HyperStructure
The Attributes of a HyperStructure:
Unstoppable
Permissionless
Minimally extractive
Valuable
Expandable
Credibly neutral
Net positive.
• Unstoppable: Protocols that are unstoppable are built to run indefinitely, without degrading. No one should be able to stop such a protocol. Not even power structures or the creators of the protocol itself. HyperStructures should be multichain, else they are subject to the longevity of the blockchain in which the protocol runs. HyperStructures’ smart contracts and mission critical files should be hosted on the permaweb, meaning that they should remain online indefinitely, come rain or come shine. Devices and networks can adopt it or abandon it, but one of the main attributes of a HyperStructure is that it can’t be stopped. The off switch does not exist, so even a DAO wide vote would not be able to turn it off, removing another attack vector of the CyberSecurity Mesh.
• Permissionless: Approval by a trusted authority is not required to join the network and any user who wishes can participate in the protocol. All devices who become part of the CyberSecurity Mesh become validators of the state of the network and the same level of security is presented to everyone. Users and builders cannot be deplataformed. HyperStructures need to be censorship resistant and accessible by anyone.
• Credibly Neutral: To be adopted by a wide range of governments, companies and individuals, which are known to have different priorities and objectives, HyperStructures need to be credibly neutral. They need to treat everyone fairly and provide the same level of access and service to all users, to the extent that it’s possible to treat people fairly in a world where everyone’s capabilities and needs are so different (Buterin, 2020)Minimally Extractive: We defend that HyperStructures need to be minimally extractive - which means, a protocol should charge near base cost fees to incentivize adoption, and disincentivize forking, while ensuring that the ecosystem development treasury is managed by the DAO remains robust to allow a strong ecosystem to emerge. While Naoris AI has a clear vision of what its core should be, being able to adapt and evolve the CyberSecurity Mesh and the ecosystem around it is critical for its longevity and effectiveness against cyber threats.
• Valuable: The protocol is conceived to be a for-public endeavour, and yet, extremely valuable to own and govern, which sparks an ecosystem around it. If a protocol is not useful for its users, it has no reason to be adopted, and stay relevant for the long term. If owning and governing a protocol does not provide any benefit to its governors, it becomes hard to maintain. Altruistic actors may exist, but they are not common. The challenge is to strike a balance between accessibility for all and value for the ones governing the protocol. The larger the Mesh becomes, the more valuable it becomes. In a tokenized machine economy with a capped token supply, it’s natural to imagine that the more valuable the mesh becomes, the more valuable the underlying tokens responsible for the security handshakes will be. Naoris AI derives its value not from Total Value Locked (TVL), but rather from Total Value Secured (TVS). The more valuable networks join the CyberSecurity mesh, the more valuable the protocol becomes.
• Expansive: Powering potentially hundreds of billions of security validations per day, the protocol needs to possess built-in incentives for users to behave fairly and for builders to continue iterating on the protocol and building on top of it at the application level. Most well funded blockchain protocols are able to set up an ecosystem development grants program, but how many can continue to foster the ecosystem in the years to come? For the longevity of grants programs to increase, a positive feedback loop is required. A portion of the minimally extractive fees generated by a growing number of participating devices needs to be directed towards a dedicated treasury for ecosystem grants, which is known as a Web3 sustainability loop. For the long term success of a HyperStructure, there should be incentives for entrepreneurs to continue working on defending the mesh against new threats. CyberSecurity is a dynamic realm and thinking that this nature will change would be both dangerous and foolish.
• Positive Sum: Wide adoption and usage of the protocol results in a win-win environment for all network participants. This happens at all levels of the protocol. As more devices of a network use the CyberSecurity Mesh, they become safer for all participants of the network. As more networks of networks participate on verge clusters, entire economic sectors subject to the same compliance standards become more secure, with verge cluster-wide learnings as attacks on any devices belonging to a network inside of a verge cluster are attempted. The net value for society at large is access to security that aims to cost an order of magnitude less than current CyberSecurity stacks, while bringing detection and mitigation capabilities one order of magnitude higher. On a technology development level, the minimally extractive fees power an ecosystem development grants program, giving the community a clear path forward and blossoming a growing number of projects maintaining and building on top of the Naoris AI. Providing competitive participants an opportunity to collaborate on certain levels, using the same infrastructure for the benefit of all provides further elements for a positive sum environment.
• Credibly Neutral: To be adopted by a wide range of governments, companies and individuals, which are known to have different priorities and objectives, HyperStructures need to be credibly neutral. They need to treat everyone fairly and provide the same level of access and service to all users, to the extent that it’s possible to treat people fairly in a world where everyone’s capabilities and needs are so different (Buterin, 2020)
Last updated