hey guys and welcome back to my channel
girl gone crypto I have a really exciting guest Colin Cantrell of Nexus so Colin
thank you so much for joining me on the show today we’re having so now I have to
say that I this is just really a huge honor because I think the work you guys
are doing at Nexus is really quite extraordinary and our whole stuff to say
that this is pretty exciting because I have actually gotten so many requests
from my audience to have you on and so just to start out can you give us an
overview of what Nexus is and what you guys are up to over there yes so I
usually start with the definition of Nexus which means a connection or series
of connections I’m leaking two or more things that’s where the project is
called Nexus because it’s kind of a collection of I guess a lot of projects
so I mean the fundamental baseline of it is the crypto currency and the
blockchain aspect but we kind of combine together a lot of different things such
as you know developing organic certification standards you know on the
blockchain or even developing our own alternative
energy systems alternative communication systems so it’s kind of a nexus of
projects I guess you can say that are really just fundamentally based around
the concept that fucking Minister polar stated on that you don’t change things
by fighting the existing reality you change things by making a new model that
renders the existing model obsolete and so that’s Nexus and so what is it that
you guys do um so the I guess the most of what we do is in actual blockchain
space so we have developed a new blockchain from scratch we’ve been
around since 2014 for those that don’t know and it’s designed to essentially
make smart contracts something that are I guess more usable for people right now
there’s this kind of I don’t want to say blue sky but it’s very complex in order
to utilize them and a lot of the the architecture that other blockchain is
used like aetherium or Yost’s are actually using kind of language designs
that are based off of more web I’m rather than actual contract
languages so we’ve designed type of smart contract engine that actually is
capable of scaling and does a lot of useful things such as managing assets
decentralized exchange I can enter into a contract between you if I like let’s
say want to send an invoice or I want to go through escrow or I want to sell you
my house or things like that so it’s kind of it’s kind of an interactive
smart contract system I guess is the best way to say it
but also one that skills I think our processing capabilities are 5,000 to
45,000 contracts per second is generally what we’re seeing on the trading
protocol and so that’s kind of the first first focus that we have is let’s take
these smart contracts and make them something that people can actually look
touch and feel right now when you send a transaction with a nexus wallet it has a
smart contract in there it allows you actually reverse the transaction if it
expires so if you send to an address or somebody’s wrong address and they never
claimed it within the said expiration time you’re actually clean those funds
back to yourself so that help kind of segue into the second thing that we
focus on is the usability for the end-user not just with the smart
contracts but for cryptocurrency as a whole I’ve noticed a lot of drawbacks
especially helping non-technical people start their wallet you know dealing with
a wallet file dealing with backups having to manage all those things if you
don’t make you know frequent enough backups you could lose coins if you send
to an invalid address the coins could be gone so everybody usually sends the test
transaction first right so we’ve developed what’s called signature change
which are a decentralized login system that essentially allows you from any
computer to log in and that’s kind of designed to feel more like your online
bank because cryptocurrency is eventually gonna replace the banking
system so we kind of believe that in order to reduce our learning curve for
people to make it something that’s streamlined with what they’re already
used to so that also adds other benefits to any other sort of application that
wants to start enhancing their system with blockchain logic they can
essentially just use the blockchain login system on top of their existing
login system and give people access to without the user actually having to have
any changes done in that the keys actually having to be
stored on the service so we believe it it definitely makes it a lot easier for
people to use and it makes it something that people are more used to and all of
the way around I mean it’s essentially designed to help kind of bring
cryptocurrency to the next level um which is you know essentially what the
tritium protocol is and that’s the first step of three which is called the Tao
framework which goes tritium I mean and then obsidian and that essentially is
unlocking our multi-dimensional chaining architecture which essentially is our
scalability solution that allows things to happen on chain without having
to make any sacrifices of centralization because there’s the block train trilemma
which vitalik you Taran actually coined the term with it states that only two
three are able to exist in a blockchain system and that security scalability and
decentralization so generally somebody will always you know essentially take a
