Cybersecurity is dead. Long live Cybersecurity.

Naoris Protocol
Naoris Protocol
Published in
10 min readFeb 22, 2022

For more information, please visit https://naorisprotocol.com/

We are Naoris Protocol. We’re building the Decentralized CyberSecurity Mesh for the hyper-connected world.

Our vision is to restore cybersecurity across every sector of the economy, by applying a contrarian p2p design pattern that pushes the boundaries of Blockchain and Swarm AI technology. An approach that doesn’t only help us play a better game against cybercriminals…it’s a solution that provides an opportunity to play an entirely different game — leveling the playing field and improving the odds for those who create value in society, not for those stealing it.

Unless we reimagine CyberSecurity, by 2025 we will face a $10T problem.

As we cross the point of 50 Billion connected devices globally, and our yearly cybersecurity-related damages are nearly 7% of global GDP, it’s fair to say we are inching closer to the point of no return.

A decentralized cybersecurity mesh architecture allows a paradigm shift: Networked devices remain the same, but behave differently. Devices previously considered single points of failure, now become validator nodes that constantly monitor every other device in the network, identifying, evaluating, and reacting to threats in real-time

Imagine the effects of neutralizing global Cyber Threat.

Imagine a world where you can safely share personal or sensitive data across multiple environments without fear of being hacked, exploited, or held hostage by ransomware?

A world where a cyber assault or breach of the digital network your company relies on is a remote possibility rather than a near-certainty?

Imagine a future where the persistent danger of cyber terrorism or cyber warfare against economies, democracies, and critical infrastructure from nation-state actors and rogue organizations is muted?

TL;DR What is Naoris Protocol?

CyberSecurity has finally met the Blockchain and the implications for the world of data security are enormous.

Naoris Protocol is the world’s first Blockchain-based CyberSecurity Mesh built for the entire digital world. Naoris Protocols’ disruptive and contrarian design pattern makes networks safer as they grow, not weaker by turning traditionally untrusted devices into a swarm of cyber-trusted validator nodes.

The protocol operates within a tokenized machine economy where cyber-trusted devices authenticate and validate each other, forming multiple points of defense while eliminating centralized single points of failure. Cyber threats are identified and risks are mitigated under a distributed consensus in near real-time.

For this use case, Naoris Protocol is employing the HyperStructure ethos to create a decentralized security enforcement protocol that is:

  • Unstoppable
  • Permissionless
  • Minimally Extractive
  • Valuable
  • Expansive
  • Positive Sum
  • Credibly neutral

All this, without relying on a myriad of legacy centralized security solutions that work independently of each other, increasing complexity, reaction time and expanding the attack surface area of networks.

Naoris Protocol is a powerful and complimentary blockchain protocol that employs a win/win mindset designed to work across Web2 or Web3 — any company using it can protect themselves against escalating levels of cyber threat.

Blackhat hackers, rogue organizations, and nation-state actors have an arsenal of cyberweapons that can easily exploit centralized network architectures, wreaking havoc on economies, endangering democracies, threatening businesses large and small, and stealing personal and sensitive data.

The sheer complexity of our hyper-connected world that relies on a static 35-year-old single point of failure cybersecurity model, means cyber warfare, cyber terrorism, and sophisticated hacks are exponentially increasing. Infrastructure, energy, supply chains, IT, financial, governmental, and military systems are constantly under some level of cyber threat or attack from malicious actors.

By 2025, cybercrime damages will cost users, companies, and governmental entities $10.5 trillion yearly, up from $3 trillion USD in 2015. Think about that for a minute. That’s approximately 7% of the forecasted Global GDP for the same period.

In addition, global spending on cybersecurity products and services has never been as higher, being expected to exceed $1.75 trillion cumulatively for the five-year period from 2021 to 2025

The average cost of a data breach currently stands at just over $4.25 million, representing a significant cost across all industries. In addition, users often experience a compromise of their private data, where one data breach can result in a cascading leak of personal information. The problem cannot be understated: the 2017 Equifax hack compromised the private financial data of over half of the population of the United States.

https://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/

Most of Web3 isn’t safe, either.

The majority of Web3 operates on top of Web2 architecture that wasn’t designed to handle the current level of cyber threat. Web2 cyber security tools are siloed black boxes owned and operated by centralized vendors using the same static approach over the last four decades.

For example, over 70% of Ethereum nodes operate in the Web2 cloud, which means Web3’s coveted decentralized ethos has its foundations built on centrally controlled cloud services. Servers, machines, and devices are inherently vulnerable to a range of threats from internal to external sources and cannot by default be considered trusted partners. Web3 ecosystems have no way of monitoring the baseline security and trust status of the devices and services upon which they rely. By default, Web3 inherits Web2’s cyber security weakness.

In short, current cybersecurity cannot deliver the level of effectiveness and service businesses and governments demand, because traditional Web2 cybersecurity methods configure devices to operate independently, not in harmony, each of them by default a potential single point of failure.

As seen year on year, cyber defense budgets are ballooning, cybersecurity teams grow bigger and more expensive and data breaches become larger, more frequent, and ultimately more damaging. It’s a catastrophic zero-sum game.

When all else fails, Change The Game…

Naoris Protocol enables a cyber secure environment across Web2 and Web3. The solution is generalized, yet highly customizable; the devices are the same but behave differently. This provides a new value proposition to nation-states, legacy industries, Web2, and the entire Web3 stack. It’s literally built for everyone. And that changes everything.

Our objective is not only to exponentially improve data security and verification, but to play a fundamental role in the ongoing evolution of the CyberSecurity landscape, its practice, methods, standards, and its future. Therefore, today’s distributed threats demand a new kind of solution:

We’re building a HyperStructure.

The risk of systemic cybersecurity failure cannot be solved by a traditionally framed company, as the company itself could become a single point of failure for the integrity of the Cybersecurity Mesh. A DAO governed protocol using quadratic voting is a great initial direction, but a mission-critical piece of digital planetary infrastructure built to run forever requires 7 bold design principles:

1. Unstoppable: It runs indefinitely; devices and networks can adopt it or abandon it, but it cannot be stopped.

2. Permissionless: Users and builders cannot be de-platformed — it’s censorship-resistant and accessible by anyone.

3. Minimally Extractive: Near base cost fees disincentivize forking while powering a treasury for ecosystem development managed by the DAO.

4. Valuable: Conceived to be a for-public endeavor, and yet, extremely valuable to own and govern — which sparks an ecosystem around it.

5. Expansive: It has built-in incentives for users to behave fairly, and for builders to build on top of it.

6. Positive Sum: Wide adoption and usage of the protocol result in a win-win environment for all network participants.

7. Credibly Neutral: To be adopted by a wide range of DAO-based governance structures, companies, and individuals, HyperStructures need to be credibly neutral.

Our belief is that the attributes of a HyperStructure are not just powerful on their own, they are also highly synergistic. Building an important piece of digital infrastructure for Web2 and Web3, potentially securing all devices in the world with a peer-to-peer Blockchain-enabled CyberSecurity Mesh, requires thoughtful planning and design principles. Being built on such an ethos, Naoris Protocol becomes a for-public infrastructure optimized for massive adoption and its network effects, while solving the underlying challenges it was designed for.

Naoris Protocol CyberSecurity Mesh Solution

Operating under the dPoSec consensus Devices in the Mesh Become the defense.

Naoris Protocol is governed by a novel Distributed Proof of Security (dPoSec) consensus that creates a distributed security environment focused on growth and wider adoption by detecting and mitigating threats early on.

Under dPoSec, devices act as cyber-secure validators that authenticate inputs while sensing and neutralizing threats. Every device continually validates every other device, bringing trust to ALL devices, securing the baseline layer and all other aspects of the network. Layers of the network are landlocked, fencing in malicious actors at the point of entry, preventing them from progressing further.

By turning single points of failure into multiple points of defense, Naoris Protocol orchestrates devices in any network to:

Convert

  • Untrusted devices into a swarm of trusted validators
  • Centralized CyberSecurity into a decentralized CyberSecurity MESH

Identify

  • All inputs authenticating status
  • Cyber threat detection in near real-time

Neutralize

  • By land locking layers and fencing in malicious actors
  • Using AI-assisted threat mitigation, preventing damage

Because every device acts as a watchdog for every other device they act in harmony, adhering to policy uptime and prescribed standards which are enforced by the protocol, creating a super-computer of trust.

By enforcing cross authentication of devices across networks and ecosystems, risky behaviors and threats become universally detectable, ensuring that no risky or vulnerable device, system, or compromised application can be leveraged to attack others or subvert business processes.

Verge Clusters: Paradigm shattering scalability & security using a purpose-built Blockchain leveraging Ethereum.

Through sharding-like structures called Verge Clusters, we’ve developed a new multi-chain architecture to assure the integrity and trustworthiness of any network or device that uses the protocol.

The ledger absorbs the issues of scalability and centralization with a performance of 50k-1M processes, network state changes, or general transactions per second, challenging the paradigm of the Blockchain trilemma.

Widespread adoption and usage results in a win-win environment for all network participants. As more devices in the network use the CyberSecurity Mesh, the security for all network participants improves.

If attacks on any device belonging to a network inside a Verge Cluster are attempted, whole economies subject to the same compliance criteria will be upgraded and become more secure within those Verge Clusters.

The more users, businesses, and governance structures that use the Decentralized Cyberecure Mesh, creating networks of networks, the stronger and more secure it becomes.

The Naoris Protocol approach is complementary and aims to help support all use cases without any impact to their operations. dPoSec is focused on leveraging higher trust and security for these spaces which operate their own private VergeClusters, with their own rules and use cases.

No further requirements for changes to their operations or consensus model are required, to leverage their already existing infrastructure for their own defense

By turning any device, by nature a centralized point of risk, into a trusted node and validator of trust operating within a Verge Cluster, Naoris Protocol is bringing decentralization to centralized environments.

Powered by the $NAORIS token.

By creating a machine-to-machine tokenized economy intrinsically tied to the network and system security, best practice and cyber security can be enforced in a permissionless manner, facilitating a highly responsive, incentivized network of decentralized devices across the mesh, from mobiles, to servers and IoT.

  • Devices hold and stake $NAORIS as a security handshake ensuring trust and security
  • Devices are rewarded for trusted behavior fostering an environment that is secure
  • Participants earn $NAORIS staking rewards for securing the network

The token utility is baked into a true machine economy optimized for immediate threat detection and an autonomous escalation of reaction measures. Single points of failure are eliminated and cyberattacks mitigated in real-time. Participants purchase $NAORIS tokens to fuel the validation of devices and networks with rewards.

We play the infinite game

Naoris Protocol is a CyberSecurity ecosystem that is agnostic to device or operating system; it works on any networked device, whether smartphone, computer, or self-driving car. By harnessing the power of the infinitely scalable Blockchain across a truly vast number of users, Naoris Protocol enables a reality where individuals and businesses can be more secure as they carry out their everyday business.

Naoris Protocol is developing state-of-the-art, scalable Blockchain technology that is built to address a critical problem of the digital world and become adopted by all sectors of the economy.

A pragmatic solution that can be deployed in the next few years, not decades — one that can self heal, expand and thrive for generations to come. With a sense of urgency, but also a strategic focus on the infinite game, our vision is to become the world’s CyberSecurity Mesh HyperStructure that can permanently neutralize cyber attacks

About Naoris Protocol

Naoris Protocol is a Decentralized CyberSecurity Mesh for the hyper-connected world. Our disruptive design pattern makes networks safer as they grow, not weaker, by turning each connected device into a trusted validator node. A powerful Blockchain protocol that every company can use to protect against the escalating levels of cyber threat.

Devices are rewarded for trusted behavior fostering an environment that is secure. Participants earn $NAORIS staking rewards for securing the network. The more users, businesses, enterprises, and governance structures that come together to establish networks or networks and use the stronger and more secure Decentralized Cyberecure Mesh becomes.

Want to learn more about it?

Visit our Website or check out our Whitepaper

Stay connected: Telegram | Twitter | LinkedIn | Medium

--

--

Naoris Protocol
Naoris Protocol

Helps enterprises achieve post-quantum cybersecurity without relying on traditional centralized systems that are prone to single points of failure