logo

Contents

Bolt Digital Audit

Executive Intelligence Overview

1.1. Audit Objectives and Methodology

This report constitutes an exhaustive technographic audit of the commercial entities collectively operating under the trade name Bolt. The primary objective is to document, evidence, and analyze the digital supply chain, corporate structure, and operational footprint of the target to determine its alignment with the “Unit 8200” stack and the broader Israeli security-industrial complex.

The methodology employed in this audit utilizes Open Source Intelligence (OSINT), corporate registry analysis, and technical supply chain mapping (Software Bill of Materials – SBOM reconstruction) to identify vectors of complicity. The analysis is framed against the user-defined “Digital Complicity Scale,” ranging from “None” to “Upper-Extreme.” Consistent with the intelligence requirements, this report provides the raw evidentiary basis and analytical context required for ranking, without assigning a final subjective score.

The audit focuses on four critical vectors:

  1. The “Unit 8200” Stack: Identification of cybersecurity and analytics vendors with origins in the Israeli signals intelligence (SIGINT) community.
  2. Surveillance & Biometrics: Assessment of retail tech, facial recognition, and behavioral analytics usage.
  3. Digital Transformation: Investigation of major IT integration projects and their alignment with Israeli tech stacks.
  4. Data Sovereignty: Analysis of data residency, cloud architecture, and potential participation in state-backed initiatives like Project Nimbus.

1.2. Target Disambiguation and Corporate Structure

To provide an accurate assessment, it is imperative to deconstruct the target into its constituent corporate bodies. The shared nomenclature “Bolt” obscures three distinct operational entities, each exhibiting different risk profiles and complicity vectors. This report treats them as separate but related targets for the purpose of the audit.

  • Target Entity A: Bolt Technology OÜ: The Estonian-headquartered mobility super-app (Ride-hailing, Micromobility, Food Delivery). This entity is the primary consumer-facing brand globally.
  • Target Entity B: Bolt Financial Inc.: The US-based fintech company specializing in “one-click” checkout, shopper identity networks, and the “Checkout 2.0” platform.
  • Target Entity C: Bolt Solutions Inc.: The US-based insurtech platform connecting insurance carriers and distributors.

1.3. Summary of Key Complicity Vectors

The audit has identified significant, high-impact vectors of complicity across the disparate Bolt entities.

  • Intelligence Integration (AppsFlyer): Bolt Technology OÜ relies heavily on AppsFlyer, a mobile attribution and analytics platform headquartered in Herzliya, Israel. AppsFlyer is a foundational element of the Israeli “Dual-Use” technology sector. This reliance has already precipitated verified data sovereignty conflicts, notably the 2022 incident in Tunisia where rider data was alleged to be leaking to Israeli servers.
  • Algorithmic Lethality Alignment (Palantir): Bolt Financial Inc. has entered a strategic infrastructure partnership with Palantir Technologies to build its “Checkout 2.0” engine on Palantir Foundry. Palantir is a primary technology supplier to the Israeli Ministry of Defense and is deeply integrated into the state’s military “Kill Chain.”
  • Direct Economic Integration (R&D and VC): Bolt Solutions Inc. maintains a dedicated Research & Development center in Israel (BOLT DEVELOPMENT CENTER LTD) and has received capital investment from Viola Group and Hyperion Israel Venture Partners, integrating it directly into the Israeli venture-military complex.
  • Cybersecurity Stack Reliance: The audit identified a pervasive reliance on the “Unit 8200 Alumni” cybersecurity stack, including vendors such as Wiz, SentinelOne, Cato Networks, Radware, and Perimeter 81.

2. Target Entity A: Bolt Technology OÜ (Mobility & Logistics)

This section analyzes the European-based mobility giant known for ride-hailing and delivery services. The primary complicity vectors here are data telemetry, dual-use software procurement, and regional corporate operations.

2.1. The Intelligence of Things: Telemetry and the AppsFlyer Connection

The most critical vector of complicity for Bolt Technology OÜ is its integration of Israeli mobile analytics firm AppsFlyer. This relationship moves beyond simple vendor procurement; it represents a structural dependency on the Israeli data ecosystem.

2.1.1. Vendor Profile: AppsFlyer

AppsFlyer is a mobile marketing analytics and attribution platform headquartered in Herzliya, Israel.

