<?xml version="1.0" encoding="utf-8"?>
<?xml-model href="rfc7991bis.rnc"?>  
<!-- Required for schema validation and schema-aware editing -->
<!-- <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?> -->
<!-- This third-party XSLT can be enabled for direct transformations in XML processors, including most browsers -->
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>

<rfc
  xmlns:xi="http://www.w3.org/2001/XInclude"
  category="exp"
  docName="draft-org-trust-relationship-protocol-00"
  ipr="trust200902"
  obsoletes=""
  updates=""
  submissionType="IETF"
  xml:lang="en"
  version="3">

  <front>
    <title abbrev="trust.txt">Organization Trust Relationship Protocol</title>

    <seriesInfo name="Internet-Draft" value="draft-org-trust-relationship-protocol-00"/>
   
    <author fullname="Ralph W Brown" initials="RW" role="editor" surname="Brown">
      <organization>Brown Wolf Consulting</organization>
      <address>
        <postal>
          <street>1355 S Foothills Hwy</street>
          <city>Boulder</city>
          <region>CO</region>
          <code>80305-7319</code>
          <country>US</country>
        </postal>        
        <phone>+1-303-517-6711</phone>
        <email>ralph@brownwolfconsulting.com</email>  
        <uri>https://journallist.net</uri>
      </address>
    </author>
   
    <date day="6" month="August" year="2024"/>

    <area>General</area>
    <workgroup>Internet Engineering Task Force</workgroup>
    <!-- "Internet Engineering Task Force" is fine for individual submissions.  If this element is 
          not present, the default is "Network Working Group", which is used by the RFC Editor as 
          a nod to the history of the RFC Series. -->

    <keyword>trust.txt</keyword>

    <abstract>
      <t>This document specifies the "Organization Trust Relationship Protocol" method for service owners (organizations) to express in a standard 
      format their trusted relationships with other organizations, as well as identify the social networks they control. This method was originally 
      defined by Scott Yates in 2020 for this purpose.</t>
    </abstract>
 
  </front>

  <middle>
    <section>
      <name>Introduction</name>
      <t>This document applies to services that provide resources that clients can access through URIs as defined in <xref target="RFC3986"/>.  
      For example, in the context of HTTP, a browser is a client that displays the content of a web page.</t>

      <t>Crawlers are automated clients.  Search engines, for instance, have crawlers to recursively traverse links for indexing as defined in 
      <xref target="RFC8288"/>.</t>

      <t>This document specifies the "trust.txt" method for service owners to declare their trusted organizational relationships. This protocol 
      can be used by any organization to declare, in a standard format, their trusted relationships with other organizations, e.g., industry 
      association memberships, organizational ownership or control, customer/vendor relationships, and social media accounts.</t>
      
      <t>The concept of <em>trust</em> for many industries with a presence on the web (e.g., healthcare, journalism, etc.) has been under assault 
      through the spead disinformation by anyone ranging from profiteers seeking financial gain to nation state actors exploiting the reputation 
      legitimate organizations have invested in building over decades.</t>
      
      <t>While there are many worthwhile efforts to build up networks of trust, those efforts are largely invisible to search engines, platforms, 
      advertisers, researchers and others. They exist in the offline world as associations, cooperatives, and other affiliations based on commonalities, 
      but modern consumers of current websites do not get all of the benefit of the work that is already being done.</t>
      
      <t>This protocol seeks to make those offline networks of trust visible online.</t>

      <t>The concept of a <tt>trust.txt</tt> file borrows heavily from two previous very successful efforts improving the overall experience of the 
      internet: robots.txt <xref target="RFC9309"/> and ads.txt <xref target="IAB_Tech_Lab"/>. With both, website publishers are able to create a small 
      and very manageable file that they have full control over that helps platforms and advertisers improve the overall ecosystem, and thereby 
      the experience for users. So it will be with <tt>trust.txt</tt>.</t>
    </section>

