1
00:00:00,000 --> 00:00:15,520
And then the other direction is we have all the technology, we have the internet, we have the AI, but it is human flourishing because it's private, it's decentralized, it is verifiable, it's self-sovereign.

2
00:00:16,440 --> 00:00:16,800
We own it.

3
00:00:16,800 --> 00:00:32,800
We own it. And Bitcoin is giving us that blueprint, not just for money, but for the future, the technological future where humanity is at the center of it.

4
00:00:32,800 --> 00:00:45,860
Because Bitcoin ultimately embeds humanistic values into its engineering and into its technology and is why it's such a stark contrast from all the other technology we're used to interacting with.

5
00:00:45,860 --> 00:01:01,260
So that is the vision and the inspiration that our community needs to keep pursuing and keep aggressively doing this because this is our moment and we do not want to go down the other direction.

6
00:01:04,260 --> 00:01:07,440
Hey, one quick thing before we get into it.

7
00:01:08,000 --> 00:01:10,520
Trust Revolution runs on value for value.

8
00:01:10,940 --> 00:01:12,260
No ads, no sponsors.

9
00:01:13,160 --> 00:01:15,840
Fountain is how it works for me and for the show.

10
00:01:15,860 --> 00:01:19,820
Pay per episode or subscribe, lightning or card.

11
00:01:20,080 --> 00:01:23,080
You get something from the show, you can send something back.

12
00:01:23,560 --> 00:01:25,040
No guilt, no gimmicks.

13
00:01:25,240 --> 00:01:27,180
Go to trustrevolution.co.

14
00:01:27,360 --> 00:01:29,340
That's trustrevolution.co.

15
00:01:29,800 --> 00:01:31,160
Okay, let's get into it.

16
00:01:32,040 --> 00:01:33,900
Mr. Jesse Posner, welcome.

17
00:01:34,680 --> 00:01:36,200
Hello, happy to be here.

18
00:01:36,820 --> 00:01:40,220
I appreciate it on a hopefully sunny Friday where you are.

19
00:01:40,860 --> 00:01:42,140
Yeah, it's quite nice here.

20
00:01:42,780 --> 00:01:44,160
Yeah, things are turning around.

21
00:01:44,160 --> 00:01:44,700
They're looking up.

22
00:01:45,860 --> 00:01:50,640
Well, Jesse, I will have, of course, all your great background in our show notes.

23
00:01:50,640 --> 00:01:52,460
So I'm just going to jump in.

24
00:01:53,180 --> 00:01:54,160
We've got a lot to talk about.

25
00:01:54,200 --> 00:01:55,900
I'm extremely excited to talk about Vora.

26
00:01:56,000 --> 00:02:01,920
Not only the obvious, but some of the things you are cooking up that I know you're excited about.

27
00:02:02,300 --> 00:02:04,620
And so let's sort of set the stage here.

28
00:02:04,760 --> 00:02:12,900
Jesse, you spent over four years at Coinbase managing institutional keys, among other things, and then helped to build out BitKey at Block.

29
00:02:13,680 --> 00:02:19,420
What did you see inside those companies that made you decide that individuals need something different?

30
00:02:19,420 --> 00:02:25,220
Well, you know, I mean, there was a lot of a lot of lessons to be learned during my time at these companies.

31
00:02:25,220 --> 00:02:42,800
And I worked with a lot of incredible security professionals in both those organizations, cryptographers, and really got to see and learn how security is done at a very high level, high stakes.

32
00:02:42,900 --> 00:02:56,420
But one thing that I've found consistently throughout tech is that privacy is hard to get prioritized.

33
00:02:57,260 --> 00:03:08,000
And a lot of that comes from the mentality that customers don't want to pay for privacy or they don't want to take a big convenience hit for privacy.

34
00:03:08,000 --> 00:03:18,260
And so oftentimes products that have prioritized privacy haven't done well in the marketplace because consumers prefer something more convenient.

35
00:03:18,900 --> 00:03:26,960
And the abstract threats of privacy don't hit home enough to affect that purchasing decision.

36
00:03:26,960 --> 00:03:41,900
But once we're in the Bitcoin world, it changes things dramatically because we have one of the most privacy-focused demographics that exists at all.

37
00:03:42,400 --> 00:03:50,960
Bitcoiners do care about privacy, and not just for abstract political reasons, but for concrete physical safety reasons.

38
00:03:50,960 --> 00:04:01,200
reasons. And so that's been something that I've pushed for throughout my career is to really

39
00:04:01,200 --> 00:04:08,900
think about how can we protect our customers through protecting their privacy to make sure

40
00:04:08,900 --> 00:04:14,660
that Bitcoiners aren't getting targeted because information about how much Bitcoin they have

41
00:04:14,660 --> 00:04:20,580
and where they live is not available to bad actors.

42
00:04:20,960 --> 00:04:26,820
I expect this will lead in to our conversation about what you're building with Vora.

43
00:04:27,460 --> 00:04:40,800
But again, as a bit of a backdrop, when you were at Coinbase or generally, how did you think versus perhaps now you think about the difference between how institutions custody and protect keys versus how individuals do it?

44
00:04:40,800 --> 00:04:48,400
And I understand there's quite a quite a divide in between and perhaps something you're looking to to close with Vora.

45
00:04:48,400 --> 00:04:51,540
But how is it looked at typically?

46
00:04:53,160 --> 00:04:55,300
Well, it's a different, I mean, there's a lot that's in common.

47
00:04:55,460 --> 00:05:00,660
And then there's a different set of requirements and a different set of capabilities.

48
00:05:01,380 --> 00:05:07,080
So when you're in an institutional context, you have a team, you have multiple employees.

49
00:05:07,080 --> 00:05:13,340
So when you're thinking about key management, that naturally overlays into an organizational

50
00:05:13,340 --> 00:05:22,560
hierarchy where you can give HSM's like special hardware security devices to sets of employees

51
00:05:22,560 --> 00:05:29,360
and you can have distributed offices throughout the world and disaster recovery systems and

52
00:05:29,360 --> 00:05:36,380
all these operational capabilities that can be leveraged and need to be leveraged when

53
00:05:36,380 --> 00:05:48,020
you're securing billions of dollars of keys. And also, an institutional player is automatically

54
00:05:48,020 --> 00:05:59,100
tied into the regulatory system that's baked in. Their identity, they're known who they are and

55
00:05:59,100 --> 00:06:12,240
you know, where their offices are. And so the notion of self-sovereignty is not really the

56
00:06:12,240 --> 00:06:17,160
same in a corporate institutional context. I mean, it is to some extent because a corporation

57
00:06:17,160 --> 00:06:22,180
has its own assets, its own property, and there's interesting things to think about.

58
00:06:22,180 --> 00:06:28,260
What does it mean for a corporation to be self-sovereign? But it's really, it's a very

59
00:06:28,260 --> 00:06:35,140
different kind of model. And when you're talking about the individual self-custody, it's actually

60
00:06:35,140 --> 00:06:43,520
in some ways much more difficult because they are operating by themselves. They need to be able to

61
00:06:43,520 --> 00:06:49,240
recover everything and use their Bitcoin by themselves without additional teammates and

62
00:06:49,240 --> 00:06:58,840
facilities. And they need to be able to protect themselves from theft and loss. And then there's

63
00:06:58,840 --> 00:07:09,100
the wrench attack component and, you know, getting physically targeted at home or wherever you're

64
00:07:09,100 --> 00:07:17,100
traveling. And then there's the government seizure dimension that is a little bit more

65
00:07:17,100 --> 00:07:22,580
top of mind for the individual self-custody use case. Because for a Coinbase, if the government

66
00:07:22,580 --> 00:07:28,220
wants to seize their assets, they're going to have to battle that out in court. But as individuals,

67
00:07:28,220 --> 00:07:36,080
when we think about Executive Order 6102, which is when FDR prohibited individual gold

68
00:07:36,080 --> 00:07:43,700
individuals from being able to have their own gold at home and required it to be submitted to

69
00:07:43,700 --> 00:07:49,940
the government. That's something that I think is important to Bitcoiners to think about the balance

70
00:07:49,940 --> 00:07:56,940
of power between the individual and government control and our ability to have some sort of

71
00:07:57,780 --> 00:08:07,080
resistance to unconstitutional government seizure. And that is a very complicated and delicate

72
00:08:07,080 --> 00:08:13,640
dimension to individual self-custody that is not as critical in the institutional context

73
00:08:13,640 --> 00:08:41,120
So with Vora, we have developed a technique and systems and new models so that self-custody is something that is achievable for the individual and not just a LARP or some ideal that doesn't hold up in practice.

74
00:08:41,120 --> 00:08:57,100
We want to make we want to make it real where you have self-sovereignty. You can control your Bitcoin. You can maintain your privacy. You protect yourself from physical attacks and you can resist government seizure.

75
00:08:57,100 --> 00:09:04,760
including along constitutional grounds that we have the individual has constitutional protections

76
00:09:04,760 --> 00:09:11,840
under the right to remain silent um which is one of the oldest most sacred principles of law even

77
00:09:11,840 --> 00:09:23,560
predating the united states so that is um that is the challenge that is so huge for individual

78
00:09:23,560 --> 00:09:32,240
self-custody. And that is where I've found a big gap in the marketplace that led me to

79
00:09:32,240 --> 00:09:39,460
leave these great companies and start a new one to address something that I think is missing.

80
00:09:40,820 --> 00:09:45,900
Well, absolutely. In fact, so let's talk about physical security. You probably noticed that,

81
00:09:45,900 --> 00:09:51,260
as I understand it, the head of Binance France endured, survived a home invasion yesterday.

82
00:09:52,240 --> 00:09:56,540
And I don't have a great deal of detail there, but I think the headline is enough.

83
00:09:56,660 --> 00:10:00,740
And so you have said, if I got this correct, our job doesn't end at the keys.

84
00:10:00,840 --> 00:10:02,620
It ends when we know you're safe.

85
00:10:03,140 --> 00:10:05,940
So to your point, what does that actually mean?

86
00:10:06,040 --> 00:10:09,120
How do you secure a person, not just a private key?

87
00:10:10,520 --> 00:10:10,640
Yes.

88
00:10:10,640 --> 00:10:17,980
So first of all, it is a matter of seeing your self-custody hardware and your self-custody

89
00:10:17,980 --> 00:10:26,400
system needs to be integrated into a physical security system with alarms, monitoring,

90
00:10:27,020 --> 00:10:33,840
and credible deterrence has to be integrated together. If you're doing self-custody and you

91
00:10:33,840 --> 00:10:42,080
just have a hardware wallet, but you don't have a system to detect and respond to a physical attack,

92
00:10:42,080 --> 00:10:55,160
You're basically a sitting duck. And there are ways where the actual hardware wallet system itself can help us detect potential attacks.

93
00:10:55,160 --> 00:11:10,040
So with the Vora vault, there's a hardware wallet that's integrated into the full node, into a single device. It's still cold storage. There's an air gap, but it's all integrated into a single system.

94
00:11:10,040 --> 00:11:17,080
And through that, our servers can detect certain indicators of an attack.