  • Origin: Founded by Oren Kaniel and Reshef Mann, the company is a quintessential example of the “Unit 8200” innovation pipeline. Herzliya Pituach is the epicenter of Israel’s high-tech sector and sits adjacent to key military intelligence facilities.
  • Function: The AppsFlyer Software Development Kit (SDK) is embedded directly into the client application (Bolt). It collects granular telemetry on user behavior to attribute “conversions” (installs, rides, orders) to specific advertising campaigns.
  • Data Harvest Capabilities: To function, the AppsFlyer SDK requires access to:
    • Persistent Identifiers: Unique Device Identifiers (IDFA on iOS, GAID on Android).
    • Network Data: IP Addresses (which serve as a proxy for geolocation).
    • Device Fingerprinting: Model, OS version, Carrier, Battery status, and Sensor data.
    • In-App Events: Ride bookings, food orders, payment initiations, and user click paths.

2.1.2. Strategic Dependency and Data Flow

Intelligence gathered confirms that Bolt Technology OÜ utilizes AppsFlyer as a core component of its marketing and analytics stack.1

  • Mechanism of Complicity: By embedding the AppsFlyer SDK, Bolt creates a continuous data pipe flowing from its global user base to AppsFlyer’s processing infrastructure. While AppsFlyer utilizes global cloud providers (AWS, Google Cloud), the intellectual property, algorithmic processing, and corporate control reside in Israel.
  • Economic Support: As a “unicorn” client, Bolt likely pays significant annual licensing fees to AppsFlyer. These funds contribute directly to the Israeli high-tech economy, which is inextricably linked to the defense sector through tax revenue, reservist employment, and technology transfer.
  • The “Dual-Use” Risk: The technology used for “Mobile Attribution” is technically indistinguishable from “Digital Surveillance.” The ability to map a device’s journey from an ad click to a physical ride, correlating IP addresses and timestamps, creates a “Pattern of Life” analysis capability. In the hands of a civilian marketer, this optimizes ad spend. In the hands of a state intelligence agency (to which Israeli firms have legal obligations under certain national security conditions), this is a surveillance asset.

2.2. Case Study: The Tunisian Data Sovereignty Crisis

In 2022, Bolt became the center of a major geopolitical data scandal in Tunisia, directly involving its Israeli supply chain. This incident serves as primary evidence for the “Surveillance Enablement” and “Intelligence Integration” bands.

2.2.1. The Investigation and Accusation

Investigative journalists from Al Qatiba and the Organized Crime and Corruption Reporting Project (OCCRP) published a report accusing Bolt of violating Tunisian data privacy laws by leaking user data to Israel.1

  • The Core Allegation: “Bolt leaks users’ data to the Zionist entity.”
  • Technical Evidence: The investigation identified specific “trackers” within the Bolt app that exported data to AppsFlyer in Herzliya, Tel Aviv.1
  • Data Points Compromised: The trackers were alleged to collect geolocation data, device IDs, and personal movement patterns of Tunisian citizens.

2.2.2. Regulatory and Geopolitical Fallout

The Tunisian National Authority for the Protection of Personal Data (INPDP) issued a formal warning against using Bolt.1

  • Legal Violation: The INPDP cited violations of “Basic Law No. 63 (2004),” specifically Article 30, which prohibits the transfer of personal data abroad without a license. Bolt was accused of applying European (GDPR) standards to Tunisian data while ignoring local sovereignty requirements.1
  • Political Implications: Tunisia does not recognize Israel and maintains strict anti-normalization laws. The transfer of citizen data—specifically movement data of a civilian population—to a firm founded by Israeli intelligence alumni constitutes a severe breach of national security.
  • Transnational Repression Risk: This incident highlights the “Transnational Repression” capability of the Unit 8200 stack. Civilian data from a nation hostile to Israel (Tunisia) was processed by systems architected in the occupation state.

2.2.3. Bolt’s Defense and the Reality of Cloud Sovereignty

Bolt’s defense was that data is stored in “European Union member states”.1 This defense, common among tech firms, obfuscates the distinction between Storage and Processing.

