AMA RECAP IDCRYPTO X Naoris Protocol

Speaker : David CarvalhoCEO of Naoris Protocol
Date : Friday, 17 June 2022

THERE IS 3 SESSION FOR AMA
1. Introduction
2. Free Question
3. Quiz


SESSION 1 ( INTRODUCTION )

ID CRYPTO:

1. What is Naoris Protocol?

David Carvalho:

So, Naoris Protocol is the Decentralized CyberSecurity Mesh that protects devices across the digital world from cyber threats and associated risks while enforcing CyberSecurity standards. Designed to increase cybersecurity levels across every sector of the economy by converting any network’s infrastructure into nodes securing the baseline, ensuring systems are cyber secure, trusted, and safe to operate – from web2 networks like governments, enterprises, and organizations to the entire Web3 stack.

We are adopting a contrarian p2p design pattern that uses Blockchain and our own Swarm AI technology developed together with various EU Universities to achieve higher levels of cybersecurity. Naoris Protocol converts centralized and untrusted devices, previously considered ‘single points of failure’ to the wider network, into cyber-trusted points of defense that identify, evaluate and mitigate threats in real-time under distributed consensus – making networks stronger as they grow instead of weaker.

In a nutshell, Naoris Protocol promises to revolutionize how security is approached, considered, and implemented, allowing for safer information-sharing environments, decentralization, and ultimately, industry-wide standardization.

ID CRYPTO:

2. How did the idea for Naoris Protocol come about?

David Carvalho:

Its actualy quite an interesting story… A number of years ago in Oslo, Norway, we attended a nation-state level meeting, where the former Head of NATO/OTAN Intelligence Committee Kjell Grandhagen was present among other important people in the space, and it was floated that perhaps the way forward would be to use blockchains and smart contracts to do CyberSecurity better. Kjell instantly understood the importance and possibility of using Blockchain to help solve one of the biggest problems in technology.

I`ll share here’s Kjell Grandhagen’s quote – “The centralized model where the hacking of a single device that could compromise an entire network is categorically flawed. This needs to change. We don’t need to play a better game against cyber-criminals, we need to play a different game. With Naoris Protocol, there is no single point of failure, central database, or middleman that can potentially be a source for leaked or compromised data. Naoris Protocol uses consensual Blockchain technology that links network devices “as blocks on a chain“ so that no single end-point or terminal exists in a silo.

”So, In 2018, Naoris Protocol was conceived to research how advancements in Blockchain, AI, and data science can provide an alternative approach to traditional cybersecurity with various universities and other organizations. Since then we have been researching companies and regulators in critical spaces, and it’s clear they want to mitigate more risks than they can with any and all centralized tools.

Following early success as winners and finalists in over a dozen premium accelerators, David and Monica have been building an incredible core team along with key industry advisors to validate the project for future development and scaling bringing in some people from the highest criticality spaces in society, from Cyber, Networks and C&C areas across the world from NATO/OTAN leaders to Nation-State Cyber-Commands, key Academia Spaces, and Cyber/Blockchain thought-leaders.

ID CRYPTO:

3. How does Naoris Protocol work?

David Carvalho:

Naoris Protocol turns centralized computer networks with traditionally untrusted devices into a decentralized cyber-secure mesh, where a swarm of cyber-trusted devices, validate each other and allows them to be operating and doing their tasks safely under blockchain-based validations of integrity and trust.

Naoris Protocol deploys a software agent or daemon dApp onto any centralized device* that enables it to constantly report its cyber trust status under consensual trust across the network. Devices operating under Naoris Protocol’s dPoSec consensus along with the software agent are converted into a decentralized cyber-validator army of watchdogs that ensure the whole infrastructure is safe.

Each device becomes a cyber-trusted validator node that constantly monitors every other device, creating a decentralized baseline layer of trust across ALL devices in the network, so Web2 and Web3 operate safely, bringing decentralized trust and security enforcement to centralized spaces. So Naoris Protocol is a Utility Blockchain for all devices.

ID CRYPTO:

4. What is a CyberSecurity Mesh?

David Carvalho:
Naoris Protocol is the worlds first Decentralized Cybersecurity Mesh.
Gartner was the organization that first predicted that Cloud would be everywhere as a technology trend about a decade and half ago, and now Gartner has identified Cybersecurity Mesh as a top strategic technology trend for 2022:

Cybersecurity mesh is a flexible, composable architecture that integrates widely distributed and disparate security services. Cybersecurity mesh enables best-of-breed, stand-alone security solutions to work together to improve overall security while moving control points closer to the assets they’re designed to protect. It can quickly and reliably verify identity, context and policy adherence across cloud and non-cloud environments.

All digital business assets are distributed across cloud and data centres. Traditional, fragmented security approaches focused on enterprise perimeters that leave organizations open to breaches. A cybersecurity mesh architecture provides a composable approach to security, based on identity to create a scalable and interoperable service. The common integrated structure secures all assets, regardless of location, to enable a security approach that extends across the foundation of IT services.

By 2024, organizations adopting a cybersecurity mesh architecture to integrate security tools to work as a cooperative ecosystem will reduce the financial impact of individual security incidents by an average of 90%.

Gartner analyst Felix Gaehtgens said the CyberSecurity Mesh approach is a strategy rather than a structure. However, the idea improves the alignment of organizations and the threats they face: “Attackers don’t think in isolation. They think in silos,”

ID CRYPTO:

5. Why should we believe in you?

David Carvalho:

Awsome question, were all very excited about disrupting this critical area for the first time using Blockchain tech.

The Naoris Protocol has been the winner or finalist in numerous top innovation and company accelerators since 2018 when Naoris was a R&D project that started out to deep-validate the concept, its ideation, technology, and use cases. We were under strict validation rules from real-world serious businesses in various regulated areas from the Innovation and Company accelerators we were in and weve had POCs with large organisations already within the 6 Accelerators we ended up winning while competing with tens of thousands of other companies. You can see these on our website and soon on the FAQs we`ll be releasing on the site as well.

Since that time, Naoris Protocol has matured heavily and completed successfully with honours a number of highly regarded and hyper-validated accelerators in real-world settings and has achieved deployments and proof of concepts in highly regulated spaces and critical environments with various innovation accelerator partners in the areas of Highly Regulated International Banking, Healthcare, Critical Industry/OT and even Smart Cities.

David Carvalho is the Founder, CEO, and Chief Scientist of Naoris Protocol, with over 20 years of cybersecurity experience working as a Global Chief Information Security Officer level of multi-billion USD companies such as the OCS group and high stakes environments such as the London City Airport. David has been an ethical hacker in cybersecurity since he was 15 years old and now advises nation-states and national highly regulated environments in the critical areas of Cyber Espionage, Cyber War, and Cyber Terrorism. He’s been involved in Crypto since 2013 as an investor and miner POS/POW and is involved in several initiatives and cybersecurity-related innovations. His core five areas of focus are risk mitigation, next-gen cyber-security, ethical wealth generation, innovation, and creation of value in the fields of crypto, automation, and Distributed AI.

Monica Oravcova is co-founder and COO of Naoris Protocol with 15 years of specializing in delivering security controls and information security strategy across advanced tech environments. In addition, Monica has high-level; experience managing risk and embedding security through training and awareness programs for telcos finance, and manufacturing. Monica also led operations and exec teams for FTSE 100 clients like AT&T and IBM.

ID CRYPTO:

6. Why should I use Naoris Protocol?

David Carvalho:

Naoris Protocol enables every device to constantly report its system integrity status and security status in a provably safe and trusted manner so that the chain can ensure under consensus that this device is operating normally and does not present a risk to the rest of the network. Naoris Protocol is a complimentary security layer that does not conflict with any other traditional or centralized cyber tool, it does not compete with them either.

