1 o Minor features (protocol, proxy support, defense in depth):
2 - Respond more deliberately to misbehaving proxies that leave leftover
3 data on their connections, so as to be even less likely as to allow
4 them to pass their data off as having come from a relay.