Dealing with sensitive information means going above and beyond to keep it secure. While most of Jiobit’s security platform is built to keep the bad guys out, here are a few of the features that we have implemented that make your Jiobit, application, and associated services one of the most secure consumer electronics platforms in the world.
- We encrypt your child’s data end-to-end using Transport Layer Security (TLS) and Advanced Encryption Standard (AES) Cipher Suites. That means nobody can see your child’s location but you and your designated Care Team. Additionally, your data is encrypted in our data center and on our servers.
- Jiobit uses a security chip, just like a credit card, to enable trusted connections and prevent hacking. This means nobody else can clone it and claim to be that device. Each device has a unique identity/key that cannot be cloned.
- Proprietary Bluetooth encryption makes sure no one can intercept the communications from a Jiobit and spoof your smartphone.
- Cryptographically signed software makes sure that only software approved by Jiobit will run on the Jiobit device.
For more details on Jiobit’s security architecture, check out this blog post that goes into even greater detail and highlights more of our work in this space.