Handling complex content in the Extract stage could leave a system open to an attack using the data to compromise the Build. Separation between the two stages, ideally using separate hardware, with the use of a simple interface in between reduces the attack surface available to an attacker.

Independent verification of the simple data format passed between the Extract and Build stages using Field Programmable Gate Arrays (FPGAs) ensures that even the most well resourced attackers cannot affect, or bypass, the Verify process and so cannot influence the Build stage thus ensuring data delivered to the destination is 100% threat free.