Naoris Protocol provides access to a global threat mitigation environment, where every participant benefits – from a single mobile user to a global enterpris,e. Joining Naoris Protocol provides real-time threat information and intelligence from the daemon present on their devices and from across other participant networks.

As more participants, users, networks and organizations join, they become part of a Naoris Protocol distributed threat management engine, where every participant is rewarded by the network for joining and participating in the network. Furthermore, the user or enterprise that joins also benefits from network validations distributed by a global decentralized threat mitigation supercomputer that is constantly learning and correlating threats and malicious behaviors to mitigate risk.

Therefore all users, whether individual or part of an enterprise, act as nodes in a decentralized system rather than a point of failure within a siloed system.

Web2 architecture wasn’t designed to handle the current level of cyber threats. As the number of connected devices approaches 50 billion globally in 2022, with the amount of records compromised peaking at 30 Billion and a massive explosion of breaches since 2017, there is no option anymore, we need an alternative solution to protect our digital world.

This in our view is the best reason to use Naoris Protocol as it brings Web3 Methods into the Web2 World for the purpose of safety and assurance of operations for the first time.

ID CRYPTO:

7. How much potential damage could be mitigated as a result of increased awareness?

David Carvalho:

By 2025 the world faces cybercrime damages that will cost users, companies, and governmental entities $10 Trillion yearly. If you`re asking how much that is, it’s about 7% of the world’s global economy. So the impact and utility of this protocol is very wide and it applies also to the 99% of the world that is centralized, not only to Web3.

By 2025 the world faces cybercrime damages that will cost users, companies, and governmental entities $10 Trillion yearly. If you`re asking how much that is, it’s about 7% of the world’s global economy. So the impact and utility of this protocol is very wide and it applies also to the 99% of the world that is centralized, not only to Web3.

The average cost of a small data breach currently stands at just over $4.25 million for a single company, representing a significant cost across all industries. In addition, users often experience a compromise of their private data, where one data breach can result in a cascading leak of personal information.

Here’s some statistics:

  • By 2025 we face a $10 trillion cyber crime problem
  • The average cost of a data breach $4.25 million
  • Global cybersecurity spend will be $1.75 trillion cumulatively for 2021 to 2025
  • The Solar Winds hack will cost $100 Billion to clean up-2017 Equifax hack compromised private data of 50% of the US population
  • Username and password attacks increased 450% up from 2019
  • Total number of connected devices is set to exceed 50 billion by 2022
  • Axie Infinity’s Ronin suffers a $625 Million hack
  • Current detection time for a reported breach is 280 days on average

As a general rule of thumb, we expect users of the Decentralized CyberSecurity Mesh to lower their risk by an order of magnitude.

ID CRYPTO:

8. How are centralized devices turned into decentralized cyber-trusted validator nodes?

David Carvalho:

A Naoris Protocol Dapp software agent or daemon is embedded on each device which directly correlates with the chain and the dPoSec consensus model.

Devices can be verified and authenticated backed by the Naoris Protocol identity proofs that operate under the Distributed Identity Validation Authority (DIVA), a Naoris Protocol technology devolped together with PHDs from various academic institutions in Europe.

This creates and requires a direct connection to our use-case-specific critical blockchain (no third parties) to ensure the celerity, immediacy, independence, baseline trust validation and future validations from then onwards.

SESSION 2 ( FREE QUESTION )

i thingking about me:
Can you provide a link to the Naoris Protocol whitepaper to learn and read more about the Naoris Protocol in the future? #26599

David Carvalho:
Hi, sure here you go. Our academically written paper is here.
and you can also find more info on our Medium Articles.

জাকারিয় কবি:

My importen question… What do you have Telegram Group, YouTube Channel, Tik-Tok channel, Website and Twitter For this project, Where can I get the latest information and what is the latest plan for your project?

David Carvalho:

Listing below. Feel free to join us on our social media to stay up to date!

Medium, Twitter, Telegram Announcement Channel, Telegram group, LinkedIn, Discord.

