[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-relays] Handling possible abuse requests



I am running some pretty good developing relays which I would like to
change into exit-nodes over time. As I have no experience how to handle
possible abuses I would need some help please?

Is there anybody out there who can give me some advice, or even help me
doing (answering) these?
How many of those abuses are to expect?
How to avoid on changing what parameters?

Any hints highly appreciated.

PA

Attachment: 0xC8C330E7.asc
Description: application/pgp-keys

_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays