What is Rivetz? What added value it will provide? and how it actually works?
To understand it, we need to look at the Cybersecurity and realize its potential damage. Cybersecurity Ventures anticipates that the damages will be more than $6 trillion globally. The rising cost of cyber security is too high to offer a solution that is:
- Simple enough to allow adoption by industry and government.
- Secure enough to protect our most valuable secrets and data.
Cyber security is extremely essential, due to the following:
- The existing security tools all assume that the edge of the network is the network perimeter.
- The ever-growing IoT which can only be described as "billions of online objects making the internet wiser".
- The mobile devices which are essential to decentralize data processing, to maintain privacy and security.
And that's where Rivetz comes in: It's constructing a new decentralized approach over a token-based and stable business model to cyber security and transaction assurance which is focusing on the device identity and continuously measuring the state of the device.
And this is what is written about it on their official website:
There are three different phases of operation:
Step 1: The device is paired with the Cybercontrols Marketplace.
Step 2: The device calculates its internal health and integrity hash and prepares to have the manufacturer signatures for the core root of trust verified by the Cybercontrols Marketplace.
Step 3: The Cybercontrols Marketplace executes an owner-provided script to validate any external controls, Enterprise or cloud. It also verifies the manufacturer core root of trust signatures are valid for the Internal device tests. The external health hash is returned to the device. The RvT will be used to obtain these services as required.
Step 4: The device uses an RvT token to seal the combined internal and external health hash and record this reference health measurement on the Global Attestation and Identity Network.
Step 1: The user selects a service that requires a health check and the device creates a unique transaction ID.
Step 2: The device performs an internal real-time test and an external real-time test and calculates a combined real-time health.
Step 3: The device seals the combined real-time health hash with the reference health hash locator with an RvT token and transmits the request to a Cybersecurity Controller for verification of a match.
Step 4: The Cybersecurity Controller retrieves the reference health hash and compares it to the real-time health hash. If they match, the device can be said to be in a reference condition.
Step 5: The Cybersecurity Controller delivers the logged event with a transaction ID to the global attestation and identity network and the results of the verification to be logged by the application as appropriate.
Step 1: A request is made to audit a transaction.
Step 2: The transaction ID is used to locate the logged event and verify the test was true.
Step 3: The reference health hash is received.
Step 4: The owner provides the Cybercontrols Marketplace the hash and the transaction ID that was used to create the external hash and the process executed to calculate the internal hash. The Cybercontrols Marketplace will verify the math and generate a transaction report for the owner proving the controls that were measured prior to the execution of the transaction.
Images are all from the official sites 1,2.
The purpose of these reviews is to give a brief and comprehensive idea about this project, so the reader can make a decision of whether or not to participate in that project. I hope you liked this review, let me know your thoughts in the comments below.
Despite the fact, that I don't understand all the technical details mentioned in this post. But I appreciate the idea and how important it is.
Thank you for sharing.
😁 I am glad you're interested.
Thank you for the comment, I really appreciate it.
You spinned the Wheel of Upvotes!
Where did it land?
Congratulations! The upvote is coming straight to your post!
If you like this idea, please upvote this comment or try another spin on the wheel so the project can grow!
Thanks for using my service ahmad.rezk! Sorry for being so slow with it, but there is too much to do and I don't have enough time to spin so I will spin on my great new wheel as compensation! :) Anyway you should totally always have 5 tags on your post to increase the post's visibility. :)
Congratulations! This post has been upvoted from the communal account, @minnowsupport, by ahmadrezk from the Minnow Support Project. It's a witness project run by aggroed, ausbitbank, teamsteem, theprophet0, and someguy123. The goal is to help Steemit grow by supporting Minnows and creating a social network. Please find us in the Peace, Abundance, and Liberty Network (PALnet) Discord Channel. It's a completely public and open space to all members of the Steemit community who voluntarily choose to be there.
If you like what we're doing please upvote this comment so we can continue to build the community account that's supporting all members.
Wooow, this is one of the best analysis on Rivetz I have seen out there. Quite technical but really good! We've done similarly deep analysis of this project only recently... https://steemit.com/cryptocurrency/@ipa-news/rivetz-review-usdrvt-5min-read , it's taken us 20+ hours of work (digging, researching and asking questions). It’s been a very time consuming research but well worth it if you’re into finding strong fundamentals.