Across today’s interconnected economy, organizations depend on digital systems that must remain secure even as technology advances introduce new forms of risk. Naoris Protocol was created to meet this moment by rethinking how cybersecurity is structured, moving away from centralized defenses toward a distributed model designed to operate securely at scale. Its architecture focuses on continuous verification, shared intelligence, and infrastructure prepared to withstand the coming impact of quantum computing. The project is designed as a foundational security layer capable of supporting digital ecosystems where devices, applications, and networks must continuously validate their integrity rather than rely on static trust assumptions.
At its core, Naoris Protocol is built on the belief that trust in digital environments should be constantly measured rather than assumed. Founded in 2018 by cybersecurity specialist David Carvalho, the company drew on decades of experience in cyber espionage, cyber warfare, and critical risk management across sensitive and regulated sectors. Carvalho brings more than 20 years of experience as an ethical hacker and C-level executive, having advised multibillion-dollar enterprises and nation-state initiatives on cyber espionage defense, cyber warfare strategy, and cyber terrorism mitigation. His exposure to high-risk environments revealed that traditional perimeter-based security models struggled to keep pace with complex, highly connected networks, prompting the development of an alternative approach grounded in decentralization. This experience shaped the project’s guiding principle that security must function as distributed infrastructure embedded directly into digital systems rather than as a defensive layer applied after threats emerge.
Early work within the company centered on research into post-quantum cryptography, distributed validation, and mechanisms capable of forming trust across vast device ecosystems. Instead of treating security as a gatekeeping function, Naoris Protocol designed systems that could evaluate the health of devices and transactions continuously. This research led to the creation of its decentralized proof of security consensus model, known as dPoSec, which validates both activity and integrity across the network.
Through dPoSec, devices become active participants in maintaining security rather than passive endpoints. The mechanism combines principles drawn from practical Byzantine fault tolerance and proof of stake to record validation results onchain. Using Verge Clusters to organize and process large volumes of validation data, the system is able to maintain efficiency while supporting constant oversight of network conditions. This allows enterprises and decentralized platforms alike to confirm trust in real time without reliance on centralized authorities. In this architecture, connected devices collectively participate in verifying the cyber health of other nodes, forming a cooperative defense system capable of identifying anomalies early in the attack lifecycle.
Another defining feature of the protocol is its decentralized trust mesh, which transforms connected systems into a cooperative security environment. Each device can verify the condition of others, forming a web of mutual validation that reduces the risk of single points of failure. By distributing responsibility across the network, Naoris Protocol creates resilience that reflects the actual state of infrastructure as it operates, rather than relying on delayed assessments or isolated monitoring tools.
As the platform matured, the integration of Swarm AI introduced a distributed intelligence layer capable of learning from patterns observed across the entire network. Swarm AI analyzes shared conditions and behavioral signals to identify anomalies and coordinate responses collectively. This collaborative model strengthens detection capabilities while allowing the system to adapt dynamically to emerging threats without centralized control structures.
A major technical component enabling this adaptability is the Sub Zero Layer, an EVM compatible blockchain designed to deliver quantum safe protection for digital transactions and infrastructure. The Sub Zero Layer enables existing blockchain ecosystems and enterprise environments to adopt enhanced cryptographic protection without requiring structural redesign. By aligning its cryptographic approach with standards developed by NIST, NATO, and ETSI, including the use of Dilithium five for signature security, the protocol prepares networks to defend against attacks that future quantum systems may enable.
Operational validation of this architecture was demonstrated in early 2025 with the launch of Naoris Protocol’s decentralized physical infrastructure testnet. During its initial phase, the testnet validated more than 106,178,587 post-quantum transactions, supported the creation of 3,353,759 Naoris wallets, and activated over 1,065,218 distributed security nodes across the network. The system also mitigated approximately 603,040,584 threats in real time, demonstrating the scalability of the protocol’s decentralized cybersecurity model under live network conditions. The results demonstrated the scalability and operational readiness of the protocol under real- world conditions. The project was also recognized within the decentralized infrastructure sector and was named “DePIN Project of the Year” in 2024 and again in 2025, reflecting growing industry attention toward decentralized cybersecurity infrastructure.
Recognition of this work extended into the regulatory and institutional sphere during the same year. The protocol’s model was cited in a research submission to the United States Securities and Exchange Commission as a reference framework for quantum-resistant blockchain infrastructure.
Beyond research and architecture, Naoris Protocol has translated its model into practical tools that support organizations navigating both Web2 and Web3 environments. Its offerings include a Sub Zero Layer blockchain for continuous validation, a distributed browser security extension that blocks malicious activity through collective defense, and secure communication tools intended for regulated industries and government operations. These solutions extend the trust mesh into everyday digital operations, from enterprise networks to decentralized applications.
Industry adoption has expanded across more than thirty use cases spanning healthcare monitoring, logistics, asset tracking, smart surveillance, and financial infrastructure protection. Each implementation reflects the same guiding principle that security should be embedded into the functioning of systems rather than applied as an external control. This philosophy allows Naoris Protocol to support environments that demand verifiable integrity, operational transparency, and resilience against both classical and quantum threats.
Leadership continues to guide the company toward long term infrastructure transformation. David Carvalho serves as founder, chief executive officer, and chief scientist, directing the technological vision while drawing on more than two decades of ethical hacking and executive leadership experience across regulated and critical industries.
Chief Business Officer Youssef El Maddarsi leads strategic development and international expansion. With more than 10 years of experience in strategic development and global partnerships, he also serves as Chief Executive Officer of Naoris Consulting. El Maddarsi has been recognized by EMEA Entrepreneur as the most influential entrepreneur from Morocco in 2025. He is a graduate of Regent’s University and has completed executive education at Wharton, INSEAD, and Duke, with additional certifications from Yale and École Polytechnique. His academic and professional background supports the company’s engagement with enterprise, institutional, and cross border initiatives as Naoris Protocol scales globally.
The evolution of Naoris Protocol illustrates a broader shift occurring within cybersecurity itself. As networks grow more complex and the horizon of quantum computing approaches, trust must be engineered into the fabric of digital infrastructure. By combining decentralized validation, collective intelligence, and quantum safe cryptography, Naoris Protocol represents a model for how security can scale alongside innovation while maintaining confidence in the systems that underpin modern society.
For further actions, you may consider blocking this person and/or reporting abuse
Top comments (0)