Post-Quantum Trust.
Verified by Every Device. Proven by Cryptography.

What is Naoris
How Naoris Works
multi-party verification
Multiple independent verifiers reach quantum-secured agreement on every device’s security posture. Like Certificate Transparency’s multi-log verification — but for your entire infrastructure. No single authority. Post-quantum resilience through multi-party verification.
Designed for the Quantum Transition
Governments and global standards bodies including NIST and the White House have initiated the migration toward post-quantum cryptography.
Post-Quantum Signature Schemes (Dilithium-5)

Security designed to withstand future quantum attacks.
What this means for your organization
Crypto-Agile Architecture

Security that can evolve without rebuilding your infrastructure.
What this means
Protection Against Harvest-Now, Decrypt-Later

Encrypted data stolen today may be broken in the future.
What this means
Long-Term Data Confidentiality

Protection designed for decades-long operational environments.
What this means
Seamless Integration. Zero Downtime
Quantum Fabric deploys beneath your existing security stack — no changes, no downtime, no lock-in. It adds post-quantum multi-party verification to what you already have, making current investments quantum-ready without replacing them.

Hybrid & On-Prem
Sovereign control, air-gapped capable. Quantum-resistant verification inside your perimeter. DORA concentration-risk compliant.
Cloud-Native
API-first, container-ready. Post-quantum collaborative verification at scale.
Security Operations Integration
Quantum-ready compliance proofs into SOC, SIEM, audit workflows. NIS2 and eIDAS 2.0 ready day one.
The Quantum Fabric Stack
Quantum Fabric is a vertically integrated architecture operating across cloud, edge, and industrial environments. It is composed of five tightly coupled layers engineered to function as a unified system.
Distributed Trust Cybersecurity Mesh
Continuous device and system validation across your infrastructure

Post-Quantum Security Layer
Immutable verification layer ensuring integrity across distributed systems.

dPoSec Consensus Protocol
Real-time security consensus between nodes.

Swarm AI Intelligence
Distributed anomaly detection across the network.

Infrastructure Protection Layer
Security enforcement extended across critical systems and operational environments.



Industry Agnostic
Government & Defense
Sovereign, provable system trust.
Banking & Finance
Automated compliance and zero-trust transactions.
Telecom & IoT
End-to-end trust across millions of devices.
Healthcare
Enforced data integrity and privacy.
Smart Infrastructure
Resilience for cities, logistics, and utilities.
Advisory Board
Government, Military & National Infrastructure

Lord Carmine Villani
Global executive, investor, and advisor focused on Saudi Arabia, the GCC, and global markets. President & CEO of Crown MFO Group, leading Vision 2030–aligned investments and overseeing a $27B global platform.

Wesley Clark
Wesley Clark — Retired four-star U.S. Army General, former NATO Supreme Allied Commander Europe, and highly decorated Vietnam veteran who led Operation Allied Force during the Kosovo War.

Inge Kampenes
Major General (ret.) and former Chief of Norwegian Armed Forces Cyber Defence, with deep insight in cyberoperations and military strategy.

Brigadier-General Carlos Ribeiro
Former Chief of Portuguese Armed Forces Communications and Information Systems, and Cyber Defence Commander. Former Signals Officer, specialist and advisor on Communications and Information Systems (CIS), Electronic Warfare and Cyber issues, experienced project manager on CIS (for 30+ years), cyber and training.
Executive Team

David Carvalho
Founder, CEO & Chief Scientist
20+ years as Ethical Hacker and C-Level roles in regulated & critical areas. Advisor to multi-billion-dollar businesses & nation-state projects in cyber espionage, cyber war & cyber terrorism mitigation.

David Holtzman
Chief Strategy Officer
CTO of Network Solutions in charge of the domain name system, Chief Scientist at IBM, submariner and cryptographer, author and futurist, now advising web3 verification fabric.

Magnus Fyhr
Chief Financial Officer
Accomplished finance executive with 25+ years of capital markets experience and strategic leadership roles across the energy and marine transportation sectors. Former CFO of AlphaOcean, CEO of Clarksons Capital Markets and leading equity research analyst at Jefferies and Lehman Brothers. MBA in Finance, University of St. Thomas (Houston, Texas).

Youssef El Maddarsi
Co-Founder & Chief Business Officer
Recognized by EMEA Entrepreneur as most influential entrepreneur from Morocco 2025. +10 years Strategic Development. Graduated from Regent’s University, Wharton, INSEAD & Duke. Certified by Yale and École Polytechnique. Honoris Causa – University of Panama.

Sumit Chauhan
Founding CTO
CTO & Advisor with 20+ years building/developing enterprise-level solutions using blockchain & AI for cybersecurity, IoT, and Fintech businesses.
Award-Winning Tech
technology and academic research. Naoris Protocol has won multiple technology incubator awards while collaborating with academia and industry across the globe
FAQ
Quantum Fabric
Quantum Fabric is a next-generation cybersecurity infrastructure that provides continuous, real-time protection for digital systems.
It creates a distributed trust and security fabric that continuously validates devices, users, applications, and system behavior, ensuring everything operating within your environment is legitimate, resilient, and secure.
Traditional cybersecurity relies on centralized tools that detect threats after the fact and often create single points of failure.
Quantum Fabric takes a fundamentally different approach by distributing validation across the infrastructure itself, enabling continuous verification and reducing the blind spots that attackers typically exploit.
Distributed validation means trust is not dependent on a single system, server, or authority.
Instead, multiple independent nodes continuously verify system behavior and operational integrity, creating a resilient security mesh where compromising one component does not compromise the system as a whole.
Quantum Fabric uses Swarm AI, a distributed intelligence model that analyzes behavioral patterns across the entire environment.
It detects anomalies, learns from events, and adapts in real time, allowing threats to be identified and contained before they escalate.
Quantum Fabric is built for organizations with high security and availability requirements, including:
- Enterprises with complex IT and cloud environments
- Governments and public institutions
- Operators of critical infrastructure and IoT systems
- Organizations managing sensitive or regulated data
Yes.
Quantum Fabric is designed as a plug-and-protect layer that integrates with existing on-premise, cloud, and hybrid environments without requiring system redesigns or disruptive migrations.
Deployment can begin with critical systems and expand progressively.
Quantum Fabric enforces the CIA Triad Confidentiality, Integrity, and Availability by design:
- Data is protected with post-quantum cryptography
- System integrity is maintained through continuous verification mechanisms
- Availability is preserved through distributed architecture with no single point of failure
Quantum Fabric helps mitigate:
- Insider threats and compromised credentials
- Device hijacking and spoofing
- Supply-chain and lateral-movement attacks
- Advanced persistent threats (APTs)
- Quantum-era cryptographic risks
- Infrastructure-level failures and cascading outages
Onboarding begins with an assessment of critical assets and risk exposure.
Quantum Fabric nodes are then deployed to establish continuous validation, starting with high-value systems and expanding based on operational priorities.
- Reduced downtime and operational risk
- Real-time visibility into security posture
- Stronger regulatory and audit readiness
- Long-term protection against quantum threats
- Increased trust with customers, partners, and regulators
- A durable competitive advantage through verifiable security

