AMA RECAP : CRYPTO CHALLENGERS x NAORIS PROTOCOL
Venue : CryptoChallengersD
Date : 25 JULY 2022
Time : 02:00 PM UTC.
Guest: DAVID CARVALHO
They shared detailed information and his opinions about the project NAORIS PROTOCOL
SEGMENT 1 INTRODUCTION.
Q1. Can you please introduce yourself as well as Naoris Protocol ?
ka7Ana『░NAORIS░PROTOCOL░ ▓▒Mͥr rͣoͫbot▒▓,
Hi Guys and Girls at Crypto Challengers a small intro about myself, so, my name is David Carvalho, I am originally from the European Union, Portugal, I have been an ethical hacker for over 20 years and was the youngest Chief Information Security Officer of a multi $Billion Business in Europe.
I am also an advisor at nation-state level projects, from smart cities’ technological transformations to defense and geopolitics in the critical areas of Cyber Espionage, Cyber War, and Cyber Terrorism. I`m also a speaker and thought leader in Enterprise Cyber and Cyber Innovation spaces.
I have been in that sort of role for close to a decade in various highly regulated areas and critical infrastructure areas of business and governance.
And its a pleasure to be here today with you all!
So answering the other part of the question:
Naoris Protocol is the Decentralized CyberSecurity Mesh that protects devices across the digital world from cyber threats and associated risks while enforcing CyberSecurity standards.
Designed to increase cybersecurity levels across every sector of the economy by converting any network’s infrastructure into nodes securing the baseline, ensuring systems are cyber secure, trusted, and safe to operate — from web2 networks like governments, enterprises, and organizations to the entire Web3 stack.
We are adopting this contrarian p2p design pattern that uses Blockchain and our own Swarm AI technology developed together with various EU Universities to achieve higher levels of cybersecurity across society, using WEB3 as a baseline.
Q2. Every project has a story behind their name, can you tell us more about the story behind this?
Thanks, yeah no worries :)
Naoris is the name of a far away star, it`s also in our case the name name we adopted for the Protocol, a historical far away solution for this hard cybersecurity problem, that was always out of reach, until just now… a hard problem, that has a solution that blockchain enables through Naoris Protocol as a utility and non-competing chain, Naoris is also a Unique name, so if you search for it online, you should only find us.
Q3. What are the advantages of Your project ?
Naoris Protocol enables every device to constantly report its system integrity status and security status in a provably safe and trusted manner validated under WEB3 Techniques so that the chain can ensure under consensus that this device is operating normally and does not present a risk to the rest of the network. Naoris Protocol is a complimentary security layer that does not conflict with any other traditional or centralized cyber tool, it does not compete with them either.
Naoris Protocol provides access to a global threat mitigation environment, where every participant benefits — from a single mobile user to a global enterprise. Joining Naoris Protocol provides real-time threat information and intelligence from the daemon present on their devices and from across other participant networks.
As more participants, users, networks, and organizations join, they become part of a Naoris Protocol distributed threat management engine, where every participant is rewarded by the network for joining and participating in the network. Furthermore, the user or enterprise that joins also benefits from network validations distributed by a global decentralized threat mitigation supercomputer that is constantly learning and correlating threats and malicious behaviours to mitigate risk.
Therefore all users, whether individuals or part of an enterprise, act as nodes in a decentralized system, rather than a point of failure within a siloed system.
4.What are the most ambitious goals of your project, can you explain how your tokenmix distribution works?
We have very ambitious goals backed by highly reputable institutions and encompassing goals that touch most areas of society, from individuals to enterprise to regulated spaces and government/defence.
Naoris Protocol aims to solve Web2.0 centralized cybersecurity vulnerabilities and weaknesses by leveraging the dedicated Naoris Protocol dPoSec consensus and Swarm AI to create a distributed security environment by converting traditionally untrusted network devices into a Decentralized CyberSecurity Mesh of cyber-trusted validator nodes.
Naoris Protocol takes a unique decentralized consensual approach to trust across devices. Its solution is groundbreaking due to its enforced decentralized security model and because it is complementary, working alongside traditional centralized cybersecurity solutions, but managed and organized under a WEB3 consensus.
It runs a novel decentralized cyber layer on top of any traditional centralized processes and systems that adds to the ‘defense in depth stack’ allowing already deployed and centralized services to freely operate without being in competition with their existing tools making complex environments safer instead of more risky.
Answering the second part of the question…
The $CYBER token is at the core of the Naoris Protocol utility chain, is embedded within a true machine-to-machine economy transaction model that validates CyberSecurity status and trust of devices and its operational processes through transactions that are validated under dPoSec consensus and enforces standards across devices and networks. Its value is intrinsically tied to the trust and security of networks and systems. $CYBER token monetizes trusted cyber security systems over a function of time, using the dPoSec consensus as an enabler and incentive to achieve cyber-secure networks and for every participant to earn from securing others.
We`re currently in private sales.
5.The biggest challenge facing projects right now is related to the current market conditions. So, can you explain the reasons why users and investors should participate in the long-term development of the #NaorisProtocol ecosystem?
Indeed, current market conditions are low for hype and may be hard for smaller scoped projects, but in our case we saw quite a large increase of interest and investment from various VC parties and users focused on the deep need for the tech we have and the high validation we have from accelerators that we won and academic spaces we collaborate with, instead of hype and “follower-culture” wich is really ideal for us.
Cybersecurity is also a unique space, as a need, it is market conditions agnostic and downturn resistant, on the other side the current socio-economic climate pushes further threats into the space that need further efforts on the creation of new cyber mitigation techniques, the current geo political and nation-state conflicts and proxy conflicts also show that a decentralised solution to centralised problems of trust and cyber threats across the current critical infrastructures, defence infrastructures and highly regulated spaces have a lot to gain from our decentralised cybersecurity mesh approach.
Please check this article from the former CHAIRMAN of NATO`s INTELLIGENCE COMMITTEE Kjell Grandhagen.
6.What is #NaorisProtocol plans for global expansion? Are #NaorisProtocol focusing on the market at this time or focus on building and developing or getting customers and users, or partnerships? Can you share some plans before the end of 2022 and for the coming year?
We have joined top world company and innovation accelerators in the area of fintech, deep tech and enterprise tech and we have not only won and been finalists on these accelerators, but also met and worked with top 10 cross industry names and academia, form an expansion perspective we`ll leverage these relationships from banking to telcos, defense and critical infrastructure spaces to integrate into critical areas of society through Smart Cities and critical infrastructure embedded systems and networks and also on the enterprise space.
We have very large announcements coming out before september and will be in test net before end of 2022 and in mainnnet in Q1-Q2 2023.
We are focused on hiring aggressively the best talent from WEB3 and academia and also on bringing aggressively large partnerships that we`ll be announcing soon.
The project itself is quite advanced already and we have done a number of POC`s with the large players mentioned above.
Regarding the project from a participation perspective and community perspective, we invite anyone to join our Testnet and to Join us/support the project and participate.
Below our participation form:
Testnet will be available on Q4 this year and there will be a whitelist for it.
7.Most of investors have just focused on price of token in short term instead of understanding the real value of the project. Can you tell us on motivations and benefits/value for investors to hold your token in long term?
$CYBER doesn’t require people to trade and transact the token monetarily for it to grow in adoption. It requires networks to integrate Naoris Protocol and hold tokens to incentivize validators to continually validate the trust status of the underlying devices that power the network in case of a breach or a threat. Centralized and untrusted devices are converted into provably trusted cyber validators after an onboarding process that ensures they have no known risks or vulnerabilities present and can be added to the secure baseline of potential validators, with every device validating every other device for trusted behaviour, all within a block time lower than 1 second under the dPoSec consensus.
$CYBER token acts as fuel for the whole ecosystem
Validator Devices :
- Hold and stake $CYBER as a security handshake ensuring trust and security
- Rewarded over time for trusted behaviour, uptime stability, and cyber-trust
- Creating a secure and trusted growing environment like a ‘supercomputer of trust validations’
- Earn $CYBER staking rewards automatically by sharing new intelligence related to new threats and securing the network
- Purchasing $CYBER tokens fuels the onboarding and validation of devices and networks with rewards
-Joining means the bigger the network grows, the more resilient and trusted are its decisions and consensus and more devices will have to join the $CYBER economy and hold $CYBER
- Benefit from the decentralized onboarding of new devices that will use $CYBER to operate on the machine economy and be validated as trusted and be able to validate others
- Gain from growing monetization of cybersecurity data through trust validations
- Win-Win for Web2 & Web3 participants
8.The Naoris Protocol ensures a centralized model where the hacking of a single device that could compromise an entire network is categorically flawed. How could you change this? What are the sophisticated mechanisms Naoris Uses and how about your headway against hackers?
