After two years of self-funded development, this round of funding supports Oraclize’s plan to expand its service and the impact of the technology in different fields.
Thomas Bertani, CEO of Oraclize, comments:
“Since launching in March 2015, the Oraclize concept has evolved and reshaped according to the needs of the market. Today, Oraclize is the longest running oracle service across a multitude of blockchain platforms. Our activity goes beyond that, we have developed a powerful technology securing different kinds of processes. This funding will enable us in bringing our technology to the next level.”
Digital Identity for advancing blockchain tech
The Swiss Digital Identity SA is at the forefront in advancing blockchain technology by financing innovative initiatives. The Company believes that blockchain technology opens many opportunities in a variety of areas, including FinTech and cryptocurrencies. With its primary focus being on financial companies, cryptocurrency wallets and decentralized exchanges among the others, Oraclize represents a strategic investment securing the development of the layer on top of which these financial applications are built.
Natale Ferrara, director of Digital Identity SA, commented:
“Oraclize provides an infrastructure tool essential for blockchain applications to grow and have a concrete impact. I believe that our investment within Oraclize, will support the talented team with its activities and ultimately benefit the blockchain ecosystem as a whole.”
About Oraclize Limited
Oraclize offers the world’s most widely adopted state-of-the-art oracle service. In the blockchain context, it provides a safe data-transport-layer enabling decentralized applications to connect with different context like the web.
Since 2015, Oraclize has served over 200,000 requests on the Ethereum mainnet and several million on testnets, backing its claims with authenticity proofs based on a variety of cryptographic techniques to prove the authenticity of data.
Oraclize enables blockchain applications to overcome common limitations while minimizing additional trust lines. For this reason, the authenticity proofs rely on independent attestors, leveraging both software and hardware-enforced security technologies.