I am running some pretty good developing relays which I would like to change into exit-nodes over time. As I have no experience how to handle possible abuses I would need some help please? Is there anybody out there who can give me some advice, or even help me doing (answering) these? How many of those abuses are to expect? How to avoid on changing what parameters? Any hints highly appreciated. PA
Attachment:
0xC8C330E7.asc
Description: application/pgp-keys
_______________________________________________ tor-relays mailing list tor-relays@xxxxxxxxxxxxxxxxxxxx https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays