federal communications corporation in the United States. And when TRAI was called for an explanation, then TRAI convened the meeting of all the telcos. Then the telcos simply blamed saying that, hey, we are the terminating provider. I mean, technically they are called as terminating access provider. That means the calls are terminating on to the network, or the text messages are terminating to the subscribers on the network, but these messages or calls have originated from an alternate network, which is called as an originating access provider. So, for example, if there is telco A and telco B, and telco B customers have complained that telco B figures that the messages have actually come from someone who has taken subscription from telco A. And then they would either tell the subscribers to go and lodge the complaint to telco A, which becomes a nightmare kind of an experience because you're not a subscriber of that particular telco, so the ability to access the customer care is basically long drawn process. It is painful and you cannot reach them on short codes because you don't belong to the network. And when they go to the telco A and then say, hey, this traffic has originated from your network, can you tell us the details of the people who have subscribed for these connections, primarily taking the SIM connections. And they would say, you know, these guys were active about a month ago, and then they have recently, they became inactive. And from the documents that they have produced in terms of KYC documents, we are not able to trace them. So they basically fly by night operators who gave wrong documents and then indulge in this spam messages, spam calls and spam text. They remain active probably for a month or so. And when the complaints peak, they basically throw those SIM cards and move to an alternate network. So they're basically no match moving from one particular network to another network. So when the telcos were shifting the blame on each other or putting the blame on each other, the regulator said, this cannot happen this way. And then they asked the telco saying, what is that we need to do to overcome this problem? Then the telco said, we need to share information. And the regulator asked them, okay, go ahead and share the information. The telcos came back and said, hey, this is the information pertaining to our subscribers. We don't know how our competitors are going to use this particular information. I'm okay to give the information provided I get visibility as to how that information is being used by another telco operator. That means they had to archive all the information on a shared ledger. And then they also not only archive the information on the shared ledger, but they also have to gain visibility as to how that particular information is being used by different participants or people who have access to that shared ledger. And when the regulator said, okay, let's look into what kind of technologies can solve this. And this was almost about three years ago. And then the regulator called for ideas. They basically called for papers from an open consultation perspective. And during that particular process, three tech majors have responded to that call from the regulator. One is Microsoft. Second is Tech Mahindra. And the third one is IBM. And these three tech majors responded to the regulator. And the research wing of the regulator also did their homework. And they said that probably a distributed ledger technology will be able to meet their requirements. And we were agreed. All the three people, all the three companies agreed with the regulator saying that yes, distributed ledger technology seems to have that promise, not only from a perspective of sharing the data, but also giving a complete visibility to what to what happens to the data on the network. And then they had various other requirements as well, which I will explain in a bit. And based on those requirements, all the three tech majors have narrowed down on DLT. And then Microsoft was looking for a partner. So we aligned with Microsoft and IBM wanted to go on their own. So it eventually narrowed down to IBM, Microsoft plus Tech Mahindra. And the regulator asked us to demonstrate proof of concept and proof of technology, which we have been able to demonstrate that. And once we have demonstrated the proof of concept and proof of technology, the regulator has come up with a set of guidelines called as UCC unsolicited commercial communication guidelines. And this particular guidelines had an approach plan in terms of what are the various functionalities that need to be on the distributed ledger or blockchain. What will be the experience of the end customer? How should they be insulated? And what are the various steps that a telco needs to take? And also the telemarketeer or telemarketeers who are affiliated to the telco need to take. So now I've explained in terms of the financial crime aspects, but not all text messages contribute to the financial crime. The text messages contribute to simple nuisance. I may get text completely on automobiles while I don't need automobile. I may get text on loans while I may not need loan. I may get text on holidays while I may not need holidays. So the regulator said that first to streamline what we need to do is we need to gather what is called as consent and we also need to gather what is called as a preference. So consent, for example, you know, if I take my example and I'm shopping or