
26 Apr
2017
26 Apr
'17
7:06 p.m.
Could you share the verbiage you used to refuse the request? Or offer any general guidance for other guard operators in case they receive a similar request? I can imagine there may be certain jurisdictions where refusing such a request might be problematic. Also, are there any guidelines for reducing the log footprint of a relay? Are the OS defaults generally sufficient, or do operators need to take additional steps to preserve user privacy?