Every packet that arrives at the exchange is thoroughly inspected based on a comprehensive set of
criteria designed to detect any type of malicious activity.
For example, this inspection can detect the utilization of Tor, a network often used by professional hackers to conceal their location. It can also detect typical attack vectors. For instance, it is capable of rejecting a packet with a potential SQL injection or an XSS attack before the packet even reaches the exchange servers.