hey guys and welcome back to my channel
girl gone crypto I have a really exciting
guest Colin Cantrell of Nexus so Colin
thank you so much for joining me on the
show today we're having so now I have to
say that I this is just really a huge
honor because I think the work you guys
are doing at Nexus is really quite
extraordinary and our whole stuff to say
that this is pretty exciting because I
have actually gotten so many requests
from my audience to have you on and so
just to start out can you give us an
overview of what Nexus is and what you
guys are up to over there yes so I
usually start with the definition of
Nexus which means a connection or series
of connections I'm leaking two or more
things that's where the project is
called Nexus because it's kind of a
collection of I guess a lot of projects
so I mean the fundamental baseline of it
is the crypto currency and the
blockchain aspect but we kind of combine
together a lot of different things such
as you know developing organic
certification standards you know on the
blockchain
or even developing our own alternative
energy systems alternative communication
systems so it's kind of a nexus of
projects I guess you can say that are
really just fundamentally based around
the concept that fucking Minister polar
stated on that you don't change things
by fighting the existing reality you
change things by making a new model that
renders the existing model obsolete and
so that's Nexus and so what is it that
you guys do um so the I guess the most
of what we do is in actual blockchain
space so we have developed a new
blockchain from scratch we've been
around since 2014 for those that don't
know and it's designed to essentially
make smart contracts something that are
I guess more usable for people right now
there's this kind of I don't want to say
blue sky but it's very complex in order
to utilize them and a lot of the the
architecture that other blockchain is
used like aetherium or Yost's are
actually using kind of language designs
that are based off of more web
I'm rather than actual contract
languages so we've designed type of
smart contract engine that actually is
capable of scaling and does a lot of
useful things such as managing assets
decentralized exchange I can enter into
a contract between you if I like let's
say want to send an invoice or I want to
go through escrow or I want to sell you
my house or things like that so it's
kind of it's kind of an interactive
smart contract system I guess is the
best way to say it
but also one that skills I think our
processing capabilities are 5,000 to
45,000 contracts per second is generally
what we're seeing on the trading
protocol and so that's kind of the first
first focus that we have is let's take
these smart contracts and make them
something that people can actually look
touch and feel right now when you send a
transaction with a nexus wallet it has a
smart contract in there it allows you
actually reverse the transaction if it
expires so if you send to an address or
somebody's wrong address and they never
claimed it within the said expiration
time you're actually clean those funds
back to yourself so that help kind of
segue into the second thing that we
focus on is the usability for the
end-user not just with the smart
contracts but for cryptocurrency as a
whole I've noticed a lot of drawbacks
especially helping non-technical people
start their wallet you know dealing with
a wallet file dealing with backups
having to manage all those things if you
don't make you know frequent enough
backups you could lose coins if you send
to an invalid address the coins could be
gone so everybody usually sends the test
transaction first right so we've
developed what's called signature change
which are a decentralized login system
that essentially allows you from any
computer to log in and that's kind of
designed to feel more like your online
bank because cryptocurrency is
eventually gonna replace the banking
system so we kind of believe that in
order to reduce our learning curve for
people to make it something that's
streamlined with what they're already
used to so that also adds other benefits
to any other sort of application that
wants to start enhancing their system
with blockchain logic they can
essentially just use the blockchain
login system on top of their existing
login system and give people access to
without the user actually having to have
any changes done in
that the keys actually having to be
stored on the service so we believe it
it definitely makes it a lot easier for
people to use and it makes it something
that people are more used to and all of
the way around I mean it's essentially
designed to help kind of bring
cryptocurrency to the next level um
which is you know essentially what the
tritium protocol is and that's the first
step of three which is called the Tao
framework which goes tritium I mean and
then obsidian and that essentially is
unlocking our multi-dimensional chaining
architecture which essentially is our
scalability solution that allows
things to happen on chain without having
to make any sacrifices of centralization
because there's the block train trilemma
which vitalik you Taran actually coined
the term with it states that only two
three are able to exist in a blockchain
system and that security scalability and
decentralization so generally somebody
will always you know essentially take a
loss on one of those three in order to
have an effective blocking system but
with our multi-dimensional chaining
architecture we believe that we have
actually solved this trilemma um in
order to essentially scale the protocol
in a decentralized way while also
allowing it to be secure so that's some
of the basic computational technology
that we work on but we also are focusing
on satellite technology which is the
applying blockchain like game theory
incentive mechanisms into deployment of
hardware so that essentially I'm just
the same ways people build a blockchain
you know and they are rewarded for doing
the same I'm you could do the same thing
with mesh networks or satellites so that
essentially we developing our own
