On 02/17/2015 02:59 PM, lpwzi9i84@use.startmail.com wrote:
...but what we want are nonmalicious guards, right?
If you want non-malicious guards, you may consider manually configuring bridge relays. Manually verifying and authenticating the identity of bridge relay operators is probably the only sure way to get non-malicious guard relays.