    <section>
      <name>Requirements Language</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL",
        "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT
        RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be
        interpreted as described in BCP 14 <xref target="RFC2119"/>
        <xref target="RFC8174"/> when, and only when, they appear in
        all capitals, as shown here.</t>
    </section>

    <section>
      <name>Scope</name>
      <t>It is not in the scope of this document to define, for example, what is "truth" or to ascribe any level of credibility to an organization and 
      its website.</t>

      <t>This is a technical document providing a method for any web publisher or group of publishers to produce and post a small text file on their own 
      website indicating how they chose to associate and detailing what related URLs they publish on, what they choose to disclose about policies 
      regarding things such as generative Artificial Intelligence, and doing so in a way that can be uniformly visible to platforms, advertisers, and 
      other interested parties.</t>

      <t>A key attribute is that the file is posted to the web serving system of the Publisher, thus proving that the controllers of that website 
      created the file.</t>
    </section>

    <section>
      <name>Description of Roles</name>
      <t>For this document, the following words describe specific roles. While these roles are broadly described, there is an implied trust relationship 
      between organizations that fall into these respective roles. This trust relationship MAY be based on a legal agreement executed by the respective 
      parties (e.g., a membership agreement or a purchase agreement).
      </t>
      <table>
        <tbody>
        <tr><td>Publisher</td><td>Any organization or individual who has control of a website that is generally available to the public on the internet. 
        If part of that site is behind a paywall, that is allowed as long as some information is available at the root domain.</td></tr>

        <tr><td>Association</td><td>Any group of Publishers, as defined by that group. This may include traditional state-level associations, buying 
        collectives, titles held by one owner, news-sharing organizations, etc. An Association will typically have a membership agreement that a 
        Publisher will need to execute to be considered a member of the Association.</td></tr>
        
        <tr><td>Control</td><td>Allowable attributes in the file include <tt>control</tt> and <tt>controlledby</tt>. This allows, for example, an 
        ownership group to express in the <tt>trust.txt</tt> file control over online publications, and vice versa. So, The New York Times owns and 
        has control over thewirecutter.com. The Times is a member of the Associated Press, but is not controlled by the AP.</td></tr>

        <tr><td>Vendor</td><td>Any organization that sells products or services to a Customer.</td></tr>

        <tr><td>Customer</td><td>Any Publisher or Association that purchases products or services from a Vendor. A Customer will typically execute a 
        purchase agreement with the Vendor for products or services provided.</td></tr>

        <tr><td>Data Consumer</td><td>Any organization or individual who ingests data from any <tt>trust.txt</tt> file. This may take the form of a 
        crawler, a robot, an agent, or any automated script. It may also include human users who want to look at the file using a browser.</td></tr>
        </tbody>
      </table>
      
      <t>This document applies to services that provide resources that clients can access through URIs as defined in <xref target="RFC3986"/>. For 
      example, in the context of HTTP, a browser is a client that displays the content of a web page.</t>

      <t>Crawlers are automated clients. Search engines for instance have crawlers to recursively traverse links for indexing. This specification is 
      not a form of access authorization.</t>

      <t>This RFC specifies a format for encoding instructions in a plain-text file available to Data Consumers. Robots may retrieve these instructions 
      before visiting other URLs on the site. Owners of those robots may use the data to learn about Associations and other affiliations of a web 
      Publisher. The use of that data is completely up to the consumer of that data.</t>
    </section>

    <section>
      <name>Access Method</name>
      <t>The use of the "Well Known Uniform Resource Identifiers" according to <xref target="RFC8615"/> is required.</t>

      <t>All of the instructions in that standard MUST be followed. For example, for the domain "example.com" the corresponding 
      "<tt>trust.txt</tt>" well-known URI on "<tt>http://www.example.com/</tt>" would be "<tt>http://www.example.com/.well-known/trust.txt</tt>". 
      Optionlly, a redirect from "<tt>http://www.example.com/trust.txt</tt>" to "<tt>http://www.example.com/.well-known/trust.txt</tt>" MAY be used 
      for backward compatibility with older crawlers or robots.</t>

