Naoris Protocol AMA

We Hosted An Amazing Ama With Naoris Protocol On The 7th Of July

And Here We Will Put Some Of The Best Questions:

Q1. Can you please introduce yourself as well as Naoris Protocol ?

Hi Guys and Girls a small intro about myself, so, my name is David Carvalho, I am originally from the European Union, Portugal, I have been an ethical hacker for over 20 years and was the youngest Chief Information Security Officer of a multi $Billion Business in Europe.

I have been in that sort of role for close to a decade in various highly regulated areas and critical infrastructure areas of business and governance.

I am also an advisor at nation-state level projects, from smart cities’ technological transformations to defense and geopolitics in the critical areas of Cyber Espionage, Cyber War, and Cyber Terrorism. Im also a speaker and thought leader in Enterprise Cyber and Cyber Innovation spaces.

And its a pleasure to be here today with you all!

So answering the other part of the question:

Naoris Protocol is the worlds first Decentralized CyberSecurity Mesh that protects devices across the digital world from cyber threats and associated risks while enforcing CyberSecurity standards.

Designed to increase cybersecurity levels across every sector of the economy by converting any network’s infrastructure into nodes securing the baseline, ensuring systems are cyber secure, trusted, and safe to operate — from web2 networks like governments, enterprises, and organizations to the entire Web3 stack.

We are adopting a contrarian p2p design pattern that uses Blockchain and our own Swarm AI technology developed together with various EU Universities to achieve higher levels of cybersecurity both in Web2, Cloud, ETC by decentralizing it, and Web3.

Q2. Every project has a story behind their name, can you tell us more about the story behind this?

Naoris is the name of a far away star, it`s also in our case the name name we adopted for the Protocol, a historical far away solution for this hard cybersecurity problem, that was always out of reach, until just now… a hard problem, that has a solution that blockchain enables through Naoris Protocol, Naoris is also a Unique name, so if you search for it online, you should only find us.

Q3. What are the advantages of Your project ?

Naoris Protocol enables every device to constantly report its system integrity status and security status in a provably safe and trusted manner so that the chain can ensure under consensus that this device is operating normally and does not present a risk to the rest of the network. Naoris Protocol is a complimentary security layer that does not conflict with any other traditional or centralized cyber tool, it does not compete with them either.

Naoris Protocol provides access to a global threat mitigation environment, where every participant benefits – from a single mobile user to a global enterprise. Joining Naoris Protocol provides real-time threat information and intelligence from the daemon present on their devices and from across other participant networks.

As more participants, users, networks, and organizations join, they become part of a Naoris Protocol distributed threat management engine, where every participant is rewarded by the network for joining and participating in the network. Furthermore, the user or enterprise that joins also benefits from network validations distributed by a global decentralized threat mitigation supercomputer that is constantly learning and correlating threats and malicious behaviors to mitigate risk.

Therefore all users, whether individuals or part of an enterprise, act as nodes in a decentralized system, rather than a point of failure within a siloed system.

And Here We Will Put Best Questions From Our Members And Naoris Protocol Fans :

Q1. What are the most ambitious goals of your project?

Naoris Protocol aims to solve Web2.0 centralized cybersecurity vulnerabilities and weaknesses by leveraging the dedicated Naoris Protocol dPoSec consensus and Swarm AI to create a distributed security environment by converting traditionally untrusted network devices into a Decentralized CyberSecurity Mesh of cyber-trusted validator nodes.

Naoris Protocol takes a unique decentralized consensual approach to trust across devices. Its solution is groundbreaking due to its enforced decentralized security model and because it is complementary, working alongside traditional centralized cybersecurity solutions. It runs a novel decentralized cyber layer on top of any traditional centralized processes and systems that adds to the ‘defense in depth stack’ allowing already deployed and centralized services to freely operate without being in competition with their existing tools making complex environments safer instead of more risky.

Q2. The biggest challenge facing projects right now is related to the current market conditions. So, can you explain the reasons why users and investors should participate in the long-term development of the #NaorisProtocol ecosystem?

Indeed, current markety conditions are low for hype and may be hard for smaller scoped projects, but in our case we saw quite a large increase of interest and investment from various VC parties and users focused on the deep need for the tech we have and the high validation we have from accelerators thatw e won and academic spaces we collaborate with, instead of hype and “follower-culture” wich is really ideal for us.

Cybersecurity is also a unique space, as a need, it is market conditions agnostic and downturn resistant, on the other side the current socio-economic climate pushes further threats into the space that need further efforts on the creation of new cyber mitigation techniques, the current geo political and nation-state conflicts and proxy conflicts also show that a decentralized soution to centralized problems of trust and cyber threats across the current critical infrastructures, defense infrastructures and highly regulated spaces have a lot to gain from our decentralized cybersecurity mesh aproach.

Please check this article from the former CHAIRMAN of NATOs INTELLIGENCE COMMITEE Kjell Grandhagen.

https://www.infosecurity-magazine.com/opinions/blockchain-no-checkmate/

Q3. What is #NaorisProtocol plans for global expansion? Are #NaorisProtocol focusing on the market at this time or focus on building and developing or getting customers and users, or partnerships?

We have joined top world company and innovation accelerators in the area of fintech, deep tech and enterprise tech and we have not only won and been finalists on these accelerators, but also met and worked with top 10 cross industry names and academia, form an expansion perspective well leverge these relationships from banking to telcos, defense and criticial infrastruicture spaces to integrate into critical areas of society through Smart Cities and critical infrastructure embedded systems and networks and also on the enterprise space.

We are focused on hiring agressively the best talent from WEB3 and academia and also on bringing agressively large partnerships that well be announcing soon.

The project itself its quite advanced already and we have have done a number of POCs with the large players mentioned above.

Regarding the project from a participation perspective and community perspective, we invite anyone to join our Testnet and to Join us/support the project and participate. 

Below our participation form:
https://mztinca6ewd.typeform.com/to/XFKR6r1q

Testnet will be available on Q4 and there will be a whitelist for it.

Q4. Most of investors have just focused on price of token in short term instead of understanding the real value of the project. Can you tell us on motivations and benefits/value for investors to hold your token in long term?

The $CYBER token is at the core of the Naoris Protocol utility chain, is embedded within a true machine-to-machine economy transaction model that validates CyberSecurity status and trust of devices and its operational processes through transactions that are validated under dPoSec consensus and enforces standards across devices and networks. Its value is intrinsically tied to the trust and security of networks and systems.

$CYBER token monetizes trusted cyber security systems over a function of time, using the dPoSec consensus as an enabler and incentive to achieve cyber-secure networks.

$CYBER doesn’t require people to trade and transact the token monetarily for it to grow in adoption. It requires networks to integrate Naoris Protocol and hold tokens to incentivize validators to continually validate the trust status of the underlying devices that power the network in case of a breach or a threat. Centralized and untrusted devices are converted into provably trusted cyber validators after an onboarding process that ensures they have no known risks or vulnerabilities present and can be added to the secure baseline of potential validators, with every device validating every other device for trusted behavior, all within a block time lower than 1 second under the dPoSec consensus.

$CYBER token acts as fuel for the whole ecosystem

Validator Devices :
– Hold and stake $CYBER as a security handshake ensuring trust and security
– Rewarded over time for trusted behavior, uptime stability, and cyber-trust
– Creating a secure and trusted growing environment like a ‘supercomputer of trust  validations’

Participants:
– Earn $CYBER staking rewards automatically by sharing new intelligence related to new threats and securing the network
– Purchasing $CYBER tokens fuels the onboarding and validation of devices and networks with rewards
– Joining means the bigger the network grows, the more resilient and trusted are its decisions and consensus and more devices will have to join the $CYBER economy and hold $CYBER
– Benefit from the decentralized onboarding of new devices that will use $CYBER to operate on the machine economy and be validated as trusted and be able to validate others
– Gain from growing monetization of cybersecurity data through trust validations
– Win-Win for Web2 & Web3 participants.

Q5. Naoris Protocol ensures a centralized model where the hacking of a single device that could compromise an entire network is categorically flawed. How could you change this? What are the sophisticated mechanisms Naoris Uses and how about your headway against hackers?

Naoris Protocol turns centralized computer networks with traditionally untrusted devices into a decentralized cyber-secure mesh, where a swarm of cyber-trusted devices, validate each other.

Naoris Protocol deploys a software agent or daemon dApp onto any centralized device* that enables it to constantly report its cyber trust status under consensual trust across the network. Devices operating under Naoris Protocol’s dPoSec consensus along with the software agent are converted into a decentralized cyber-validator army of watchdogs that ensure the whole infrastructure is safe.

Each device becomes a cyber-trusted validator node that constantly monitors every other device, creating a decentralized baseline layer of trust across ALL devices in the network, so Web2 and Web3 operate safely, bringing decentralized trust and security enforcement to centralized spaces.

