Back to news

Stay updated on the latest Naoris news

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Share post:
Learn > Blog

Naoris Protocol Partners with Router, the cross-chain infrastructure protocol enabling multi-chain communication

September 11, 2024

Naoris Protocol, the Blockchain and AI-based Decentralised CyberSecurity Mesh that restores cybersecurity across all sectors of the economy, is delighted to announce a partnership with Router Protocol, the cross-chain infrastructure layer that enables communication between blockchains.

Router Protocol is a modular layer and cross-chain bridge that connects different blockchains and allows interactions to occur between them.

As the blockchain space matures, Router is designed to mitigate the risk of liquidity being fragmented across the blockchain universe, for example, with such chains as Polygon, Algorand, Avalanche, and Solana. With the rapid growth of various blockchains, there is an urgent need for different chains to talk to each other through bridges and other forms of connectivity. Router Protcol’s unique selling point is that they can provide cross-chain communication across EVM (Ethereum Virtual Machine) and non-EVM chains, as well as layer 1 and layer 2 networks.

Naoris Protocol is scaling the Decentralized Cybersecurity Mesh to protect every device in the digital world, allowing networks to defend themselves from cyber-attacks using disruptive Swarm AI and Blockchain technology.

Naoris Protocol is designed to reduce cyber security risks and costs significantly, addressing the staggering $10 trillion global opportunity, which is the projected cost of cybercrime by 2025. By converting traditionally untrusted network devices into a swarm of cyber-trusted validator nodes, Naoris Protocol makes networks stronger as they grow, not weaker. Powered by a tokenized cyber-secure machine-to-machine economy, single points of failure are converted into multiple points of defense that identify risks in real-time under consensus. Naoris Protocol is also complementary — traditional cyber tools can operate freely without being in competition.

Naoris Protocol will integrate its Decentralized CyberSecurity Mesh with Router Protocol’s modular cross-chain bridge technology, providing a cyber-secure and validation layer across all devices protecting Router Protocol’s bridging. By securing cyber integrity, Router’s devices can communicate securely and safely whilst being protected from the vulnerabilities that Web3 inherits from Web2 by default.

Here are some examples:

  • Account hijacking risks at the node, user, and exchange levels
  • API tampering risks
  • DOS/DDOS attacks, data corruption or tampering with oracles
  • Internal threats to exchanges, oracles, protocols, bridges
  • Update poisoning
  • Evil maid attacks through hardware or firmware tampering
  • Identity and access management (IAM) vulnerabilities on nodes, users, oracles, bridges and servers
  • Advanced persistent threat risks and service provider attacks on oracles and nodes

Ramanai Ramachandran, CEO and Founder of Router Protocol, commented:
Router Protocol is excited to help Naoris leverage Router’s cross-chain tooling. We think security is one of the biggest problems to solve in the space. In the era of fragmentation of users and liquidity — we are committed to help products expand and leverage multiple chains”

David Carvalho, CEO, and Founder of Naoris Protocol “We are super excited to partner with Router Protocol who are providing crucial bridging services for the growing blockchain space, we see our partnership as pivotal in being able to support Router’s infrastructure, providing trust and security to their technology through our Decentralized CyberSecurity Mesh”

About Router Protocol

Router Protocol is building a suite of cross-chain infra primitives that aims to enable blockchain interoperability between current and emerging Layer 1 and Layer 2 blockchains.