      <t>The declarations MUST be accessible via HTTP and/or HTTPS from the website that the instructions are to be applied to under a standard 
      relative path on the server host: "<tt>/.well-known/trust.txt</tt>" and HTTP request header containing "<tt>Content-Type: text/plain</tt>". 
      It may be advisable to additionally use "<tt>Content-Type: text/plain; charset=utf-8</tt>" to signal UTF8 support.</t>

      <t>Crawlers or robots SHOULD prefer HTTPS connections over HTTP when crawling <tt>trust.txt</tt> files. In any case where data is available at 
      an HTTPS and an HTTP connection for the same URL, the data from HTTPS should be preferred.</t>

      <t>If the server response indicates Success (HTTP 2xx Status Code) the Data Consumer SHOULD read the content, parse it, and use the declarations.</t>

      <t>If the server response indicates an HTTP/HTTPS redirect (301, 302, 307 status codes), the Data Consumer SHOULD follow the redirect and consume 
      the data as authoritative for the source of the redirect, if and only if the redirect is within scope of the original root domain as defined above. 
      Up to three redirects are valid as long as each redirect location remains within the original root domain. For example an HTTP to HTTPS redirect 
      within the same root domain is valid.</t>

      <t>Any other redirect SHOULD be interpreted as an error and ignored.</t>

      <t>If the server response indicates the resource is restricted (HTTP 401) the Data Consumer SHOULD seek direct contact with the site for 
      authorization keys or clarification. Lacking direct contact, the Data Consumer should assume no declarations are being made under this system.</t>

      <t>If the server response indicates the resource does not exist (HTTP Status Code 404), the Data Consumer MAY assume no declarations exist. For 
      any other HTTP error encountered for a URL which the crawler or robot previously found data, the Data Consumer should assume that previous 
      declarations by the Publisher are no longer valid.</t>

      <t>If the <tt>trust.txt</tt> file is unreachable due to server or network errors, this means the file is undefined and the Data Consumer MAY 
      assume no declarations exist. For example, in the context of HTTP, an unreachable <tt>trust.txt</tt> has a response code in the 500-599 range. 
      For other undefined status codes, the Data Consumer SHOULD assume the file does not exist.</t>
    </section>

    <section anchor="trust_uri">
      <name>Trust URI</name>
      <t>A Publisher MAY place a trust URI of the form "<tt>trust://&lt;domain&gt;!</tt>" in the HTML of the social network pages they control 
      (identified by the "<tt>social=</tt>" entries in their <tt>trust.txt</tt> file). This will advertise their <tt>trust.txt</tt> file in their 
      social network pages.  The corresponding <tt>trust.txt</tt> file can be retrieved by replacing the "<tt>trust://</tt>" scheme with 
      "<tt>https://</tt>", by removing the trailing character "<tt>!</tt>", and by appending "<tt>/.well-known/trust.txt</tt>" to the path.
      For example, if the Trust URI is "<tt>trust://example.com!</tt>" the resulting trust.txt file URL is 
      "<tt>https://example.com/.well-known/trust.txt</tt>".</t>

      <t>When visiting a page with a trust URI, a Data Consumer MAY fetch the corresponding trust.txt and verify that this page is listed in the 
      retrieved trust file, therefore confirming that the Publisher controlling the origin domain also controls the referenced "social" URI.</t>

      <t>See <xref target="trust_uri_placement"/> for information on where to place the Trust URI on various social media platforms.</t>

      <t>It should be noted that client-side parsers might have issues in attempting to retrieve the <tt>trust.txt</tt> files referenced by the
      Trust URI depending on the server&apos;s Cross Origin Resource Sharing (CORS) settings and the client browser security settings. Server-side
      crawlers on the other hand will not have these CORS issues.</t>
    </section>

    <section>
      <name>File Format</name>
      <t>The instructions are encoded as a formatted plain text object, described here.</t>

      <t>The format logically consists of a non-empty set of records, separated by blank lines, returns, line-feeds or end-of-line command. The 
      records consist of a set of lines ofthe form:</t>
      <t><tt>&lt;attribute&gt; "=" &lt;value&gt;</tt></t>
      <t>Comments are allowed anywhere in the file, and consist of optional whitespace, followed by a comment character &#39;#&#39; followed by the 
      comment, terminated by the end-of-line.</t>
    </section>

    <section>
      <name>File Content</name>
      <t>Not all of the attributes here need to be used, but all of them are available. All Fields MAY be used more than once with the exception of 
      controlledby and datatrainingallowed, which SHALL each be used only once. For instance, an Association will in nearly all cases have many members. 
      Each one will get its own line in the file. All Data Consumers SHOULD store all valid data with each URI.</t>

      <t>Note that there is no distinction in the file between Publishers and Associations. This is by design. An organization may both have members, 
      and be a member of other Associations.</t>

      <table>
        <thead>
          <tr><th>Field</th><th>Valid Data</th><th>Notes</th></tr>
        </thead>
        <tbody>
          <tr><td>member</td><td>URL</td><td>Included here will be the URL for a member of any Association. One line for each member.</td></tr>

          <tr><td>belongto</td><td>URL</td><td>This is the place to list an Association or other organization that a Publisher may belong to. One 
          line for each organization.</td></tr>

          <tr><td>control</td><td>URL</td><td>A domain directly controlled by one entity. For use by ownership groups or other similar organizational 
          units.</td></tr>

          <tr><td>controlledby</td><td>URL</td><td>Domain of owner or other controlling entity. There should be only one listing for the controlling 
          organization.</td></tr>

          <tr><td>social</td><td>URI</td><td>Any social media account directly controlled by the Publisher, see <xref target="trust_uri_placement"/> 
          for examples.</td></tr>

          <tr><td>vendor</td><td>URL</td><td>Included here will be the URL for a Vendor to any Association or Publisher. One line for each Vendor.</td></tr>

          <tr><td>customer</td><td>URL</td><td>Included here will be the URL for a Customer to any Vendor. One line for each Customer.</td></tr>

          <tr><td>disclosure</td><td>Directory on base URL</td><td>If a Publisher has, for example, an ethics policy, it can publish the URI for that.</td></tr>

          <tr><td>contact</td><td>Contact information that can be in any form, including physical or email addresses, a URI, etc.</td><td>As part of 
          full transparency, Publishers or Associations may want to associate contact data so that people who are part of Data Consumer organizations 
          can make contact with questions.</td></tr>

          <tr><td>datatrainingallowed</td><td>"yes" or "no"</td><td>This is a directive to any scraper from an AI, a large language model, or any other 
          tool designed to collect data from the site of the publisher to be used in forms other than referring users to the site of origin. A 
          "<tt>yes</tt>" reply means that tools can scrape the data without restriction. A "<tt>no</tt>" means that a tool can not do that without a 
          legally binding contract in place before collecting any data.</td></tr>
        </tbody>
      </table>
    </section>

    <section>
      <name>File Methods</name>
      <section>
      <name>Attribute Declaration Records</name>
        <t>Any line containing a pattern of <tt>&lt;ATTRIBUTE&gt;=&lt;VALUE&gt;</tt> SHOULD be interpreted as a attribute declaration and the crawler 
        or robot SHOULD store the data associated with the root domain.</t>

        <t>The <tt>&lt;ATTRIBUTE&gt;</tt> is a string identifier without internal whitespace. The only supported separator is the equals sign &#39;=&#39;. 
        The <tt>&lt;VALUE&gt;</tt> is an open string that may contain arbitrary data.</t>

        <t>The declaration line is terminated by the end-of-line marker. The Data Consumer should liberally interpret CR, CRLF, etc., as a line separator. 
        For human readability it is recommended that attributes be declared at the end of the file, but this is not a strict requirement and SHOULD NOT 
        be assumed.</t>
      </section>

      <section>
      <name>Expiration</name>
        <t>Data Consumers MAY independently store files, but if they do it is recommended that they regularly verify their own cache. Standard HTTP 
        cache-control mechanisms can be used by both origin server and robots to influence the caching of the trust.txt file. Specifically consumers 
        and replicators should take note of HTTP Expires header set by the origin server.</t>
      </section>

      <section>
      <name>Limits</name>
        <t>Crawlers or robots MAY impose a parsing limit, but it is recommended that the limit be at least 500 kilobytes (KB).</t>
      </section>

      <section>
      <name>Where to Place the File</name>
        <t>As detailed above, in the well-known directory, and in the top-level directory of your web server for backward compatibility.</t>

        <t>When a robot looks for the "/trust.txt" file for URL, it strips the path component from the URL (everything from the first single slash), and 
        puts "<tt>/trust.txt</tt>" in its place.</t>

        <t>For example, for "<tt>http://www.example.com/news/index.html</tt>" it will remove the "<tt>/news/index.html</tt>" and replace it with 
        "<tt>/.well-known/trust.txt</tt>", and will end up with "<tt>http://www.example.com/.well-known/trust.txt</tt>".</t>

        <t>So, as a web site owner you need to put it in the right place on your web server for that resulting URL to work. Usually that is the same 
        place where you put your web site&#39;s main "<tt>index.html</tt>" welcome page. Where exactly that is, and how to put the file there, depends 
        on your web server software.</t>

        <t>Remember to use all lower case for the filename: "<tt>trust.txt</tt>", not "<tt>Trust.TXT</tt>."</t>
      </section>
    </section>

    <section>
      <name>Note About Base URI for Publishers on Other Platforms</name>
      <t>There are some Publishers who work on a platform for which they do not control the base URI, for example a video Publisher working exclusively 
      on YouTube.  In that case, the Publisher would be advised to create a single-page website. The traditional public-facing homepage of that site 
      can be just a link to the YouTube page. Then a trust.txt page can be placed on that public-facing homepage and place a Trust URI as described 
      above in <xref target="trust_uri"/> on the YouTube page.</t>

      <t>Another example is a local, independent newsroom that is part of a chain that uses one URL, for example www.bizjournals.com. In that case it 
      will be up to the Publisher to have all trust.txt information in one file, or to set up individual URIs for each publication. Either one is 
      acceptable.</t>
    </section>

    <section>
      <name>Note on Reliability of Signals</name>
      <t>Search engines and social networks never reveal exactly what goes into their algorithms for determining search engine results or placement 
      in a social feed. To reveal that would be an invitation to fraudulent manipulation. That said, they clearly rely on "signals" from pages, and 
      from the way those pages are referenced and used. The existence of this RFC is designed in large part to create a new and useful signal.</t>

      <t>That said, while the intention of the trust.txt system is to increase the trust of legitimate Publishers, the existence of a file on a site 
      should not be regarded a priori as a signal of trust on its own. Also, the lack of a trust.txt file should not on its own be regarded as a 
      negative indicator.</t>

      <t>The platforms and social networks must weigh for themselves the trustworthiness of any individual Publisher or Association.</t>

      <t>The goal of this RFC and the underlying framework is to make the inference of trust by affiliation much more accessible and scalable.</t>
    </section>

    <section>
      <name>Note on Importance of Network Effects</name>
      <t>While every organization publishes a trust.txt file completely at its own discretion, the importance of networked connections is vital to 
      make the signal valuable to algorithms assessing the value of the information in the file.</t>

      <t>In other words, if a Publisher says that it belongs to an Association, but that Association does not publish a trust.txt file confirming that 
      the Publisher is indeed a member, the strength of that signal may be lost, or even become negative. If a Publisher feels participation in an 
      Association is a positive signal, that organization should strongly encourage the Association to publish its own trust.txt file.</t>
    </section>

    <section anchor="IANA">
    <!-- All drafts are required to have an IANA considerations section. See RFC 8126 for a guide.-->
      <name>IANA Considerations</name>
      <t>The well known resource "trust.txt" has been registered with IANA in accordance with <xref target="RFC8615"/>.</t>
    </section>
    
