Naoris Protocol x IM community AMA RECAP

12 min readJul 3, 2022


🐋TELEGRAM AMA: Im Community & Naoris Protocol 🐋
⏰ AMA Timing : 30th June 2022 l 12:00 PM UTC l 19:00 GMT +7
Venue For AMA :

🎁 Reward Pool 100 USDT

➡️ The reward pool for the best 5 questions from Telegram is $50($10 Each) 💸
➡️ The reward pool for the best 5 questions from Twitter is $50 ($10 Each) 💸
Bà Tân |:
Welcome everyone. Today Im Community will host AMA with Naoris Protocol.

Bà Tân |: Today our guest is: @Consanto from Naoris Protocol.

Ahrix : Welcome @Consanto to the IM community.

Constantinos : Glad to be here! Our Founder and CEO @DC_Cyber will be answering your questions today

���Jőhn L��� : nice

���Jőhn L��� : AMA be started now

Bà Tân | : Hi @DC_Cyber

ka7Ana『░N░A░O░R░I░S░P░R░O░T░O░C░O░L░. ▓▒Mͥr rͣoͫbot▒▓ : Hi everyone! ❤

Bà Tân | : Before the first, please introduce yourself a little bit: @DC_Cyber���

ka7Ana『░N░A░O░R░I░S░P░R░O░T░O░C░O░L░. ▓▒Mͥr rͣoͫbot▒▓ : Hi Guys and Girls a small intro about myself, so, my name is David Carvalho, I am originally from the European Union, Portugal, I have been an ethical hacker for over 20 years and was the youngest Chief Information Security Officer of a multi $Billion Business in Europe.

I have been in that sort of role for close to a decade in various highly regulated areas and critical infrastructure areas of business and governance.

I am also an advisor at nation-state level projects, from smart cities’ technological transformations to defense and geopolitics in the critical areas of Cyber Espionage, Cyber War, and Cyber Terrorism. I`m also a speaker and thought leader in Enterprise Cyber and Cyber Innovation spaces. And its a pleasure to be here today with you all!


Bà Tân |: Thanks for the introduction.

Bà Tân |: Today’s AMA will have 2 session

Session 1: Project Introduction

Session 2: Free Asking (will choose 5 question)

Bà Tân |: Start session 1 AMA.

Bà Tân |: 1. What is Naoris Protocol? @DC_Cyber

ka7Ana『░N░A░O░R░I░S░P░R░O░T░O░C░O░L░. ▓▒Mͥr rͣoͫbot▒▓ : So, Naoris Protocol is the Decentralized CyberSecurity Mesh that protects devices across the digital world from cyber threats and associated risks while enforcing CyberSecurity standards.

Designed to increase cybersecurity levels across every sector of the economy by converting any network’s infrastructure into nodes securing the baseline, ensuring systems are cyber secure, trusted, and safe to operate — from web2 networks like governments, enterprises, and organizations to the entire Web3 stack.

We are adopting a contrarian p2p design pattern that uses Blockchain and our own Swarm AI technology developed together with various EU Universities to achieve higher levels of cybersecurity.


Bà Tân |: 2. How did the idea for Naoris Protocol come about?

ka7Ana『░N░A░O░R░I░S░P░R░O░T░O░C░O░L░. ▓▒Mͥr rͣoͫbot▒▓ : It’s actually quite an interesting story…

A number of years ago in Oslo, Norway, we attended as a participant a nation-state level meeting, where the former Head of NATO/OTAN Intelligence Committee Kjell Grandhagen was present among other important people in the space, and it was floated that perhaps the way forward would be to use blockchains and smart contracts to do CyberSecurity better. Kjell instantly understood the importance and possibility of using Blockchain to help solve one of the biggest problems in technology.

I`ll share Kjell Grandhagen’s quote — “The centralized model where the hacking of a single device that could compromise an entire network is categorically flawed. This needs to change. We don’t need to play a better game against cyber-criminals, we need to play a different game. With Naoris Protocol, there is no single point of failure, central database, or middleman that can potentially be a source for leaked or compromised data in ay digital device. Naoris Protocol uses consensual Blockchain technology that links network devices “as blocks on a chain“ so that no single end-point or terminal exists in a silo.”

So In 2018, Naoris Protocol was conceived to research how advancements in Blockchain, AI, and data science can provide an alternative approach to traditional cybersecurity with various universities and other organizations. Since then we have been researching companies and regulators in critical spaces, and it’s clear they want to mitigate their risks at a much higher capability level than what they are capable of at the moment with centralized tools.


There was a problem with the captcha button on our Telegram group.