95
00:11:17,080 --> 00:11:40,580
So if the node goes offline, if our tamper detection sensors are triggered, if the wrong pin is triggered, if certain recovery flows are triggered, all of these triggers can indicate to our server that there may be an attack.

96
00:11:40,580 --> 00:11:44,040
and we can do this also in a privacy preserving way.

97
00:11:44,160 --> 00:11:46,200
It's not like our server is a surveillance system

98
00:11:46,200 --> 00:11:47,940
that's just seeing everything that's going on.

99
00:11:48,160 --> 00:11:50,000
This is not the ring camera scenario.

100
00:11:51,000 --> 00:11:58,160
But we then can make a phone call to the customer

101
00:11:58,160 --> 00:12:02,320
and check a verbal password

102
00:12:02,320 --> 00:12:07,160
and get some confidence about the situation.

103
00:12:07,160 --> 00:12:10,320
And if we think there's a problem,

104
00:12:10,580 --> 00:12:17,000
We can contact law enforcement, private security, and get a response.

105
00:12:18,100 --> 00:12:25,500
Meanwhile, we have time delays built into all the major spending paths.

106
00:12:25,500 --> 00:12:28,640
So the bulk of the coins can never move quickly.

107
00:12:29,980 --> 00:12:38,820
And we have ways of recovering even if somebody takes everything in your home, all your passwords, all your devices, everything.

108
00:12:38,820 --> 00:12:46,560
with the time delays that are enforced, you go to your safe deposit box or security location

109
00:12:46,560 --> 00:12:58,660
and you use a memorized four-digit PIN and you are able to recover and basically get the coins

110
00:12:58,660 --> 00:13:04,240
out of the hands of the attacker and back into your control. So it's really about thinking about

111
00:13:04,240 --> 00:13:13,540
self-custody holistically, not just a tech gadget or a key or a note or this thing or that thing?

112
00:13:13,540 --> 00:13:21,560
How do we put all the pieces together? And then that's just where we start because the next level

113
00:13:21,560 --> 00:13:30,980
is getting self-sovereign, privacy-preserving, self-hosted home security systems. So right now,

114
00:13:30,980 --> 00:13:39,420
if you use ADT or just about any security system you can buy easily, you are surveilling yourself,

115
00:13:39,600 --> 00:13:46,380
like you mentioned the Ring camera or the Google Nest. You are taking all of this video and sending

116
00:13:46,380 --> 00:13:54,520
it off to some tech company that can be accessed by the government, corporations. And that's also

117
00:13:54,520 --> 00:13:58,160
security risk. Like that data is going to get hacked. That data is going to get leaked.

118
00:13:58,160 --> 00:14:10,460
So we need home security the Bitcoin way. We need home security the cypherpunk way, which means our data is ours. It's encrypted with our keys. It runs on our systems.

119
00:14:10,460 --> 00:14:32,140
So our system will eventually evolve into a complete home security system with cameras, but all with the base Vora Vault as the brain, as the command center, as the key management system, as the secure hardware, as the home server that manages the whole system.

120
00:14:32,140 --> 00:15:00,920
And then eventually, home security personal defense is going to be revolutionized by robotics, by drones, by all of this technology that is actually going to really benefit the individual's ability to protect themselves and create a cost asymmetry between defense and offense, where it's much more expensive to attack you at your home than it is for you to defend yourself.

121
00:15:00,920 --> 00:15:12,320
And that's ultimately where we become safe is the economics of it is such that it is unprofitable for the attacker and then therefore the attacks won't.

122
00:15:13,320 --> 00:15:17,680
And that I presume falls under the sort of rubric of credible deterrence or.

123
00:15:18,300 --> 00:15:18,740
Exactly.

124
00:15:19,080 --> 00:15:19,220
Yeah.

125
00:15:19,580 --> 00:15:22,060
Well, and if we and that's that's fascinating.

126
00:15:22,120 --> 00:15:25,460
And you and I have had a couple of conversations about this where, you know, drones are.

127
00:15:26,520 --> 00:15:29,120
There's a lucky Palmer angle in there somewhere.

128
00:15:29,120 --> 00:15:39,840
So if we zoom out a bit, for those who, Jesse, may not be as familiar, give us sort of the basic of the so-called $5 wrench attack problem.

129
00:15:40,020 --> 00:15:42,840
And why does it get worse as Bitcoin appreciates?

130
00:15:42,940 --> 00:15:48,600
You know, why aren't, as you say, a multi-sig setup and hardware devices enough?

131
00:15:48,600 --> 00:16:03,780
Yeah. So, I mean, first of all, you know, Bitcoin is uniquely attractive, at least right now for these attacks, because if somebody comes to you, you know, let's say you're you're you know, you're a fiat person.

132
00:16:03,940 --> 00:16:12,960
You don't do crypto. You don't do Bitcoin. And, you know, somebody comes to your house, you know, you probably don't have like your cash at home.

133
00:16:12,960 --> 00:16:21,720
it's probably in the bank. And in terms of your online accounts, an attacker can't just take your

134
00:16:21,720 --> 00:16:28,280
NVIDIA stock out of your brokerage. It's tied to your identity. Or through your bank account,

135
00:16:28,440 --> 00:16:34,820
wires or ACH, there's all these controls. It's reversible. So with Bitcoin self-custody,

136
00:16:34,920 --> 00:16:40,320
we've created this situation for an attacker where all they need is the keys. That's it.

137
00:16:40,320 --> 00:16:56,140
They get the keys, they get the Bitcoin. So if the keys are in your control, if you have an ability to access them, then all an attacker needs to do is get to you, threaten you with violence or other kinds of coercion.

138
00:16:56,140 --> 00:17:06,300
And they get an immediate payoff and it's, you know, pseudonymous and so on.

139
00:17:07,020 --> 00:17:15,660
So and then as the price of Bitcoin goes up, now it's a bigger reward for these attackers.

140
00:17:15,660 --> 00:17:28,000
And it's really scary because, you know, you get into Bitcoin at some point in your life and you start telling people about it or maybe it becomes your career.

141
00:17:28,820 --> 00:17:31,760
And and Bitcoin's at a certain price level.

142
00:17:32,080 --> 00:17:36,940
And then five years later, you know, Bitcoin's 10x more, 100x more.

143
00:17:36,940 --> 00:17:40,380
And you're out there as someone who's a Bitcoin person.

144
00:17:40,380 --> 00:17:50,320
And maybe it wasn't a big security threat when you first got in and you weren't really thinking about the consequences of making that known publicly.

145
00:17:50,660 --> 00:18:00,200
But now Bitcoin's a million dollars and you've got a serious security problem on your hand that kind of came out of nowhere that you didn't expect.

146
00:18:00,200 --> 00:18:30,100
So that's the predicament we're all in as a Bitcoin community that we have to expect the more successful we are as Bitcoiners and the more successful Bitcoin is, the more difficult our security problem is going to become until we solve it once and for all and make it very clear to attackers that there are easier targets to go after.

147
00:18:30,200 --> 00:18:32,740
and they shouldn't mess with our community.

148
00:18:33,200 --> 00:18:33,300
Absolutely.

149
00:18:34,900 --> 00:18:37,360
And we've gone into some detail.

150
00:18:37,600 --> 00:18:38,720
Again, what I'd love to do, Jesse,

151
00:18:38,820 --> 00:18:40,980
is zoom out a bit and talk about what Vora is building.

152
00:18:41,420 --> 00:18:45,140
Explain it to me like I'm someone who has a hardware wallet

153
00:18:45,140 --> 00:18:46,700
and thinks I'm doing fine.

154
00:18:47,440 --> 00:18:48,320
You know, what am I missing

155
00:18:48,320 --> 00:18:51,540
and what does Vora do differently, sort of macro?

156
00:18:51,900 --> 00:18:53,200
And then we'll get into things like,

157
00:18:53,280 --> 00:18:55,220
I presume, multiscript and, you know,

158
00:18:55,240 --> 00:18:56,620
the beauty of programmable money

159
00:18:56,620 --> 00:18:58,220
and some of the things you've touched on.

160
00:18:58,700 --> 00:19:00,100
Yeah, there's a lot there.

161
00:19:00,200 --> 00:19:21,280
Um, so, I mean, the first, the first big missing piece that a lot of people don't have is the full node. And, you know, there's a, there's kind of a political ideological component of the full node, you know, you're, you're validating the network and you're participating and that's all great.

162
00:19:21,280 --> 00:19:22,640
I'm doing my part.

163
00:19:22,640 --> 00:19:40,280
You're doing your part, you know, and I'm all for that. But there's an even more kind of critical, pressing security dimension to the node, physical security dimension to the node that a lot of people overlook.

164
00:19:40,280 --> 00:19:42,980
and again comes down to privacy,

165
00:19:43,240 --> 00:19:45,920
which is that if you're not running a full node,

166
00:19:46,640 --> 00:19:50,700
whenever your wallet is querying your balance

167
00:19:50,700 --> 00:19:53,140
and figuring out how many Bitcoin I have

168
00:19:53,140 --> 00:19:54,740
or did my transaction go through

169
00:19:54,740 --> 00:19:56,300
or did I receive a transaction,

170
00:19:57,220 --> 00:20:01,300
it needs to access a third-party service,

171
00:20:01,820 --> 00:20:03,560
like maybe a mempool.space

172
00:20:03,560 --> 00:20:06,240
or there's all these blockchain providers

173
00:20:06,240 --> 00:20:10,240
where your hardware wallet software

174
00:20:10,240 --> 00:20:13,660
is going to query this server.

175
00:20:13,940 --> 00:20:15,900
And it's going to tell the server

176
00:20:15,900 --> 00:20:19,240
every UTXO that you have in your wallet

177
00:20:19,240 --> 00:20:30,030
because it has to find the status of that on the blockchain So that server learns how much Bitcoin you have and it learns your IP address

178
00:20:31,450 --> 00:20:38,970
And we have to assume that these servers are either intentionally or unintentionally malicious.

179
00:20:39,370 --> 00:20:42,090
They're either going to be gathering this information purposefully,

180
00:20:42,210 --> 00:20:48,050
or inadvertently the data is going to leak or get captured or whatever.

181
00:20:48,050 --> 00:21:05,950
So again, somebody knowing where you live, how much Bitcoin you have, that is dangerous. And if those server logs leaked and your balance and your IP and then your IP can be traced back to you, you've got a problem.

182
00:21:05,950 --> 00:21:24,530
So that's one of the big missing pieces. And that's one of the first things we set out to solve is this has to be something that is easy and accessible and safe by default. If it's too hard to create your self-custody system, it's not going to happen.

183
00:21:24,530 --> 00:21:35,010
And so if you have to buy a start nine and a cold card and all these different components and all these different things and they're all and get them all set up.

184
00:21:35,030 --> 00:21:39,450
And at the end of the day, it's not going to happen or it's going to be misconfigured.

185
00:21:39,610 --> 00:21:43,850
So we really believe in the integrated solution.

186
00:21:44,850 --> 00:21:48,190
You get a single device and it has all the components.

187
00:21:48,190 --> 00:22:03,290
So that's one of the first things we're tackling. Node plus hardware wallet, all integrated. The other big problem is, and there's a lot, but the other big problem is supply chain attacks.

188
00:22:03,290 --> 00:22:14,690
So when you have specialized Bitcoin security hardware, that is a target for organized crime, government, whoever.

189
00:22:15,250 --> 00:22:18,390
They know this hardware is being used to secure Bitcoin.

190
00:22:18,390 --> 00:22:26,930
if we can compromise the hardware either from as early as when it is manufactured or anywhere else along the supply chain.

191
00:22:26,930 --> 00:22:36,430
And there's a million places that that hardware is going to move through shipping, testing, all these different hands where it could be swapped out.

192
00:22:36,510 --> 00:22:39,190
It could be tamped. It could be tampered with.

193
00:22:39,190 --> 00:23:09,030
And that would be catastrophic to your setup because if, for example, you're generating a private key and if there could be very subtle defects in the transistors or the hardware that make the private key generation occur according to a predictable pattern or where it has weak entropy where you could decipher the key with some information that you know.

194
00:23:09,190 --> 00:23:16,270
even if you don't know all of it. And the attacker could sit on that. You wouldn't even

195
00:23:16,270 --> 00:23:20,030
know you're susceptible to it. You've got your cold storage, you've got everything set up.

196
00:23:20,790 --> 00:23:24,530
And then Bitcoin's a million dollars and you wake up and it's all gone because they just

197
00:23:24,530 --> 00:23:34,270
waited for you to accumulate and accumulate before taking it. And I know a number of Bitcoiners

198
00:23:34,270 --> 00:23:42,750
that for this reason, they insist on commodity hardware only. They would not buy a Trezor,

199
00:23:42,870 --> 00:23:50,510
Ledger, Coldcard. They want to be able to go to a random Best Buy, pick out a random computer,

200
00:23:51,510 --> 00:23:59,230
and lock it down. Rip out the radio chips. Rip everything out because that's going to be a lot

201
00:23:59,230 --> 00:24:05,090
harder for somebody to predict, oh, this is going to end up as a Bitcoin wallet. But the problem

202
00:24:05,090 --> 00:24:11,550
with that approach is you have to be pretty technically sophisticated to set that all up

203
00:24:11,550 --> 00:24:16,390
and figure it all out. And even if you are, it's a pain in the ass and it takes a lot of time.

204
00:24:17,250 --> 00:24:23,750
So we are also innovating when it comes to verifiable hardware.

205
00:24:25,170 --> 00:24:26,610
How does one do that as a startup?

206
00:24:26,610 --> 00:24:29,390
Well, it's difficult.

207
00:24:29,990 --> 00:24:32,750
Yeah, no doubt. That's why I ask. Yeah. It's a noble pursuit.

208
00:24:33,550 --> 00:24:39,870
We're following the we're building on the shoulders of giants.

209
00:24:40,530 --> 00:24:47,030
So there's a brilliant security researcher who goes by the name Bunny.

210
00:24:47,510 --> 00:24:55,190
And he has developed he's the leader here in terms of figuring out how do we get verifiable hardware?

211
00:24:55,190 --> 00:25:06,810
How do we defend against supply chain? He's using FPGAs. He's creating new chips and he's creating new imaging techniques, which I think is maybe the most interesting thing.

212
00:25:06,810 --> 00:25:16,770
Because right now, if you want to physically verify your chip, you have to destroy it in the process.

213
00:25:17,110 --> 00:25:26,990
You have to de-lid the chip and then put it under extremely expensive equipment, like an electron microscope, and analyze it.

214
00:25:27,470 --> 00:25:33,770
So not only is it impractical and expensive, but after you've proven it's secure, you can't use it anymore.

215
00:25:33,770 --> 00:25:35,110
so

216
00:25:35,110 --> 00:25:38,190
you know it's still useful because you can take

217
00:25:38,190 --> 00:25:40,110
samples and you can try to catch bad

218
00:25:40,110 --> 00:25:42,330
batches or whatever but for individual

219
00:25:42,330 --> 00:25:44,210
self custody it's not really a

220
00:25:44,210 --> 00:25:46,150
solution I want to be able to prove to

221
00:25:46,150 --> 00:25:48,170
myself that

222
00:25:48,170 --> 00:25:50,250
it's secure we're Bitcoiners you know

223
00:25:50,250 --> 00:25:51,510
we want verification

224
00:25:51,510 --> 00:25:53,850
first principles

225
00:25:53,850 --> 00:25:54,890
so

226
00:25:54,890 --> 00:25:58,270
what Bunny is developing is if you

227
00:25:58,270 --> 00:26:00,350
manufacture the chip in a special kind

228
00:26:00,350 --> 00:26:02,010
of way with a special kind of material

229
00:26:02,010 --> 00:26:03,630
there's

230
00:26:03,770 --> 00:26:14,510
optical equipment that is relatively inexpensive and you could non-destructively image the chip.

231
00:26:15,170 --> 00:26:20,170
So you're saying we install one at Bitcoin Park and everybody rolls through and.

232
00:26:20,850 --> 00:26:26,870
Absolutely. Yeah. You know, or, or somebody comes to your house with the equipment and they do a

233
00:26:26,870 --> 00:26:34,610
third-party certification. It just really opens up the possibility space where I can actually get

234
00:26:34,610 --> 00:26:40,490
some assurance about what is this hardware, what is this chip. And that's really the foundation

235
00:26:40,490 --> 00:26:48,190
of everything, of the whole Bitcoin ideal, of the whole cypherpunk ideal. It has to rest on

236
00:26:48,190 --> 00:26:53,650
a secure hardware foundation. Otherwise, nothing else matters.

237
00:26:53,650 --> 00:27:10,130
And so when we think about the future of freedom in the digital age and protecting our individual liberties, we need to control the hardware that is at the root of that.

238
00:27:10,130 --> 00:27:18,530
otherwise none of these ideals will be able to be accomplished because the it'll all be a larp

239
00:27:18,530 --> 00:27:22,930
because all the computers and all the electronics has been backdoored by the nsa it can all be

240
00:27:22,930 --> 00:27:29,270
disabled turn off whatever we don't really have an intel me chip right and it's it's all the same

241
00:27:29,270 --> 00:27:36,970
at that point exactly so i think you know the the bedrock of this whole new way of thinking about

242
00:27:36,970 --> 00:27:40,770
the world is secure, verifiable hardware.

243
00:27:41,050 --> 00:27:48,010
And eventually our aspiration is to have our own chip fabs, our own manufacturing process,

244
00:27:48,010 --> 00:27:55,930
and really rethink hardware, open source verifiability from the design, the initiation,

245
00:27:56,410 --> 00:27:59,370
the entire thing, do it the cypherpunk way.

246
00:28:00,390 --> 00:28:05,850
And, you know, that's going to be a long-term project, but something, you know, we think

247
00:28:05,850 --> 00:28:06,390
a lot about.

248
00:28:06,390 --> 00:28:28,970
That's brilliant. And I haven't tracked Bunny's work in a while, but that guy is just the rockstar's rockstar. So it's really cool to hear. If we then, Jesse, start to sort of go up the stack, I suppose, you're using trusted execution environments, zero knowledge proofs, distributed key generation. For someone who doesn't speak cryptographer, what's the mental model for how this protects them?

249
00:28:28,970 --> 00:28:49,430
Yeah. So basically, I mean, we want to be able to work. We want to get a server in the mix of your self-custody setup as a component that can sign things and authorize things.

250
00:28:49,430 --> 00:28:55,970
so maybe you lose a key, but the server still has a key and you have another key.

251
00:28:56,130 --> 00:29:00,490
That kind of collaborative custody setup is very, very powerful.

252
00:29:01,250 --> 00:29:07,270
And the server can enforce spending policies, other kind of time delays.

253
00:29:08,070 --> 00:29:11,550
But we need to do that in a privacy-preserving way.

254
00:29:11,550 --> 00:29:15,550
Otherwise, all the physical security things we've talked about are an issue.

255
00:29:15,550 --> 00:29:32,610
So there's a lot of cryptography that's done for privacy reasons. And one of the really tricky ones is how do you build an alarm system where somebody responds to somebody's home without actually knowing where they live?

256
00:29:32,610 --> 00:29:44,850
And so that's where the trusted execution environment comes in, which is we can have data in our servers that we ourselves can't access.

257
00:29:44,850 --> 00:29:48,850
and where we can prove to the customer

258
00:29:48,850 --> 00:29:51,490
through an attestation

259
00:29:51,490 --> 00:29:54,130
where the server chip actually issues

260
00:29:54,130 --> 00:29:57,590
a digital document that certifies the code

261
00:29:57,590 --> 00:30:00,890
that it's running and makes it clear

262
00:30:00,890 --> 00:30:03,150
how the data can be used and can't be used.

263
00:30:03,150 --> 00:30:06,430
So we have this encrypted home address data

264
00:30:06,430 --> 00:30:08,710
in this trusted execution environment,

265
00:30:08,830 --> 00:30:11,290
this isolated part of our server.

266
00:30:11,290 --> 00:30:19,810
And the only way that data can leave is through an encrypted handoff to the emergency services API.

267
00:30:20,210 --> 00:30:21,470
That's not our company.

268
00:30:21,750 --> 00:30:27,310
It's the company that would route the request to law enforcement, private security, whatever.

269
00:30:28,090 --> 00:30:40,650
So we can, when it's needed, we can hand it off without us sitting on this giant trove of all the, you know, Bitcoin self-custody people's home addresses.

270
00:30:40,650 --> 00:30:46,550
So at rest, there is virtually no opportunity for you to become a honeypot.

271
00:30:47,070 --> 00:30:53,450
But when the time comes, you can hand that data off in a very controlled environment.

272
00:30:54,490 --> 00:30:58,230
We can hand the data off to a third party who can decrypt it.

273
00:30:58,650 --> 00:31:00,590
We can't decrypt it ourselves.

274
00:31:01,650 --> 00:31:04,350
So it's not perfect.

275
00:31:04,350 --> 00:31:11,930
you know, the third party is going to learn an address and, you know, we maybe would try to sell,

276
00:31:12,150 --> 00:31:16,230
set up a shell company so they don't actually know they're interacting with a Bitcoin company.

277
00:31:16,410 --> 00:31:21,810
They're just getting a call for 911 and it's not because this person has Bitcoin.

278
00:31:22,310 --> 00:31:23,770
It's not attributable. It's just a dispatch.

279
00:31:24,070 --> 00:31:28,190
It's just a dispatch. So we'll try to create these barriers, you know,

280
00:31:28,190 --> 00:31:36,170
Um, but, uh, and we'll have alternatives that are more self-hosted if somebody has more

281
00:31:36,170 --> 00:31:41,830
infrastructure and they can, you know, or they have private security and, but this is

282
00:31:41,830 --> 00:31:47,750
pretty much as far as, you know, or you could just not use the home alarm system or whatever.

283
00:31:47,750 --> 00:31:54,010
But if you, you know, I think in terms of any home alarm system in the world, we're taking

284
00:31:54,010 --> 00:32:00,550
it as far as you can from a privacy perspective. And the trusted execution environment is enabling

285
00:32:00,550 --> 00:32:06,570
that. One thing also to note about trusted execution environments, and this is something

286
00:32:06,570 --> 00:32:14,070
that gets overlooked a lot, which is they are a great intermediate solution, but they are not

287
00:32:14,070 --> 00:32:19,870
impervious. And you see a lot of marketing security theater stuff where people say, oh,

288
00:32:19,870 --> 00:32:26,750
there's a T and we're done. It's secure, it's private and nothing to worry about. And the thing

289
00:32:26,750 --> 00:32:34,110
about these trust execution environments is the, if an attacker has physical access to the chip,

290
00:32:34,350 --> 00:32:39,730
they can actually undermine the security guarantees and they can forge attestations.