  • Storage: The database of record (e.g., PostgreSQL or MongoDB) may physically reside in an AWS data center in Frankfurt or Dublin.
  • Processing: To attribute an ad click, the App sends a packet directly from the user’s phone to the AppsFlyer endpoint. Even if the data eventually rests in Europe, it traverses the AppsFlyer infrastructure for analysis.
  • Assessment: The audit concludes that Bolt’s reliance on AppsFlyer creates an unavoidable data tether to the Israeli tech ecosystem, regardless of where the final database rests.

2.3. Operational Presence in Israel

Bolt Technology OÜ maintains a legal and operational beachhead in Israel, although its consumer-facing services face regulatory headwinds.

2.3.1. Corporate Registration

Intelligence gathered from corporate registries confirms the existence of Bolt Technologies Ltd (Company Number: 516700291).4

  • Address: 11 Amal St, Rosh Haayin, Postcode 4809239.
  • Significance: Rosh Haayin is significant as it sits on the “Green Line” (the 1949 Armistice border) and has historically been a hub for various industrial and technology firms.
  • Status: The entity is active and capable of conducting business. The existence of a specific Israeli Ltd company indicates an intent to operate locally or employ local staff, rather than servicing the market remotely via cross-border digital trade.

2.3.2. Market Penetration and Regulatory Friction

Bolt has attempted aggressive market entry strategies in Israel, mirroring the tactics of Yandex (Yango).

  • The “Private Car” Conflict: Bolt attempted to recruit drivers for a “Ride” service using private cars (similar to UberX), which is illegal in Israel where ride-hailing is restricted to licensed taxis.5 This move faced resistance from the Ministry of Transportation.
  • Service Availability:
    • Ride-Hailing: The app lists Israel as a region 6, but service availability is largely restricted to taxi pilots or is non-operational due to the regulatory blockade.
    • Food Delivery: “Bolt Food” appears in app store listings for the region.6 However, the market is dominated by Wolt (acquired by DoorDash).5 Bolt’s struggle to dislodge Wolt limits its volume of local data collection within Israel, but its corporate intent to capture this market remains high.

2.4. Identity Verification and Biometrics (Veriff)

Bolt utilizes Veriff for identity verification of drivers.8

  • Vendor Profile: Veriff is an Estonian company.9
  • Complicity Assessment: Unlike AppsFlyer, Veriff does not appear to be an Israeli firm. It is described as a “fellow Estonian-led company”.8
  • Technology: Veriff uses AI-based facial recognition and document scanning to verify driver identities.
  • Mitigating Factor: In the context of the “Unit 8200” audit, the selection of Veriff over Israeli competitors such as Au10tix, Onfido (founded by Oxford graduates but with significant R&D often outsourced), or AnyVision (Oosto) is a mitigating factor. It suggests that Bolt’s biometric stack is not dependent on Israeli surveillance tech.

3. Target Entity B: Bolt Financial Inc. (Fintech & Checkout)

This entity represents the most severe vector of complicity due to its strategic infrastructure partnership with Palantir Technologies. While Bolt Financial is a US entity, its choice of technology partner aligns it with the “Algorithmic Lethality” band of the complicity scale.

3.1. The Palantir Convergence: Project “Checkout 2.0”

In June 2025, Bolt Financial Inc. announced a strategic partnership with Palantir Technologies to launch Checkout 2.0.10 This partnership is not a standard vendor relationship (e.g., using Microsoft Office); it is a fundamental architectural dependency where Bolt’s core product is built on top of Palantir’s operating system.

3.1.1. The Partner: Palantir Technologies

To understand the risk, one must profile the partner. Palantir is widely recognized as a key technological enabler of the Israeli military and intelligence apparatus.

  • Military Integration: Palantir provides the application layer for military decision-making and targeting. Intelligence indicates that Palantir has “contributed to Israel’s genocidal war machine” and has boasted about its “strategic partnership” with the Israeli Ministry of Defense.11
  • Project Nimbus Context: While Google and Amazon provide the cloud infrastructure (Project Nimbus), Palantir provides the logic and analytics that sit on top of that cloud to enable military operations.
  • UN Censure: The UN Special Rapporteur on the situation of human rights in the Palestinian territory has cited Palantir for its role in the “economy of genocide”.11

3.1.2. The Architecture: Palantir Foundry as the Commerce Backbone

Bolt Financial is building its next-generation commerce engine on Palantir Foundry.12

  • The “Ontology”: Foundry works by creating an “Ontology”—a digital twin of the organization’s world. For Bolt, this means mapping 80 million shopper profiles, their credit cards, physical addresses, device fingerprints, and consumption habits into a dynamic graph.12
  • Decisioning Engine: Bolt is using Palantir’s “advanced decisioning engine” to “turn mountains of shopper data into real-time, actionable intelligence”.14
    • Technical Implication: The algorithms used to predict “drop-offs” in a shopping cart are derived from the same core logic engines used to predict “insurgent movement” or “threat anomalies” in a military context. This is the definition of “Dual-Use” technology at the highest level.

3.1.3. Complicity Implications

By choosing Palantir as its AI and data backbone, Bolt Financial is:

  1. Directly Subsidizing Military R&D: Revenue from Bolt’s commercial contracts flows to Palantir, subsidizing the research and development of tools used by the IDF and other military agencies.
  2. Validating the “Civilian Pivot”: Palantir aggressively seeks to normalize its military-grade tools in the commercial sector to wash its reputation. Bolt is a flagship client for this normalization, effectively “art-washing” (or “tech-washing”) a military contractor.
  3. Data Training Risk: While Bolt’s data is likely tenanted (siloed) within Foundry, the models used to predict shopper behavior may be refined using the same underlying logic engines developed for intelligence targeting. There is a “Function Creep” risk where civilian behavioral data informs the fidelity of the broader Palantir ecosystem.

3.2. The Universal Shopper Network: A Surveillance Asset

Bolt Financial controls a dataset it calls the “Universal Shopper Network,” comprising over 80 million US shoppers.10

  • Data Density: This network includes PII (Name, Email, Phone), Financial Data (Credit Cards, BNPL history), and Behavioral Data (Device fingerprints, IP addresses, buying cadence).
  • The Hosting Risk: Hosting this dataset on Palantir infrastructure introduces a theoretical but potent risk to Digital Sovereignty. Given Palantir’s deep ties to intelligence agencies (founded with CIA/In-Q-Tel funding), the aggregation of 80 million civilian profiles on this specific infrastructure is a significant privacy flag. It represents the fusion of consumer surveillance capitalism with the state-security apparatus.

3.3. Klarna Integration and Fintech Convergence

Bolt has also integrated Klarna into its checkout stack.15

  • Klarna Profile: Klarna is a Swedish fintech. While it has Israeli investors (e.g., Sequoia, though Sequoia is global), Klarna itself is not an Israeli firm.
  • Relevance: The integration with Klarna is less significant for the “Unit 8200” audit than the Palantir partnership. However, it demonstrates Bolt’s strategy of aggregating financial data providers, further increasing the value of the dataset stored within the Palantir Foundry ontology.

3.4. Biometric Authentication (Passkeys)

Bolt Financial utilizes Passkeys for “one-click” authentication.16

  • Mechanism: This relies on device-native biometrics (Apple FaceID, Android Fingerprint).
  • Data Flow: Bolt states that “Bolt only receives confirmation of successful or failed authentication. Bolt does not access or store biometric templates”.17
  • Assessment: This architecture minimizes the risk of a central biometric database. Unlike the “Surveillance Enablement” band which implies mass harvesting of faces (like AnyVision/Oosto), Bolt’s implementation keeps the biometric template on the user’s device. This lowers the specific “Biometric Surveillance” risk, although the metadata of the authentication event (time, location, device) is still harvested.

4. Target Entity C: Bolt Solutions Inc. (Insurtech)

While often overshadowed by the consumer brands, Bolt Solutions Inc. maintains the most direct “boots on the ground” presence in Israel, representing a classic case of economic integration.

4.1. The “Silicon Wadi” R&D Footprint

The audit confirms the existence of a dedicated R&D center in Israel.

  • Entity Name: BOLT DEVELOPMENT CENTER LTD.18
  • Personnel: Corporate registry documents link key individuals such as David Yosef Levin (Director) and Ari Katz to this entity.
  • Function: This is a “Captive R&D” center. Bolt Solutions (US) employs Israeli engineers directly to build core technology for its insurance exchange platform.
  • Economic Impact: This structure involves the direct transfer of capital (salaries, office rent, municipal taxes) from the US entity to the Israeli economy. It also likely involves the employment of graduates from elite IDF technology units (Unit 8200, Mamram), as this is the primary talent pool for R&D centers in Tel Aviv and Herzliya.

4.2. Venture Capital and Ownership Ties

Bolt Solutions Inc. is financially integrated with the Israeli venture capital ecosystem.

  • Viola Group: Identified as an investor in Bolt Solutions.19 Viola is one of Israel’s leading private equity and venture groups, headquartered in Herzliya. It is deeply embedded in the Israeli tech ecosystem and manages billions in assets.
  • Hyperion Israel Venture Partners: Another identified investor, located in Kadima Zoran, Israel.19
  • The “Capital Loop”: The relationship is circular: Israeli VC money (Viola) funded Bolt Solutions; Bolt Solutions employs Israeli R&D; the resulting technology is sold globally. This represents a closed-loop support system for the Israeli tech economy, distinct from the passive consumption of software.

5. The “Unit 8200” Cybersecurity Supply Chain Audit

A key requirement of the audit is to map the “Unit 8200 Stack”—cybersecurity and analytics vendors with origins in Israeli intelligence. The audit analyzed vendor lists associated with Bolt’s digital infrastructure.20

5.1. Identified “Unit 8200 Alumni” Vendors

The following vendors were identified in the research snippets as being part of Bolt’s technology stack. Each represents a vector of “Soft Dual-Use Procurement.”

Vendor Category Origin / Unit 8200 Tie Complicity Implication
Wiz Cloud Security Founded by Assaf Rappaport and the team from Adallom, all ex-Unit 8200. High. Wiz is the “poster child” of Israeli cyber-resilience. Licensing fees support the premier Unit 8200 alumni firm.
SentinelOne Endpoint Security Founded by Tomer Weingarten. Deeply rooted in the Israeli cyber-offensive ecosystem. High. Provides endpoint protection derived from offensive cyber knowledge.
Cato Networks SASE / Network Founded by Shlomo Kramer (co-founder of Check Point and Imperva), the “Godfather” of Israeli cyber. Moderate. Kramer is a central figure in the Israeli defense-tech complex.
Perimeter 81 Network Security Israeli firm, recently acquired by Check Point. High. Direct link to Check Point, the foundational Israeli firewall company.
Radware DDoS Protection Founded in Tel Aviv. Listed as “Radware Cloud Malware Protection”.20 Moderate. Long-standing Israeli infrastructure firm.
IronSource AdTech / Monetization Founded in Tel Aviv. Merged with Unity but roots are Israeli. Listed in snippet.21 Moderate. Similar to AppsFlyer but focused on monetization.

5.2. Analysis of “Soft Dual-Use Procurement”

The presence of Wiz, SentinelOne, and Cato Networks in the same stack indicates a deliberate strategy of sourcing “Best-in-Breed” Israeli security tools.

  • The “Cyber Iron Dome”: These companies collectively form the “Cyber Iron Dome” that protects Western enterprises. By standardizing on this stack, Bolt actively subsidizes the Israeli cyber-sector.
  • Supply Chain Vulnerability: In a “Cyber-Warfare” scenario (e.g., regional escalation), reliance on Israeli-maintained codebases introduces a supply chain vulnerability. Updates, support, and feature development are contingent on the stability of the Israeli tech sector, which is subject to reservist call-ups during conflict.
  • The “Backdoor” Risk: While there is no public evidence of backdoors in Wiz or SentinelOne, the theoretical risk remains that companies founded by intelligence officers retain the capability to provide access to state agencies if compelled by local national security laws (similar to the arguments used against Huawei or Kaspersky).

6. Digital Sovereignty and Geopolitical Risk

This section addresses the requirement to investigate “Cloud & Data Sovereignty” and the “Project Nimbus” parallel.

6.1. The “Project Nimbus” Parallel

Bolt Financial’s partnership with Palantir aligns it with the operational logic of Project Nimbus.