    <section anchor="Security">
      <!-- All drafts are required to have a security considerations section. See RFC 3552 for a guide. -->
      <name>Security Considerations</name>
      <t>This document should not affect the security of the Internet. Section <xref target="trust_uri"/>, specifying the Trust URI, describes potential 
      Cross Origin Resource Sharing issues that might arise in client side parsers.</t>
    </section>
    
    <!-- NOTE: The Acknowledgements and Contributors sections are at the end of this template -->
  </middle>

  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3986.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8288.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8615.xml"/>
        
        <!-- The recommended and simplest way to include a well known reference -->
        
      </references>
 
      <references>
        <name>Informative References</name>

        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9309.xml"/>

        <reference anchor="IAB_Tech_Lab" target="https://iabtechlab.com/ads.txt/">
          <front>
            <title>ads.txt Version 1.1</title>
            <author>
              <organization>"IAB Tech Lab</organization>
            </author>
            <date month="August" year="2022"/>
          </front>
        </reference> 

        <reference anchor="JournalList.net" target="https://journallist.net/reference-document-for-trust-txt-specifications/">
          <front>
            <title>Specification for trust.txt file and underlying system Version 1.5</title>
            <author>
              <organization>JournalList.net</organization>
            </author>
            <date month="July" year="2024"/>
          </front>
        </reference>

      </references>
    </references>
    
    <section>
      <name>Examples of Files</name>
      <t>These examples (created by JournalList, so data is not accurate) are examples of files that would be generated by individual organizations 
      that would be placed on their own URL and controlled by them.</t>

      <t>This the file that might be created by a Publication, The Durango Herald, of Colorado:</t>
      <sourcecode name="" type="abnf"><![CDATA[
# Durango Herald trust.txt file from Ballantine Communications Inc.
#
# For more information on trust.txt see:
# 1. Home of the trust.txt specification - https://journallist.net
# 2. IETF RFC 8615 - Well-Known Uniform Resource Identifiers (URIs) -
# https://datatracker.ietf.org/doc/html/rfc8615
# 3. IANA's list of registered Well-Known URIs - 
# https://iana.org/assignments/well-known-uris/well-known-uris.xhtml
#
belongto=https://coloradopressassociation.com
belongto=https://www.ap.org/
belongto=https://www.journallist.net/
control=http://www.adventurepro.us/
control=http://www.directoryplus.com/
control=http://www.doradomagazine.com/
control=http://www.dgomag.com/
control=http://the-journal.com/
control=http://pinerivertimes.com/
datatrainingallowed=no
social=https://facebook.com/TheDurangoHerald
social=https://twitter.com/durangoherald
social=https://instagram.com/durango_herald
social=https://www.youtube.com/channel/UCSfC3ozxDs8aOVDaMnaUAQA
contact=https://durangoherald.com/contact_us/staff
      ]]></sourcecode>
      
      <t>This is the file that might be created by a Publication that is owned by the owner of The Durango Herald, but does not have any other 
      association memberships. This example, taken from the Herald&#39;s file, is called Adventure Pro Magazine:</t>
      <sourcecode name="" type="abnf"><![CDATA[
# Adventure Pro Magazine trust.txt file from Ballantine 
# Communications Inc.
#
# For more information on trust.txt see:
# 1. Home of the trust.txt specification - https://journallist.net
# 2. IETF RFC 8615 - Well-Known Uniform Resource Identifiers (URIs) -
# https://datatracker.ietf.org/doc/html/rfc8615
# 3. IANA's list of registered Well-Known URIs - 
# https://iana.org/assignments/well-known-uris/well-known-uris.xhtml
#
controlledby=http://www.durangoherald.com/
datatrainingallowed=no
social=https://www.facebook.com/AdventureProMag
social=https://twitter.com/AdventureProMag
social=https://www.instagram.com/adventurepromagazine/
social=https://www.youtube.com/channel/UCm0EL3_uRC6BFBtCud8mw7Q
social=https://flipboard.com/@AdventurePro
contact=https://adventurepro.us/about/
      ]]></sourcecode>
      
      <t>The Durango Herald could place the following trust URI on its X (Twitter) page (e.g., in the bio of its "durangoherald" account): 
      "<tt>trust://durangoherald.com!</tt>". A Data Consumer visiting the durangoherald X/Twitter account would then be able to verify that this 
      X/Twitter account is listed in the Durango Herald&#39;s <tt>trust.txt file</tt>.</t>

      <t>This is the (shortened) file that might be created by an Association, The Colorado Press Association:</t>
      <sourcecode name="" type="abnf"><![CDATA[
# CPA trust.txt file
#
# For more information on trust.txt see:
# 1. Home of the trust.txt specification - https://journallist.net
# 2. IETF RFC 8615 - Well-Known Uniform Resource Identifiers (URIs) -
# https://datatracker.ietf.org/doc/html/rfc8615
# 3. IANA's list of registered Well-Known URIs - 
# https://iana.org/assignments/well-known-uris/well-known-uris.xhtml
#
belongto=http://newspapers.org/
belongto=https://www.nammembers.com/
belongto=https://coloradofoic.org/
belongto=https://www.journallist.net/
member=http://www.akronnewsreporter.com/
member=http://www.alamosanews.com/
member=http://www.theflume.com/
member=http://arvadapress.com/
member=http://www.aspendailynews.com/
member=http://www.aspentimes.com/
member=http://www.hightimbertimes.com/
member=http://www.aurorasentinel.com/
datatrainingallowed=yes
social=https://www.facebook.com/coloradopressassociation/
social=https://twitter.com/ColoradoPress
social=https://www.linkedin.com/company/colorado-press-association/
social=https://www.youtube.com/channel/UCDHXPIQtH1ze7UM3aT8ivKA/
      ]]></sourcecode>

      <t>This is the (shortened) file that might be created by the Associated Press:</t>
      <sourcecode name="" type="abnf"><![CDATA[
# Associated Press trust.txt file
#
# For more information on trust.txt see:
# 1. Home of the trust.txt specification - https://journallist.net
# 2. IETF RFC 8615 - Well-Known Uniform Resource Identifiers (URIs) -
# https://datatracker.ietf.org/doc/html/rfc8615
# 3. IANA's list of registered Well-Known URIs - 
# https://iana.org/assignments/well-known-uris/well-known-uris.xhtml
#
belongto=https://iptc.org/
belongto=https://journallist.net/
#
member=https://www.hearst.com/
member=https://scripps.com/
member=https://www.jsonline.com/
member=https://www.swiftcom.com/
member=https://www.spokesman.com/
member=https://www.nytimes.com/
member=https://www.ogdennews.com/
#
social=https://www.facebook.com/APNews
social=https://www.instagram.com/apnews/
social=https://twitter.com/ap
social=https://www.linkedin.com/company/associated-press
social=https://www.youtube.com/ap
#
contact=https://www.ap.org/contact-us/
      ]]></sourcecode>
    </section>

    <section anchor="trust_uri_placement">
      <name>Trust URI Placement Guidelines</name>
      <t>The <tt>trust.txt</tt> specification is platform agnostic. In order to improve interoperability one SHOULD follow these guidelines when 
      creating Trust URI entries on the following platforms.</t>

      <ul>
        <li><strong>Facebook</strong>: Trust URI <tt>https://www.facebook.com/&lt;accountname&gt;</tt> on the Facebook account page: in the account 
        page&apos;s Intro field.</li>

        <li><strong>GitHub</strong>: Trust URI <tt>https://github.com/&lt;accountname&gt;</tt> on the account page: in the GitHub account page&apos;s 
        Bio field.</li>

        <li><strong>Instagram</strong>: Trust URI <tt>https://www.instagram.com/&lt;accountname&gt;</tt> on the account page: in the Instagram account 
        page&apos;s Bio field.</li>
        
        <li><strong>LinkedIn</strong>: Trust URI <tt>https://www.linkedin.com/&lt;type&gt;/@&lt;accountname&gt;/</tt>, where &lt;type&gt; is <tt>in</tt> 
          (for individuals), <tt>school</tt> or <tt>company</tt>, on the LinkedIn account page: for individuals - in the LinkedIn account page&apos;s 
          About field; for schools and companies - in the account page&apos;s Overview section. This will appear on the About page 
          (<tt>&lt;url&gt;/about/</tt>) of the account.</li>

