bekerja layaknya dinding pelindung, memeriksa setiap permintaan masuk, dan hanya mengizinkan akses dari sumber yang dianggap aman.Soon after development to the CI, the installer is analyzed from A selection of distribution that match the installer architecture ($ARCH). By way of example when architecture is aarch64, the made installer is examined t