Could you share the verbiage you used to refuse the request? Or offer any 
general guidance for other guard operators in case they receive a similar 
request? I can imagine there may be certain jurisdictions where refusing such a 
request might be problematic.

Also, are there any guidelines for reducing the log footprint of a relay? Are 
the OS defaults generally sufficient, or do operators need to take additional 
steps to preserve user privacy?
_______________________________________________
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Reply via email to