|  | @@ -1183,12 +1183,18 @@ The following options are useful only for clients (that is, if
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  |  **PathBiasMultFactor** __NUM__ +
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  | -**PathBiasScaleFactor** __NUM__::
 | 
	
		
			
				|  |  | +**PathBiasScaleFactor** __NUM__ +
 | 
	
		
			
				|  |  | +
 | 
	
		
			
				|  |  | +**PathBiasUseCloseCounts** __NUM__::
 | 
	
		
			
				|  |  |      These options override the default behavior of Tor's (**currently
 | 
	
		
			
				|  |  |      experimental**) path bias detection algorithm. To try to find broken or
 | 
	
		
			
				|  |  |      misbehaving guard nodes, Tor looks for nodes where more than a certain
 | 
	
		
			
				|  |  | -    fraction of circuits through that node fail after the first hop.  The
 | 
	
		
			
				|  |  | -    PathBiasCircThreshold option controls how many circuits we need to build
 | 
	
		
			
				|  |  | +    fraction of circuits through that guard fail to get built. If
 | 
	
		
			
				|  |  | +    PathBiasUseCloseCounts is set to 1 (the default), usage-based accounting is
 | 
	
		
			
				|  |  | +    performed, and circuits that fail to carry streams are also counted as
 | 
	
		
			
				|  |  | +    failures. +
 | 
	
		
			
				|  |  | + +
 | 
	
		
			
				|  |  | +    The PathBiasCircThreshold option controls how many circuits we need to build
 | 
	
		
			
				|  |  |      through a guard before we make these checks.  The PathBiasNoticeRate,
 | 
	
		
			
				|  |  |      PathBiasWarnRate and PathBiasExtremeRate options control what fraction of
 | 
	
		
			
				|  |  |      circuits must succeed through a guard so we won't write log messages.
 |