<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Blockchain Archive - R&amp;U</title>
	<atom:link href="https://ru.law/en/tag/blockchain/feed/" rel="self" type="application/rss+xml" />
	<link>https://ru.law/en/tag/blockchain/</link>
	<description>Consumer lawyers</description>
	<lastbuilddate>Thu, 12 Mar 2026 10:42:05 +0000</lastbuilddate>
	<language>en-GB</language>
	<sy:updateperiod>
	hourly	</sy:updateperiod>
	<sy:updatefrequency>
	1	</sy:updatefrequency>
	<generator>https://wordpress.org/?v=6.8.5</generator>

<image>
	<url>https://ru.law/wp-content/uploads/2020/12/favicon-150x150.png</url>
	<title>Blockchain Archive - R&amp;U</title>
	<link>https://ru.law/en/tag/blockchain/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Beweismittel bei Kryptobetrug: Welche Nachweise für Strafanzeige und Rückforderung entscheidend sind</title>
		<link>https://ru.law/en/beweismittel-bei-kryptobetrug/</link>
		
		<dc:creator><![CDATA[Stefan Selge]]></dc:creator>
		<pubdate>Mon, 19 Jan 2026 07:00:00 +0000</pubdate>
				<category><![CDATA[Bank- und Kapitalmarktrecht]]></category>
		<category><![CDATA[Krypto]]></category>
		<category><![CDATA[Anlagebtrug]]></category>
		<category><![CDATA[Betrug]]></category>
		<category><![CDATA[Beweismittel]]></category>
		<category><![CDATA[Blockchain]]></category>
		<category><![CDATA[Kryptobetrug]]></category>
		<category><![CDATA[Strafanzeige]]></category>
		<guid ispermalink="false">https://ru.law/?p=96015</guid>

					<description><![CDATA[<p>Cryptocurrencies have quickly become a significant component of private and corporate wealth structures. At the same time, the number of professionally organized fraud cases is increasing. Often, […]</p>
<p>Der Beitrag <a href="https://ru.law/en/beweismittel-bei-kryptobetrug/">Beweismittel bei Kryptobetrug: Welche Nachweise für Strafanzeige und Rückforderung entscheidend sind</a> erschien zuerst auf <a href="https://ru.law/en">R&amp;U</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Cryptocurrencies have rapidly become a significant component of private and corporate wealth structures. Simultaneously, the number of professionally organized fraud cases is increasing. These often involve not just isolated acts of deception, but complex schemes comprising fake trading platforms, social engineering, bogus support, and international payment processing. In practice, the effectiveness of investigative authorities and the likelihood of success in civil proceedings depend less on mere suspicion of fraud and more on the quality of the evidence.</p>



<p>Blockchain transactions appear anonymous to the outside world, but are technically traceable. This is precisely where a key difference lies. While traditional banking cases often rely on bank statements and recipient data, crypto fraud requires structured evidence gathering that effectively combines technical data, communication records, and legal classification. Securing evidence early and consistently significantly improves one&#039;s position in criminal proceedings and when seeking to recover funds.</p>



<p>RU Law supports clients in cases of crypto fraud by prioritizing and preparing relevant evidence so that criminal charges and claims can be filed on a sound basis.</p>



<h2 class="wp-block-heading"><strong>Blockchain evidence as primary evidence</strong></h2>



<p>At its core, the blockchain itself is the most important piece of evidence. Every transaction is permanently recorded. For later analysis, transaction IDs, wallet addresses, timestamps, and token type are particularly relevant. In many cases, this basic data alone can reveal which assets were transferred and where they went. It is crucial not to just view this information briefly in a blockchain explorer, but to document it transparently, for example, through backed-up files, PDF extracts, or structured reports.</p>



<p>Furthermore, verifying the plausibility of the attribution is practically crucial. Law enforcement agencies and courts must be able to verify that the wallet used is indeed assigned to the individual in question or that the payment originated from a specific exchange or wallet environment. Documents from the exchange account, confirmations of deposits and withdrawals, and documentation of one&#039;s own wallet management are helpful in this regard.</p>