I'm in the market shopping for a car, then I would go and say that, hey, I would like to receive text messages from automobile manufacturers. That is my consent. And in that consent, I can also go to a granular level and I can say while I'm open to receive information from automobile manufacturers, I'm looking at only a particular class of SUV and that particular class of SUV is limited, let's say to a Toyota or Ford. That level of granularity is also possible. That is the consent information. Now, the preference. The preference is primarily, I would say, I don't want to receive this particular text message whenever you want to send it. I want to receive it in a predefined interval. So I can define maybe weekday or I can define maybe weekend. And then I may define saying that on a weekday I'm okay to receive this message probably from 4 to 5 o'clock, or on a weekend probably from 11 to 12 a.m. But I don't want to receive these messages in time zones outside the time zone that I have selected for. So this consent information and the preference information for every subscriber has to be collected by the telco. They collect that information via an app and once that information is collected, this information has to be replicated across all the telcos because telco B will collect information pertaining only to the subscribers. Now, if a marketer wants to send message from telco B because they're affiliated to telco B or they have taken subscription services from telco B and now they have to send messages to subscribers who belong to telco A. So the telco A consent and preference information needs to be accessed by these marketeers who are on the telco B network. So every telco by virtue of that has to share that information and this information has to be replicated across the telcos in a real time basis or maybe a particular with a particular lack. And this information has to be archived so that everybody can access that information. So it has been designed in such a manner that consent information is archived on the blockchain and the preference information may be archived or may not be archived on blockchain. It can be off the chain because that information may be humongous. So those are the two important aspects. The other thing is in terms of the tele marketeers have to come through a telco. They cannot come directly. So they cannot know tele marketeer is allowed to set up their own blockchain node directly on this particular blockchain network. They have to come through a telco. The nodes are managed by the telco. And before a message is sent, the message or a call is made. They are subjected to what is called as a scrubbing. I will explain in terms of what is scrubbing. Scrubbing is primarily suppose tele marketeer comes and says that I have to send 100,000 messages to these, I mean one message for one message each for 100,000 subscribers. So it is 100,000 messages and this messages pertain to a new launch of luxury sedan and they go to the telco and they give the mobile numbers of all the people to whom the message has to go. Now the telco cannot send the messages just like that. The telco has to take all those mobile numbers and they perform scrubbing and basically by virtue of scrubbing they are validating whether these 100,000 numbers have actually said yes to receive information on a luxury sedan and have they said yes to receive information, let's say from Lexus brand. And that process of validation is called as scrubbing. And when they do the scrubbing, they're basically comparing the consent and the preference information which is there on the blockchain network and off the blockchain network. And when they do that validation, the telco may find that 80,000 numbers confined to that rule set whereas 20,000 numbers do not confine to the rule set. So they drop those 20,000 numbers and they tokenize all the mobile numbers and then they communicate to the tele marketeer saying you gave 100,000 numbers out of the 100,000 numbers, 80,000 numbers meet the consent and the preference criteria based on the scrubbing we did and since only 80,000 numbers meet the requirement, we are able to deliver only 80,000 numbers. And the marketeer doesn't know which number went through and which number didn't went through because we don't want them to do social engineering and then try to figure out what consent and preference information is there pertaining to the subscribers. So the second element that is required is tokenization of the mobile numbers using sharp protocol or whatever is the protocol and then once the numbers are tokenized and the number, I mean you're basically pseudo find the telephone number as far as the marketeer is concerned and then all those numbers, 80,000 numbers which pass through, they are aggregated and once they are aggregated and another token is generated by the originating access provider. Now, this token along with the numbers is exchanged on the blockchain network with the terminating access provider and when the terminating access provider gets this information, they don't just push the messages through, they don't just push the calls through because they also need to perform the algorithm. And they perform the algorithm again based on the consent information and the preference information and the scrubbing that has been done and then they ensure if 80,000 numbers pass through the algorithm pass through the checks and the balances, and if they pass through the checks and balances, then those 80,000 numbers get delivered. And if the marketeer defaults or if the telco defaults and if there is a customer complaint, the complaint gets archived on the blockchain network and the regulation basically tells that the telcos are responsible for compliance. It doesn't matter even if the telemarketeers are at fault because eventually the responsibility of scrubbing, the responsibility of comparing the consent information and the preference information that is archived on the blockchain network is with the telcos. And if the telcos are at fault and if a complaint is raised, the telco is expected to take an action against the telemarketeer within 24 hours. The action would be basically a warning and in spite of the warning, if the compliances are not met and if they continue to, if they are repeat offenders, then they have to constrain the calling facility on their numbers to just about two calls per day, and they have to constrain the text messaging capability to just do two text messages per day. And if they don't do that, then the telco will run a risk of paying a fine as high as $10,000 per every day of delay. And the entire thing is archived on the blockchain network because telco A is repeatedly complaining to telco B saying that they are defaulting, they're not complying with the TRAI UCC guidelines as a result of which they need to be penalized. And this entire blockchain network, the regulator also has an observatory node so that they can see what's happening in the network. So this gives you a perspective of the architecture in terms of the DLT network wherein you have all the operating systems of the telco provider as well as the BSS systems of the telco provider. So you have the modules that take care of identity and access management, you have an active directory module, there is an SMSC center, then there is the CRM engines in which the subscriber information is archived. And when the subscribers, if the subscribers have moved from one network to another network because of the mobile number portability, they don't end up changing the numbers. So you may want to perform that check also to figure out saying that to which telco they actually belong to. So all these components are included. And then, as I said before, the blockchain nodes are set up by the respective telco and the architecture pertaining to the blockchain is maintained by the respective telco. In terms of this is an additional details in terms of the how the architecture looks like. So you have a tel which is one of the operator, they have the node, they have an order pure and a central authority, and then they have deployed this on premise. Data is another telco operator. They have deployed it on the Azure cloud environment. RCOM is another telco operator. They've also deployed it on Azure cloud environment. Reliance Geo is another operator. They have deployed it on Zeus Azure cloud. And then order phone and idea is another operator where they have used AWS cloud services and there's the others other small operator called QTL they've used on premise BSNL which is the government incumbent owned telcom operator. They have used a third party AWS cloud and this gives you a complete perspective of how the entire DLT network for these telcos look like and then the entire thing when it comes together it constitutes the consortium, complete consortium to get into the technical details. Many of them have used Hyperledger Fabric version 1.4.2 because all of them have started implementation almost about 8 to 2, about, I think about 8 to 12 months ago. And the number of smart contracts that run on the network are about 13 of them, 13 each for each of the telco. They've used Go language for the smart contract. I mean the technology stack is Go language. Each of the telco has 12 channels and then they have three applications which are primarily the subscriber management. The entity registration entity registration is primarily applicable to the tele marketeers and then the complete telcom operations that belong to an incumbent telco. And each of the telco have two notes. And, and I mentioned to you about cloud technology in fact because of this cloud technology. This particular implementation can also easily get qualified or classify as the world's largest implementation of blockchain using a multi cloud environment. And why do I say world's largest implementation because if you look at India, currently there are 1.2 billion subscribers in India, out of the 1.2 billion subscribers there are 100, 800 million active subscribers. And if you do the math about 10 spam calls per day and 10 spam text per day, you can, you can imagine in terms the amount of transactions that are going to be processed out of, I mean through this particular implementation. And currently, most of the telcos are at TPS of 176. I had mentioned to you before that it's not necessary to archive all the information on chain, because if you archive all the information on on chain for 800 million subscribers. We're talking about huge amount of storage on on chain, which makes the entire processing capacity slower, and it also requires humongous amount of data storage. So from that perspective, we have used a combination of on chain and off chain, I will explain to you how we have used it, and we have used elastic search as a capability to facilitate off chain and on on chain storage. Now to explain how the off chain and on chain storage happens before, you