4403:

IS This Your project only for elite investors, ro how about others with small funds, is it open to everyone?26599

David Carvalho:

Our project is currently on private sale and there is a minimum participation amount. token sales etc, We are currently in Private Sale and you can find more info about that on our telegram chat or ask for info on it. Public Sales anyone can participate, well be on it in Q3 of the year. Interest form here.

Akbar 20:

Can you list 1-3 killer features of this project that makes it ahead of its competitors.? What is the competitive advantage your project has that you feel most confident ABOUT..?

David Carvalho:

dPoSec (Distributed Proof of Security). Distributed Security – Network devices are organized into an army of cryptographic key validators and threat hunters. Dedicated consensus model for the critical area of cybersecurity – dPoSec (Distributed Proof of Security) consensus.

Proof Of Compliance – $CYBER creates zero-knowledge reports that voluntarily disclose compliance amongst participating counterparties.

Earn As You Secure – Validator devices hold and stake $CYBER tokens being rewarded for trusted behavior and validations of trust and security levels that contribute to the consensus that enforces security across networks.

Scalable – On-chain efficiency and scalability via a purpose-built Blockchain, which can record 50k-1M processes.

Sustainable and Go Green – An environmentally friendly principle ethos guides our approach without the need for environmentally unfriendly and inefficient proof of work.

Risk Management by Design – Capability to validate risky smart contract design ‘a priori’, such as reentrancy, arithmetic bugs, risky low-level checks, etc.

Swarm Intelligence AI – Embedded by design and adapted to learn across different sets of biases and weights based on the user-defined criticality of the node and the node`s operating system type.

Naoris Protocol Wallet (NP Wallet) – A revolutionary approach to how wallets are managed and thought about, the dPoSec enabled wallet will allow for the wallet itself to be validated from an integrity, tampering, and risk perspective under distributed consensus before it allows any outgoing transactions to be done, mitigating many cyber-risks of crypto-wallets. 

Currently as a Utility Protocol, we do not have any known competitors on our use case on Web3.

Winner Group:

Do you have a AUDIT certificates? or are you working to AUDIT your project, so that the security of the project becomes more secure and reliable? Do you have a AUDIT certificates? or are you working to AUDIT your project, so that the security of the project becomes more secure and reliable?

David Carvalho:

Thanks for the question. We have been highly validated by all the real world accelerators and their companies, Banks, Telcos, Defense Companies etc – in all the spaces we have participated in and worn – Answered in more detal above.

We have also a certificate from Assure Defi that we will make public that covers all from KYC of project workers and leadership to Validations, this will be public by beginning of next month.

SESSION 3 ( QUIZ )

ID CRYPTO:

1. What is the name of the founder of Naoris Protocol?

A. David Carvalho

B. Gaehtgens

C. Kjell Grandhagen

CHUKKY:

A. David Carvalho

ID CRYPTO:

2. In what year did the Naoris Protocol research progress in Blockchain, AI and data science?
A. 2016
B. 2017
C. 2018

Uci Suryadi:
C. 2018

ID CRYPTO:

3. Cybersecurity mesh is an architecture that is?
A. Fluctuating
B. Systematic
C. Flexible

Sonic:
C. Flexible

ID CRYPTO:

4. Naoris Protocol is….. which protects devices across the digital world from cyber threats.
A. Centralized Cybersecurity Mesh
B. Decentralized CyberSecurity Mesh
C. Blockchain Cybersecurity Mesh

Syah putri:
B. Decentralized CyberSecurity Mesh

ID CRYPTO:

5. Naoris Protocol uses Blockchain technology and Swarm AI to achieve a higher level of cybersecurity by adopting ?

A. p2e design pattern
B. p2w design pattern
C. p2p design pattern

Chika Jessica Indonesian:
C. p2p design pattern

MORE DETAIL ABOUT Naoris Protocol

Website

Twitter

Announcement Channel

Telegram group

Medium

LinkedIn

Discord

Oezank
Oezank is a Crypto Influencer who has more than 2 years of experience observing Crypto projects and strongly believes in blockchain technology in Indonesia.