Please Join again ���

Bà Tân |: 3. How does Naoris Protocol work?

ka7Ana『░N░A░O░R░I░S░P░R░O░T░O░C░O░L░. ▓▒Mͥr rͣoͫbot▒▓ : Naoris Protocol turns traditional centralized computer networks with traditionally untrusted devices into a decentralized cyber-secure mesh, where a swarm of cyber-trusted devices, validate each other.

Naoris Protocol deploys a software agent or daemon dApp onto any centralized device* that enables it to constantly report its cyber trust status under consensual trust across the network. Devices operating under Naoris Protocol’s dPoSec consensus along with the software agent are converted into a decentralized cyber-validator army of watchdogs that ensure the whole infrastructure is safe.

Each device becomes a cyber-trusted validator node that constantly monitors every other device, creating a decentralized baseline layer of trust across ALL devices in the network, so Web2 and Web3 operate safely, bringing decentralized trust and security enforcement to centralized spaces. So Naoris Protocol is a Utility Blockchain for all devices.

Following early success as winners and finalists in over a dozen premium accelerators, David and Monica have been building an incredible core team along with key industry advisors to validate the project for future development and scaling bringing in some people from the highest criticality spaces in society, from Cyber, Networks and C&C areas across the world from NATO/OTAN leaders to Nation-State Cyber-Commands, key Academia Spaces, and Cyber/Blockchain thought-leaders.

Naoris Protocol was conceptualized to tackle the most critical areas of business and governance. Founded by David Carvalho and Monika Oravcova, who has extensive experience in cybersecurity and blockchain technology, Naoris Protocol understands that leveraging a dedicated blockchain consensus can provide a decentralized and anonymous cyber risk management framework that would unlock a new era in cybersecurity and its standardization.


Bà Tân |: 4. What is a CyberSecurity Mesh?

ka7Ana『░N░A░O░R░I░S░P░R░O░T░O░C░O░L░. ▓▒Mͥr rͣoͫbot▒▓ : Naoris Protocol is the world’s first Decentralized Cybersecurity Mesh.

Gartner was the organization that first predicted that Cloud would be everywhere as a technology trend about a decade and a half ago, and now Gartner has identified Cybersecurity Mesh as a top strategic technology trend for 2022:

“Cybersecurity mesh is a flexible, composable architecture that integrates widely distributed and disparate security services. Cybersecurity mesh enables best-of-breed, stand-alone security solutions to work together to improve overall security while moving control points.


Bà Tân |: 5. Why should we believe in you?

ka7Ana『░N░A░O░R░I░S░P░R░O░T░O░C░O░L░. ▓▒Mͥr rͣoͫbot▒▓ : Awesome question, we`re all very excited about disrupting this critical area for the first time using Blockchain tech.

Naoris Protocol has been the winner or finalist in numerous top innovation and company accelerators since 2018 when Naoris was a R&D project that started out to deep-validate the concept, its ideation, technology, and use cases, initially conceptualised under the highest criticality areas of society and defence while under the advisory of former Chairman of NATO/OTAN Intelligence Committee, Mr Kjell Grandhagen. We were under strict validation rules from real-world serious businesses in various regulated areas from the Innovation and Company accelerators we were in and we’ve had POCs with large organisations already within the 6 or so Accelerators we ended up winning. You can see these on our website and soon on the FAQs we`ll be releasing on the site as well.

Since that time, Naoris Protocol has matured heavily and completed successfully with honours a number of highly regarded and hyper-validated accelerators in real-world settings and has achieved deployments and proof of concepts in highly regulated spaces and critical environments with various innovation accelerator partners in the areas of Highly Regulated International Banking, Healthcare, Critical Industry/OT and Smart Cities.

David Carvalho is the Founder, CEO, and Chief Scientist of Naoris Protocol, with over 20 years of cybersecurity experience working as a Global Chief Information Security Officer level of multi-billion USD companies such as the OCS group and high stakes environments such as the London City Airport. David has been an ethical hacker in cybersecurity since he was 15 years old and now advises nation-states and national highly regulated environments in the critical areas of Cyber Espionage, Cyber War, and Cyber Terrorism. He’s been involved in Crypto since 2013 as an investor and miner POS/POW and is involved in several initiatives and cybersecurity-related innovations. His core five areas of focus are risk mitigation, next-gen cyber-security, ethical wealth generation, innovation, and creation of value in the fields of crypto, automation, and Distributed AI.