<p>Another key element is verification via hash values. The hash is the technical signature of a transaction and proves that this exact process took place in this form on the blockchain. Such proof significantly increases the evidentiary value, especially if platform access is later blocked or perpetrators delete content.</p>



<h2 class="wp-block-heading"><strong>Forensic analysis and tracing as structured evidence gathering</strong></h2>



<p>Many fraud cases don&#039;t end with a single transfer. Often, data is routed through numerous intermediaries, moved via bridges, or distributed using obfuscation services. In such situations, a single screenshot is insufficient. <a href="https://finanz-forensik.de/leistungen/krypto-forensik/">forensic analysis</a> It can process the transaction chain in a traceable manner and visualize it as a report. This transforms a confusing sequence of individual wallet movements into a structured overview that can be used in investigative files and civil proceedings.</p>



<p>Tracing reports can reveal, among other things, the stages through which assets flowed, whether clusters are identifiable, whether addresses belong to exchanges or service providers, and where potential exit points are located. These exit points are often crucial because they are where crypto assets are exchanged for euros or processed via regulated interfaces.</p>



<p>However, technology alone is not enough. The forensic analysis must be legally assessed. Who could be held liable? Are platform operators accountable? What role do payment service providers, banks, or stock exchanges play? What legal grounds for claims are realistic, and what procedural steps are advisable?.</p>



<h2 class="wp-block-heading"><strong>Information requests as a bridge from pseudonymity to identity</strong></h2>



<p>Blockchain addresses are initially pseudonymous. A key step towards personalization can therefore be achieved through requests for information from service providers that process KYC data. Many cryptocurrency exchanges and platforms store identity documents, contact details, deposit and withdrawal information, and in certain cases, technical logs. This data can help to assign wallet addresses to specific accounts or link transaction paths to real people.</p>



<p>In practice, requests for information are often key to developing a reliable attribution of perpetrators from a purely technical description. At the same time, the question of whether internal anti-money laundering checks or documentation obligations have been properly implemented may also become relevant. Such information is not always available, but can play a role depending on the circumstances, especially when claims against third parties can be examined.</p>



<h2 class="wp-block-heading"><strong>Device analysis and digital traces of the perpetrators</strong></h2>



<p>Besides blockchain data, end devices are often an important source of evidence. Many cases involve remote access, manipulated apps, fake support contacts, or phishing sites. Traces proving the attack can be found on smartphones and computers, such as evidence of remote access software, suspicious browser extensions, logs of unauthorized access, or malware artifacts.</p>



<p>In criminal proceedings, this can significantly strengthen the account of events. It can also be relevant in civil cases when questions of liability and breach of duty by third parties arise. Crucially, such devices should not be reset prematurely or data deleted if an analysis could be useful.</p>



<h2 class="wp-block-heading"><strong>Security measures and the time factor in criminal proceedings</strong></h2>



<p>If compelling evidence exists, investigating authorities can consider securing measures, such as seizing data storage devices or ordering asset protection measures. With cryptocurrencies, the time factor is particularly critical because assets can be transferred or concealed within a short period. A well-prepared criminal complaint with clear transaction data and a comprehensible structure increases the chances that authorities will take concrete action.</p>



<h2 class="wp-block-heading"><strong>Supplementary documents to round out the facts</strong></h2>



<p>In addition to technical evidence, traditional documents remain important. These include chat logs, email communication, screenshots of dashboards, advertisements, contract details, promises of payment, and any indications of fee demands. Bank documents can also be relevant, for example, if cryptocurrency purchases were made through bank accounts or if loans were taken out to finance the alleged investment. Such documents help to transparently document the process, the deceptive actions, and the manipulation.</p>



<h2 class="wp-block-heading"><strong>Civil law recovery and logic of claims</strong></h2>



<p>Based on substantiated evidence, the question arises as to which civil law avenues are realistic. Depending on the specific circumstances, claims based on unjust enrichment, tort claims, and breaches of contractual or pre-contractual obligations may be considered. The strategy often hinges on whether perpetrators can be identified, whether tangible assets still exist, and whether third parties can be included in a chain of liability.</p>



<p>Here too, a technical description alone is insufficient. A legally sound statement of claim is required for a refund, one that consistently combines the facts, evidence, and the defendant.</p>



