...but what we
want are nonmalicious guards, right?
If you want non-malicious guards, you may consider
manually configuring bridge relays. Manually verifying
and authenticating the identity of bridge relay operators
is probably the only sure way to get non-malicious guard relays.