communication protocols and so the nexus
software is part of which will help aid
in that just as it aids in the
development of the blockchain system
itself so you guys have your hands in a
few different buckets a lot of different
areas and I kind of want to touch on
something that you mentioned a second
ago because one of the things that I
think most of us in the space can kind
of agree on is that there's a really big
learning curve when it comes to figuring
out how to buy
and sell and move around crypto and like
for someone coming into the space
learning how to use a hardware wallet is
is that still kind of like a nerdy thing
that is you know just not really
intuitive and so I think that the
decentralized login system that you
mentioned about creating a user
experience that feels more like just
logging into your normal bank account
but still has that security feature of
the blockchain can you talk like a
little bit more on that and how that
works and what you guys are doing there
yeah absolutely
so that's so I guess the first the first
I guess benefit of it is you have a
decentralized login system but there's a
lot of other benefits as far as security
underneath the hood one of them is
actually quantum resistance so we
actually using a sig chain you actually
are resistant to quantum computers which
are coming out and then another thing is
that you essentially don't ever get
bound to one specific key so when you're
dealing with YouTube so or any legacy
blockchain your Hardware wallet or your
wallet dot that file is basically
storing these private keys on your
computer or on that actual device and so
what ends up happening is if that key is
ever compromised or lost your funds are
completely gone but with the sig chain
we actually decouple the key from the
account identity so a Sikh chain can
have anything on I mean you can create
assets you can create registers you can
have tokens you can have token accounts
I mean there's a lot of things that's so
there's no limitation on a situation of
what you can do but what it also does is
it essentially as I was saying decouples
is key from the identity so that we're
actually changing the private key every
single transaction which also gives you
more assurance that it's gonna be more
secure because the vulnerability period
of that public key even to a quantum
computer is around five seconds rather
than with Bitcoin or anything once you
essentially make a transaction and spend
an input or an output what that public
is revealed which means that you know if
you have a quantum computer you're able
to crack that and then once that key is
compromised all of the funds in that
address are compromised forever in this
way think about the authentication of
the private key but with
Atika identifiers so you have an account
identifier called the Genesis ID and
that I can identifier never changes and
that's how you're actually able to prove
your ownership and then you have two
ways to authenticate yourself you have
an X - 2 recovery hash so the way it's
working under the hood is we're actually
taking your username and a password and
a pin and we're running it through a
special hashing function called argon -
which that's a memory hard password
function which basically means that the
the difficulty in generating that hash
comes it's bound by your memory of your
computer so this way if people have
FPGAs or a6 or these you know
supercomputers essentially designed for
cracking encryption they won't have any
advantage over a conventional laptop and
so that essentially gives us brute force
resistance in a decentralized way
because when you're talking about a
decentralized login system if you
attempt a password you no more than
three times you can get locked out of
the system in a centralized way but
there is no central authority that is
deeming your credentials are valid or
not it's essentially you're in a
contract with mathematics in a way
you're you're saying you know the access
of my state chain has to prove that I've
created this public key and you have to
generate not only that hidden input but
you also generated a signature from that
private key opt to authenticate yourself
so essentially you're getting all of the
benefits of the public key cryptography
but you're actually making it even more
secure because you're never reusing a
key more than once which and you're
never revealing that key until you
actually use it and by the time you use
that key then you've already assigned
your stake chain and another key so that
key therefore becomes invalid once you
essentially reveal it so even with the
quantum computer you'd have a very
difficult time actually cracking a suit
change so your username and password and
pin as I was saying go through the argon
- hashing function which to generate a
512 that hash which is then used as a
secret to generate your new private key
which then generates the public key and
then you hash that public key and that
creates your authorization hash so to
law again essentially what I'm doing is
I'm typing in my username password and
pin it runs for that special argon -
hashing function and that generates the
private key and the generator ISA public
key and then
authenticate that data and I hashed that
public key and make sure that it is
equivalent to my next stash right which
is my authorization hash and that's your
general login system that's essentially
how you're able to log in and also
change your password or PIN at any time
and then the second way is with the
recovery system that we developed and
that's a separate type of hash that is
independent of the password so if you
forget your username or password or and
at any time you're able to actually
recover your account even if that
account was packed so look I'm having in
your account hacked would essentially be
the same as having a private key
compromised in any legacy protocol in
this sense you're able to actually still
recover your account and prevent any
damages and lock somebody out that may
have had access to that so you get a
higher level of security in that way and
you get kind of the more natural I guess
