During his appearance in The Joe Rogan Experience on December 3, 2025, Jensen Huang delivered a striking assessment. The head of Nvidia (NVDA), today the most powerful company in the world with $4 trillion, considers artificial intelligence to be a new industrial revolution. But this revolution comes with major security challenges.

In Brief
- Jensen Huang warns that quantum computing will break current encryption.
- Naoris Protocol responds with a decentralized post-quantum cybersecurity Trust Mesh.
- Each device becomes a validator, securing Web2 and Web3 at the Sub-Zero layer.
Huang broke down the AI ecosystem into five fundamental layers: energy, chips, infrastructure, models and applications. At each level, security concerns multiply. The CEO particularly highlighted the vulnerability of systems to the emergence of quantum computing, capable of break current encryption methods.
Joe Rogan asked Huang about the risks of modern encryption collapsing with quantum computing. The CEO's response was intended to be reassuring: according to him, AI will remain “ one click ahead“. However, experts believe that this quantum threat, nicknamed “Q-Day”, could arrive sooner than expected. Shor and Grover's algorithms directly threaten RSA, ECC and the integrity of blockchain transactions.
Jensen describes a defense model where all systems cooperate. This is exactly how the Naoris Trust Mesh : a device detects a threat, and the entire network is informed in milliseconds.
The difference? Naoris is decentralized and eliminates single points of failure.
The infrastructure race: United States vs. China
During his presentation to Center for Strategic and International Studies (CSIS) the same day, Jensen Huang sounded the alarm on the Sino-American competition. According to him, building a data center in the United States takes approximately three yearsfrom the start of work to the commissioning of an AI supercomputer. In China, the equivalent is done in a few months.
This difference in speed represents a major strategic risk. Huang also pointed out that China has a twice the energy capacity to that of the United States, despite the larger American economy. AI data centers are very energy intensive, and this asymmetry could compromise American competitiveness in the long term.
Nvidia CEO remains confident about American technological superiority in chips. He claims that Nvidia is ahead of the Chinese competition. But he warns against complacency: China excels in manufacturing and is catching up.
Naoris Protocol: decentralized post-quantum cybersecurity
Faced with the challenges raised by Jensen Huang, blockchain projects provide innovative solutions. Naoris Protocol positions itself as the first Decentralized Cybersecurity Trust Mesh in the world, powered by a blockchain resistant to quantum attacks.
Founded in 2018 by David Carvalho, the project was born from a meeting with Kjell Grandhagen, former chairman of the NATO Intelligence Committee. His philosophy: “ We don't need to play better than the cybercriminals, we need to play differently. » This vision guided the development of a radically new architecture.
The protocol transforms each device connected to a validator node. These nodes verify each other’s integrity in real time, creating a “security mental hive.” When a node detects a threat, the entire network is instantly informed. This approach eliminates the single points of failure inherent in centralized solutions.
Technical architecture: dPoSec and post-quantum cryptography
Naoris Protocol is based on three major technological pillars. The first is dPoSec (decentralized proof of security)a proprietary consensus mechanism. Unlike Proof of Work or Proof of Stake, this consensus continuously validates the security status of participating devices, establishing a self-validating trusted application protocol.
The second pillar is decentralized SWARM AI. This distributed artificial intelligence coordinates detection and response to threats in real time. Thousands of rules are applied to logs to identify malicious patterns. Continuous learning allows the system to evolve in the face of new attacks.
The third pillar, crucial given Jensen Huang's warnings, is post-quantum cryptography. Naoris uses algorithms compliant with NIST, NATO and ETSI standards, including Dilithium-5 for signatures and key encapsulation mechanisms (KEM). These algorithms are designed to resist attacks from future quantum computers.
The Sub-Zero layer: securing the entire blockchain ecosystem
The great architectural innovation of Naoris is its positioning at the Sub-Zero layerunder the L0 layer of traditional blockchains. This position makes it possible to secure all upper layers (L0, L1, L2), as well as DEXs, bridges and validators, without requiring hard forks or disrupting existing networks.
This approach directly responds to Jensen Huang's vision of AI becoming “infrastructure”. Likewise, Naoris aims to become the internet security substratea layer of trust beneath every connected system. The protocol supports both Web2 (businesses, governments, IoT) and Web3 (blockchains, DeFi, NFTs) infrastructure.
The $NAORIS token: economics and use cases
The native token $NAORIS powers the protocol ecosystem. It rewards validator nodes for their participation in network security. Every security validation, every integrity check relies on this token, which the team describes as the “ first security token in the world“.
Targeted use cases include: defense and critical infrastructure, financial and banking services, telecommunications (3G, 4G, 5G), connected health, autonomous vehicles and of course securing existing blockchains against quantum threats.
What this means for users
For end users, Naoris Protocol currently offers a browser security extension accessible via its DePIN testnet. Each participating device becomes a validator node, blocking malware, trackers and threats in real time. Participants accumulate points convertible into $NAORIS tokens during the TGE (Token Generation Event).
For businesses, the protocol offers proof of conformity shareable in real time. Where traditional security audits are periodic and costly, Naoris enables continuous and immutable validation of system security status. Partners and regulators can check cybersecurity posture at any time.
Anticipating the AI-quantum cyber security convergence
Jensen Huang's appearances in December 2025 mark a turning point in awareness of security issues linked to AI. His vision of artificial intelligence becoming invisible infrastructure, like electricity or the internet, involves unprecedented security requirements. Quantum threats, even distant ones, must be anticipated today.
Naoris Protocol offers a coherent architectural response to these challenges: decentralization to eliminate single points of failure, post-quantum cryptography to anticipate Q-Day, and distributed AI for adaptive resilience. The project is part of the DePIN trend revolutionizing digital infrastructures in 2025.
It remains to be seen whether this ambitious vision will come to fruition when the mainnet launches. The coming months will be decisive in assessing Naoris' ability to transform a technological promise into real adoption.
FAQs
Naoris Protocol is a decentralized cybersecurity infrastructure using blockchain and AI to turn every device into a validator node, with built-in resistance to quantum attacks.
Future quantum computers will be able to break current encryption algorithms (RSA, ECC). Post-quantum cryptography uses algorithms that are resistant to these attacks, protecting data and transactions over the long term.
You can install the Naoris Testnet browser extension to become a validator node. You will accumulate points convertible into $NAORIS tokens during the token generation event.
The mainnet is planned for the first quarter of 2026, accompanied by an airdrop and the launch of commercial products.
Maximize your Tremplin.io experience with our 'Read to Earn' program! For every article you read, earn points and access exclusive rewards. Sign up now and start earning benefits.
