Skyhook to provide location service protections to Rivetz network :


Skyhook is partnering with Rivetz to integrate Skyhook’s global mobile location services to enhance the Rivetz platform.

Skyhook is the operator of a worldwide independent location services platform. The company’s technology provides the foundation for mobile location services in the global market for connected devices.

Skyhook’s hybrid positioning system locates devices using observed radio signals — including GNSS, Wi-Fi and cellular — ensuring that all devices can be located in all environments.

Rivetz offers decentralized, embedded cybersecurity tools.

By enabling Skyhook’s advanced location capabilities on the Rivetz Network of cybersecurity tools, Rivetz users can take advantage of location service protection in any signal environment, regardless of GPS availability.

Accurate and accessible device location services are a critical component of all end-to-end security solutions, particularly in regulated environments or other markets where trusted and verifiable location is a requirement.

“We are pleased to partner and collaborate with Rivetz, a trusted leader in decentralized mobile security,” said Kipp Jones, Chief Technology Evangelist of Skyhook. “We share the values that our products must be built on the pillars of trust and respect for individual privacy. We look forward to providing Skyhook’s industry-leading location services to the Rivetz Network.”

“We are proud to join forces with Skyhook to enable powerful location services to the Rivetz Network,” said Steven Sprague, co-founder and CEO of Rivetz. “A simple and safe security model is our greatest priority, and precise device location is a cornerstone of protecting our cybersecurity solutions.”

Rivetz’s security solutions hinge upon access to the Trusted Execution Environment (TEE), which is an isolated, measured computer environment separate from the operating system. By provisioning all digital transactions through the TEE, Rivetz assures that users’ private keys cannot be altered or stolen if the operating system were tampered with or infected by malware.



Source link