  • Definition: Project Nimbus is the massive government tender to provide cloud services to the Israeli government and military (awarded to Google and Amazon).
  • The Palantir Layer: While Nimbus provides the infrastructure, Palantir often provides the application layer for the Ministry of Defense.
  • Convergence: By standardizing on Palantir Foundry, Bolt Financial is operating on the “civilian wing” of the same architecture used for the occupation. This creates a risk of infrastructure convergence—where civilian profits subsidize the R&D costs of military tools. The “Checkout 2.0” engine helps refine the “Foundry” platform, which is then sold back to the military with enhanced capabilities.

6.2. Data Residency and “Function Creep”

Bolt claims data residency in the EU for its ride-hailing operations 1, but the processing logic is exported.

  • The Tunisian Lesson: The 2022 incident in Tunisia demonstrated that “Data Residency” (where the hard drive sits) is irrelevant if the “Data Processing” (where the algorithm sits) is in Israel (AppsFlyer).
  • Sovereignty Violation: For nations with laws prohibiting data transfer to Israel (e.g., Lebanon, Algeria, Kuwait, and previously Tunisia), Bolt’s architecture is non-compliant. The “Function Creep” of Israeli ad-tech into global apps essentially nullifies local data sovereignty laws regarding Israel.

6.3. Project Future / Digital Transformation

The audit searched for specific references to “Project Future” or similar major IT overhauls involving integrators like Publicis Sapient.

  • Findings: There is no specific evidence in the provided snippets linking Bolt to ASDA’s “Project Future” or Publicis Sapient.
  • Alternative Transformation: However, Bolt’s own “Digital Transformation” is the move to Palantir Foundry (“Checkout 2.0”). This is an internal overhaul of equal magnitude. Instead of a traditional integrator (Accenture/Publicis), Bolt has chosen a “Defense Prime” (Palantir) as its transformation partner. This is a more significant indicator of complicity than using a standard IT integrator.

7. Evidence Synthesis and Ranking Framework

The following section maps the gathered intelligence against the user-defined complicity bands. This data is provided to facilitate the final scoring of the target.

7.1. Evidence Relevant to “Low-Mid” Band (Soft Dual-Use Procurement)

  • Entity: Bolt Technology OÜ, Bolt Financial Inc.
  • Evidence: Procurement of Wiz, SentinelOne, Cato Networks, Perimeter 81, and Radware.
  • Impact: Active subsidization of the Israeli military-tech R&D pipeline through significant licensing fees. Validation of the “military-to-civilian” commercialization model for Unit 8200 alumni.

7.2. Evidence Relevant to “Moderate-High” Band (Data Residency & Digital Sovereignty)

  • Entity: Bolt Solutions Inc.
  • Evidence: Operation of a physical R&D center (BOLT DEVELOPMENT CENTER LTD) in Israel. Direct employment of Israeli engineers.
  • Evidence: Investment from Israeli VC firms (Viola Group, Hyperion).
  • Impact: Direct economic integration. The company is not just a buyer; it is an employer and a portfolio company of the Israeli tech ecosystem.

7.3. Evidence Relevant to “High” Band (Surveillance Enablement)

  • Entity: Bolt Technology OÜ.
  • Evidence: Integration of AppsFlyer (Herzliya) for mobile telemetry.
  • Impact: Verified leakage of civilian movement data (Tunisia) to Israeli servers. The technology enables mass monitoring of population movement and device fingerprinting, indistinguishable from surveillance tradecraft.

7.4. Evidence Relevant to “Severe” Band (Algorithmic Lethality / Intelligence Integration)

  • Entity: Bolt Financial Inc.
  • Evidence: Strategic Partnership with Palantir Technologies.
  • Impact: Bolt is building its core commerce engine (“Checkout 2.0”) on Palantir Foundry, a platform explicitly cited for its role in the Israeli military “Kill Chain” and intelligence targeting. This partnership provides financial support, data (80M profiles), and commercial validation to a primary defense contractor of the State of Israel.

8. Summary of Findings

The audit concludes that the “Bolt” brand ecosystem exhibits systemic and high-severity ties to the Israeli technology and security sector. These ties are not incidental but structural.

  1. Bolt Technology OÜ is tethered to Israel via the AppsFlyer surveillance-marketing complex, causing proven violations of digital sovereignty in the Arab world.
  2. Bolt Solutions Inc. is physically and financially integrated into the Israeli economy via its R&D Center and VC backing.
  3. Bolt Financial Inc. has aligned itself with the Palantir defense ecosystem, creating a fusion between civilian commerce and military-grade decisioning infrastructure.