Monica Oravcova is co-founder ad COO of Naoris Protocol with 15 years of specialising in delivering security controls and information security strategy across advanced tech environments. In addition, Monica has high-level; experience managing risk and embedding security through training and awareness programs for telcos finance, and manufacturing. Monica also led operations and exec teams for FTSE 100 clients like AT&T and IBM.

closer to the assets they’re designed to protect. It can quickly and reliably verify identity, context, and policy adherence across cloud and non-cloud environments.


���Jőhn L��� : There was a problem with the captcha button on our Telegram group.

Please Join again ���

please join hurry up guys

Bà Tân |: 6. How much potential damage could be mitigated as a result of increased awareness?

ka7Ana『░N░A░O░R░I░S░P░R░O░T░O░C░O░L░. ▓▒Mͥr rͣoͫbot▒▓ : By 2025 the world faces cybercrime damages that will cost users, companies, and governmental entities $10 Trillion yearly. If you`re asking how much that is, it’s about 7% of the world’s global economy.

So the impact and utility of this protocol is very wide and it applies also to the 99% of the world that is centralized, not only to Web3.

The average cost of a small data breach currently stands at just over $4.25 million for a single company, representing a significant cost across all industries. In addition, users often experience a compromise of their private data, where one data breach can result in a cascading leak of personal information.

Here’s some statistics:

- By 2025 we face a $10 trillion cyber crime problem

- The average cost of a data breach $4.25 million

Global cybersecurity spend will be $1.75 trillion cumulatively for 2021 to 2025

- The Solar Winds hack will cost $100 Billion to clean up

2017 Equifax hack compromised private data of 50% of the US population

- Username and password attacks increased 450% up from 2019

- Total number of connected devices is set to exceed 50 billion by 2022

- Axie Infinity’s Ronin suffers a $625 Million hack

- Current detection time for a reported breach is 280 days on average

As a general rule of thumb, we expect users of the Decentralized CyberSecurity Mesh to lower their risk by an order of magnitude.


Bà Tân |: 7. How are centralized devices turned into decentralized cyber-trusted validator nodes?

ka7Ana『░N░A░O░R░I░S░P░R░O░T░O░C░O░L░. ▓▒Mͥr rͣoͫbot▒▓ : A Naoris Protocol Dapp software agent or daemon is embedded on each device which directly correlates with the chain and the dPoSec consensus model.

Devices can be verified and authenticated backed by the Naoris Protocol identity proofs that operate under the Distributed Identity Validation Authority (DIVA), a Naoris Protocol technology developed together with PHD`s from various academic institutions in Europe,

This creates and requires a direct connection to our use-case-specific critical blockchain (no third parties) to ensure the celerity, immediacy, independence, baseline trust validation and future validations from then onwards.


Bà Tân |: 8. Why is Naoris Protocol building its own scalable blockchain and dPoSec (Distributed Proof of Security) consensus?

ka7Ana『░N░A░O░R░I░S░P░R░O░T░O░C░O░L░. ▓▒Mͥr rͣoͫbot▒▓ : Naoris Protocol’s utility use case is too critical to operate on a general-purpose blockchain. A complete separation from general-purpose chains is required to meet best-practice and cyber operational design in order to maintain current and future assurance of our non-negotiable cybersecurity principles.

For example: The security validation of a management system for a nuclear power station should not have to wait for a general-purpose chain to mint an NFT picture of a cat.

Core drivers for dPoSec:

- Core use case is Security & Trust

- Use case is too critical to be on a general-purpose blockchain

- Typical L2s are focused on smart contracts data and regular monetary transactions

- Complete separation from general chains because of cybersecurity principles

- The Naoris Protocol software daemon is embedded on each device and requires a direct blockchain connection because of the core critical use case (no third party involvement)

- Must be separated not to inherit existing risks

The use case requires a unique blockchain and consensus model that is “air-gapped“ and independent to allow critical security objectives to be achieved without delay or interference. The dPoSec model is fully integrated and inherently linked to the Naoris Protocol daemon that is embedded in each device and directly correlates with CyberSecurity Mesh design principles, allowing for quick and reliable verification of identity, context and policy adherence.

Within Naoris Protocol, validators cannot just validate without key sanity and security checks. In order for validators to be allowed to participate, they must be known to be cyber secure, and proven to be following best cyber practice, and not harboring any known threats before being onboarded under consensus by other validators.

For this to occur, a different consensus mechanism is absolutely necessary.


Bà Tân |: Alright, Session 1 has finished perfectly. Appreciate your detailed responses @DC_Cybe ���

Bà Tân |: Don’t forget to join the group

Bà Tân |: End of session 1

Bà Tân |: We’ll move on to session 2

Bà Tân |: Session 2: Free Asking (will choose 5 question)

Bà Tân |: Thanks for the questions from the community.

