How to contribute bandwidth to Tor safely and what to know about abuse issues
You can still contribute bandwidth to Tor without exposing yourself to exit relay abuse complaints. By configuring your relay's exit policy, you control exactly which outbound connections-if any-are allowed. While the Tor Project actively monitors for and removes bad relays, we cannot and do not monitor individual users' activity by design.
Each Tor relay has an exit policy that specifies what sort of outbound connections are allowed or refused from that relay. The exit policies are propagated to Tor clients via the directory, so clients will automatically avoid picking exit relays that would refuse to exit to their intended destination. This way each relay can decide the services, hosts, and networks it wants to allow connections to, based on abuse potential and its own situation. Read the Support entry on issues you might encounter if you use the default exit policy, and then read Mike Perry's tips for running an exit node with minimal harassment.
The default exit policy allows access to many popular services (e.g. web browsing), but restricts some due to abuse potential (e.g. mail) and some since the Tor network can't handle the load (e.g. default file-sharing ports). You can change your exit policy by editing your torrc file. If you want to avoid most if not all abuse potential, set it to "reject *:*". This setting means that your relay will be used for relaying traffic inside the Tor network, but not for connections to external websites or other services.
If you do allow any exit connections, make sure name resolution works (that is, your computer can resolve Internet addresses correctly). If there are any resources that your computer can't reach (for example, you are behind a restrictive firewall or content filter), please explicitly reject them in your exit policy otherwise Tor users will be impacted too.
In parallel, Tor has a dedicated Network Health team investigating bad relay behavior and removing malicious relays from the network. However, by design we cannot see or control what individual users do on the network. This design overwhelmingly enables beneficial uses-such as for human rights defenders, journalists, domestic-violence survivors, whistleblowers, and even law-enforcement officers. Learn more about our users and Tor's beneficial use cases.