The Rivet token is the CyberSecurity token. Together with the Rivetz ecosystem, it provides proof and assurance of privacy and security at a hardware level.
The shift to decentralized security requires that the integrity of the data is built into the system; reliance on network observation is no longer effective.
The Trusted Execution Environment
Think of the TEE as a private “vault” inside your phone’s hardware – but instead of software (like apps and iOS/Android), it’s already built into your phone (the hardware). Inside of this vault, everything is isolated. No apps or software or operating system can see what’s inside. This could be your secrets, your passwords, keys, or any other private information.
RvT: The Rivet Token
Rivetz uses the RvT token and blockchain to cryptographically prove that the vault in your phone is secure, all the way from the manufacturer to your pocket. The RvT blockchain can perform a health check, verifying that your vault’s integrity is intact, and that transactions you send are exactly the ones you intended.
Fundamentally, RvT creates an ecosystem for cybersecurity micropayments. Your banks use RvT to verify identify for withdrawing funds. Your local store uses RvT to protect its supply chain. Through RvT, everyday society and actions are securely powered by the blockchain.
Attestation, Health And Integrity
The Rivetz system binds the health and integrity of the device to a transaction. When you make an important transaction, the device’s health is checked against its healthy condition. Have malware on your phone? Connected to a malicious WiFi hotspot? Rivetz ensures that your transaction will not go through until your device health is restored and it can proceed safely.
Bringing It Together
Proof of ownership of the RvT token private key will allow forensic proof that the transactions were completed from a known device. The blockchain maintains proof that you connected to the services you intended to connect to, and that your device passed the require security tests. This can work in everything from the most basic applications – such as the verification that a private message is actually private – to identity verification in banking or enterprise.