Back to news

Stay updated on the latest Naoris news

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Share post:
Learn > Blog

Transcript of the AMA session with IM Community

September 11, 2024

Last week we had an amazing AMA session with IM Community, a very active Vietnamese crypto community. We had the chance to answer great introductory questions about Naoris Protocol as well as more specific questions from community members!

If you missed it, don’t worry! We transcribed the session for everyone that wants to check it out.

The transcript is slightly edited for clarity

Enjoy!

///Transcript begins here///

Bà Tân: Hi David, Before the first, please introduce yourself a little bit 👋

David: Hi Guys and Girls a small intro about myself, so, my name is David Carvalho, I am originally from the European Union, Portugal, I have been an ethical hacker for over 20 years and was the youngest Chief Information Security Officer of a multi $Billion Business in Europe.

I have been in that sort of role for close to a decade in various highly regulated areas and critical infrastructure areas of business and governance.

I am also an advisor at nation-state level projects, from smart cities’ technological transformations to defense and geopolitics in the critical areas of Cyber Espionage, Cyber War, and Cyber Terrorism. I`m also a speaker and thought leader in Enterprise Cyber and Cyber Innovation spaces. And it's a pleasure to be here today with you all!

Bà Tân: Thanks for the introduction.

Today’s AMA will have 2 sessions.

Session 1: Project Introduction
Session 2: Free Asking (will choose 5 questions)

So for the first session:

What is Naoris Protocol?

David: So, Naoris Protocol is the Decentralized CyberSecurity Mesh that protects devices across the digital world from cyber threats and associated risks while enforcing CyberSecurity standards.

Designed to increase cybersecurity levels across every sector of the economy by converting any network’s infrastructure into nodes securing the baseline, ensuring systems are cyber secure, trusted, and safe to operate — from web2 networks like governments, enterprises, and organizations to the entire Web3 stack.

We are adopting a contrarian p2p design pattern that uses Blockchain and our own Swarm AI technology developed together with various EU Universities to achieve higher levels of cybersecurity.

Bà Tân: How did the idea for Naoris Protocol come about?

David: It’s actually quite an interesting story…

A number of years ago in Oslo, Norway, we attended as a participant a nation-state level meeting, where the former Head of NATO/OTAN Intelligence Committee Kjell Grandhagen was present among other important people in the space, and it was floated that perhaps the way forward would be to use blockchains and smart contracts to do CyberSecurity better. Kjell instantly understood the importance and possibility of using Blockchain to help solve one of the biggest problems in technology.

I`ll share Kjell Grandhagen’s quote — “The centralized model where the hacking of a single device that could compromise an entire network is categorically flawed. This needs to change. We don’t need to play a better game against cyber-criminals, we need to play a different game. With Naoris Protocol, there is no single point of failure, central database, or middleman that can potentially be a source for leaked or compromised data. Naoris Protocol uses consensual Blockchain technology that links network devices “as blocks on a chain“ so that no single end-point or terminal exists in a silo.”

So In 2018, Naoris Protocol was conceived to research how advancements in Blockchain, AI, and data science can provide an alternative approach to traditional cybersecurity with various universities and other organizations. Since then we have been researching companies and regulators in critical spaces, and it’s clear they want to mitigate their risks at a much higher capability level than what they are capable of at the moment with centralized tools.

Bà Tân: How does Naoris Protocol work?

David: Naoris Protocol turns centralized computer networks with traditionally untrusted devices into a decentralized cyber-secure mesh, where a swarm of cyber-trusted devices, validate each other.

Naoris Protocol deploys a software agent or daemon dApp onto any centralized device* that enables it to constantly report its cyber trust status under consensual trust across the network. Devices operating under Naoris Protocol’s dPoSec consensus along with the software agent are converted into a decentralized cyber-validator army of watchdogs that ensure the whole infrastructure is safe.

Each device becomes a cyber-trusted validator node that constantly monitors every other device, creating a decentralized baseline layer of trust across ALL devices in the network, so Web2 and Web3 operate safely, bringing decentralized trust and security enforcement to centralized spaces. So Naoris Protocol is a Utility Blockchain for all devices.

Following early success as winners and finalists in over a dozen premium accelerators, David and Monica have been building an incredible core team along with key industry advisors to validate the project for future development and scaling bringing in some people from the highest criticality spaces in society, from Cyber, Networks and C&C areas across the world from NATO/OTAN leaders to Nation-State Cyber-Commands, key Academia Spaces, and Cyber/Blockchain thought-leaders.

Naoris Protocol was conceptualized to tackle the most critical areas of business and governance. Founded by David Carvalho and Monika Oravcova, who has extensive experience in cybersecurity and blockchain technology, Naoris Protocol understands that leveraging a dedicated blockchain consensus can provide a decentralized and anonymous cyber risk management framework that would unlock a new era in cybersecurity and its standardization.

Bà Tân: What is a CyberSecurity Mesh?

David: Naoris Protocol is the world’s first Decentralized Cybersecurity Mesh.

Gartner was the organization that first predicted that Cloud would be everywhere as a technology trend about a decade and a half ago, and now Gartner has identified Cybersecurity Mesh as a top strategic technology trend for 2022:

“Cybersecurity mesh is a flexible, composable architecture that integrates widely distributed and disparate security services. Cybersecurity mesh enables best-of-breed, stand-alone security solutions to work together to improve overall security while moving control points closer to the assets they’re designed to protect. It can quickly and reliably verify identity, context, and policy adherence across cloud and non-cloud environments.”

Bà Tân: Why should we believe in you?

David: Awesome question, we`re all very excited about disrupting this critical area for the first time using Blockchain tech.

Naoris Protocol has been the winner or finalist in numerous top innovation and company accelerators since 2018 when Naoris was an R&D project that started out to deep-validate the concept, its ideation, technology, and use cases, initially conceptualized under the highest criticality areas of society and defense while under the advisory of former Chairman of NATO/OTAN Intelligence Committee, Mr. Kjell Grandhagen. We were under strict validation rules from real-world serious businesses in various regulated areas from the Innovation and Company accelerators we were in and we’ve had POCs with large organizations already within the 6 or so Accelerators we ended up winning. You can see these on our website and soon on the FAQs we`ll be releasing on the site as well.

Since that time, Naoris Protocol has matured heavily and completed successfully with honors a number of highly regarded and hyper-validated accelerators in real-world settings and has achieved deployments and proof of concepts in highly regulated spaces and critical environments with various innovation accelerator partners in the areas of Highly Regulated International Banking, Healthcare, Critical Industry/OT and Smart Cities.

David Carvalho is the Founder, CEO, and Chief Scientist of Naoris Protocol, with over 20 years of cybersecurity experience working as a Global Chief Information Security Officer level of multi-billion USD companies such as the OCS group and high stakes environments such as the London City Airport. David has been an ethical hacker in cybersecurity since he was 15 years old and now advises nation-states and national highly regulated environments in the critical areas of Cyber Espionage, Cyber War, and Cyber Terrorism. He’s been involved in Crypto since 2013 as an investor and miner POS/POW and is involved in several initiatives and cybersecurity-related innovations. His core five areas of focus are risk mitigation, next-gen cyber-security, ethical wealth generation, innovation, and creation of value in the fields of crypto, automation, and Distributed AI.

Monica Oravcova is co-founder and COO of Naoris Protocol with 15 years of specializing in delivering security controls and information security strategy across advanced tech environments. In addition, Monica has high-level; experience managing risk and embedding security through training and awareness programs for telcos finance, and manufacturing. Monica also led operations and exec teams for FTSE 100 clients like AT&T and IBM.

Bà Tân: How much potential damage could be mitigated as a result of increased awareness?

David: By 2025 the world faces cybercrime damages that will cost users, companies, and governmental entities $10 Trillion yearly. If you`re asking how much that is, it’s about 7% of the world’s global economy.

So the impact and utility of this protocol is very wide and it applies also to the 99% of the world that is centralized, not only to Web3.

