David Holtzman, Internet Pioneer and Architect of the DNS System, Joins Naoris Protocol as Distributed Systems, CyberSecurity & Blockchain Advisor
David H. Holtzman is an Internet pioneer, a former security analyst, technologist, military code-breaker, futurist, activist, privacy expert, technologist, technology executive, and writer. Over his career life, the initiatives he led have transformed and radically changed the way people interact with technology.
Today, blockchain cybersecurity startup Naoris Protocol announced that David H. Holtzman has joined the company in an advisory capacity. Holtzman will support Naoris Protocol in marketing, technology, and strategy, helping the project revolutionize cyber security mitigation with its CyberMesh technology.
Holtzman is an early contributor to the technologies that shaped the Internet as we know it today. In the late 1990s, as CTO of Network Solutions, he managed the Internet’s Domain Name System (DNS) as well as the ‘Dot’ root server. During his tenure, the number of internet domains skyrocketed from 500,000 to over 20 million.
Before Networks Solutions, Holtzman was a Chief Scientist at IBM and ran a major research group at Booz-Allen & Hamilton. He was the CTO of Senator Evan Bayh’s presidential bid and a senior cybersecurity advisor to General Wesley Clarke’s campaign. For the last six years, he’s worked with blockchain companies as a consultant, advisor, or director.
In a previous life, Holtzman was a Russian cryptographer deployed on submarines for the US Naval Security Group, later working at the National Security Agency as a Soviet Cosmonaut analyst.
Holtzman is a vocal advocate of individuals employing personal cryptography to secure their privacy instead of waiting for the protection of government regulation. He is the author of “Privacy Lost: How Technology is Endangering Your Privacy,” in which he presented a comprehensive insider’s exposé of the world of invasive technology, who’s using it, and how our privacy is at risk.
With Holtzman’s support, Naoris Protocol aims to decentralize the cybersecurity practices of modern-day corporations, government agencies, Web3 projects and other entities. As the world transitions to the new Web3 paradigms of DeFi and borderless cryptocurrency, the inefficiency and vulnerabilities of legacy centralized systems threaten global stability. As a representative of an earlier, more radical internet culture, Holtzman is the ideal guiding light for Naoris Protocol.
“Naoris Protocol has the right ideas. In my many decades of experience working with disruptive innovators, I’ve come to the conclusion that a company’s most valuable differentiator is the strength of its underlying foundational principles and values. Naoris Protocol has started from a good place and their technology directly aligns with their beliefs. The value of networked decentralization cannot be overemphasized and their novel approach of applying that to security validation is an important one that is likely to be a real game changer.” Holtzman said.
“We are so incredibly blessed to be working with David Holtzman as an advisor to the project, we wouldn’t have the internet as we know it today without him and we`re humbled to be splicing together new and highly impactful use cases and ideas with David. This is an exciting, and critical time for Naoris Protocol as we strive to bring the best and most visionary from Web2 and Web3 together to scale our Decentralized CyberSecurity Mesh approach. Having David Holtzman on board, with his incredible knowledge and world-changing experience makes us feel great about the future of all things digital.” said David Carvalho, CEO, and Founder of Naoris Protocol.
Founded in 2020 by David Joao Vieira Carvaho, and Monica Oravcova, Naoris Protocol is the Decentralized CyberSecurity Mesh for the hyper-connected world. Our disruptive design pattern makes networks safer as they grow, not weaker, by turning each connected device into a trusted validator node. A robust Blockchain protocol that every company can use to protect against the escalating levels of cyber threat.
Devices are rewarded for trusted behavior fostering a secure environment. Participants earn $CYBER staking rewards for securing the network.