loss on one of those three in order to have an effective blocking system but
with our multi-dimensional chaining architecture we believe that we have
actually solved this trilemma um in order to essentially scale the protocol
in a decentralized way while also allowing it to be secure so that’s some
of the basic computational technology that we work on but we also are focusing
on satellite technology which is the applying blockchain like game theory
incentive mechanisms into deployment of hardware so that essentially I’m just
the same ways people build a blockchain you know and they are rewarded for doing
the same I’m you could do the same thing with mesh networks or satellites so that
essentially we developing our own communication protocols and so the nexus
software is part of which will help aid in that just as it aids in the
development of the blockchain system itself so you guys have your hands in a
few different buckets a lot of different areas and I kind of want to touch on
something that you mentioned a second ago because one of the things that I
think most of us in the space can kind of agree on is that there’s a really big
learning curve when it comes to figuring out how to buy
and sell and move around crypto and like for someone coming into the space
learning how to use a hardware wallet is is that still kind of like a nerdy thing
that is you know just not really intuitive and so I think that the
decentralized login system that you mentioned about creating a user
experience that feels more like just logging into your normal bank account
but still has that security feature of the blockchain can you talk like a
little bit more on that and how that works and what you guys are doing there
yeah absolutely so that’s so I guess the first the first
I guess benefit of it is you have a decentralized login system but there’s a
lot of other benefits as far as security underneath the hood one of them is
actually quantum resistance so we actually using a sig chain you actually
are resistant to quantum computers which are coming out and then another thing is
that you essentially don’t ever get bound to one specific key so when you’re
dealing with YouTube so or any legacy blockchain your Hardware wallet or your
wallet dot that file is basically storing these private keys on your
computer or on that actual device and so what ends up happening is if that key is
ever compromised or lost your funds are completely gone but with the sig chain
we actually decouple the key from the account identity so a Sikh chain can
have anything on I mean you can create assets you can create registers you can
have tokens you can have token accounts I mean there’s a lot of things that’s so
there’s no limitation on a situation of what you can do but what it also does is
it essentially as I was saying decouples is key from the identity so that we’re
actually changing the private key every single transaction which also gives you
more assurance that it’s gonna be more secure because the vulnerability period
of that public key even to a quantum computer is around five seconds rather
than with Bitcoin or anything once you essentially make a transaction and spend
an input or an output what that public is revealed which means that you know if
you have a quantum computer you’re able to crack that and then once that key is
compromised all of the funds in that address are compromised forever in this
way think about the authentication of the private key but with
Atika identifiers so you have an account identifier called the Genesis ID and
that I can identifier never changes and that’s how you’re actually able to prove
your ownership and then you have two ways to authenticate yourself you have
an X – 2 recovery hash so the way it’s working under the hood is we’re actually
taking your username and a password and a pin and we’re running it through a
special hashing function called argon – which that’s a memory hard password
function which basically means that the the difficulty in generating that hash
comes it’s bound by your memory of your computer so this way if people have
FPGAs or a6 or these you know supercomputers essentially designed for
cracking encryption they won’t have any advantage over a conventional laptop and
so that essentially gives us brute force resistance in a decentralized way
because when you’re talking about a decentralized login system if you
attempt a password you no more than three times you can get locked out of
the system in a centralized way but there is no central authority that is
deeming your credentials are valid or not it’s essentially you’re in a
contract with mathematics in a way you’re you’re saying you know the access
of my state chain has to prove that I’ve created this public key and you have to
generate not only that hidden input but you also generated a signature from that
private key opt to authenticate yourself so essentially you’re getting all of the
benefits of the public key cryptography but you’re actually making it even more
secure because you’re never reusing a key more than once which and you’re
never revealing that key until you actually use it and by the time you use
that key then you’ve already assigned your stake chain and another key so that
key therefore becomes invalid once you essentially reveal it so even with the
quantum computer you’d have a very difficult time actually cracking a suit