The average cost of a small data breach currently stands at just over $4.25 million for a single company, representing a significant cost across all industries. In addition, users often experience a compromise of their private data, where one data breach can result in a cascading leak of personal information.

Here are some statistics:

As a general rule of thumb, we expect users of the Decentralized CyberSecurity Mesh to lower their risk by an order of magnitude.

Bà Tân: How are centralized devices turned into decentralized cyber-trusted validator nodes?

David: A Naoris Protocol Dapp software agent or daemon is embedded on each device which directly correlates with the chain and the dPoSec consensus model.

Devices can be verified and authenticated backed by the Naoris Protocol identity proofs that operate under the Distributed Identity Validation Authority (DIVA), a Naoris Protocol technology developed together with Ph.D.`s from various academic institutions in Europe,

This creates and requires a direct connection to our use-case-specific critical blockchain (no third parties) to ensure celerity, immediacy, independence, baseline trust validation, and future validations from then onwards.

Bà Tân: Why is Naoris Protocol building its own scalable blockchain and dPoSec (Distributed Proof of Security) consensus?

David: Naoris Protocol’s utility use case is too critical to operate on a general-purpose blockchain. A complete separation from general-purpose chains is required to meet best-practice and cyber operational design in order to maintain current and future assurance of our non-negotiable cybersecurity principles.

For example, The security validation of a management system for a nuclear power station should not have to wait for a general-purpose chain to mint an NFT picture of a cat.

Core drivers for dPoSec:

  • Core use case is Security & Trust
  • Use case is too critical to be on a general-purpose blockchain
  • Typical L2s are focused on smart contracts data and regular monetary transactions
  • Complete separation from general chains because of cybersecurity principles
  • The Naoris Protocol software daemon is embedded on each device and requires a direct blockchain connection because of the core critical use case (no third party involvement)
  • Must be separated not to inherit existing risks

The use case requires a unique blockchain and consensus model that is “air-gapped“ and independent to allow critical security objectives to be achieved without delay or interference. The dPoSec model is fully integrated and inherently linked to the Naoris Protocol daemon that is embedded in each device and directly correlates with CyberSecurity Mesh design principles, allowing for quick and reliable verification of identity, context and policy adherence.

Within Naoris Protocol, validators cannot just validate without key sanity and security checks. In order for validators to be allowed to participate, they must be known to be cyber secure, and proven to be following best cyber practice, and not harboring any known threats before being onboarded under consensus by other validators.

For this to occur, a different consensus mechanism is necessary.

Bà Tân: Alright, Session 1 has finished perfectly. Appreciate your detailed responses David!

Don’t forget to join Naoris Protocol’s Telegram group https://t.me/NaorisProtocol

End of session 1
We’ll move on to session 2

Session 2: Free Asking (will choose 5 question)

Gutierrez04: You say that blockchain projects can adopt Naoris to avoid Finheriting the cybersecurity risks of Web2 and protect the integrity of their validators, but to adopt Naoris will they have to be projects that have not yet been developed? Or can anyone migrate to your technology?

David: Thats a great question, actually any current digital device or infrastructure, from phones running Android, Laptops Running Windows or Servers in any cloud running Unix or Linux can use and deply the protocol to improve their security posture, the more devices in the network have the bigger the level of cyber trust and resilience of their operarions under consensus as all of them validate each other… instead of becoming weaker and vulnerable as normally every device is a point of failure for the whole network.

Hernderson: I want to invest to your project. Where i buy your token? Is it available on any exchange?

David: Our project is currently on private sale and there is a minimum participation amount.

Re: token sales etc, We are currently in Private Sale and you can find more info about that on our telegram chat or ask for info on it.

Re: Public Sales anyone can participate.

Interest form here:
https://mztinca6ewd.typeform.com/to/XFKR6r1q

Ripa: Do you have a telegram channel, Twitter or YouTube channel to promote your project and know the details of your project? Can we learn anything there?

David: Listing below

Feel free to join us on our social media to stay up to date!

Twitter: https://twitter.com/NaorisProtocol
Medium: https://medium.com/naoris-protocol
Telegram group: https://t.me/+E976qpBGhLw3MzA0
Telegram Announcement Channel: https://t.me/NaorisAnn
LinkedIn: https://www.linkedin.com/company/naoris-protocol
Discord: https://discord.gg/WkUE7aVBXU

ASIF: Staking program is very important for every project? Can i stake your Token? Do you have any plan of starting staking programme?

David: We will allow staking under our testnet for everyone that buys tokens and the rewards are increased with the download and running of our DAPP Naoris Protocol Daemon during our testnet.

Cataleya Emerson Do you have Whitepaper if yes, please share it with as secondly do you have plans for pre-sale? Now where can we Join it?

David: Hi, sure here you go. Our academically written paper is here:
https://docsend.com/view/piiy2cvzghx262ma

You can also find it on our site:
https://naoris.com/

and you can also find more info on our Medium Articles
Medium: https://medium.com/naoris-protocol

Our project is currently on private sale and there is a minimum participation amount.

Re: token sales etc, We are currently in Private Sale and you can find more info about that on our telegram chat or ask for info on it.

Re: Public Sales anyone can participate.

Interest form here:
https://mztinca6ewd.typeform.com/to/XFKR6r1q

Constantinos: Dont forget to follow us on Twitter! 💙

JavaScript is not available.

Edit description

twitter.com

Shuvo🌺🌺🌺🌺 Do you have Whitepaper if yes, please share your project Whitepaper with as. Secondly, you have a AUDIT certificates? and are you working to AUDIT your project? or, What are the security measures for your Project?

David: Thanks for the question

We have been highly validated by all the real world accelerators and their companies under POC`s, Banks, Telcos, Defense Companies etc — in all the spaces we have participated in and worn — Answered in more detal above, from inner workings to capability have been validated at the highest levels.

We also have a certificate from Assure Defi that we will make public that covers all from KYC of project workers and leadership to Validations, this will be public by the beginning of next month.

Our academically written paper is here:
https://docsend.com/view/piiy2cvzghx262ma

You can also find it on our site:
https://naoris.com/

and you can also find more info on our Medium Articles
Medium: https://medium.com/naoris-protocol

Bà Tân: Thanks for the useful information from David!

Allright, I declare the Im Community AMA with Naoris Protocol has ended.

Naoris Protocol joined us and provided us with Naoris Protocol information, we hope that this knowledge makes us understand more about naoris.com
To the members, thank you for following this event to the end. Winners will be announced soon.

David: 🏆🏆🏆💪Thank you so much for your time and attention! It was a pleasure to share some good details on the project with this amazing Vietnam Community!

We love Vietnam in the team and looking forward to visit, we will be looking to be onboarding Vietnam Partners as well.
💯🥰🥰🥰🥰🥰

Feel free to join us on our social media to stay up to date!

Medium: https://medium.com/naoris-protocol
Twitter: https://twitter.com/NaorisProtocol
Telegram Announcement Channel: https://t.me/NaorisAnn
Telegram group: https://t.me/+E976qpBGhLw3MzA0
LinkedIn: https://www.linkedin.com/company/naoris-protocol
Discord: https://discord.gg/WkUE7aVBXU

About Naoris Protocol

Naoris Protocol is a Decentralized CyberSecurity Mesh for the hyper-connected world. Our disruptive design pattern makes networks safer as they grow, not weaker, by turning each connected device into a trusted validator node. A powerful Blockchain protocol that every company can use to protect against the escalating levels of cyber threat.

Devices are rewarded for trusted behavior fostering an environment that is secure. Participants earn $CYBER staking rewards for securing the network. The more users, businesses, enterprises, and governance structures that come together to establish networks or networks and use the stronger and more secure Decentralized Cyberecure Mesh becomes.

Want to learn more about it?

Visit our Website or check out our Whitepaper

Stay connected: Telegram | Twitter | LinkedIn | Medium | Instagram