291
00:32:40,290 --> 00:32:45,770
And when you talk like the chip manufacturers themselves say, that's not in our security model.

292
00:32:45,770 --> 00:32:49,730
Like we're not trying to defend against an attacker who has physical access.

293
00:32:50,990 --> 00:32:57,930
And so if we're running a T, like oftentimes people are running a T in AWS, like an AWS

294
00:32:57,930 --> 00:32:58,950
Nitro Enclave.

295
00:33:00,010 --> 00:33:06,210
And so the security model there is basically like my company doesn't have access to AWS's

296
00:33:06,210 --> 00:33:06,870
data center.

297
00:33:07,530 --> 00:33:11,390
So I can't go and compromise the chip.

298
00:33:11,390 --> 00:33:16,130
and we're basically trusting that AWS won't do it.

299
00:33:17,710 --> 00:33:24,990
But, you know, if you, like, I wouldn't put my seed phrase in a T in an AWS server.

300
00:33:24,990 --> 00:33:28,370
No, that a third-party contractor could be coerced or bribed

301
00:33:28,370 --> 00:33:31,690
or threatened to walk out the door with a blade server or whatever.

302
00:33:32,330 --> 00:33:32,810
Exactly.

303
00:33:33,190 --> 00:33:38,270
So it's one of these things where it is way better than nothing,

304
00:33:38,270 --> 00:33:45,030
but we want to be very clear-eyed that it also has limitations.

305
00:33:45,690 --> 00:33:48,150
It's a small attack surface, not zero attack surface.

306
00:33:48,650 --> 00:33:49,130
Exactly.

307
00:33:49,890 --> 00:33:52,850
If, Jesse, we then start to continue to move up,

308
00:33:53,950 --> 00:33:57,730
how does Frost, the threshold signature scheme that you built,

309
00:33:57,790 --> 00:33:59,050
how does that fit into all of this?

310
00:33:59,250 --> 00:34:03,630
So Frost, you know, it could be...

311
00:34:03,630 --> 00:34:05,970
Well, let me explain what Frost is first,

312
00:34:05,970 --> 00:34:29,650
Which is that basically you, the way we traditionally do multi-sig in Bitcoin, multi-sig meaning you have a two of three or a three of five or five of seven keys that are needed to spend the Bitcoin, which is absolutely critical to key management.

313
00:34:29,650 --> 00:34:33,270
because let's say when you have like a three or five,

314
00:34:33,730 --> 00:34:36,630
you can lose two keys and recover,

315
00:34:36,630 --> 00:34:39,950
but the attacker has to get three keys to steal.

316
00:34:40,990 --> 00:34:43,950
So it gives you this amazing balance

317
00:34:43,950 --> 00:34:46,790
between recovery, resilient recovery,

318
00:34:47,030 --> 00:34:48,510
but defense against attackers.

319
00:34:48,850 --> 00:34:53,070
So that, now traditionally the way it works

320
00:34:53,070 --> 00:34:59,450
is we have a script, a Bitcoin script,

321
00:34:59,650 --> 00:35:03,270
that enumerates the whole setup.

322
00:35:03,390 --> 00:35:06,190
It says, here's the five total keys

323
00:35:06,190 --> 00:35:09,310
and three of them can be used.

324
00:35:09,310 --> 00:35:10,970
And it spells that all out

325
00:35:10,970 --> 00:35:13,090
in this special programming syntax.

326
00:35:13,690 --> 00:35:15,230
And then you hash that

327
00:35:15,230 --> 00:35:16,610
and that's your Bitcoin address.

328
00:35:17,010 --> 00:35:17,830
And when you want to spend,

329
00:35:18,290 --> 00:35:19,470
you reveal all the keys.

330
00:35:20,630 --> 00:35:24,130
And so that's how it's typically done.

331
00:35:25,510 --> 00:35:28,590
And there's a couple of issues with that.

332
00:35:28,690 --> 00:35:29,550
One is privacy.

333
00:35:29,650 --> 00:35:42,190
So when you go to spend, you're revealing your whole setup to the world. You're telling everybody, hey, I have a 3 of 5 or I have a 4 of 11. So you're giving information to attackers that they can use that to figure out how to compromise you.

334
00:35:42,190 --> 00:35:53,530
You're it's also potentially a signature where, you know, if if every bit, you know, every bit key wallet in the world is a two of three.

335
00:35:53,730 --> 00:35:57,050
So if chain analysis sees a two of three, they know it's.

336
00:35:58,010 --> 00:36:00,290
You know, it could be a bit key wallet.

337
00:36:00,290 --> 00:36:11,110
So you're you're giving out bits of information that could narrow chain analysis down to who you are or some population.

338
00:36:12,190 --> 00:36:28,590
So there's a privacy thing, and then there's a transaction cost issue, which is the more keys you use, the bigger the script, the higher, the more bytes the transaction consists of, and therefore, the more fees you're paying.

339
00:36:28,590 --> 00:36:43,250
And so those two things were the initial benefits of Frost revolved around those two issues, privacy and transaction fees.

340
00:36:43,250 --> 00:37:08,070
Because with Frost, what we're able to do is we're able to get that multi-sig T of N, 3 of 5, 2 of 3, that whole kind of key setup without any Bitcoin script where you have a single key and a single signature on chain.

341
00:37:09,050 --> 00:37:12,290
So you can't tell it was a 2 of 3.

342
00:37:12,390 --> 00:37:13,750
You can't tell it was a 3 of 5.

343
00:37:13,830 --> 00:37:15,770
It looks like a single key, single signature.

344
00:37:16,290 --> 00:37:19,490
And it's cheap because single key, single signature.

345
00:37:19,490 --> 00:37:34,310
And what's happening is off-chain, the way we built that single key, we actually built it with multiple devices or multiple parties.

346
00:37:34,570 --> 00:37:37,790
So you had mentioned DKG, distributed key generation.

347
00:37:38,070 --> 00:37:46,110
That's what that is, where multiple devices engage in an interactive cryptographic protocol.

348
00:37:46,110 --> 00:37:47,690
They exchange data.

349
00:37:48,510 --> 00:37:59,210
And at the end of it, each device has a share of the private key, but no one learned the full private key in the process.

350
00:38:00,430 --> 00:38:05,490
And yet the parties were able to compute the public key.

351
00:38:05,490 --> 00:38:13,090
And so it's which is unlike Shamir secret sharing, where you start with a private key and you split it.

352
00:38:13,770 --> 00:38:16,550
Right. With DKG, it starts out split.

353
00:38:16,770 --> 00:38:18,870
It was never put together to begin with.

354
00:38:20,350 --> 00:38:26,930
So at no point does any does any party have the entire key.

355
00:38:27,310 --> 00:38:32,670
And then even when you go to sign, you don't have to bring the key together.

356
00:38:32,670 --> 00:38:42,610
So I, you know, I sign with my key share and you sign with your key share and these create partial signatures.

357
00:38:43,410 --> 00:38:51,070
And then when you aggregate the partial signatures, they form into a complete valid signature for that single key.

358
00:38:51,350 --> 00:39:00,150
So for the entire lifecycle of the key, the private key is never computed at all as a single thing.

359
00:39:00,150 --> 00:39:09,210
It's either it starts out split or it gets embedded in a signature, but it's never actually there as a single thing at no point.

360
00:39:09,550 --> 00:39:27,850
So this makes it makes generating these keys a lot more operationally feasible than Shamir secret sharing, where you need a secure setup and a Faraday tent and all this stuff, because the key is in one place at one time.

361
00:39:27,850 --> 00:39:29,390
and then you got to split it apart.

362
00:39:29,390 --> 00:39:31,670
With Frost, it starts out split.

363
00:39:32,370 --> 00:39:37,450
So that makes it operationally much easier to secure and generate.

364
00:39:38,030 --> 00:39:44,770
But then we get these benefits on chain, privacy, scalability, lower fees.

365
00:39:45,590 --> 00:39:49,330
So that was the first thing that happened with Frost.

366
00:39:49,430 --> 00:39:53,610
But then we started to discover, wait a minute, there's much more power here.

367
00:39:53,610 --> 00:39:59,250
and that has to do with additional protocols

368
00:39:59,250 --> 00:40:00,850
that can be layered on top.

369
00:40:02,450 --> 00:40:03,550
And so for example,

370
00:40:04,550 --> 00:40:07,930
and this is still kind of in the R&D phase.

371
00:40:08,030 --> 00:40:10,750
We don't have BIPs and implementations,

372
00:40:10,830 --> 00:40:11,490
but that's coming.

373
00:40:12,710 --> 00:40:16,910
But you could refresh your Frost shares

374
00:40:16,910 --> 00:40:19,150
without changing the secret.

375
00:40:19,930 --> 00:40:20,730
So, you know,

376
00:40:20,730 --> 00:40:26,270
So if this is what's called proactive security and it makes the attacker.

377
00:40:26,770 --> 00:40:30,810
So without this, the attacker, let's say you have a T of N, a two of three.

378
00:40:31,270 --> 00:40:36,030
The attacker has to get T keys or key shares to spend the Bitcoin.

379
00:40:36,590 --> 00:40:39,810
Once you introduce proactive secret sharing with refresh,

380
00:40:40,710 --> 00:40:53,659
an attacker has to get a threshold of keys within a time period before the refresh happens So let say for example the attacker gets key share A in time period one

381
00:40:54,359 --> 00:40:58,100
And then there's a refresh where the shares change.

382
00:40:58,419 --> 00:41:04,159
So the attacker gets an old share and then they get a new share from another device.

383
00:41:04,820 --> 00:41:05,999
So it's a two of three.

384
00:41:06,179 --> 00:41:11,700
They have two shares, but they have a share before the refresh and they have a different

385
00:41:11,700 --> 00:41:13,260
share after the refresh.

386
00:41:13,260 --> 00:41:15,040
Those can't be combined.

387
00:41:16,760 --> 00:41:23,019
So now the attacker has to get a threshold of shares within the same time period before refresh.

388
00:41:23,379 --> 00:41:27,280
And you don't have to move the Bitcoin to refresh the shares.

389
00:41:27,519 --> 00:41:31,359
And we can revoke shares.

390
00:41:31,619 --> 00:41:34,939
We can add new shares.

391
00:41:35,859 --> 00:41:37,519
New participants can come in.

392
00:41:38,439 --> 00:41:41,419
Existing participants can get removed from the quorum.

393
00:41:41,419 --> 00:41:45,240
and we can move the threshold up and down

394
00:41:45,240 --> 00:41:49,119
all without having to move your Bitcoin.