<p>If you want to assess which evidence should be prioritized in your case and what steps can be derived from it, an early review can be beneficial. RU Law specializes in crypto fraud and provides support in the structured analysis of the facts and the enforcement of potential claims.</p>



<h2 class="wp-block-heading" id="h-fazit-zu-beweismittel-bei-kryptobetrug"><strong>Conclusion</strong> <strong>Regarding evidence in crypto fraud</strong></h2>



<p>In cases of cryptocurrency fraud, the evidence presented determines the chances of success. Those who consistently secure and legally classify transaction data, tracing analyses, communication records, and technical traces significantly improve their position in criminal proceedings and recovery claims. Not every loss can be fully compensated. Nevertheless, in many cases, more is possible than victims initially assume, provided the facts are thoroughly documented and strategically prepared.</p>



<h2 class="wp-block-heading" id="h-faqs-haufig-gestellte-fragen-zu-beweismittel-bei-kryptobetrug"><strong>FAQs – Frequently Asked Questions about Evidence in Crypto Fraud</strong></h2>


<div class="wp-block-uagb-faq uagb-faq__outer-wrap uagb-block-ed0fa9cc uagb-faq-icon-row uagb-faq-layout-accordion uagb-faq-expand-first-true uagb-faq-inactive-other-true uagb-faq__wrap uagb-buttons-layout-wrap uagb-faq-equal-height" data-faqtoggle="true" role="tablist"><div class="wp-block-uagb-faq-child uagb-faq-child__outer-wrap uagb-faq-item uagb-block-f9785a0e" role="tab" tabindex="0"><div class="uagb-faq-questions-button uagb-faq-questions">			<span class="uagb-icon uagb-faq-icon-wrap">
								<svg xmlns="https://www.w3.org/2000/svg" viewbox= "0 0 448 512"><path d="M432 256c0 17.69-14.33 32.01-32 32.01H256v144c0 17.69-14.33 31.99-32 31.99s-32-14.3-32-31.99v-144H48c-17.67 0-32-14.32-32-32.01s14.33-31.99 32-31.99H192v-144c0-17.69 14.33-32.01 32-32.01s32 14.32 32 32.01v144h144C417.7 224 432 238.3 432 256z"></path></svg>
							</span>
						<span class="uagb-icon-active uagb-faq-icon-wrap">
								<svg xmlns="https://www.w3.org/2000/svg" viewbox= "0 0 448 512"><path d="M400 288h-352c-17.69 0-32-14.32-32-32.01s14.31-31.99 32-31.99h352c17.69 0 32 14.3 32 31.99S417.7 288 400 288z"></path></svg>
							</span>
			<span class="uagb-question">What types of evidence are particularly important in cases of crypto fraud?</span></div><div class="uagb-faq-content"><p>Key pieces of evidence include blockchain transaction data such as wallet addresses, transaction IDs and timestamps, as well as supplementary documentation such as communication histories, platform screenshots and proof of payment.</p></div></div><div class="wp-block-uagb-faq-child uagb-faq-child__outer-wrap uagb-faq-item uagb-block-eef02c53" role="tab" tabindex="0"><div class="uagb-faq-questions-button uagb-faq-questions">			<span class="uagb-icon uagb-faq-icon-wrap">
								<svg xmlns="https://www.w3.org/2000/svg" viewbox= "0 0 448 512"><path d="M432 256c0 17.69-14.33 32.01-32 32.01H256v144c0 17.69-14.33 31.99-32 31.99s-32-14.3-32-31.99v-144H48c-17.67 0-32-14.32-32-32.01s14.33-31.99 32-31.99H192v-144c0-17.69 14.33-32.01 32-32.01s32 14.32 32 32.01v144h144C417.7 224 432 238.3 432 256z"></path></svg>
							</span>
						<span class="uagb-icon-active uagb-faq-icon-wrap">
								<svg xmlns="https://www.w3.org/2000/svg" viewbox= "0 0 448 512"><path d="M400 288h-352c-17.69 0-32-14.32-32-32.01s14.31-31.99 32-31.99h352c17.69 0 32 14.3 32 31.99S417.7 288 400 288z"></path></svg>