know, I mentioned to you about scrubbing wherein every subscriber consent and preference information has to be checked before the message is delivered or before the call is made. That process of scrubbing can be stored off the chain. You don't have to store every minute detail of scrubbing on the chain. And once you once you store that information off the chain, and you connect the systems in which that information is stored. If somebody wants to go down and do an audit, they can access those systems offline, or I mean off the chain, and then they can validate whether the scrubbing process has been completely a dear to or not a dear to. The aspect that the scrubbing has been completed as a result of which legitimate call can be made to the customer or a legitimate message can be delivered to the customer that portion is archived on the chain. Using this combination of off the chain and the on the chain, we are able to accomplish huge amount of data capabilities. And as I mentioned to you in terms of, you know, it's a first multi hybrid multi hybrid cloud and on combination of on prem and cloud setup. Obviously, it's one of the largest scale network, which brings in again a unique combination of on chain and off chain processing. And there is a control sharing of the content pertaining to the users pertaining to the subscribers between different operators. You know, you can also ensure that the content can be read only by the terminating access provider and the originating access provider by using a combination of symmetric and asymmetric keys. And what is more important is it results in a real time integration with various telecom network elements to accomplish what I call as the do not disturb checks, because you know if people go and register do a blanket do not disturb that they're not open to receive even a single text message, even though the telemarketeer would have acquired the consent, then you have to respect the do not disturb provisions that have been set up by the subscriber. And then it also ensures that the telemarketeers and principal entities can interoperate between different telecom operators. They can interrupt with one operator and even while the delivery is with the other operator as I have as I've explained explained to you, and then the blockchain as a technology is integrated to a cross section of technology landscape of the telecom operators, and as I've shown you in the architecture diagram, it has been integrated with multiple telco OSS and BSS components, which is either the CRM, or the short messaging gateway, active directory, or security gateway, or whatever are the underlying underlying systems. So in, in a sense, what we are basically saying is, initially when they were complaints the complaints used to take anywhere between two to 30 days to resolve and many of many of the complaints get remained unresolved because of this blame game that I mentioned to you before, but now the cycle time to manage those complaints will get reduced tremendously. And everybody has a complete transparency. Nobody can blame the other telco operator and say that they are flouting the rules while, while they themselves, I mean the incumbent telco is adhering to the rules, but that aspect is eliminated completely so there is no trust deficit. And in addition to that, since everybody can see all the information there is a good amount of traceability that is available on the network, and also as I mentioned to you the regulator also as an observatory note. So as the live implementations, Reliance Geo, Tata Tele Services and Reliance Communications are the, are the telcos who are working with us, and for Reliance Geo we have used many functionalities into enterprise grade implementation. This is the case with Tata Tele Services and so is the case with Reliance Communication. In essence, TechMindra is catering to about 50% of the active subscriber base or greater than 50% of the active subscriber base. And no wonder this particular implementation has been recognized, not only in India, but also has been recognized globally as a sensible blockchain solution, a scalable blockchain solution, and a solution that is impacting the lives of the people, and not an esoteric blockchain solution whose impact cannot be measured or whose impact cannot be quantified. So, so we've been recognized by Microsoft because initially we have partnered with Microsoft, we have used Microsoft technologies tacked to a great extent, and we have received a worldwide runners up award from Microsoft under the Microsoft Inspire category. The blockchain association has also awarded us this association runs under the AGS of Accenture, and they have they have awarded us for a sensible implementation under the category of blockchain for social good or blockchain for social impact. The National Association of Software and Services Company which is the services companies which is the mouthpiece of IT and ITS industry in India have also recognized this as a very innovative solution using blockchain in their annual technology awards, you know, they have technology here, and it was recognized in the year 2019. So, what I'll do is I'll pause here, hopefully I've given you a good perspective of how it works. And hopefully I have demystified. If I, if I made things more mystified and not demystified them, happy to answer your questions, and then, and then clarify any doubts that you may have. Thank you, Rajesh. This is great. It was very interesting. A question from an anonymous attendee is this network live is capable of interoperability. Also, is this platform capable of data purge which is a legal requirement for telcos. So the, the complete network of all the participating telcos is still not live because some of the telcos have been lagging behind implementation, and some of them have also gotten vapor from the telcom regulatory authority, citing difficulties in implementation, especially implementing blockchain technology as a result of which some of those operators are still not live on the network, but majority of the operators, many, many functionalities that I mentioned to you, consent, preferences, scrubbing, all those functionalities are live from an enterprise grade perspective. Interoperability is become a little redundant because all of them have went in favor of Hyperledge of Fabric because nobody wanted to use public stack of blockchain or a public protocol of blockchain. Nobody wanted to use permission technology as a result of which the choice was narrowed down to Hyperledge of Fabric as a result of which there is no real interoperability challenge per se. From a data purge perspective sorry I didn't understand the exact nature of the question. Whatever the telcos are doing, they are in compliance with the KYC guidelines, and they're also in compliance with the data disclosure norms that are that are available within the country so from that particular perspective, there is no conflict from our data disclosure norms or disclosing the personal identifiable information. The only personal identifiable information that is going to be disclosed here is the consent and the preference information and customers have signed up for that voluntarily. They've not only signed up for that voluntarily but they also give that what we call as implicit consent and how it happens is for example, over the weekend you're touring the mall, they're very good promotion that is happening probably on furniture or on housing or on holidays, you fill up a form and then you give your mobile number and you also say that you're okay to receive calls that is called as an implicit consent. And if the telemarketer is able to come up and show the documentary evidence of that implicit consent until and unless the subscriber has not opted for a blanket DND, those messages can be delivered. So that's how this entire process works. So there is nothing that is going to happen in dissonance with the data disclosure norms pertaining to the end subscribers. Right, that makes sense. So just to follow up to that question by data purge, the question was meant to be data archival after a certain timeline. This would be an issue for the data stored on fabric. Yeah, absolutely. So the way it happens is customers also keep changing their consent information dynamically, because they don't want to give consent to everyone. They keep their consent open to everyone, they will go back to the original situation. And now they can't even complain because all the telemarketeers have acquired their consent information. So what we expect from a customer behavior, since most of their requirements are tactical, once their requirement has been met, we expect the customer even if an additional redundant message is delivered, they would just go and revoke their consent. And once they revoke their consent pertaining to a particular category of commercial message, since that revoke has happened, their information, of course, in blockchain it is stored, but the telemarketeers will not be able to access that information. From that particular perspective, we don't expect a misutilization, but in terms of yes, it is etched into the blockchain completely. Great, thank you. Is there any specific reason why did you go for hyperledger fabric rather than private Ethereum. Private Ethereum, a couple of reasons many telcos didn't want to get into something which have tokens and something protocol which also was used in the public domain. And also in terms of Ethereum perspective, the TPS was also a problem. So considering all these aspects, the telcos have made the decision in favor of hyperledger fabric. Probably the telcos were also being guided by, if I take an example from a cloud technology perspective, initially everybody wanted to use only the private aspects of the cloud. Nobody wanted to use the public aspects of the cloud because either it was considered initially to be insecure or the technologies have not evolved to a state where you could secure anything that you're leveraging from a public stack or from a public infrastructure perspective, because of those analogies and because also kind of a rub off effect and also the inherent limitations from Ethereum protocol perspective, everybody had made a decision in favor of hyperledger fabric. Well, yeah, that makes sense. Do you see these being repeated in other countries as you said, spam is a real problem. Yeah, absolutely, absolutely. So Office, you know, you know, Ofcom, which is the regulator in UK has studied the TRAI model. As I mentioned to you earlier, they had challenges in terms of spam calls on landlines. I think that problem still persists. And there have been initiatives from British Telecom and the others to look at this particular model but nothing concrete has been implemented from the end. At least I know FCC in the United States is looking at it from a perspective of robocalls. They have gone, they have