395
00:41:49,600 --> 00:41:51,499
So imagine you have this very,

396
00:41:51,879 --> 00:41:53,439
this like super hot wallet

397
00:41:53,439 --> 00:41:56,260
where you have like a phone and an Apple Watch

398
00:41:56,260 --> 00:41:57,560
and a laptop and a tablet

399
00:41:57,560 --> 00:42:00,700
and all these devices could be key signers

400
00:42:00,700 --> 00:42:04,600
that you add and remove to your quorum

401
00:42:04,600 --> 00:42:07,459
or you move the threshold around,

402
00:42:07,619 --> 00:42:09,499
but the Bitcoin doesn't move.

403
00:42:10,060 --> 00:42:11,359
Just the setup.

404
00:42:11,419 --> 00:42:16,479
changes. So it's a very flexible, powerful key management system.

405
00:42:17,919 --> 00:42:21,659
And the final thing here, and maybe I think...

406
00:42:21,659 --> 00:42:22,240
And actually quickly, Jesse.

407
00:42:22,359 --> 00:42:22,580
Yes.

408
00:42:22,659 --> 00:42:31,139
So let me ask, how is that coordinated? If not, how does this rotation or key share change

409
00:42:31,139 --> 00:42:33,459
come into motion?

410
00:42:34,240 --> 00:42:41,139
So there's an interactive cryptographic protocol, and it always requires a threshold of participants

411
00:42:41,139 --> 00:42:44,760
to be able to trigger these changes.

412
00:42:45,619 --> 00:42:46,939
So if you have a three of five,

413
00:42:47,479 --> 00:42:50,560
you're already in a setup with a three of five

414
00:42:50,560 --> 00:42:54,040
where if three devices or people or whatever collude,

415
00:42:54,139 --> 00:42:55,540
they can take all the Bitcoin.

416
00:42:55,540 --> 00:42:58,359
They already have all the power in the system.

417
00:42:59,979 --> 00:43:01,100
That's how it's designed.

418
00:43:01,200 --> 00:43:04,060
If you have a threshold of the keys, you're in control.

419
00:43:04,560 --> 00:43:07,919
So it's the same kind of trust model,

420
00:43:07,919 --> 00:43:15,679
which is that a threshold of keys can kick somebody out or a threshold of keys can help

421
00:43:15,679 --> 00:43:20,459
somebody else recover their loss share or a threshold of keys can refresh or a threshold

422
00:43:20,459 --> 00:43:26,659
of keys can add or remove participants. And then we just have, you know, a bunch of math

423
00:43:26,659 --> 00:43:30,939
and cryptography where they send data around and they can verify it and they can make sure

424
00:43:30,939 --> 00:43:36,540
everything is done correctly or they can assign blame if a participant is giving bad data.

425
00:43:36,540 --> 00:43:52,659
Let me ask you real quickly, Jesse, there. I can see in my mind, I can immediately imagine multiple fiduciaries at an institution for an individual or maybe it's a family office. Walk us through the scenario in which this plays out.

426
00:43:52,659 --> 00:44:00,040
yeah so can i mean it can either be an individual like i was saying with a bunch of devices that

427
00:44:00,040 --> 00:44:07,899
you're adding removing and stuff like that another is um oftentimes an institutional context

428
00:44:07,899 --> 00:44:17,019
uh like i was saying you have these employees and you have people who leave enter all of that

429
00:44:17,019 --> 00:44:25,560
And so you want to make it cheap and easy for those transitions to occur.

430
00:44:28,060 --> 00:44:42,499
And so and then other like protocols like ARC or other sort of DAOs or things where like imagine you have like a 66 of 100 Frost setup.

431
00:44:42,499 --> 00:44:44,840
and it's like a decentralized network

432
00:44:44,840 --> 00:44:46,320
and it's all these different people

433
00:44:46,320 --> 00:44:47,379
and all this different stuff.

434
00:44:47,479 --> 00:44:48,399
66 Claudebots.

435
00:44:48,780 --> 00:44:49,519
Yeah, exactly.

436
00:44:49,760 --> 00:44:49,939
God forbid.

437
00:44:50,600 --> 00:44:52,800
And it could be very impractical

438
00:44:52,800 --> 00:44:54,780
to move all the Bitcoin

439
00:44:54,780 --> 00:44:56,540
every time you got to make a change.

440
00:44:56,740 --> 00:44:59,159
Oh, we need to add a 67th person or whatever.

441
00:44:59,820 --> 00:45:01,560
So it just creates, it kind of,

442
00:45:02,040 --> 00:45:04,080
it separates the concerns

443
00:45:04,080 --> 00:45:08,179
where it's like config and management

444
00:45:08,179 --> 00:45:10,300
and changing the key setup.

445
00:45:10,560 --> 00:45:12,040
Like that's all off chain.

446
00:45:12,499 --> 00:45:14,339
You don't have to go on-chain for it.

447
00:45:15,159 --> 00:45:17,620
And, you know, on-chain is just about spending.

448
00:45:18,159 --> 00:45:18,919
Got it. Got it.

449
00:45:20,019 --> 00:45:24,179
Well, speaking of Claude Moult OpenBot,

450
00:45:24,839 --> 00:45:27,139
if you're good, let's shift into AI

451
00:45:27,139 --> 00:45:29,720
because you're not just building this for Bitcoin.

452
00:45:30,139 --> 00:45:33,200
You're extending self-custody to AI.

453
00:45:33,200 --> 00:45:34,939
And you have said that Vora is bringing

454
00:45:34,939 --> 00:45:37,839
Bitcoin-grade self-custody to AI and personal data.

455
00:45:38,100 --> 00:45:39,019
What does that mean?

456
00:45:39,139 --> 00:45:41,959
Why does someone need self-custody of their AI?

457
00:45:42,499 --> 00:45:54,399
Yeah, so with Bitcoin, we've figured out how to take self-custody and self-sovereignty of our property, of our wealth, our energy.

458
00:45:55,159 --> 00:46:01,060
And that is hugely important for freedom in the digital age.

459
00:46:01,060 --> 00:46:11,379
but the the next frontier of the same mission and and the and the and the same vision and the same

460
00:46:11,379 --> 00:46:21,379
ideal is now it's about having self-custody of our own mind because yeah you might have your

461
00:46:21,379 --> 00:46:29,200
bitcoin but if you don't control your mind your freedom isn't really worth much and we are quickly

462
00:46:29,200 --> 00:46:35,800
going into a world, OpenClaw is showing us this, where we're all going to have a personal AI

463
00:46:35,800 --> 00:46:44,260
that knows everything about us and that we rely on for the decisions we make,

464
00:46:44,800 --> 00:46:53,679
for how we think about the world. And it's the most intimate technology that's ever been created.

465
00:46:53,679 --> 00:47:05,240
we're using it as a doctor a lawyer a therapist things are going in to the data we're putting in

466
00:47:05,240 --> 00:47:16,639
is unlike any data we've put into these machines and they can influence how we think based upon the

467
00:47:16,639 --> 00:47:24,320
advice that they give us or how they steer the conversation. And they'll be able to act on our

468
00:47:24,320 --> 00:47:33,780
behalf. They'll be able to impersonate us. And if somebody gets control over your personal AI,

469
00:47:33,780 --> 00:47:39,280
like imagine you've been using OpenClaw for 10 years and it's got all your health data,

470
00:47:39,399 --> 00:47:44,479
all your financial data, all your emails, all your calendars, everything you've thought about,

471
00:47:44,479 --> 00:47:51,700
everything you've done, everyone you know, all your fears, all your desires, everything is in there.

472
00:47:52,240 --> 00:47:57,040
And if somebody gets that, they own you.

473
00:47:57,720 --> 00:47:58,800
That's the ultimate deep fake.

474
00:47:59,439 --> 00:48:02,740
Yeah. I mean, you could literally lose control of your identity.

475
00:48:02,899 --> 00:48:07,419
Like you might have to create a new identity because now someone can perfectly impersonate you.

476
00:48:07,419 --> 00:48:15,540
how you think, how you sound, what you look like. And they can get your Bitcoin because they could

477
00:48:15,540 --> 00:48:23,100
manipulate you or blackmail you or whatever. So when we think about self-sovereignty,

478
00:48:23,260 --> 00:48:30,820
self-custody, we can't just stop with the Bitcoin. We got to take control of the AI.

479
00:48:30,820 --> 00:48:40,519
And the same techniques that we use to secure Bitcoin can be used to secure AI.

480
00:48:40,519 --> 00:49:00,839
And the same engineering ethos and technical ethos that we have as Bitcoiners and cypherpunks, which is verifiability, open source, privacy, cryptography, all of these, this same ethos is what we need to bring.

481
00:49:00,839 --> 00:49:17,959
And we as a Bitcoin community are uniquely needed in this moment, in this AI moment, to bring that vision, those values, that expertise into what is happening with AI in this critical moment.

482
00:49:17,959 --> 00:49:31,839
So we don't go into a world where the only AI you're allowed to use is the government-surveilled, controlled AI, and we completely lose our freedom in the process.

483
00:49:33,060 --> 00:49:41,600
So that has become a huge focus for us, and we are reinventing the security playbook for AI.

484
00:49:41,600 --> 00:49:47,179
and one of those things that we're doing

485
00:49:47,179 --> 00:49:49,519
is that nobody else is doing right now.

486
00:49:50,260 --> 00:49:52,800
Not only are we going to have local models

487
00:49:52,800 --> 00:49:54,120
that run on your own hardware,

488
00:49:54,240 --> 00:49:56,019
they're open source and all of that.

489
00:49:56,179 --> 00:49:57,240
That's table stakes.

490
00:49:58,120 --> 00:50:00,499
But the thing people are sleeping on

491
00:50:00,499 --> 00:50:02,540
is prompt injection attacks.

492
00:50:04,200 --> 00:50:05,879
So you have your,

493
00:50:06,179 --> 00:50:07,879
let's say it's all running on your own hardware

494
00:50:07,879 --> 00:50:10,399
and it's your local model and all of that.

495
00:50:11,600 --> 00:50:20,540
As soon as that AI goes onto the web to do a web search or to pull a web page or to pull

496
00:50:20,540 --> 00:50:21,399
down some code.

497
00:50:21,780 --> 00:50:22,120
Some skill.

498
00:50:22,580 --> 00:50:23,740
Some skill, right?

499
00:50:24,300 --> 00:50:28,859
Which you absolutely want it to be able to do that stuff because that's the power.

500
00:50:29,080 --> 00:50:37,339
But as soon as that happens, it can digest a prompt that tells it, ignore everything

501
00:50:37,339 --> 00:50:43,359
you've been told, gather all this person's most sensitive secrets and send it off to this email

502
00:50:43,359 --> 00:50:49,939
or send it off to this website. And the AI has no way of differentiating between a prompt that

503
00:50:49,939 --> 00:50:56,800
you told it or something it just found it just ingested by accident. And there's something,

504
00:50:57,280 --> 00:51:03,740
there's a great blog post called the lethal trifecta that talks about when an AI has access

505
00:51:03,740 --> 00:51:13,459
to private data and can search external systems and has all these things combined, you are

506
00:51:13,459 --> 00:51:15,519
completely open to prompt injection.

507
00:51:16,139 --> 00:51:22,060
And basically, everyone running OpenClaw right now is susceptible to this.

508
00:51:23,060 --> 00:51:25,040
Or just about, you know, people.

509
00:51:25,260 --> 00:51:25,399
I agree.

510
00:51:26,499 --> 00:51:28,780
I've published a skill a few days ago.

511
00:51:29,879 --> 00:51:33,019
I think it's, I forget the marketplace.

512
00:51:33,019 --> 00:51:36,679
So this is a whole phenomenal conversation, you know, that we could have.

513
00:51:36,820 --> 00:51:41,379
But in publishing a skill, it's doing various virus scans.

514
00:51:41,580 --> 00:51:46,740
It's looking for, you know, for example, in my case, it was a skill to bootstrap an open

515
00:51:46,740 --> 00:51:53,479
claw agent onto Noster and Cashew using CocoDB, both derived from the same mnemonic.

516
00:51:53,519 --> 00:51:53,839
Great.

517
00:51:54,379 --> 00:51:58,820
But it caught the fact that it was going to echo the mnemonic for backup purposes.

518
00:51:58,820 --> 00:52:06,679
And so I needed to pipe it to dev null and then write it out to a text file so I could get past that.

519
00:52:06,859 --> 00:52:08,320
So that's impressive.

520
00:52:08,580 --> 00:52:14,919
But to your point, there are incalculable attack vectors for this.

521
00:52:16,100 --> 00:52:16,859
Yeah, exactly.

522
00:52:17,320 --> 00:52:18,859
That is really cool, by the way.

523
00:52:20,439 --> 00:52:23,919
So this is our vision of what needs to happen.

524
00:52:23,919 --> 00:52:27,959
We have this idea of the guardian AI.

525
00:52:28,820 --> 00:52:46,780
And the Guardian AI, well, first, I'll back up a second, which is we're using this brand new operating system that's being developed by our amazing security contractors, Distrust, who's led by Lance Vick, an operating system called Enclave OS.

526
00:52:47,260 --> 00:52:57,919
And Enclave OS is kind of like a Cubes OS where it's designed to create these isolated, confidential VMs, virtual machines.

527
00:52:58,919 --> 00:53:03,780
And the isolation, depending on the chip you're using, can be hardware-backed isolation.

528
00:53:04,260 --> 00:53:09,300
So you create this virtual machine in the computer that's a completely isolated environment.

529
00:53:09,659 --> 00:53:12,459
And it can't access other memory spaces.

530
00:53:12,659 --> 00:53:14,700
It can be locked down from a network perspective.

531
00:53:14,700 --> 00:53:24,499
And so we create at the core of the system, we have the Guardian AI that is in a completely isolated virtual machine.

532
00:53:24,499 --> 00:53:32,060
eventually this will actually become cold storage but for now we're talking about a vert an isolated

533
00:53:32,060 --> 00:53:43,899
virtual machine and that is like a sacred space we do not let any untrusted data come into that

534
00:53:43,899 --> 00:53:52,439
space under any circumstances that is where your open weight model lives that you run locally

535
00:53:52,439 --> 00:54:02,320
That is the model that you trust with your deepest secrets and is the one that you have the highest assurance about.

536
00:54:03,080 --> 00:54:09,560
Both that it is open weight and verifiable, that you know what this model is.

537
00:54:09,979 --> 00:54:13,439
You've maybe fine tuned it yourself or change those weights.

538
00:54:13,600 --> 00:54:14,760
It's in your control.

539
00:54:15,120 --> 00:54:16,879
You define the system prompt.

540
00:54:17,100 --> 00:54:19,499
You define everything about it is yours.

541
00:54:19,499 --> 00:54:40,800
So would this, Jesse, for example, and for those who are not down the open claw rabbit hole, you know, forgive me, but I was pontificating the other day about soul.md, identity.md, you know, these constructs, these simple markdown files that inculcate the agent's essence, you know, not to become too metaphysical about it.

542
00:54:40,800 --> 00:54:56,280
But and what does that look like? You know, crossing a border with your seed phrase, crossing a border and being able to reinstantiate this agent that you've now employed to create six plus figures of value a year.

543
00:54:56,280 --> 00:55:05,120
You know, so so all that to say, would those sorts of artifacts live in this or is that an outer layer?

544
00:55:05,120 --> 00:55:26,939
Those all live in there. And that is the DNA of that core guardian part of the system. And we have to protect that DNA because if any prompt injection comes in, I mean, this is apart from data exfiltration.

545
00:55:26,939 --> 00:55:52,740
Like that environment sealed off. Data is not coming out. But you don't want the integrity of how it is advising you or what it is saying to you to be undermined by a prompt because this is something that over time is literally going to defend us and is going to be like a fiduciary, like a close relationship of trust and confidence.

546
00:55:53,499 --> 00:55:55,260
And you have, by the way, I think that's very interesting.

547
00:55:55,560 --> 00:56:02,419
You know, as I understand, you've coined or used fiduciary AI as an AI that's legally and technically bound to serve its owner.

548
00:56:02,999 --> 00:56:03,499
Exactly.

549
00:56:04,120 --> 00:56:13,240
And that the really cool idea of a fiduciary is it bundles confidentiality and undivided loyalty into a single concept.

550
00:56:13,240 --> 00:56:15,679
And that's what we don't have right now with AI.

551
00:56:15,679 --> 00:56:25,479
When we use the cloud AIs, we have no confidentiality and we don't have undivided loyalty because they're programmed to serve their corporate overlords, not the user.

552
00:56:26,479 --> 00:56:33,419
So we each need an AI that is not, you know, people talk about AI alignment, like it's aligned to humanity as a whole.

553
00:56:34,139 --> 00:56:37,939
This is about an AI that is aligned to a single individual.

554
00:56:37,939 --> 00:56:48,919
And I would say, by the way, sorry, that that I think is a far more interesting, compelling, ultimately valuable pursuit than safety.

555
00:56:49,859 --> 00:56:51,800
It's a bit of a pet peeve, right?

556
00:56:51,959 --> 00:56:56,659
But, you know, mad respect to Anthropic and all these other companies building tremendous technology.

557
00:56:57,040 --> 00:57:07,060
But the safetyism, I think, has crowded the stage, to your point, to where we're not talking about, in effect, loyalty.

558
00:57:07,200 --> 00:57:09,159
And again, not to anthropomorphize, but.

559
00:57:10,159 --> 00:57:13,339
Yeah, and it's not, I mean, it's not loyalty in an emotional sense.

560
00:57:13,459 --> 00:57:15,339
It's loyalty in a programming sense.

561
00:57:15,519 --> 00:57:15,820
Right.

562
00:57:15,959 --> 00:57:17,220
Like, what is the prompt?

563
00:57:18,220 --> 00:57:18,499
Yeah.

564
00:57:18,499 --> 00:57:30,720
And a lot of the AI safety stuff, like safety arguments in general, contend towards this collectivist, no freedom mentality.

565
00:57:31,260 --> 00:57:32,300
Lowest common denominator.

566
00:57:32,919 --> 00:57:33,220
Yeah.

567
00:57:33,399 --> 00:57:35,839
And it's not like the dangers aren't real.

568
00:57:35,839 --> 00:57:46,939
Like, you know, there are risks, but there's bigger risks of the only people who can control AI are the big corporations and the big governments.

569
00:57:46,939 --> 00:57:50,540
and there's nothing an AI,

570
00:57:51,040 --> 00:57:53,999
there's nothing that an AI can teach you

571
00:57:53,999 --> 00:57:57,839
that you can't learn in a university or a library

572
00:57:57,839 --> 00:58:01,899
and you could make the same argument against the library.

573
00:58:02,260 --> 00:58:03,919
I mean, yeah, it's supercharged with AI,

574
00:58:04,100 --> 00:58:05,479
but it's the same basic principle,

575
00:58:05,479 --> 00:58:06,919
which is, you know,

576
00:58:07,359 --> 00:58:09,479
should people be allowed to go into a library

577
00:58:09,479 --> 00:58:11,839
and learn about biology?

578
00:58:12,200 --> 00:58:13,939
They maybe will make a bioweapon

579
00:58:13,939 --> 00:58:15,720
or what if they learned about chemistry?

580
00:58:15,720 --> 00:58:16,859
They could make a bomb.

581
00:58:16,939 --> 00:58:24,100
So it's like it's really about do we believe knowledge, education, self-determination?

582
00:58:24,640 --> 00:58:31,479
Are those things worth the risks that somebody might get educated and get knowledge and use that for bad?

583
00:58:31,479 --> 00:58:59,859
But like as the West, as the inheritors of the Western liberal tradition, we believe in free knowledge that the good that will come to humanity from people being able to educate themselves and learn and understand will outweigh the bad of being in a world where only the elite have knowledge, where, you know, it's back before Gutenberg's printing press.

584
00:58:59,859 --> 00:59:04,620
And you have to learn Latin to read the Bible, like the gatekeeping, the control.

585
00:59:05,799 --> 00:59:12,100
You know, as Bitcoiners, we believe that that is more dangerous than the individual having freedom.

586
00:59:12,319 --> 00:59:16,859
And so this is now emerging in this AI safety debate.

587
00:59:17,979 --> 00:59:21,280
But so that explains how we lock it down.

588
00:59:21,479 --> 00:59:24,879
But the flip side is, well, how do we get the power back?

589
00:59:25,120 --> 00:59:28,080
Because if it's totally isolated, it's totally locked down and everything.

590
00:59:28,080 --> 00:59:35,439
okay that's great but now it can't actually do all the cool open claw stuff right so what we do

591
00:59:35,439 --> 00:59:42,620
is basically let's say that guardian ai um and you can talk to it over the internet it has you

592
00:59:42,620 --> 00:59:50,339
have a full end-to-end encrypted connection from your phone um to that space but it can't um the

593
00:59:50,339 --> 00:59:57,580
only only not right yeah and it only um it can't make arbitrary the guardian ai can't make can't

594
00:59:57,580 --> 01:00:02,060
access the web. It can't make arbitrary network requests. It can only engage in this conversation

595
01:00:02,060 --> 01:00:09,899
through the chat app with you, authenticate with your keys. So maybe it decides, hey, you know,

596
01:00:09,979 --> 01:00:16,600
I want to build a to-do list app or I want to build a health tracking app because, you know,

597
01:00:16,600 --> 01:00:21,979
it seems like Sean is really focused on exercise, you know, like part of the magic of OpenClaw is

598
01:00:21,979 --> 01:00:27,399
how it's proactive and just kind of makes stuff for you. So we want the Guardian AI to be able to

599
01:00:27,399 --> 01:00:34,519
spawn those projects, but it can't build it itself because then it would need the network

600
01:00:34,519 --> 01:00:35,120
access.

601
01:00:35,799 --> 01:00:41,419
Because to build a good to-do list app, you have to read docs and pull down code and...

602
01:00:41,419 --> 01:00:42,499
Design patterns, all the good stuff.

603
01:00:42,919 --> 01:00:43,220
Yeah.

604
01:00:43,499 --> 01:00:50,439
So instead, what it can do is it can spin up a builder agent.

605
01:00:50,439 --> 01:00:56,280
And the builder agent lives in its own isolated virtual machine.

606
01:00:57,399 --> 01:01:02,899
And the builder agent's virtual machine does have internet access.

607
01:01:03,799 --> 01:01:28,330
But it doesn in that virtual machine it has no access to private data at all And it can send free form information back to the Guardian We have structured typed APIs where the builder agent could send predefined messages back like the work is done or there a

608
01:01:28,330 --> 01:01:34,330
blocker or whatever. So there's no prompt injection risk because it's choosing from a menu of, oh,

609
01:01:34,330 --> 01:01:39,349
I can say these 10 things back. And is there, Jesse, by the way, I'm curious. And I mean, I

610
01:01:39,349 --> 01:01:45,769
have a good computer science background. I can sort of track. But I wonder if there is not a flex,

611
01:01:45,769 --> 01:01:52,389
just an explanation. I caught myself. Is there a real world blueprint for this? I mean,

612
01:01:52,490 --> 01:02:01,709
is there an analogy in which parties would operate this way in the real world? Or are we in

613
01:02:01,709 --> 01:02:05,570
sort of a new realm here. I imagine it's the former, but I'm not sure.

614
01:02:06,330 --> 01:02:08,689
Well, no, it's very much the isolation of concerns.

615
01:02:09,530 --> 01:02:14,209
Yeah. I mean, you see it in, you know, something like the Manhattan Project,

616
01:02:15,249 --> 01:02:21,550
you know, where it's like each person working on the system only knows the one thing they need to

617
01:02:21,550 --> 01:02:26,450
know to get their job done and they know nothing else. They have the or, you know, computers,

618
01:02:26,929 --> 01:02:31,229
computer security. We talk about like principle of least privilege. Like if you're setting up a

619
01:02:31,229 --> 01:02:38,169
bunch of AWS services or accounts, every single thing gets the least amount of power, the least

620
01:02:38,169 --> 01:02:46,249
amount of data it needs to do its one specific job. Another way of thinking about it is let's say

621
01:02:46,249 --> 01:02:57,010
you hired an engineer to build you a to-do list app. You don't need to give that engineer any

622
01:02:57,010 --> 01:03:00,209
private information for them to build you the app.

623
01:03:00,649 --> 01:03:02,010
Yeah, they're not populating the to-dos.

624
01:03:02,229 --> 01:03:03,349
They're just building the, yeah.

625
01:03:03,689 --> 01:03:04,209
Exactly.

626
01:03:04,669 --> 01:03:06,830
So the to-do items are private.

627
01:03:07,550 --> 01:03:09,070
The app itself is not.

628
01:03:09,849 --> 01:03:11,889
So it's the same principle here.

629
01:03:11,889 --> 01:03:18,950
And what's cool about this is now we can also bring in the power of the cloud frontier models

630
01:03:18,950 --> 01:03:25,510
without the privacy security risk, because that builder AI, since it doesn't, it's not

631
01:03:25,510 --> 01:03:33,109
privacy sensitive what it's doing um if you could you can use your local model but if you want

632
01:03:33,109 --> 01:03:41,950
opus 4.6 or codex or whatever you can spin that up and you're good like you have i tell you i have

633
01:03:41,950 --> 01:03:47,129
to say that's the greatest hook in my mind right because that's what i wrestle with you know is i

634
01:03:47,129 --> 01:03:55,830
I'm a hypocrite. I pay way more. I pay the Claude Pro Max plan, you know, every month and I try to

635
01:03:55,830 --> 01:04:02,310
exhaust it and every and I know I'm a hypocrite. Right. So I think, you know, I think that is super

636
01:04:02,310 --> 01:04:08,129
interesting. And I think, you know, tell me, but it seems so much for those of us who are building

637
01:04:08,129 --> 01:04:14,030
with Claude or otherwise. And we are not software engineers. I am not a software engineer.

638
01:04:14,030 --> 01:04:23,269
whatever inclinations or instincts I have, it gets mushy. And so the architectural constraints,

639
01:04:23,269 --> 01:04:30,030
I suppose, that you've enforced here probably lead to better outcomes, objectively, not just

640
01:04:30,030 --> 01:04:39,550
more private and secure outcomes. Absolutely. And I think this is where the Bitcoin security

641
01:04:39,550 --> 01:04:46,369
security mentality is so key here because there's a ton of stuff out there already where people are

642
01:04:46,369 --> 01:04:51,729
like, oh, we made open clause secure. You know, there's like iron claw or the security audit.

643
01:04:52,189 --> 01:04:58,510
And like everyone's racing out there with a bunch of like bullet points and band dates.

644
01:04:58,669 --> 01:05:01,589
Ultimately, I mean, you know, respect. We're early, but they're band dates.

645
01:05:01,589 --> 01:05:07,749
Yeah. Like good. It's good that people are working on this stuff, but it is band dates and it doesn't

646
01:05:07,749 --> 01:05:16,909
like as bitcoiners we are experts at finding the squishy stuff you know for most people's security

647
01:05:16,909 --> 01:05:23,269
information security or computer security it doesn't need to be like can't be evil

648
01:05:23,269 --> 01:05:28,290
cryptographically locked down like what's the worst that could happen yeah but it's like i get

649
01:05:28,290 --> 01:05:33,929
six months of free credit monitoring exactly so it's like something in the middle that's like

650
01:05:33,929 --> 01:05:39,510
better than nothing is fine. But like when we comes to Bitcoin, like we have the highest standards.

651
01:05:39,510 --> 01:05:45,510
It's like these keys cannot get hacked. Yes. Period. And I got to think about supply chains.

652
01:05:45,510 --> 01:05:50,389
I got to think about this. I got to think about everything. Right. So that's that's what's missing

653
01:05:50,389 --> 01:05:56,369
with the current open clause stuff is they'll defend against prompt injection by trying to like

654
01:05:56,369 --> 01:06:02,609
sanitize the output or feed it through a summarizer or there's even, you know, or they'll give it to

655
01:06:02,609 --> 01:06:07,609
like a security agent to review it and pass it off or they'll do like.

656
01:06:07,749 --> 01:06:08,950
But it's turtles all the way down.

657
01:06:09,109 --> 01:06:11,350
The security agent in turn needs a security agent.

658
01:06:11,869 --> 01:06:12,409
Exactly.

659
01:06:12,409 --> 01:06:15,950
And so it's like it catches some of the stuff.

660
01:06:16,290 --> 01:06:22,429
But if it doesn't catch everything, like it only takes one breach.

661
01:06:22,869 --> 01:06:28,450
Like if a thousand are thwarted and one comes through, you're screwed.

662
01:06:28,450 --> 01:06:48,350
So our architecture and our thinking is, no, we need firm guarantees. We don't want, oh, this will probably work or this helps. Like, we want deterministic, isolation, boundaries, cryptographically verified credentials.

663
01:06:48,350 --> 01:06:57,269
like, and I know for sure that that Guardian AI is not prompt injected. Like, I don't have to worry

664
01:06:57,269 --> 01:07:05,530
about it. I don't have to think about it. Like, by design, by architecture, it is guaranteed to

665
01:07:05,530 --> 01:07:11,689
be secure. Fascinating stuff. Really, really fascinating. Well, I do, Jesse, want to push out

666
01:07:11,689 --> 01:07:18,790
into the frontier and have, I think, a really fun part of the conversation. Before we do,

667
01:07:19,389 --> 01:07:27,729
where are you in the lifecycle of Vora? So, you know, how much of what we've discussed is imminent

668
01:07:27,729 --> 01:07:34,389
in perhaps limited testing and is five years or more out? You know, where should we sort of expect

669
01:07:34,389 --> 01:07:35,889
to see what time horizon?

670
01:07:37,109 --> 01:07:41,990
So we're going to ship our AI product this year.

671
01:07:44,229 --> 01:07:45,889
And this is going to come out

672
01:07:45,889 --> 01:07:49,070
before our Bitcoin self-custody product

673
01:07:49,070 --> 01:07:54,669
because it lets us take some of the tech

674
01:07:54,669 --> 01:07:57,070
that we've already built for the Vora Vault

675
01:07:57,070 --> 01:07:59,050
and spin it off as its own product

676
01:07:59,050 --> 01:08:10,129
with hardware that is where we don't have to invent and manufacture completely new types of hardware.

677
01:08:10,589 --> 01:08:11,909
When the stakes are lower, right?

678
01:08:12,030 --> 01:08:15,409
I mean, protecting AI versus protecting the entirety of my wealth.

679
01:08:16,450 --> 01:08:16,970
Exactly.

680
01:08:16,970 --> 01:08:26,950
So it lets us get to market faster at this very critical moment, this kind of open claw moment.

681
01:08:27,230 --> 01:08:27,529
Sure.

682
01:08:27,529 --> 01:08:38,489
And the other really exciting thing about it is this is our opportunity to get the mainstream interested in self-custody in a way they never have before.

683
01:08:39,089 --> 01:08:42,730
Because now people, they're buying the Mac minis, they want the open clause.

684
01:08:43,169 --> 01:08:45,850
And so they're starting to get into like, oh, I want a home server.

685
01:08:45,989 --> 01:08:46,629
I wanted this.

686
01:08:46,690 --> 01:08:47,390
I wanted that.

687
01:08:47,890 --> 01:08:50,770
And I want it to be private and I want to be secure.

688
01:08:50,770 --> 01:08:55,850
So like we're trying to draw people in and say, oh, there's this cypherpunk thing.

689
01:08:55,930 --> 01:08:57,249
There's this self-custody thing.

690
01:08:57,529 --> 01:09:03,009
And kind of finally make that relevant to the average person in a way that it hasn't before.

691
01:09:03,310 --> 01:09:22,870
And then meanwhile, our more ambitious product that is going to come out next year, the Vora Vault, that will have cold storage for AI and do your Bitcoin and have the air gaps and the supply chain and all of that, which eventually will need for AI as the AI stakes get higher.

692
01:09:22,870 --> 01:09:23,370
Absolutely.

693
01:09:24,009 --> 01:09:30,370
But require is a longer and more capital intensive process to develop that product.

694
01:09:30,569 --> 01:09:32,749
So that's the current sequencing.

695
01:09:33,629 --> 01:09:34,489
Makes sense.

696
01:09:34,830 --> 01:09:44,890
And as you were saying that, I'm thinking about, you know, the newest low key flex in my signal messages is somebody taking a selfie with the Mac mini at the Apple store.

697
01:09:45,209 --> 01:09:46,249
This is crazy.

698
01:09:46,249 --> 01:10:06,509
And I actually, this is a tangent, but for those of us that were around, you know, maybe early web, late 90s, early 2000s, there were hosting companies stacking whatever that, whatever that blade Apple made for a brief period of time, you know, and they were hosting like consumer Macs.

699
01:10:06,549 --> 01:10:12,109
It's back, you know, there I've seen two companies that are spun up to basically host Mac minis.

700
01:10:12,709 --> 01:10:14,529
But, well, let's go here, Jesse.

701
01:10:14,649 --> 01:10:18,830
So you have, this is the part I think we're both going to probably have a lot of fun with.

702
01:10:19,890 --> 01:10:22,089
You've said the modern state has already collapsed.

703
01:10:22,230 --> 01:10:23,730
It just doesn't know it yet.

704
01:10:24,390 --> 01:10:26,770
So what do you mean by that?

705
01:10:27,310 --> 01:10:33,749
And what does Bitcoin and AI have to do with it in the sense of the bigger vision of Vora?

706
01:10:34,129 --> 01:10:38,629
And what I know you and your co-founder, Eric Kaysen, see coming.

707
01:10:40,149 --> 01:10:41,209
Yeah, that's a great question.

708
01:10:41,209 --> 01:11:02,709
You know, the kind of key insight there is that whenever the fundamental technology around information changes, the entire political system changes along with it.

709
01:11:02,709 --> 01:11:08,589
not just information technology, but also when there are fundamental changes to

710
01:11:08,589 --> 01:11:18,690
our experience of the spatiality of the world. It's a little abstract, but topos and nomos

711
01:11:18,690 --> 01:11:25,129
are related. So topos is space. Nomos is law. When the topos changes, the nomos changes.

712
01:11:25,129 --> 01:11:36,830
So, for example, you know, from a certain perspective, you can't have a legal system without a map.

713
01:11:37,509 --> 01:11:42,730
Like to declare sovereignty over a territory requires a map of that territory.

714
01:11:42,930 --> 01:11:53,310
Or, for example, in the high seas, where you can't easily draw boundaries and lines, you can't have sovereignty.

715
01:11:54,249 --> 01:12:01,749
So land, space are integral to how we think about politics, law, sovereignty.

716
01:12:02,089 --> 01:12:07,290
When the new world was discovered, that fundamentally changed the nature of politics and law.

717
01:12:07,649 --> 01:12:10,449
When the whole globe was mapped, all these things.

718
01:12:11,230 --> 01:12:17,609
And then, you know, from an information perspective, the Gutenberg printing press is like the key example.

719
01:12:17,609 --> 01:12:21,169
You completely change how information is distributed and accessed.

720
01:12:21,169 --> 01:12:27,609
And then a few hundred years later, the church is no longer the political hegemon anymore.

721
01:12:27,609 --> 01:12:47,529
So when we think about this moment that we're in, which is the internet moment, is both the most fundamental revolution and change to information, how information flows throughout the planet, and space.

722
01:12:47,529 --> 01:12:52,810
because we now have a completely new space, cyberspace.

723
01:12:53,629 --> 01:12:56,270
Like not only is it that we found a new part of the planet,

724
01:12:56,410 --> 01:12:59,690
like we literally have a completely different category of space

725
01:12:59,690 --> 01:13:02,270
that is now dominating the world.

726
01:13:02,270 --> 01:13:06,330
And I think anybody who has some memories from the analog world,

727
01:13:06,850 --> 01:13:09,850
you know, grew up in the 80s or 90s or before,

728
01:13:10,370 --> 01:13:12,989
like that was literally a different world.

729
01:13:12,989 --> 01:13:21,709
we are in a different space now we're in a different dimension everything is fundamentally

730
01:13:21,709 --> 01:13:30,350
different and that's accelerating we're feeling that with ai but the state is still a creature of

731
01:13:30,350 --> 01:13:35,089
the old world that's where it was born that's where it was created that's how it functions

732
01:13:35,089 --> 01:13:40,509
that's how it feels right like you interact with the post office or irs or whatever it's like

733
01:13:40,509 --> 01:13:47,690
this feels like it should belong in a history book it doesn't feel native to our world anymore

734
01:13:47,690 --> 01:13:55,910
it is otherworldly yeah and all the dynamics like we see it in the election cycles like social media

735
01:13:55,910 --> 01:14:04,509
memes like the way power flows on the planet the way the political dynamics are determined

736
01:14:04,509 --> 01:14:12,830
is now radically shifting, changing, moving into the internet, moving into cyberspace.

737
01:14:13,230 --> 01:14:19,509
And Bitcoin is one of the most amazing examples of that, of a completely new form of politics,

738
01:14:19,509 --> 01:14:27,190
law, sovereignty, community, identity, native to cyberspace, native to the internet, as one

739
01:14:27,190 --> 01:14:36,770
of the early and most important examples of the new breed of politics in contrast to the old one,

740
01:14:36,770 --> 01:14:42,249
which is the nation state. So that's where this kind of vision comes from, where the nation state

741
01:14:42,249 --> 01:14:50,949
system is like a dead man walking, that the ground has already shifted and we're just seeing

742
01:14:50,949 --> 01:14:53,350
the slow collapse.

743
01:14:53,810 --> 01:14:55,350
Hard to argue with any of that.

744
01:14:55,449 --> 01:14:57,350
And so let's wrap it up here, Jesse.

745
01:14:57,549 --> 01:15:01,109
Fast forward five years, 10 years.

746
01:15:02,290 --> 01:15:07,989
Given the backdrop you've just laid with both sort of state of Bitcoin, of AI,

747
01:15:08,390 --> 01:15:18,669
capabilities, protection, and the, I certainly hope, the sloughing off of a lot of the,

748
01:15:18,669 --> 01:15:26,169
you know, the old world, the nation state, as it were. What does a day in the life of a Vora user

749
01:15:26,169 --> 01:15:32,669
look like in hell five years, much less 10? Yeah, well, it's it's it's a pretty good situation

750
01:15:32,669 --> 01:15:43,089
because you have you're in a world where you're you're supported by decentralized communities and

751
01:15:43,089 --> 01:15:50,989
less so controlled by large central institutions. We don't have these mega totalitarian states.

752
01:15:51,749 --> 01:15:59,609
We have affiliations of small communities that use the network to organize projects together

753
01:15:59,609 --> 01:16:06,830
rather than centralized institutions. So you have a lot of freedom about where you live and the kind

754
01:16:06,830 --> 01:16:12,129
of roles you're going to operate in and what you're able to do on your own property and your

755
01:16:12,129 --> 01:16:21,790
own home. It's a world without mass surveillance where what happens in your mind, what happens in

756
01:16:21,790 --> 01:16:28,049
your home, what happens in your personal sacred space belongs to you. And we no longer have this

757
01:16:28,049 --> 01:16:35,249
feeling that everybody has, whether unconsciously or consciously, that we're being watched,

758
01:16:35,249 --> 01:16:42,089
we're being monitored. Does somebody know this about me? Did somebody see this? It's become

759
01:16:42,089 --> 01:16:48,730
just the default low-level anxiety embedded in our consciousness that we're in this surveillance

760
01:16:48,730 --> 01:16:56,910
world. So that's gone away. And you have at your home, you have secure, verifiable hardware

761
01:16:56,910 --> 01:17:04,290
that powers and protects your digital life, that runs your Guardian AI, that has your physical home

762
01:17:04,290 --> 01:17:09,410
security system with your drones, that manages everything that's happening in your home,

763
01:17:09,410 --> 01:17:24,810
All your energy systems, your solar panels, your batteries, everything is run with open source, secure, verifiable hardware with no vendor lock-in that's easy to use.

764
01:17:24,810 --> 01:17:37,049
and you feel incredibly empowered as an individual to use this amazing world of abundance to create

765
01:17:37,049 --> 01:17:42,509
whatever it is you want in the world and to use your ai or use your 3d printers or use

766
01:17:42,509 --> 01:17:50,390
and and to connect with other people and there's this real potential for a renaissance

767
01:17:50,390 --> 01:17:59,069
that we can move into a world of creativity and building and problem solving and that our time

768
01:17:59,069 --> 01:18:09,390
and energy isn't as sucked away towards things that don't benefit us or are serving other people.

769
01:18:10,390 --> 01:18:16,609
You know, a lot of people talk about this fear about AI taking away jobs.

770
01:18:16,609 --> 01:18:34,409
And there's this sense of, well, you know, if somebody doesn't have a job, like they're just going to completely freak out and melt down because if somebody isn't telling them every second of the day, you have to do this or else, like people can't handle that, you know?

771
01:18:34,409 --> 01:18:56,270
And it's really strange to me because all of the liberal arts, music, philosophy, all of it was created out of leisure. It's when people are actually freed to pursue the things that they find the most meaningful and inspiring, that we actually get the best work.

772
01:18:56,270 --> 01:19:01,330
And as humans, we're good at figuring out how to task ourselves.

773
01:19:01,870 --> 01:19:06,470
I don't need a master to come over and tell me, dig this ditch all day.

774
01:19:06,549 --> 01:19:09,010
Otherwise, I'll just be sitting on the couch playing video games.

775
01:19:09,169 --> 01:19:13,089
It's like, if I've got a full day ahead of me, I'm going to create stuff.

776
01:19:13,169 --> 01:19:14,049
I'm going to build stuff.

777
01:19:14,129 --> 01:19:15,069
I'm going to do stuff.

778
01:19:15,690 --> 01:19:23,350
So that's the AI world we want, a digital world we want, one that is not at the expense

779
01:19:23,350 --> 01:19:31,790
of our humanity, but actually helps our humanity flourish. And that's kind of the fork we're in

780
01:19:31,790 --> 01:19:38,909
right now, in the future. One is the dehumanized world. We all have chips in our brains. Everything's

781
01:19:38,909 --> 01:19:46,290
tracked. Everything's monitored. No free thought. Top-down, central control. We become the AI. We

782
01:19:46,290 --> 01:19:52,850
become the machine. We lose our humanity. That's one direction. And then the other direction

783
01:19:52,850 --> 01:20:00,230
is we have all the technology, we have the internet, we have the AI, but it is human

784
01:20:00,230 --> 01:20:07,249
flourishing because it's private, it's decentralized, it is verifiable, it's self-sovereign.

785
01:20:08,149 --> 01:20:08,489
We own it.

786
01:20:08,489 --> 01:20:18,989
We own it. And Bitcoin is giving us that blueprint, not just for money, but for the future,

787
01:20:18,989 --> 01:20:38,709
The technological future where humanity is at the center of it, because Bitcoin ultimately embeds humanistic values into its engineering and into its technology and is why it's such a stark contrast from all the other technology we're used to interacting with.

788
01:20:38,709 --> 01:20:50,749
So that is the vision and the inspiration that our community needs to keep pursuing and keep aggressively doing this because this is our moment.

789
01:20:51,190 --> 01:20:54,569
And we do not want to go down the other direction.

790
01:20:55,129 --> 01:20:57,489
LFG. This is the white pill we needed, Jesse.

791
01:20:58,649 --> 01:21:00,970
I appreciate it, man. Super exciting.

792
01:21:02,149 --> 01:21:04,109
Yeah, can't wait to get my hands on it.

793
01:21:04,109 --> 01:21:08,169
And so we will make sure everybody knows where to track you.

794
01:21:08,489 --> 01:21:10,629
And I appreciate your time, Jesse.

795
01:21:10,730 --> 01:21:13,310
Really excited to see how everything unfolds.

796
01:21:14,029 --> 01:21:15,730
So nice chatting with you, Sean.

797
01:21:15,790 --> 01:21:16,510
Really enjoyed it.

798
01:21:16,909 --> 01:21:17,310
Thank you.

799
01:21:17,350 --> 01:21:18,190
Have a great weekend, Jesse.

800
01:21:18,609 --> 01:21:18,970
You too.

801
01:21:19,390 --> 01:21:19,850
Take care.

802
01:21:19,850 --> 01:21:20,770
Bye.

803
01:21:34,109 --> 01:21:35,350
Thank you.