							</span>
			<span class="uagb-question">Are screenshots of wallets or platforms sufficient as proof?</span></div><div class="uagb-faq-content"><p>Screenshots alone are generally insufficient. They should always be supplemented with verifiable blockchain data and, if possible, structured analyses to ensure traceability.</p></div></div><div class="wp-block-uagb-faq-child uagb-faq-child__outer-wrap uagb-faq-item uagb-block-7b6999cf" role="tab" tabindex="0"><div class="uagb-faq-questions-button uagb-faq-questions">			<span class="uagb-icon uagb-faq-icon-wrap">
								<svg xmlns="https://www.w3.org/2000/svg" viewbox= "0 0 448 512"><path d="M432 256c0 17.69-14.33 32.01-32 32.01H256v144c0 17.69-14.33 31.99-32 31.99s-32-14.3-32-31.99v-144H48c-17.67 0-32-14.32-32-32.01s14.33-31.99 32-31.99H192v-144c0-17.69 14.33-32.01 32-32.01s32 14.32 32 32.01v144h144C417.7 224 432 238.3 432 256z"></path></svg>
							</span>
						<span class="uagb-icon-active uagb-faq-icon-wrap">
								<svg xmlns="https://www.w3.org/2000/svg" viewbox= "0 0 448 512"><path d="M400 288h-352c-17.69 0-32-14.32-32-32.01s14.31-31.99 32-31.99h352c17.69 0 32 14.3 32 31.99S417.7 288 400 288z"></path></svg>
							</span>
			<span class="uagb-question">What role do transaction IDs play in providing evidence?</span></div><div class="uagb-faq-content"><p>Transaction IDs are crucial pieces of evidence because they clearly prove that a specific transfer of crypto assets has taken place. They make it possible to trace payment flows with technical and temporal precision.</p></div></div><div class="wp-block-uagb-faq-child uagb-faq-child__outer-wrap uagb-faq-item uagb-block-a5f0bb69" role="tab" tabindex="0"><div class="uagb-faq-questions-button uagb-faq-questions">			<span class="uagb-icon uagb-faq-icon-wrap">
								<svg xmlns="https://www.w3.org/2000/svg" viewbox= "0 0 448 512"><path d="M432 256c0 17.69-14.33 32.01-32 32.01H256v144c0 17.69-14.33 31.99-32 31.99s-32-14.3-32-31.99v-144H48c-17.67 0-32-14.32-32-32.01s14.33-31.99 32-31.99H192v-144c0-17.69 14.33-32.01 32-32.01s32 14.32 32 32.01v144h144C417.7 224 432 238.3 432 256z"></path></svg>
							</span>
						<span class="uagb-icon-active uagb-faq-icon-wrap">
								<svg xmlns="https://www.w3.org/2000/svg" viewbox= "0 0 448 512"><path d="M400 288h-352c-17.69 0-32-14.32-32-32.01s14.31-31.99 32-31.99h352c17.69 0 32 14.3 32 31.99S417.7 288 400 288z"></path></svg>
							</span>
			<span class="uagb-question">What is wallet tracing and why is it relevant?</span></div><div class="uagb-faq-content"><p>Wallet tracing refers to the analysis of transaction chains on the blockchain. It helps to track the path of crypto assets across multiple stages and to identify potential interfaces with exchanges or service providers.</p></div></div><div class="wp-block-uagb-faq-child uagb-faq-child__outer-wrap uagb-faq-item uagb-block-28b6f38a" role="tab" tabindex="0"><div class="uagb-faq-questions-button uagb-faq-questions">			<span class="uagb-icon uagb-faq-icon-wrap">
								<svg xmlns="https://www.w3.org/2000/svg" viewbox= "0 0 448 512"><path d="M432 256c0 17.69-14.33 32.01-32 32.01H256v144c0 17.69-14.33 31.99-32 31.99s-32-14.3-32-31.99v-144H48c-17.67 0-32-14.32-32-32.01s14.33-31.99 32-31.99H192v-144c0-17.69 14.33-32.01 32-32.01s32 14.32 32 32.01v144h144C417.7 224 432 238.3 432 256z"></path></svg>