Bà Tân |: Now let’s give our dear guest @DC_Cyber some time to go through them.

Q1. You say that blockchain projects can adopt Naoris to avoid inheriting the cybersecurity risks of Web2 and protect the integrity of their validators, but to adopt Naoris will they have to be projects that have not yet been developed? Or can anyone migrate to your technology?

ka7Ana『░N░A░O░R░I░S░P░R░O░T░O░C░O░L░. ▓▒Mͥr rͣoͫbot▒▓ : Thats a great question, actually any current digital device or infrastructure, from phones running Android, Laptops Running Windows or Servers in any cloud running Unix or Linux can use and deply the protocol to improve their security posture, the more devices in the network have the bigger the level of cyber trust and resilience of their operarions under consensus as all of them validate each other… instead of becoming weaker and vulnerable as normally every device is a point of failure for the whole network.

Q2. Q… I want to invest to your project. Where i buy your token? Is it available on any exchange?

ka7Ana『░N░A░O░R░I░S░P░R░O░T░O░C░O░L░. ▓▒Mͥr rͣoͫbot▒▓ : Our project is currently on private sale and there is a minimum participation amount.

Re: token sales etc, We are currently in Private Sale and you can find more info about that on our telegram chat or ask for info on it.

Re: Public Sales anyone can participate, we`ll be on it in Q3 of the year

Interest form here:

Q3. Do you have a telegram channel, Twitter or YouTube channel to promote your project and know the details of your project? Can we learn anything there?-

ka7Ana『░N░A░O░R░I░S░P░R░O░T░O░C░O░L░. ▓▒Mͥr rͣoͫbot▒▓ : Listing below

Feel free to join us on our social media to stay up to date!



Telegram group:

Telegram Announcement Channel:



Q4. Staking program is very important for every project? Can i stake your Token? Do you have any plan of starting staking programme? plz tell sir?

ka7Ana『░N░A░O░R░I░S░P░R░O░T░O░C░O░L░. ▓▒Mͥr rͣoͫbot▒▓ : We will allow staking under our testnet for everyone that buys tokens and the rewards are increased with the download and running of our DAPP Naoris Protocol Daemon during our testnet.

Q5. Do you have Whitepaper if yes, please share it with as secondly do you have plans for pre-sale? Now where can we Join it?

ka7Ana『░N░A░O░R░I░S░P░R░O░T░O░C░O░L░. ▓▒Mͥr rͣoͫbot▒▓ : Hi, sure here you go. Our academically written paper is here:

You can also find it on our site:

and you can also find more info on our Medium Articles


Our project is currently on private sale and there is a minimum participation amount.

Re: token sales etc, We are currently in Private Sale and you can find more info about that on our telegram chat or ask for info on it.

Re: Public Sales anyone can participate, we`ll be on it in Q3 of the year

Interest form here:

Constantinos : Dont forget to follow us on Twitter! ���

Q6. Do you have Whitepaper if yes, please share your project Whitepaper with as. Secondly, you have a AUDIT certificates? and are you working to AUDIT your project? or, What are the security measures for your Project?

ka7Ana『░N░A░O░R░I░S░P░R░O░T░O░C░O░L░. ▓▒Mͥr rͣoͫbot▒▓ : Thanks for the question

We have been highly validated by all the real world accelerators and their companies under POC`s, Banks, Telcos, Defense Companies etc — in all the spaces we have participated in and worn — Answered in more detal above, from inner workings to capability have been validated at the highest levels.

We also have a certificate from Assure Defi that we will make public that covers all from KYC of project workers and leadership to Validations, this will be public by the beginning of next month.

Our academically written paper is here:

You can also find it on our site:

and you can also find more info on our Medium Articles


Bà Tân |: Thanks for the useful information from @DC_Cyber

Bà Tân |: End of session 3

Bà Tân |: For questions that have not been answered today, you can send them to @NaorisProtocol for answers.

Bà Tân |: IM Community, if you would like to know more about Naoris Protocol ! here are some useful links for you:

Official Website:




Bà Tân |: Allright, I declare the Im Community AMA with Naoris Protocol has ended.

Thanks to @DC_Cyber | Naoris Protocol joined us and provided us with Naoris Protocol information, we hope that this knowledge makes us understand more about (

To the members, thank you for following this event to the end. winners will be announced soon.




IM is a PR group — Marketing support for Airdrop, advertising, AMA, Services … in Vietnam Flag of Vietnam. — — — — — — — - TG: