Join this validator. Delegate your stake
To protect against DDoS attacks, we make maximum use of the capabilities of cloud providers. Including intrusion detection systems, the introduction of barriers and the ability to absorb attacks through the mechanisms of scaling and load balancing.
Also, protection from DDoS is included in the design of the network architecture. We follow the recommendations for Sentry Node Architecture. This provides a hiding of the real location of the Signature Server (Validator) and load balancing across the Full Nodes
Access from the Internet to all nodes is protected by several levels of firewalls.
The validator is located in an isolated network and is completely unavailable from the Internet. The control capability exists only through an encrypted channel with access by a key.