							</span>
						<span class="uagb-icon-active uagb-faq-icon-wrap">
								<svg xmlns="https://www.w3.org/2000/svg" viewbox= "0 0 448 512"><path d="M400 288h-352c-17.69 0-32-14.32-32-32.01s14.31-31.99 32-31.99h352c17.69 0 32 14.3 32 31.99S417.7 288 400 288z"></path></svg>
							</span>
			<span class="uagb-question">Can blockchain analytics be used in court?</span></div><div class="uagb-faq-content"><p>Yes. Structured blockchain analyses and tracing reports are used in practice as electronic evidence and can carry significant weight in both criminal and civil proceedings.</p></div></div><div class="wp-block-uagb-faq-child uagb-faq-child__outer-wrap uagb-faq-item uagb-block-922e0bf1" role="tab" tabindex="0"><div class="uagb-faq-questions-button uagb-faq-questions">			<span class="uagb-icon uagb-faq-icon-wrap">
								<svg xmlns="https://www.w3.org/2000/svg" viewbox= "0 0 448 512"><path d="M432 256c0 17.69-14.33 32.01-32 32.01H256v144c0 17.69-14.33 31.99-32 31.99s-32-14.3-32-31.99v-144H48c-17.67 0-32-14.32-32-32.01s14.33-31.99 32-31.99H192v-144c0-17.69 14.33-32.01 32-32.01s32 14.32 32 32.01v144h144C417.7 224 432 238.3 432 256z"></path></svg>
							</span>
						<span class="uagb-icon-active uagb-faq-icon-wrap">
								<svg xmlns="https://www.w3.org/2000/svg" viewbox= "0 0 448 512"><path d="M400 288h-352c-17.69 0-32-14.32-32-32.01s14.31-31.99 32-31.99h352c17.69 0 32 14.3 32 31.99S417.7 288 400 288z"></path></svg>
							</span>
			<span class="uagb-question">What significance do GDPR data disclosures have in cases of crypto fraud?</span></div><div class="uagb-faq-content"><p>GDPR inquiries to stock exchanges or platform operators can help to link pseudonymous wallet addresses to real accounts or persons, provided that personal data is processed there.</p></div></div><div class="wp-block-uagb-faq-child uagb-faq-child__outer-wrap uagb-faq-item uagb-block-44975cc3" role="tab" tabindex="0"><div class="uagb-faq-questions-button uagb-faq-questions">			<span class="uagb-icon uagb-faq-icon-wrap">
								<svg xmlns="https://www.w3.org/2000/svg" viewbox= "0 0 448 512"><path d="M432 256c0 17.69-14.33 32.01-32 32.01H256v144c0 17.69-14.33 31.99-32 31.99s-32-14.3-32-31.99v-144H48c-17.67 0-32-14.32-32-32.01s14.33-31.99 32-31.99H192v-144c0-17.69 14.33-32.01 32-32.01s32 14.32 32 32.01v144h144C417.7 224 432 238.3 432 256z"></path></svg>
							</span>
						<span class="uagb-icon-active uagb-faq-icon-wrap">
								<svg xmlns="https://www.w3.org/2000/svg" viewbox= "0 0 448 512"><path d="M400 288h-352c-17.69 0-32-14.32-32-32.01s14.31-31.99 32-31.99h352c17.69 0 32 14.3 32 31.99S417.7 288 400 288z"></path></svg>
							</span>
			<span class="uagb-question">Should computers and smartphones be secured as evidence?</span></div><div class="uagb-faq-content"><p>Yes. Devices can contain evidence of phishing, remote access, or manipulated apps. Premature deletion or reinstallation can destroy valuable evidence.</p></div></div><div class="wp-block-uagb-faq-child uagb-faq-child__outer-wrap uagb-faq-item uagb-block-910f255b" role="tab" tabindex="0"><div class="uagb-faq-questions-button uagb-faq-questions">			<span class="uagb-icon uagb-faq-icon-wrap">
								<svg xmlns="https://www.w3.org/2000/svg" viewbox= "0 0 448 512"><path d="M432 256c0 17.69-14.33 32.01-32 32.01H256v144c0 17.69-14.33 31.99-32 31.99s-32-14.3-32-31.99v-144H48c-17.67 0-32-14.32-32-32.01s14.33-31.99 32-31.99H192v-144c0-17.69 14.33-32.01 32-32.01s32 14.32 32 32.01v144h144C417.7 224 432 238.3 432 256z"></path></svg>