Detection of risks and governance lapses in complex environments or networks happen in seconds, not months, with cyber-related damages falling by at least an order of magnitude. With Naoris Protocol, devices and networks remain the same, but behave differently, every device is no longer a silo and an observer in cyber operations, it becomes instead an active operator in a cyber trust consensus under a new layer of distributed and enforced cyber standards.

The Protocol allows for a huge and exponentional trust model and validation model for cyber risks threats and status of systems to exist across the internet under consensus that was not possible before, allowing any digital devices to be known to operate in a trusted mannel backed by distributed validations for the first time ever.

Q6. How can we participate in your Presale and what about Whitelist holders ?

Our project is currently on private sale and there is a minimum participation amount.

Re: token sales etc, We are currently in Private Sale and you can find more info about that on our telegram chat or ask for info on it.

Re: Public Sales anyone can participate, we`ll be on it in Q3 of the year

Interest form here:
https://mztinca6ewd.typeform.com/to/XFKR6r1q

Q7. I read that you operate under the new dPoSec consensus. Why does the Naoris Protocol operate under the dPoSec (Distributed Proof of Security) consensus? Can you explain the advantages and disadvantages offered by this consensus compared to other consensuses?

Great Question!

Naoris Protocol’s utility use case is too critical to operate on a general-purpose blockchain. A complete separation from general-purpose chains is required to meet best-practice and cyber operational design in order to maintain current and future assurance of our non-negotiable cybersecurity principles.

For example: The security validation of a management system for a nuclear power station should not have to wait for a general-purpose chain to mint an NFT picture of a cat.

The use case requires a unique blockchain and consensus model that is “air-gapped“ and independent to allow critical security objectives to be achieved without delay or interference. The dPoSec model is fully integrated and inherently linked to the Naoris Protocol daemon that is embedded in each device and directly correlates with CyberSecurity Mesh design principles, allowing for quick and reliable verification of identity, context and policy adherence.

Within Naoris Protocol, validators cannot just validate without key sanity and security checks. In order for validators to be allowed to participate, they must be known to be cyber secure, and proven to be following best cyber practice, and not harboring any known threats before being onboarded under consensus by other validators.

For this to occur, a different consensus mechanism is necessary. Typical L2s are focused on smart contracts data and regular monetary transactions. It’s important within the Naoris Protocol sphere not to inherit any existing third-party risks, side-channel risks or TPS-related constraints.

Operating under the dPoSec consensus, network devices act as cyber secure validators in a decentralized CyberSecurity Mesh, and by default become the secure baseline for an extended trusted defense approach. As validators authenticate inputs while sensing and neutralizing threats, they create a distributed security environment that’s focused on network growth, wider adoption and network effect.

Every device continually validates every other device, bringing trust to all devices, securing the baseline layer and allowing for this baseline of trust and risk mitigation to be inherited by all other aspects of the network and operational processes in a P2P format. Because every device acts as a watchdog for every other device, they act in synchronous harmony, adhering to policy and enforcing policy in a provable manner under consensus and the prescribed standards defined; creating a distributed supercomputer of trust.

Q8. You say that blockchain projects can adopt Naoris in order to secure their validators’ integrity and avoid inheriting Web2’s cybersecurity vulnerabilities, but will they need to be finished projects in order to do so? Or is your technology open to migration by ?

Any project be it inder development or in production will have an infrastructure… On cloud, on premise etc.

ANY digital device will be able to deploy our Naoris Protocol Dapp and contribute to the overall security of everyone while everyone will contribute to their security.

Cross-Platform, in our testnet we currently support Windows, Most flavours of Linux, Unix, MACOS and Android.

Q9. Do the token holders have the right to participate in the governance of the project? What kind of decisions can they vote on about the community project?

yes, as a community driven project after Public Sale, the community will be able to participate in quadratic voting based on $CYBER token ownership and how active they are with their tokens.

New improvements, addons or even projects can be proposed and voted by the community in a decentralized manner.

And This Was The End Of Our Ama With Naoris Protocol .

If you have any other questions you can ask here: https://t.me/NaorisProtocol

Useful links:

Website : https://naorisprotocol.com/
Telegram group: https://t.me/NaorisProtocol
Telegram Announcement Channel: https://t.me/NaorisAnn
Medium: https://medium.com/naoris-protocol
Twitter: https://twitter.com/NaorisProtocol
LinkedIn: https://www.linkedin.com/company/naoris-protocol
Discord: https://discord.gg/WkUE7aVBXU