On 02/17/2015 02:59 PM, lpwzi9i84@use.startmail.com wrote:
...but what we want are nonmalicious guards, right?

If you want non-malicious guards, you may consider
manually configuring bridge relays. Manually verifying
and authenticating the identity of bridge relay operators
is probably the only sure way to get non-malicious guard relays.