change so your username and password and pin as I was saying go through the argon
– hashing function which to generate a 512 that hash which is then used as a
secret to generate your new private key which then generates the public key and
then you hash that public key and that creates your authorization hash so to
law again essentially what I’m doing is I’m typing in my username password and
pin it runs for that special argon – hashing function and that generates the
private key and the generator ISA public key and then
authenticate that data and I hashed that public key and make sure that it is
equivalent to my next stash right which is my authorization hash and that’s your
general login system that’s essentially how you’re able to log in and also
change your password or PIN at any time and then the second way is with the
recovery system that we developed and that’s a separate type of hash that is
independent of the password so if you forget your username or password or and
at any time you’re able to actually recover your account even if that
account was packed so look I’m having in your account hacked would essentially be
the same as having a private key compromised in any legacy protocol in
this sense you’re able to actually still recover your account and prevent any
damages and lock somebody out that may have had access to that so you get a
higher level of security in that way and you get kind of the more natural I guess
utilities that are involved if you forget a password I’m generally you
don’t have to go and have your password reset but if there’s no central
authority to do that the only way to change through mathematics right so it’s
been very challenging but very fun at the same time to kind of integrate these
these different technologies together to create something that feels like what
we’re already using but actually having a function and it completely
decentralized so that’s essentially how that the sync chain architecture works
and then the other useful whole component of it is that we’re not since
your account isn’t bound to any specific heat anymore it’s only bound to the last
key that you’ve generated you can change your keys at any time which means if I
want to upgrade my key we allow the option for you to actually use post
quantum cryptography now if you’re extra extra paranoid I’m using it’s called
Falcon which is fast for your lattice based complex creatures over ntr you
witness it’s just a complex name of you know saying that this has no known
attacks from quantum computers so that’s another really useful thing too is that
at any time you can change your key with pickle and unfortunately once you have
that address that address is bound to the key for all time if the keys ever
compromised it’s gone you can’t ever change that key so that means if any
Bitcoin Keys become vulnerable to quantum computers well not if when they
become conservative yours then you’re pretty much Sol which
is a big problem because the quantum resistance problem is not necessarily
how should I sit there’s a lot of assumptions that you can prevent it from
happening or putting preventive measures in but since all of this is baked into
the Bitcoin protocol and all of these keys are actually already existing and
already used you’d have to essentially chain or transfer all of these coins out
of these old addresses into these new address is to get quantum resistance and
a lot of Satoshi’s actual coins are still held in open public keys so when
quantum computers come out even these old coins that have never moved may
start moving which is gonna be a big big problem I mean I think the general
consensus is that oh and when that problem comes to present itself that’s
when me that’s when we deal with it I hate this and says well you know that
may not be the best option we should probably take as many preventive
measures now to prevent against that as we possibly can so you have the
combination of using that post corner cryptography and also simply hiding near
public key until it’s actually used even if you’re using let’s do the brain pool
key you actually wouldn’t be able to hijack somebody searching even in this
upon a computer because you have a less than five second window to actually try
to crack that transaction because the transaction will propagate to the
network within three seconds so you have to try to crack that public key then
Rees on it and then create a new key and then a new transaction that’s
conflicting transaction with that one in less than five seconds but even then the
cool part about it is our our system actually basically when it goes into a
conflict resolution it detects something that was received first as the most
valid it doesn’t necessarily negate the other
one from being accepted in a block but if a block is created with a conflicted
transaction that block actually won’t be relayed either so there’s a lot of other
preventative measures even deeper into it
with that specific component so yeah yeah that’s that’s a change in a
nutshell they they provide all of these things and they also provide a
foundation for developing digital identities
all circling trust because we have trust based consensus um where you know
everybody has money but everybody has time so you actually earn a nexus
valuation based on your time you contribute to the network and of course
is invaluable buddy else so that essentially what
we’re doing is we’re actually taking new time and giving new money to new time
right the problem with the world right now is new time is bought by old money
and money doesn’t age right so when we’re doing cryptocurrencies now we’re
actually able to start giving people’s time back to themselves and the new
money or crypto is what is buying that new time and you’re also rewarded for
having that trust – by securing the network so that builds us a really cool
kind of like elevation in the internet now the Internet’s just anybody could be
anybody and we have no idea who’s who you know you could maybe you know talk
to somebody’s username but you don’t necessarily always know that that is who
you’re talking to you know you have hacking spoofing it’s just the internet
wasn’t really just when with security in mind it’s just designed to work and so
there’s a lot of these these centralized authorities doing other things like that
um that are kind of helping bridge that but now when you add this ledger over
the internet and you add trust and you have stake chains right then you have an
elevated level of trust on the internet so that eventually I see you know you
have log in with Google or log in with Facebook you know they’re most likely in
the future be a log in with Texas button or essentially you can actually use your
Nexus syncing as an authentication system for other services and then you
can carry that around with you and you also know that that account is not
regulated by a central authority you actually have complete control and
autonomy over your own data and your own account and that can also be used to
authenticate system for existing web services so it it kind of fits together
really well with everything but it also allows extensibility such as using
biometrics for your username generation your finger good things like that that
can help continually improve that so that essentially it just becomes
something that we’re already used to but it
I guess builds on the the security models of that and also builds the
autonomy for users so yeah that’s basically it in a nutshell
and so what you were just talking about with kind of creating or making the
internet more secure is that something that kind of layers on top of the
internet or is that a completely separate system or how do you see that
integration happening very good question so the internet it’s built on a stack
okay it’s called the OSI which stands for open systems interconnection and
this stack is essentially what they’ve used to standardize all of the existing
web technology so that’s composed of seven layers the bottom most layer is
the network layer then the next I’m sorry I’m thinking Nexus bottom layer is
your physical layer then the next layer is your data link layer and then the
next layer is your network and then your transports and then session and then
presentation and application so all seven of those layers essentially drive
every single web application that you do so we’ve developed a stack – called the
tritium software stack um in ours is seven layers as well but they kind of
interweave into the OSI instead of it sitting on top of the OSI like this it
kind of is adding sub items inside each one of these items so one could say that
it’s you know 14 layers of stack or whatever but it’s really kind of just
something that it fits together with the existing OSI and ours stack essentially
goes network then ledger then register then operate and then API and logical
and interface so essentially this technology with a ledger can actually
interweave with the existing Internet and then when we use something called
the locator identity separation protocol on the network layer what we do is as I
was saying earlier you have your Genesis study which becomes your account
identifier so your keys are decoupled from that now imagine that this
identifier also becomes your IP address but it’s an IP address that can follow
you everywhere right and what you’re doing is you’re decoupling not only the
identity right yet fire from the location because your IP
address as it exists now is essentially a locator it’s saying okay you’re in
this network in this place that’s how you can trace somebody by their IP
address so when you’re roaming between these networks you’re essentially gonna
be roaming over different arlok’s and you’ll essentially be able to be
logged in on your Nexus account on your phone but that’ll give you access to
your Eid that is static and does not change so that’s your first step right
because any web service that’s receiving any sort of request from anybody they’re
usually always logging the IP addresses they’re running them against possible
whitelist or blacklist and all those types of things but then again you don’t
ever really know um somebody can source a packet from another address it looks
like they’re coming from that address but they just never received a reply so
you have your account identifier you login and that gives you your Eid which
is your routing or your network level identity and then you also have a ledger
level identity that comes with your trust so that when any web service or
anybody is pinging my web service and I’m running this locator identity
separation protocol I’m obviously talking a nexus as well then I will be
able to identify and look up this users trust the time they’ve been around owns
what other services they’ve gotten to if they’ve ever had any you know attempts
against me or any of these types of things so that essentially now this IP
address doesn’t become this ephemeral this could be anybody this is a specific
individual and then when I was talking about the login with Nexus right with
the searching you’re able to generate the the key that allows you to sign for
your new or Lopes right which allows you to roam and have that static IP address
that’s associated with your account and that’s unique to you that means I can go
to another web services of course login with Texas and just by having access and
using my e ID that specific Yediot is allocated in my search pane I can be
authenticated and then I don’t even have to log in on that service because they
can authenticate me directly by over a few address because my IP address can
never change because it’s bound specifically to my online identity which
it is my suitcase right so it adds this really cool kind of layer of trust
on the internet that essentially removes our need for these these third parties
so it gives I guess more transparency to I mean where right now you have to go to
a you know I don’t know if you’ve ever set up an SSL certificate you have to go
and you know paste man tag to you know sign the certificate for you and then
say that they did their due diligence to verify you are you are
that’s because cryptography does that necessarily identify people you have to
have some sort of proof that a vista public key belongs to this person that
we’ve already identified since the sink Japan is sensibly a type of
identification system I’m a pseudo anonymous I should say though because
just because you are contacting with your secretary doesn’t mean that I know
it’s you right it just looks like a alphanumeric series of you know letters
and numbers then you tie this identifier with your also keys and then it acts
essentially kind of like a public key database where you don’t even need these
certificate authorities anymore and you can identify somebody with the
cryptography because the public keys associated with those accounts are
published on the ledger in a decentralized way that cannot be
manipulated right and and you take it a step further and say let’s say I create
a web service and you know I put the web service as a sig chain and then I use
the TNS system which is Thao name system and I own let’s say test Nexus dot IO
and I create a sick chain let’s just say the user name that owns test Nexus that
I do then you can authenticate not only to the web services domain ownership
through the blockchain but you can also verify the content on that website so if
they have copyrightable material that copyrighted material can actually be
water marks and that water more needs a hash that contains a register address of
something that that’s sink chain owns and I can verify the ownership of
digital content on the website it’s this way
that you know when you go to a website and it says this web page is unsafe you
know this is a self-signed certificate I imagine the web in the future when
SafeNet becomes more and more used being a type of warning hey this website
has you know on essentially this the content on this
website has no owner or something like that or these assets have any owners
that are verified copyrighted material or you know etc etc and then you can
also make sure you don’t get viruses because in that made of data for that
specific piece of content that has you know ownership and the licensing and all
of that you also have a checksum of the actual image that you’re downloading so
that even a hacker accessing somebody’s web service and hacking into the server
and trying to replace anything with different assets or different files
they’re not gonna be able to because everybody’s gonna start choking and
saying oh well hey this you know file was tampered with because I can see the
file was tampered with because I just look up the services sick chain and
they’re telling me that you know the checksum of this file is this and it
shouldn’t be so it’ll be a lot easier for people to detect people manipulating
web services hacking web services so that kind of all fully formulates into
what I’m called the safe net um and I imagine this type of technology being
something that really is gonna be fundamental in driving that and it takes
the Internet out of this I mean the internet it it’s very poor as it’s dark
and like but I mean I consider the internet right now mostly pretty dark I
mean you don’t know who’s who random IP address is anonymous people
you know I mean one person can be a hundred people if they wanna be right
and this kind of brings it I guess more into the light where you can start to
say okay well you know I can talk to you directly because I know and I can look
up your account and then the other cool thing with the locator identity
separation protocol is it also allows you to be accessible by your Eid at
anytime without the need for a central routing server so I can actually open a
direct peer-to-peer connection with you if I want to make a phone call to just
by no user name right I could call you by your user name if you have voice over
IP that essentially is using that D ID right so I mean there’s so many really
really really cool things that you can kind of build together in this and it’s
at least what we envision actually doing for the internet because I believe that
the Internet has been missing this piece this is a
huge missing component of the Internet to make it a safer place and you know I
I’m not necessarily sure I’ve seen some people talk about you know the trusted
layer on the internet and the trust in both but from what I’ve looked
technically most people haven’t really tackled it in a way that covers all all
layers all levels of it you know they’ll just drop something in and say oh hey
you know it works or you know have the idea that I could use a blockchain for
all these things but not necessarily with the technology to actually deliver
it there so what would actual adoption of this of the SafeNet look like would
it like how would someone start using it would be people personally opting in to
have a nexus login or what does this actually look like yeah I mean it’s
uncertain to me now exactly how it’s going to emerge but I imagine you know
further down the road essentially web services are gonna start adopting this
this new type of protocol essentially you know having their web service become
quote-unquote safe web service and then you’re gonna have to have some form of
adoption from web browsers that are gonna have to basically link into this
and start utilizing the Nexxus blockchain or whatever blockchain for
the verification of sorry some of these services and then people it’s just gonna
start with you know I’m using that basic account for my Nexus and I’m
transferring you know sending receiving and then there’s another dab that pops
up and I can start using that there’s maybe new web services you know
companies to start adopting it that started adopting SiC chain architecture
so yeah I imagine it kind of in the safe net safe net it’s gonna require users
essentially to demand it and if they require web browsers to support it um
where it eventually becomes the norm and unsafe web services are not so it’ll
obviously have to prove its value in a lot of different areas and I mean I’m
talking to some people that I have where I said you can’t scoop IP addresses
anymore with this system they just go you know so I think I think there’s a
lot of promise of seeing seeing a lot of this adoption I mean just simply a
merchant that has issues with no people doing chargebacks or fraudulent activity
you know spoofing IP addresses or hacking I mean all these types of things
that think of the low-hanging fruits where it can really start when you can
start to identify these people a lot more and you put that requirement upon
them then they’re gonna have less ability to wiggle in because they’re
gonna have less shadows to hide behind right and it’s gonna make services safer
so businesses are gonna naturally just start adopting that because they’re
gonna mitigate their risk and it’s gonna be cheaper for them to operate overall
because they’ll have less fraud yeah so one thing that I want to circle back to
that we talked about earlier in the conversation real quick because I think
it’s so huge and I want to make sure that people watching this didn’t miss
miss that is that when you were talking about the login system and how your
private Keys you would be like generated every time like honestly I think that
some of the biggest barriers to entry in the crypto market some of the biggest
pain points are this you know the whole you know if you don’t own your keys you
don’t own your coins right and it’s scary to people getting in that there’s
no customer service line there’s no account recovery that there’s all of
this kind of fear around losing their money and the fact that you guys are
working on both of those to where you don’t have that issue of losing your key
and there is actually an account recovery process and it’s more secure
it’s like more user friendly more secure like kind of a win-win so let’s say that
like what does a kind of adoption of that look like let’s say a legacy chain
like litecoin or something is like oh that looks good I wish we had that like
is there a way for current chains to integrate with this technology this is
the beauty of it so we just we just launched and activated the tritium
protocol on 11 this year so it’s about a month in now
and I guess you are you familiar with the etherium 2.0 upgrade process they’re
essentially building a completely new blockchain and you’ll have hearing about
it yeah so they’re they’re kind of going the the easier route which is you know
it’s just build a totally new blockchain and yeah of course it’s easier you don’t
have to deal with all the lacy stuff but we did we actually spent a lot more time
making it interoperate with you TXO or legacy type system so you can’t actually
still use private keys and well that’s on Nexus if you want if you’re one of
those types of people but it interoperates with those and it also
upgraded the entire legacy block train into the trading block chain so
essentially we upgraded to a completely new blockchain architecture over the
existing old architecture which means that there’s an upgrade path for anybody
and we did that partially for that so that anybody that sees this technology
says hey I want to upgrade to not only sick change for the fact that it’s so
changed but you know I want spark contracts and all this other stuff yeah
they can definitely upgrade I mean it’s not gonna be a like one for one cuz an
exodus I’m even on the legacy blockchain it’s still really really really
different than any type of Bitcoin variant it still has remnants of some of
the same architecture of utx O’s but it’s still pretty different so yeah they
could definitely do that or even using some of the text so like are what we got
it from ok the q2 wallet which I’m sure you from though that’s using all those
little cuties right um if you’ve used any alt coins a little wallet whatever
so it used to take us about 30 days to synchronize with the network we have
about 3 million blocks on the network’s been around since 2014 now gasps what
the performance is now with trio syncing from block 0 guess
how long it took so it used to take you 30 days
hmm I don’t know do you I won’t look down to add a 17 and a half minutes oh
wow oh wow that’s amazing it took so long to get it to be able to
do that just because I had to do so much architecture work under the hood but the
reason I said that is because um tritium is not you don’t have to always just
upgrade the tritium protocol if you want all the tritium because you can actually
still run I’m a tritium note obviously if you modify it to fit with your
consensus rules of your Ocwen and gain you know those benefits of the tritium
protocol – I don’t know if you’ve seen all the old Gucci wallets what’s the
usual startup time like 30 seconds to a minute the wallet did turn on and come
out right this sounds about right somewhere in there
yes so we got ours – less than a second steps I could put up time – yeah no
matter how big the blockchain is because we fundamentally went through and I mean
we originally were based off of a Bitcoin the Bitcoin code from about 2012
and basically went through it all and fixed it and changed some of the
architecture on it’s still maintaining some of the original consensus code
obviously and that’s why we get such incredible performance so it’s not just
something that you if you need new features you can use you can actually
use the the Nexus software as it stands and make it work over your existing
blockchain which could be for Bitcoin or any other type of course so I mean we
designed a lot of our software to be used by other people it’s we’re not the
type of people that are psycho hey you know like we’re you know gonna take this
and you know say it’s ours and say it’s okay because it’s open source or
whatever or you know we’re gonna keep our closed doors so that you know we
keep other people from using you know we want to really contribute to the rest of
the industry and I mean this technology itself can be used including the
database that I wrote from scratch just because the embedded database system
that they use called lovely be a Google has some issues with scaling and it
wasn’t designed for election applications so yeah I mean all aspects
of this code can be used for other projects
that see value and including like cloning Bitcoin and that’s kind of part
of our plan anyway is that if you know these legacy block chains start to
realize that they’re scaling limitations become such a big deal then they can run
the Tao framework over it with still start with tritium and then they’ll have
to upgrade it to a mean and then upgrade it to obsidian and we did it in three
parts because it’s a massive architectural overhaul and it all has to
be on the live network so you want to you want to stagger it you want to do it
bit by bit you don’t want to change too much at once otherwise yeah big big
problems happens so it’s it’s an upgrade path for any other watch chain including
Bitcoin if they decide that you know lightning network isn’t working out the
way they wanted to in this era you know Nexus as the 3d see they can upgrade the
Bitcoin blockchain it’s user3 to see if they want as well well Colin I feel like
we could probably keep talking for hours but thank you so much for taking time
out of your busy day to come on and hang out and chat with me so do you have any
is there anything any final words you have for the people is sitting before we
go um yeah I’ll just always to say what I’ve usually been saying
do not forget why we are here we are not here to make money we are here to change
things it is not about the money the money is only a means to that end
so do not forget why were you here and why Satoshi created Bitcoin because the
world needs this the world needs the freedom I mean it’s so far beyond just
like our luxuries right now I mean the world needs it and the world needs more
people to see that and to hold that space for the entire industry because
I’ve seen a lot of people maybe get stuck in the money and
a lot of projects that have just essentially become the same thing that
we created crypto from so yeah just don’t ever don’t ever forget that
and you too if you can you know spread it to spread the word
you know like keep keep true to the roots of crypto because crypto needs it
who needs that as that’s really what’s gonna bring to change some more Colin
thank you again so much for coming on if people want to find you online and
connect with you where’s the best place for them to find you on Nexus dot io NEX
u.s. dot IO find just about anything there on the footer that’ll have all our
different social channels slack telegram or forum
come join the forum to we just set up a forum so yeah come help give us a smile
too as well it’s forum Nexus today Oh perfect well
there you guys have it thank you again so much Colin thank you