Could you share the verbiage you used to refuse the request? Or offer any
general guidance for other guard operators in case they receive a similar
request? I can imagine there may be certain jurisdictions where refusing such a
request might be problematic.
Also, are there any guidelines for reducing the log footprint of a relay? Are
the OS defaults generally sufficient, or do operators need to take additional
steps to preserve user privacy?
_______________________________________________
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays