Authenticating, Sovereignty, Recovery part 6