Rivetz The decentralized cyber security token


Rivetz uses the RvT token and blockchain to cryptographically prove that the vault in your phone is secure, all the way from the manufacturer to your pocket. The RvT blockchain can perform a health check, verifying that your vault’s integrity is intact, and that transactions you send are exactly the ones you intended.

The Trusted Execution Environment Think of the TEE as a private “vault” inside your phone’s hardware – but instead of software (like apps and iOS/Android), it’s already built into your phone (the hardware). Inside of this vault, everything is isolated. No apps or software or operating system can see what’s inside. This could be your secrets, your passwords, keys, or any other private information. RvT: The Rivet Token Rivetz uses the RvT token and blockchain to cryptographically prove that the vault in your phone is secure, all the way from the manufacturer to your pocket. The RvT blockchain can perform a health check, verifying that your vault’s integrity is intact, and that transactions you send are exactly the ones you intended. Fundamentally, RvT creates an ecosystem for cybersecurity micropayments. Your banks use RvT to verify identify for withdrawing funds. Your local store uses RvT to protect its supply chain. Through RvT, everyday society and actions are securely powered by the blockchain. Attestation, Health and Integrity The Rivetz system binds the health and integrity of the device to a transaction. When you make an important transaction, the device’s health is checked against its healthy condition. Have malware on your phone? Connected to a malicious WiFi hotspot? Rivetz ensures that your transaction will not go through until your device health is restored and it can proceed safely. Bringing It Together Proof of ownership of the RvT token private key will allow forensic proof that the transactions were completed from a known device. The blockchain maintains proof that you connected to the services you intended to connect to, and that your device passed the require security tests. This can work in everything from the most basic applications – such as the verification that a private message is actually private – to identity verification in banking or enterprise.

Matthew Roszak

David A. Johnston

Ari Singer

Greg Kazmierczak

Andy Tarbox

Steven Sprague

CEO & Cofounder

Michael Sprague

CTO & Cofounder

Sean Gilligan

VP Engineering

Mark Hoblit

Senior Developer

Greg Laun

Software Developer

George Gilder

Board Member

Bradley Rotter

Vice Chair

Joe Trippi

Board Member

John Edge

Strategic Business Advisor


  1. Warning: Invalid argument supplied for foreach() in /home/livecryptorates/public_html/ico-details.php on line 121