Naoris Protocol turns centralized computer networks with traditionally untrusted devices into a decentralized cyber-secure mesh, where a swarm of cyber-trusted devices, validate each other.
Naoris Protocol deploys a software agent or daemon dApp onto any centralized device* that enables it to constantly report its cyber trust status under consensual trust across the network. Devices operating under Naoris Protocol’s dPoSec consensus along with the software agent are converted into a decentralized cyber-validator army of watchdogs that ensure the whole infrastructure is safe.
Each device becomes a cyber-trusted validator node that constantly monitors every other device, creating a decentralized baseline layer of trust across ALL devices in the network, so Web2 and Web3 operate safely, bringing decentralized trust and security enforcement to centralized spaces.
Detection of risks and governance lapses in complex environments or networks happen in seconds, not months, with cyber-related damages falling by at least an order of magnitude. With Naoris Protocol, devices and networks remain the same, but behave differently, every device is no longer a silo and an observer in cyber operations, it becomes instead an active operator in a cyber trust consensus under a new layer of distributed and enforced cyber standards.
The Protocol allows for a huge and exponential trust model and validation model for cyber risks, threats and status of systems to exist across the internet under consensus that was not possible before, allowing any digital devices to be known to operate in a trusted mannel backed by distributed validations for the first time ever.
SEGMENT 2 TELEGRAM LIVE.
Do you have a Whitepaper?
If you have, Please share it with us.
Lastly, Do you have plans for pre-sale?
please tell me answer my question
[In reply to skarafat333]
Hi, sure here you go. Our academically written paper is here:
You can also find it on our site:
and you can also find more info on our Medium Articles
Where can I currently buy Token?
[In reply to 5050]
Our project is currently on private sale and there is a minimum participation amount.
Re: token sales etc, We are currently in Private Sale and you can find more info about that on our telegram chat or ask for info on it.
Re: Public Sales anyone can participate, we`ll be on it in Q3 of the year
Interest form here:
Q3-𝙈𝙧. 𝙏𝙖𝙢𝙗𝙤𝙪𝙧𝙞𝙣𝙚 𝙈𝙖𝙣,
Hello Mr. Robot Sir!!
Does Naoris only help the big enterprise to ensure their security level or it will help a single Android users too? I meant Will you proceed for all the users come from all walks of life or it only for elite one?
[In reply to 𝙈𝙧. 𝙏𝙖𝙢𝙗𝙤𝙪𝙧𝙞𝙣𝙚 𝙈𝙖𝙣]
Hi thanks for your question,
Any device can use it, a user can use it on his android / PC — Windows / Linux machine, cloud instance or virtual machine.
>Also companies with their complicated infrastructures can use it too and benefit from everyone else in a win-win situation for security but with fifferent cost conditions, for users it will be free to participate, but if you have tokens you can be an active node of validation and make more tokens.
Q4-Hotbit Number 1,
What do you have??
1- Telegram Group✔️
3- Tik tok channel✔️
For this project, where Can I get the latest information and what is the latest plan for Your Project?♥️💯
[In reply to Hotbit Number 1]
Feel free to join us on our social media to stay up to date!
Telegram Announcement Channel: https://t.me/NaorisAnn
Telegram group: https://t.me/NaorisProtocol
Q5-𝑩𝒆𝒊𝒎𝒂𝒏 𝑴𝒆𝒚𝒆 2,
Do you have AUDIT certificates??
Are you working to AUDIT your project, to make it more secure and reliable??
[In reply to 𝑩𝒆𝒊𝒎𝒂𝒏 𝑴𝒆𝒚𝒆 2]
Thanks for the question
We have been highly validated by all the real world accelerators and their companies under POC`s, Banks, Telcos, Defense Companies etc — in all the spaces we have participated in and won — Answered in more detail above, from inner workings to capability have been validated at the highest levels.
We also have a certificate from Assure Defi that is public that covers all from KYC of project workers and leadership to Validations.
ka7Ana『░NAORIS░PROTOCOL░ ▓▒Mͥr rͣoͫbot▒▓,
This was the last one :) Thank you so much for your time and attention! It was a pleasure to share some details on the project with this amazing Crypto Challengers Community!
Feel free to join us on our social media to stay up to date!
Telegram Announcement Channel: https://t.me/NaorisAnn
Telegram group: https://t.me/+E976qpBGhLw3MzA0
Thank you very much for taking your time to be here for today’s AMA 😁