        <li><strong>Medium</strong>: Trust URI either the default https://medium.com/@&lt;accountname&gt;/ form or the subdomain 
          <tt>https://&lt;accountname&gt;.medium.com</tt> form (depending on the owner&apos;s Medium account settings) on the account page: preferably 
          in the Medium account page&apos;s Bio field, optionally in the Medium About page&apos;s description.</li>

        <li><strong>Rumble</strong>: Trust URI <tt>https://rumble.com/c/&lt;accountname&gt;</tt> for individuals, in the user&apos;s Rumble channel 
          Description field (per channel). This will appear on the About page (&lt;url&gt;/about/) of the account.</li>

        <li><strong>Telegram</strong>: Trust URI <tt>https://t.me/&lt;accountname&gt;</tt> for accounts - in the Telegram account bio field; for 
          channels - in the Telegram channel description field.</li>

        <li><strong>Threads</strong>: Trust URI <tt>https:///www.threads.net/@&lt;accountname&gt;</tt> in the Threads account page&apos;s Bio field.</li>

        <li><strong>TikTok</strong>: Trust URI <tt>https://www.tiktok.com/@&lt;accountname&gt;</tt> on the TikTok account page, in the account 
          page&apos;s Bio field.</li>

        <li><strong>Vimeo</strong>: Trust URI <tt>https://vimeo.com/c/&lt;accountname&gt;</tt> on the Vimeo account page, in the account page&apos;s 
          Bio field.</li>

        <li><strong>X (formerly Twitter)</strong>: Trust URI <tt>https://x.com/c/&lt;accountname&gt;</tt> on the X account page, in the account 
          page&apos;s Bio field.</li>

        <li><strong>YouTube</strong>: Trust URI <tt>https://youtube.com/@&lt;accountname&gt;</tt> on the YouTube account page, in the About page&apos;s 
          description. This will appear on the About page (<tt>&lt;url&gt;/about/</tt>) of the account.</li>
      </ul>

    </section>

    <section anchor="Acknowledgements" numbered="false">
      <name>Acknowledgements</name>
      <t>Many thanks to these people who reviewed the original trust.txt specification. (Reviewing does not imply endorsement):</t>

      <t>Claire Wardle, First Draft News; Ralph Brown; John Daniszewski, Heather Edwards, Associated Press; Tom Brand, NAFB; Justin Sasso, Colo. 
      Association of Broadcasters, Mickey Osterreicher, NPPA; Bill Skeet and Cedar Milazzo, Trustie; Sandro Hawke, W3C fellow; Jill Fraschman, Colo. 
      Press Association; Connie Moon Sehat, NewsQ/Credibility Coalition; Gabriel Altay, Kensho; Sean La Roque-Doherty lawyer, writer and IEEE P.7011 
      participant; Andres Rodriguez, Instituto Tecnológico de Buenos Aires (ITBA) and IEEE P.7011 participant; Brendan Quinn, IPTC; Scott Cunningham 
      original ads.txt advisor; Ed Bice, Scott Hale and Megan Marrelli, Meedan; Jason Kint, Chris Pedigo, Digital Content Next; Kati London and 
      Christian Paquin, Microsoft; Brendan Quinn, IPTC; Thad Swiderski, eTypeServices; Michael W. Kearney, Ph.D., AI &amp; Digital Media Expert; 
      Kenny Katzgrau, CEO, BroadStreet Ads; Laura Ellis and Chris Needham, BBC.</t>
    </section>
    
    <section anchor="Contributors" numbered="false">
      <name>Contributors</name>
      <t>Thanks to Scott Yates for the contribution of the original trust.txt specification <xref target="JournalList.net"/> and Christian Paquin 
      for the contribution of the Trust URI specification.</t>
    </section>
    
 </back>
</rfc>
