Below are a list of active switches which users have opted to make public. This list may include decoys, which we regularly deploy to help protect our users and obfuscate our attack surface.