							</span>
						<span class="uagb-icon-active uagb-faq-icon-wrap">
								<svg xmlns="https://www.w3.org/2000/svg" viewbox= "0 0 448 512"><path d="M400 288h-352c-17.69 0-32-14.32-32-32.01s14.31-31.99 32-31.99h352c17.69 0 32 14.3 32 31.99S417.7 288 400 288z"></path></svg>
							</span>
			<span class="uagb-question">When is filing a criminal complaint in cases of crypto fraud advisable?</span></div><div class="uagb-faq-content"><p>Filing a criminal complaint is particularly advisable when reliable transaction data and other evidence are available. The more structured the evidence is, the higher the chances of a successful investigation.</p></div></div><div class="wp-block-uagb-faq-child uagb-faq-child__outer-wrap uagb-faq-item uagb-block-7ab03cea" role="tab" tabindex="0"><div class="uagb-faq-questions-button uagb-faq-questions">			<span class="uagb-icon uagb-faq-icon-wrap">
								<svg xmlns="https://www.w3.org/2000/svg" viewbox= "0 0 448 512"><path d="M432 256c0 17.69-14.33 32.01-32 32.01H256v144c0 17.69-14.33 31.99-32 31.99s-32-14.3-32-31.99v-144H48c-17.67 0-32-14.32-32-32.01s14.33-31.99 32-31.99H192v-144c0-17.69 14.33-32.01 32-32.01s32 14.32 32 32.01v144h144C417.7 224 432 238.3 432 256z"></path></svg>
							</span>
						<span class="uagb-icon-active uagb-faq-icon-wrap">
								<svg xmlns="https://www.w3.org/2000/svg" viewbox= "0 0 448 512"><path d="M400 288h-352c-17.69 0-32-14.32-32-32.01s14.31-31.99 32-31.99h352c17.69 0 32 14.3 32 31.99S417.7 288 400 288z"></path></svg>
							</span>
			<span class="uagb-question">Can evidence also be used for a claim for restitution?</span></div><div class="uagb-faq-content"><p>Yes. The same evidence that is relevant for criminal proceedings often also forms the basis for civil claims, for example against perpetrators or service providers involved.</p></div></div><div class="wp-block-uagb-faq-child uagb-faq-child__outer-wrap uagb-faq-item uagb-block-ab813d0e" role="tab" tabindex="0"><div class="uagb-faq-questions-button uagb-faq-questions">			<span class="uagb-icon uagb-faq-icon-wrap">
								<svg xmlns="https://www.w3.org/2000/svg" viewbox= "0 0 448 512"><path d="M432 256c0 17.69-14.33 32.01-32 32.01H256v144c0 17.69-14.33 31.99-32 31.99s-32-14.3-32-31.99v-144H48c-17.67 0-32-14.32-32-32.01s14.33-31.99 32-31.99H192v-144c0-17.69 14.33-32.01 32-32.01s32 14.32 32 32.01v144h144C417.7 224 432 238.3 432 256z"></path></svg>
							</span>
						<span class="uagb-icon-active uagb-faq-icon-wrap">
								<svg xmlns="https://www.w3.org/2000/svg" viewbox= "0 0 448 512"><path d="M400 288h-352c-17.69 0-32-14.32-32-32.01s14.31-31.99 32-31.99h352c17.69 0 32 14.3 32 31.99S417.7 288 400 288z"></path></svg>
							</span>
			<span class="uagb-question">Who provides support in evaluating and preparing the evidence?</span></div><div class="uagb-faq-content"><p>RU Law specializes in crypto fraud and provides support in the legal classification, prioritization and use of evidence for criminal charges and recovery.</p></div></div></div>


<p></p><p>Der Beitrag <a href="https://ru.law/en/beweismittel-bei-kryptobetrug/">Beweismittel bei Kryptobetrug: Welche Nachweise für Strafanzeige und Rückforderung entscheidend sind</a> erschien zuerst auf <a href="https://ru.law/en">R&amp;U</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>