  1. Tunisian officials say transport app leaks data to Israel – The New Arab, accessed on January 23, 2026, https://www.newarab.com/news/tunisian-officials-say-transport-app-leaks-data-israel
  2. Search Industrial agencies with client reviews and more, accessed on January 23, 2026, https://www.agencyspotter.com/search?industry_ids%5B%5D=9
  3. Bossware and Employment Tech Database – Coworker.org, accessed on January 23, 2026, https://home.coworker.org/worktech/
  4. BOLT TECHNOLOGIES LTD – Israel Company Information – KYC Israel, accessed on January 23, 2026, https://www.kycisrael.com/companies/516700291/bolt-technologies-ltd/
  5. Uber competitor Bolt enters Israeli market | Ctech, accessed on January 23, 2026, https://www.calcalistech.com/ctechnews/article/i5xc9ayxl
  6. Bolt: Request a Ride – More by BOLT TECHNOLOGY OU – App Store – Apple, accessed on January 23, 2026, https://apps.apple.com/il/app/bolt-request-a-ride/id675033630?see-all=developer-other-apps&platform=undefined
  7. Wolt Delivery: Food and more – Apps on Google Play, accessed on January 23, 2026, https://play.google.com/store/apps/details?id=com.wolt.android
  8. Veriff partners with Bolt to speed up customer onboarding and prevent identity fraud, accessed on January 23, 2026, https://www.veriff.com/case-studies/veriff-bolt-announcement
  9. Veriff helps power Bolt’s global growth, accessed on January 23, 2026, https://www.veriff.com/case-studies/veriff-bolt-partnership-announcement
  10. Bolt and Palantir Partner to Launch Checkout 2.0: The Smartest, Most Personalized Checkout Experience Yet – PR Newswire, accessed on January 23, 2026, https://www.prnewswire.com/news-releases/bolt-and-palantir-partner-to-launch-checkout-2-0-the-smartest-most-personalized-checkout-experience-yet-302473783.html
  11. Palantir, Seemingly Everywhere All at Once – PassBlue, accessed on January 23, 2026, https://passblue.com/2025/10/12/palantir-seemingly-everywhere-all-at-once/
  12. The Palantirization of everything | Andreessen Horowitz, accessed on January 23, 2026, https://a16z.com/the-palantirization-of-everything/
  13. Palantir Foundry: The Operating System for Modern Enterprise Decisions – i4C, accessed on January 23, 2026, https://www.i4c.com/palantir-foundry-the-operating-system-for-modern-enterprise-decisions/
  14. Bolt & Palantir Kickstart an AI-Powered Checkout Revolution | FinTech Magazine, accessed on January 23, 2026, https://fintechmagazine.com/articles/bolt-palantir-kickstart-an-ai-powered-checkout-revolution
  15. What the Klarna Deal Means for Checkout Platform Bolt – PaymentsJournal, accessed on January 23, 2026, https://www.paymentsjournal.com/what-the-klarna-deal-means-for-checkout-platform-bolt/
  16. Login with Passkeys | Bolt Shopper Help, accessed on January 23, 2026, https://help.bolt.com/shoppers/account/passkeys/
  17. Privacy Policy – Bolt, accessed on January 23, 2026, https://www.bolt.com/privacy
  18. bolt development center ltd – CheckId, accessed on January 23, 2026, https://en.checkid.co.il/company/BOLT+DEVELOPMENT+CENTER+LTD-rM3Kkdr-512914805
  19. Bolt Solutions – 2025 Funding Rounds & List of Investors – Tracxn, accessed on January 23, 2026, https://tracxn.com/d/companies/bolt-solutions/__jSbsZBFXUqtLTY9js71BB_7ZZcTacdhzHc3xEuHpfIs/funding-and-investors
  20. Get Awards and Badges from Techimply, accessed on January 23, 2026, https://www.techimply.com/awards-badges
  21. Privacy statement – Dexxter Clark – YouTube, accessed on January 23, 2026, https://www.dexxterclark.com/privacy-policy

 

Related News & Articles