<html>
  <head>
    <meta content="text/html; charset=windows-1252"
      http-equiv="Content-Type">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    Yes.<br>
    But, it is easy to exclude your own relays.<br>
    <a class="moz-txt-link-freetext" href="https://www.torproject.org/docs/tor-manual.html.en#ExcludeNodes">https://www.torproject.org/docs/tor-manual.html.en#ExcludeNodes</a><br>
    <div class="moz-cite-prefix">On 02/06/2015 08:54 PM, Chris Tilt
      wrote:<br>
    </div>
    <blockquote
cite="mid:CAMLCkZBzuJ5k=CbY+H8-SQnkDJ-kL+11XY3M-kNsqr4pVgJ44A@mail.gmail.com"
      type="cite">
      <pre wrap="">Hello,

When running a relay that is configured as an Exit, do you run the risk of
your own TOR browsing sessions (initiated from the same private network)
using the relay and effectively short-circuiting the location randomization?

Note that I don't have a relay up yet, so my question may be lacking
clarity.

Cheers, Chris

</pre>
      <br>
      <fieldset class="mimeAttachmentHeader"></fieldset>
      <br>
      <pre wrap="">_______________________________________________
tor-relays mailing list
<a class="moz-txt-link-abbreviated" href="mailto:tor-relays@lists.torproject.org">tor-relays@lists.torproject.org</a>
<a class="moz-txt-link-freetext" href="https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays">https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays</a>
</pre>
    </blockquote>
    <br>
    <pre class="moz-signature" cols="72">-- 
PGP fingerprint: 8516 5FFC 011A 6465 D042 6AC1 D719 1F41 B7CE EDFF
Full PGP public key: <a class="moz-txt-link-freetext" href="https://justaguy.pw">https://justaguy.pw</a></pre>
  </body>
</html>