 So we're here at the ITU in Geneva, and we're at a workshop organized by Study Group 11, looking at global approaches on how to combat counter-fitting and stolen ICT devices. Roussam, welcome, and thank you very much indeed for joining us here today. Thank you very much. Amazing event, amazing discussion. Thank you. And perhaps you could explain to our viewers, you know, what's the situation in Russia when it comes to counterfeit and stolen ICT devices? Oh, yeah. Unfortunately, the situation is not perfect, but we work hard to improve that. And in our opinion, the main challenges, the main issues related with counter-fitting is counterfeit medicines. It's a very social significant problem, because usually these counterfeit medicines are correspondingly directly to the most expensive medicines. And also, it's stolen phones. Today we use cash less. We have a lot of different electronic payment systems, and they are very convenient. And in that way, big pocket thieves mostly focus on mobile phones and ICT devices and ICT variables. So the third one is not certified or non-legal phones and also luxury goods. Last year, the percent of fake luxury goods is increasing. So evidently that we have to create a system to identify these items to make it universal system. But unfortunately, none of existing approaches not satisfy all the requirements and it cannot be used to identify any item. So in that way, we suggested a new solution based on use of different identifiers for specific object, but the same management level, management of data, management of that identifiers. That is our solution and we have implemented that in Russia and we have some very interesting results. And I think that this approach has very high potential. And more specifically, what kind of identifiers are we looking at and are they really effective in minimizing counterfeiting and theft in ICT devices? Yeah, that is the point. For mobile phones, we use IMA, MAC address, ID of software and anything other we can use related with hardware or software on this phone. If we're talking about goods, if we're talking about, for example, medicines, we can use NFC QR codes and we make a photo of the package and all that integrated data stored in a server and when you buy this item, you can check if it legal or not using that data from a server. So we have individual approach to every individual object, but the same management layer. So it seems like there are a variety of solutions out there and approaches. But more specifically, what kind of work should take place in Study Group 11 if we want to solve this issue, especially from the perspective of identifiers? In my opinion, this approach should be implemented worldwide. For that, we have to standardize approaches for data record, for management of the data worldwide and to determine the architecture. I think that's the main aims of standardization in that field and of course we have to increase the reliability of this data. And I think that approach using blockchain for that, suggested by our colleagues, it's a really good solution for that, I believe in it. Well, thank you, Rustam. I'd like to thank you for your time and wish you a successful workshop and continuation in Study Group 11. Thank you very much.