taken a slightly different path. They have come up with something called as a stir and shaken. So they're basically in stir and shaken, you're using tokens, and then you're handling the assorted information through tokens in a secure fashion, but it does not have the elements of sharing of information between various telcos. So the approach that the US telcos are taking, if you see a robocall just shut it down, but they're not taking an approach wherein they're saying, okay, this information has to be shared with different telcos so that we not only shut down the robocall as and when it happens, but we completely eliminate it. Thus, that component can happen only when all the telcos come together and start sharing information using blockchain or DLT and that we actually we put in as a recommendation through World Economic Forum, and also through IBM and through some other sources. And if they take that recommendation in, stir and shaken will also have the blockchain DLT component. In the Middle East, the UAE regulator has mandated both it is a lot, as well as do telecom to basically look into the Indian model, and then manage the preference and consent information. Only because because when people come into the country, and when they take when they're roaming on their network, or when they take a local sim, they don't want the experience of those transient users of the telecom services to be back because of the spam calls and spam text. In the Middle East, yes, the regulator has already mandated it for it is a lot than do. And in other countries, for example, Saudi Arabia, the telcos are evaluating it proactively so I mentioned to you about telcos in UK telcos in US which are primarily driven by FCC telcos in the family driven by the regulator and telcos in Saudi not driven by the regulator but driven by the telcos themselves. So these are the different markets where we are seeing traction for this kind of service. Yeah, so I see the Brett Carpenter that wants to speak up I'll give you voice in a second Brett. One more question. So someone saying thank you fantastic use case and what's next on the roadmap for this project. So here on this roadmap for this project is at this point of time the regulator has not allowed the monetization of the information. I'll tell you how monetization can happen. So as a telco I know that my subscriber has said yes to consent, let's say from luxury car. This is also said to lifestyle holidays. So now I start making the sketch of their buying preferences. So here is a customer who seems to be very fond of luxury. So there may be ideal target for luxury housing. So by by making that sketch not through a second and not through information which has been collated through indirect sources or by market research firms. This is based on the information that I am acquiring directly from the subscribers by bring by putting all that information together. I should have very good insights about the about the subscriber buying preference and buying behavior so that I'll be able to come up with very effective marketing campaigns from an upsell and from a cross cell perspective. This is going to come up at a later point of time but now the regulator has strictly forbidden all the telcos to utilize that information for marketing purposes. When it comes, then the marketers will absolutely love it because they don't have to do syndicated market research or they don't have to get data from indirect sources. And the ability of a hit is much higher on the direct source data. And we expect that to come up at a later point of time. So Brett, your turn. You're allowed to talk speak. Can you hear me? Yep. Yes, Brett. Thank you. Very, very, very nice presentation. My name is Brett Carpenter and I am the hyper ledger organizer of Troy, Michigan. And my functions up to this point have been varying, but in large part, I'm very interested in policy. And when I lived in Maryland, I had access through my 501c3 to work in the Library of Congress. And so I took a course and I learned how to make the codes and I was able to do some really deep dives. As you well know, information isn't that easily gotten. And so could you make any recommendations for me to grab the policies that I'm hearing so that I can lobby my government for what I'm doing in Troy? Absolutely. I'm going to be doing a digital 20 of the entire county of Oakland County. So Brett, when US President Honorable Donald Trump visited India, he also brought in the FCC chairman, Ajit Pai. Ajit Pai has also visited India and he met with the officials at TRAI. One was primarily to explore collaboration in the telecommunication space between both the countries. But what caught Ajit Pai's attention was also this UCC guidelines that we are talking about. In fact, we also wanted to do a proof of concept and proof of technology for FCC. FCC is relying at this point of time heavily with an organization called IETF. It is Internet Engineering Task Force. So if you go to IETF.org and you look for Stir and Shake and Protocols, you will get a wealth of information from them. And what we will do is through the organizers, we will also give you access to all the guidelines that TRAI has also put it in the public domain. Even if it is not in public domain, we should be able to get you 30, 40 page regulation that you could read. Does that help, Brett? Oh, it really does. I just went in warp speed, you know, like Star Trek. Thank you, thank you. I'm really happy that this is turning so productive. So another anonymous attendee is asking once the data is stored in a blockchain, it cannot be altered or removed. You're storing customer information in blockchain. Does this comply with the GDPR guideline? What if customer don't want to store this information and how will it be removed from the blockchain? Yeah, that's a great question. As I said before, the information, some part of information pertaining to customers is only available to the telcos. So it is as good as, for example, your KYC information is with the telcos, which means your date of birth, your address details, your identification details, all of them are with the telco. And the telcos have to follow in terms of the data non-disclosure norms. And since it's a permissioned blockchain, and since the telemarket years cannot come directly onto the blockchain, they have to go through the gateway that is set up by the telco. The amount of information that the others can access apart from the telcos or the staff of the telcos is very, very limited. And by even today in absence of blockchain, you're storing all the subscriber personally identifiable information in the CRM systems of the telco. And the access to that information is available to the telco employees as well. But still you're able to secure that particular information and that information is not going to be pushed out into the wild. The same concept applies even to blockchain. And even then, what information are we storing on blockchain? We're just storing some constant information of the subscriber and the time of the week or the time of the day that they have said yes to the messages or to the calls. So we're not storing mission critical information on blockchain. So from that perspective, already there is a layer of insulation. And the second layer of insulation is that you're only storing constant and preference information of the customer. You're not archiving the date of birth or identification or KYC information of the customer on blockchain. So from that perspective, we don't see much of a challenge from a GDPR compliance aspects. Hopefully that answers your question. I think it does. Satish is asking how the governance part works. How does the governance part work? Is the TRI has the final say and how the conflicts handle at the high level? Yeah. So basically, as you know, consortiums work on a concept of team sport. So from that perspective, the regulator played a brilliant role here. First, they framed the regulation and they told all the telcos to implement it or run the risk of paying fines for non-implementation. So all the telcos had no option but to implement it. And the telcos tried to circumvent this through their organization called cellular operators association of India. But ultimately, since it was for common good of all the subscribers, then the cellular operators association of India also has agreed to implement this. Once they have given the initial momentum through the regulations, the regulator said that the future developments of the consortium will be governed by what they call as COP, the code of practice. And the code of practice will define the do's and don'ts and the governance structure. So the telcos have to evolve this code of practice by themselves. And if the telcos are not able to reach a conclusion or they're not able to reach a consent, then the regulator is always available to disintermediate or act as a mediator and then address the conflicts. So to give the initial momentum, they framed the regulation and the regulation gave the initial momentum, moved the telcos out of the inertia and then got them on the path to implement this. After that, they told all the telcos to come up with code of practices. So all the telcos have evolved a very detailed code of practice to ensure that the consortium works in a frictionless manner. And when the friction point arrives and if the telcos are not able to address that through the code of practice, they can always go to the regulator for intervention. That's how the governance aspect works on this consortium. Great. Thank you so much, Rajesh. This was amazing. There is one more question and I will ask you to answer it with one word. Are you storing the mobile numbers of citizens? No, the mobile numbers of the citizens are not stored on blockchain. They are referred off the blockchain and when they are moving on the blockchain, remember I told you about tokenization. So the mobile numbers are completely tokenized or the pseudo numbers are exchanged on the network. And then the telco will be able to decrypt, but the telemarketeer will not be able to decrypt. Great. Thank you. We are out of time which shows how good the discussion was. Thank you everyone for participating. We have upcoming webinars on the November 4th. We will hear from CEO Ledger on credit unions using a member pass. This will be an identity talk. And then we will also have a talk from IBM on securing your open source blockchain project with IBM blockchain platform. We have loads of content on our website and YouTube channel, so please check it out. And finally, please get involved. We love to hear from you and we would love you to maybe become one of the next speakers. Thank you. Stay safe and we'll see you on November 4th. Great. Fantastic. Thanks for the opportunity. I absolutely love the interaction. Thanks for all the questions they brought in an extra element of energy into this webinar.