Faced with the quantum threat, build the web3 of tomorrow - exclusive interview with David Carvalho, CEO of Naoris

A silent revolution is looming. As the quantum computer becomes reality, web foundations vacillate. Behind this invisible threat, a solution emerges: Noris Protocol. Post-quantic infrastructure of decentralized cybersecurity, it anticipates the vulnerabilities that the states themselves fear. Its founder, David Carvalhogives us an exclusive interview. Ethical hacker who has become a cyber strategist, he reveals here his vision, his technological choices and his warnings. While the TGE of $ Naoris took place on July 31, 2025, a new paradigm is coming.

Illustration of a concentrated man manipulating a bright digital structure symbolizing the blockchain cybersecurity in the face of the quantum threat.

In short

  • Noris Protocol wants to protect the web3 with post-quantic cybersecurity.
  • Its founder, David Carvalho, former ethical hacker and NATO advisor, alert to the urgency of Q-Day.
  • Already 3.3 m of portfolios created and 474 m of neutralized threats before the TGE of July 31, 2025.

Why Noris? At the crossroads of the emergencies of the web3 and the quantum threat

The web3 was designed to be resilient. But it is still based on cryptographs that the quantum computer could make obsolete in the blink of an eye. Financial institutions, critical infrastructure, states … All begin to become aware of the risk: current cryptography can be broken, without visible alert, by machines that do not officially exist.

In this context, the mission of Noris Protocol is to offer an infrastructure of decentralized and confidence cybersecurity, designed from the outset to resist threats of quantum computer science. Not a corrective, but a structural reinvention thanks to technologies such as Sub-Zero LayerTHE SWARM AITHE Dilithium-5THE Diposec.

To materialize this mission, the project benefits from the support of a recent strategic financing of $ 3 million led by Mason Labswith the participation of Freekaz Group,, Level One Robotics And Tradecraft Capital.

Key figures

The results speak for themselves. During the early 2025 testnet:

  • Over 3.3 million portfolios created;
  • More than 100 million post-quantic figures have been executed;
  • 1,065,153 safety nodes were activated;
  • 474,763,995 threats were detected and stopped.

These figures reflect a dazzling adoption and an unprecedented response capacity in the web 3 ecosystem.

Meeting with the visionary: David Carvalho

David Carvalho is the founder, CEO and chief scientist of Naoris Protocol. With more than 20 years of experience as director of global IT security and ethical hacker, he devoted his career to advise state -of -the -art states and infrastructure under NATO mandate on cyberguerre, cyberterrorism and espionage.

His vision is radical: if quantum adversaries already exist in secret laboratories, we must build an infrastructure capable of surviving the invisible. Not a corrective – an architecture. This architecture is based on three pillars: post-ventic cryptography, decentralized validation and automated collective intelligence.

David does not just imagine a resilient web3. It builds an antifragile digital civilization, ready to absorb shocks that others refuse to admit.

Exclusive interview with David Carvalho

Can you introduce yourself and explain to us what prompted you to create Noris Protocol?

I am David Carvalho, founder, CEO and chief scientist of Naoris Protocol. I spent more than 20 years as global ciso and ethical hacker, advising states and critical infrastructure under NATO mandate on cyberguerre, cyberterrorism and espionage.

The click took place in 2017, during a meeting with Kjell Glujen, former head of the NATO intelligence committee. But what really motivated me is to understand that quantum deadlines are not theoretical. As Jay Gambetta said, vice-president of IBM Quantum:

The quantum threat does not happen, it is already there.

States collect encrypted data today, focusing on their ability to decipher them tomorrow. It was necessary an infrastructure thought from the start for quantum adversaries.

Naoris presents himself as “The Base Layer of Trust & Security”-Why should cybersecurity be native and not added after the fact?

Because superimposed solutions died in the face of quantum threats. CIA management already informs congress that quantum breakthroughs are more advanced than you think. When intelligence agencies collect encrypted communications on an ever seen scale, waiting for conventional suppliers to adapt is a strategic error.

We operate with the sub-zero layer-below the L0 to L0 layers-, striking real-time transactions without hard forks. When quantum computers break on large -scale encryption, conventional safety layers will fall into domino. Only a natively post-quantic infrastructure will resist Q-Day.

Over 1.1 million portfolios in a month: How to explain this dazzling adoption?

This growth reflects an institutional awareness: quantum transition windows are much shorter than expected. Cryptographers from the NSA advise large companies to immediately switch immediately to post-quantism.

Blackrock did not include quantum warnings in his Bitcoin and Files to make pretty. They receive briefings showing progress far beyond public research. Intelligent money knows that the day these capacities are announced, it will already be too late.

In a post shell, what threats are still underestimated by web3 projects?

The collapse of deadlines. Many think they have until the 2030s. This is seriously false. Meetings of the Department of Defense show that the breakthroughs are already there, but classified.

As Tilo Kunz from Quantum DEFEN5E explained to DISA officials, Q-Day could arrive much earlier than expected. The data is already collected – each blockchain transaction is archived, ready to be deciphered.

States will not publish their quantum capacities. They will exploit them in silence while everyone is looking for solutions that no longer work.

How is Noris Protocol really post-quantic? Can you simply explain the algorithms used (dilithium-5, kems, etc.)?

We have built on the principle that quantum adversaries are already operating in secret. Dilithium-5 signatures are resistant to Shor, even at full power. Crystalls-Kyber prevents attackers from extracting our keys, even if they intercept all traffic.

We have redesigned the whole cryptographic battery to withstand sudden quantum superiority. Where researchers are considering progressive developments, we are targeting a sudden domination scenario.

IBM's quantum roadmap shows exponential growth. But governments are still several decades in advance.

Does your Diposec basically change the role of validators? Can we say that each node becomes a cybersecurity agent?

Absolutely. Traditional validators will become unnecessary the day when quantum computers can forge signatures. Our DPOSEC validators are quantum security agents capable of operating even under attack.

Each node performs detection algorithms designed to recognize attacks before they become visible. When classic blockchains give in, our validators will remain the only legitimate.

We build the largest mesh of post-quantic cybersecurity in the world. Each knot becomes a sentry.

What sectors today express the greatest need for a solution like yours? And which are still lagging behind?

Defense financial services and subcontractors are panicking in silence. They receive classified briefings contradicting public research.

Companies managing sensitive data must implement post-quarter immediately. They do not wait for standards: they know that the threats are already there.

Latecomers? Lots of crypto projects believe they have time. The majority of protocols DEFI still build on vulnerable bases.

With more than 474 million cyberrencies blocked on the testnet, can you give a concrete example of detected and neutralized attack?

We have neutralized phishing campaigns operating pirated browser extensions to steal private keys. Others targeted anonymity by correlating blockchain transactions with browser imprints.

Certain attacks used the cross-channel analysis and the compromise of browsers to de-anonymize users from Privacy Coins. Mixing services were specifically targeted.

We have also detected so -called “preparation” attacks: tests carried out by opponents to map vulnerabilities for future operations by quantum means.

The token $ Naoris is at the heart of your infrastructure. What exactly is its role?

$ Naoris is not a classic speculative token. It is an token for machine-to-machine interaction, certification, validation and cryptographic security.

It allows machines to validate the safety state of other machines without human intervention. Unlike tokens linked to human volatility, $ Naoris is driven by safety performance.

It creates an automated ecosystem where each device can validate the other and be rewarded.

What will be the key steps of the project within 6 to 12 months depending on the TGE?

Our main goal is to converge web3 and web2. We want to transform centralized infrastructure into resilient networks, validated by millions of nodes.

We prepare the critical period when classical cryptography will fail. Adoption will accelerate as soon as quantum capacities become public.

Our quantum intelligence platform will detect weak signals. The day when quantum supremacy is revealed, our network will be the only one still operational.

A safety net before the quantum storm

By combining scientific rigor and strategic vision, David Carvalho opens the way to a viable web3 beyond Q-Day. THE Token Generation Event (TGE) From the native token of the Noris protocol, $ Noris, took place on July 31, 2025. Follow their latest news on the Noris Protocol website and on X For more information on project development.

Quest read to read: Learn and win with Naoris Protocol

Do you want to discover the future of post-quantic cybersecurity while being rewarded for your curiosity? There Read2earn quest for Naoris Protocol Allows you to win awards simply by learning about post-quantic security protocols. By participating, you join a community of passionate early adopters and deepen your knowledge of innovation that will secure the web3 of tomorrow.

Not yet registered in our Read2earn program? This innovative model rewards users for their commitment and consumption of content, with many quests available on different blockchain projects. It's the perfect time for join the community And discover how Noris Protocol is revolutionizing decentralized cybersecurity. Learning has never been so rewarding!

Maximize your Cointribne experience with our 'Read to Earn' program! For each article you read, earn points and access exclusive rewards. Sign up now and start accumulating advantages.

Similar Posts