utilities that are involved if you
forget a password I'm generally you
don't have to go and have your password
reset but if there's no central
authority to do that the only way to
change through mathematics right so it's
been very challenging but very fun at
the same time to kind of integrate these
these different technologies together to
create something that feels like what
we're already using but actually having
a function and it completely
decentralized so that's essentially how
that the sync chain architecture works
and then the other useful whole
component of it is that we're not since
your account isn't bound to any specific
heat anymore it's only bound to the last
key that you've generated you can change
your keys at any time which means if I
want to upgrade my key we allow the
option for you to actually use post
quantum cryptography now if you're extra
extra paranoid I'm using it's called
Falcon which is fast for your lattice
based complex creatures over ntr you
witness it's just a complex name of you
know saying that this has no known
attacks from quantum computers so that's
another really useful thing too is that
at any time you can change your key with
pickle and unfortunately once you have
that address that address is bound to
the key for all time if the keys ever
compromised it's gone you can't ever
change that key so that means if any
Bitcoin Keys become vulnerable to
quantum computers well not if when they
become conservative
yours then you're pretty much Sol which
is a big problem because the quantum
resistance problem is not necessarily
how should I sit there's a lot of
assumptions that you can prevent it from
happening or putting preventive measures
in but since all of this is baked into
the Bitcoin protocol and all of these
keys are actually already existing and
already used you'd have to essentially
chain or transfer all of these coins out
of these old addresses into these new
address is to get quantum resistance and
a lot of Satoshi's actual coins are
still held in open public keys so when
quantum computers come out even these
old coins that have never moved may
start moving which is gonna be a big big
problem I mean I think the general
consensus is that oh and when that
problem comes to present itself that's
when me that's when we deal with it I
hate this and says well you know that
may not be the best option we should
probably take as many preventive
measures now to prevent against that as
we possibly can so you have the
combination of using that post corner
cryptography and also simply hiding near
public key until it's actually used even
if you're using let's do the brain pool
key you actually wouldn't be able to
hijack somebody searching even in this
upon a computer because you have a less
than five second window to actually try
to crack that transaction because the
transaction will propagate to the
network within three seconds so you have
to try to crack that public key then
Rees on it and then create a new key and
then a new transaction that's
conflicting transaction with that one in
less than five seconds but even then the
cool part about it is our our system
actually basically when it goes into a
conflict resolution it detects something
that was received first as the most
valid
it doesn't necessarily negate the other
one from being accepted in a block but
if a block is created with a conflicted
transaction that block actually won't be
relayed either so there's a lot of other
preventative measures even deeper into
it
with that specific component so yeah
yeah that's that's a change in a
nutshell they they provide all of these
things and they also provide a
foundation for developing digital
identities
all circling trust because we have trust
based consensus um where you know
everybody has money but everybody has
time so you actually earn a nexus
valuation based on your time you
contribute to the network and of course
is invaluable
buddy else so that essentially what
we're doing is we're actually taking new
time and giving new money to new time
right the problem with the world right
now is new time is bought by old money
and money doesn't age right so when
we're doing cryptocurrencies now we're
actually able to start giving people's
time back to themselves and the new
money or crypto is what is buying that
new time and you're also rewarded for
having that trust - by securing the
network so that builds us a really cool
kind of like elevation in the internet
now the Internet's just anybody could be
anybody and we have no idea who's who
you know you could maybe you know talk
to somebody's username but you don't
necessarily always know that that is who
you're talking to you know you have
hacking spoofing it's just the internet
wasn't really just when with security in
mind it's just designed to work and so
there's a lot of these these centralized
authorities doing other things like that
um that are kind of helping bridge that
but now when you add this ledger over
the internet and you add trust and you
have stake chains right then you have an
elevated level of trust on the internet
so that eventually I see you know you
have log in with Google or log in with
Facebook you know they're most likely in
the future be a log in with Texas button
or essentially you can actually use your
Nexus syncing as an authentication
system for other services and then you
can carry that around with you and you
also know that that account is not
regulated by a central authority you
actually have complete control and
autonomy over your own data and your own
account and that can also be used to
authenticate system for existing web
services so it it kind of fits together
really well with everything but it also
allows extensibility such as using
biometrics for your username generation
your finger good things like that that
can help continually improve that so
that essentially it just becomes
something that we're already used to but
it
I guess builds on the the security
models of that and also builds the
autonomy for users so yeah that's
basically it in a nutshell
and so what you were just talking about
with kind of creating or making the
internet more secure is that something
that kind of layers on top of the
internet or is that a completely
separate system or how do you see that
integration happening very good question
so the internet it's built on a stack
okay it's called the OSI which stands
for open systems interconnection and
this stack is essentially what they've
used to standardize all of the existing
web technology so that's composed of
seven layers the bottom most layer is
the network layer then the next I'm
sorry I'm thinking Nexus bottom layer is
your physical layer then the next layer
is your data link layer and then the
next layer is your network and then your
transports and then session and then
presentation and application so all
seven of those layers essentially drive
every single web application that you do
so we've developed a stack - called the
tritium software stack um in ours is
seven layers as well but they kind of
interweave into the OSI instead of it
sitting on top of the OSI like this it
kind of is adding sub items inside each
one of these items so one could say that
it's you know 14 layers of stack or
whatever but it's really kind of just
something that it fits together with the
existing OSI and ours stack essentially
goes network then ledger then register
then operate and then API and logical
and interface so essentially this
technology with a ledger can actually
interweave with the existing Internet
and then when we use something called
the locator identity separation protocol
on the network layer what we do is as I
was saying earlier you have your Genesis
study which becomes your account
identifier so your keys are decoupled
from that now imagine that this
identifier also becomes your IP address
but it's an IP address that can follow
you everywhere right and what you're
doing is you're decoupling not only the
identity right yet
fire from the location because your IP
address as it exists now is essentially
a locator it's saying okay you're in
this network in this place that's how
you can trace somebody by their IP
address so when you're roaming between
these networks you're essentially gonna
be roaming over different arlok's
and you'll essentially be able to be
logged in on your Nexus account on your
phone but that'll give you access to
your Eid that is static and does not
change so that's your first step right
because any web service that's receiving
any sort of request from anybody they're
usually always logging the IP addresses
they're running them against possible
whitelist or blacklist and all those
types of things but then again you don't
ever really know um somebody can source
a packet from another address it looks
like they're coming from that address
but they just never received a reply so
you have your account identifier you
login and that gives you your Eid which
is your routing or your network level
identity and then you also have a ledger
level identity that comes with your
trust so that when any web service or
anybody is pinging my web service and
I'm running this locator identity
separation protocol I'm obviously
talking a nexus as well then I will be
able to identify and look up this users
trust the time they've been around owns
what other services they've gotten to if
they've ever had any you know attempts
against me or any of these types of
things so that essentially now this IP
address doesn't become this ephemeral
this could be anybody this is a specific
individual and then when I was talking
about the login with Nexus right with
the searching you're able to generate
the the key that allows you to sign for
your new or Lopes right which allows you
to roam and have that static IP address
that's associated with your account and
that's unique to you that means I can go
to another web services of course login
with Texas and just by having access and
using my e ID that specific Yediot is
allocated in my search pane I can be
authenticated and then I don't even have
to log in on that service because they
can authenticate me directly by over a
few address because my IP address can
never change because it's bound
specifically to my online identity which
it is my suitcase right so it adds this
really cool kind of layer of trust
on the internet that essentially removes
our need for these these third parties
so it gives I guess more transparency to
I mean where right now you have to go to
a you know I don't know if you've ever
set up an SSL certificate you have to go
and you know paste man tag to you know
sign the certificate for you and then
say that they did their due diligence to
verify you are you are
that's because cryptography does that
necessarily identify people you have to
have some sort of proof that a vista
public key belongs to this person that
we've already identified since the sink
Japan is sensibly a type of
identification system I'm a pseudo
anonymous I should say though because
just because you are contacting with
your secretary doesn't mean that I know
it's you right it just looks like a
alphanumeric series of you know letters
and numbers then you tie this identifier
with your also keys and then it acts
essentially kind of like a public key
database where you don't even need these
certificate authorities anymore and you
can identify somebody with the
cryptography because the public keys
associated with those accounts are
published on the ledger in a
decentralized way that cannot be
manipulated right and and you take it a
step further and say let's say I create
a web service and you know I put the web
service as a sig chain and then I use
the TNS system which is Thao name system
and I own let's say test Nexus dot IO
and I create a sick chain let's just say
the user name that owns test Nexus that
I do then you can authenticate not only
to the web services domain ownership
through the blockchain but you can also
verify the content on that website so if
they have copyrightable material that
copyrighted material can actually be
water marks and that water more needs a
hash that contains a register address of
something that that's sink chain owns
and I can verify the ownership of
digital content on the website it's this
way
that you know when you go to a website
and it says this web page is unsafe you
know this is a self-signed certificate I
imagine the web in the future when
SafeNet becomes more and more used
being a type of warning hey this website
has you know on
essentially this the content on this
website has no owner or something like
that or these assets have any owners
that are verified copyrighted material
or you know etc etc and then you can
also make sure you don't get viruses
because in that made of data for that
specific piece of content that has you
know ownership and the licensing and all
of that you also have a checksum of the
actual image that you're downloading so
that even a hacker accessing somebody's
web service and hacking into the server
and trying to replace anything with
different assets or different files
they're not gonna be able to because
everybody's gonna start choking and
saying oh well hey this you know file
was tampered with because I can see the
file was tampered with because I just
look up the services sick chain and
they're telling me that you know the
checksum of this file is this and it
shouldn't be so it'll be a lot easier
for people to detect people manipulating
web services hacking web services so
that kind of all fully formulates into
what I'm called the safe net um and I
imagine this type of technology being
something that really is gonna be
fundamental in driving that and it takes
the Internet out of this I mean the
internet it it's very poor as it's dark
and like but I mean I consider the
internet right now mostly pretty dark I
mean you don't know who's who
random IP address is anonymous people
you know I mean one person can be a
hundred people if they wanna be right
and this kind of brings it I guess more
into the light where you can start to
say okay well you know I can talk to you
directly because I know and I can look
up your account and then the other cool
thing with the locator identity
separation protocol is it also allows
you to be accessible by your Eid at
anytime without the need for a central
routing server so I can actually open a
direct peer-to-peer connection with you
if I want to make a phone call to just
by no user name right I could call you
by your user name if you have voice over
IP that essentially is using that D ID
right so I mean there's so many really
really really cool things that you can
kind of build together in this and it's
at least what we envision actually doing
for the internet because I believe that
the Internet has been missing this piece
this is a
huge missing component of the Internet
to make it a safer place and you know I
I'm not necessarily sure I've seen some
people talk about you know the trusted
layer on the internet and the trust in
both but from what I've looked
technically most people haven't really
tackled it in a way that covers all all
layers all levels of it you know they'll
just drop something in and say oh hey
you know it works or you know have the
idea that I could use a blockchain for
all these things but not necessarily
with the technology to actually deliver
it there so what would actual adoption
of this of the SafeNet look like would
it like how would someone start using it
would be people personally opting in to
have a nexus login or what does this
actually look like yeah I mean it's
uncertain to me now exactly how it's
going to emerge but I imagine you know
further down the road essentially web
services are gonna start adopting this
this new type of protocol essentially
you know having their web service become
quote-unquote safe web service and then
you're gonna have to have some form of
adoption from web browsers that are
gonna have to basically link into this
and start utilizing the Nexxus
blockchain or whatever blockchain for
the verification of sorry some of these
services and then people it's just gonna
start with you know I'm using that basic
account for my Nexus and I'm
transferring you know sending receiving
and then there's another dab that pops
up and I can start using that there's
maybe new web services you know
companies to start adopting it that
started adopting SiC chain architecture
so yeah I imagine it kind of in the safe
net safe net it's gonna require users
essentially to demand it and if they
require web browsers to support it um
where it eventually becomes the norm and
unsafe web services are not so it'll
obviously have to prove its value in a
lot of different areas and I mean I'm
talking to some people that I have where
I said you can't scoop IP addresses
anymore with this system they just go
you know so I think I think there's a
lot of promise of seeing seeing a lot of
this adoption I mean just simply a
merchant that has issues with no people
doing chargebacks or fraudulent activity
you know spoofing IP addresses or
hacking I mean all these types of things
that think of the low-hanging fruits
where it can really start when you can
start to identify these people a lot
more and you put that requirement upon
them then they're gonna have less
ability to wiggle in because they're
gonna have less shadows to hide behind
right and it's gonna make services safer
so businesses are gonna naturally just
start adopting that because they're
gonna mitigate their risk and it's gonna
be cheaper for them to operate overall
because they'll have less fraud yeah so
one thing that I want to circle back to
that we talked about earlier in the
conversation real quick because I think
it's so huge and I want to make sure
that people watching this didn't miss
miss that is that when you were talking
about the login system and how your
private Keys you would be like generated
every time like honestly I think that
some of the biggest barriers to entry in
the crypto market some of the biggest
pain points are this you know the whole
you know if you don't own your keys you
don't own your coins right and it's
scary to people getting in that there's
no customer service line there's no
account recovery that there's all of
this kind of fear around losing their
money and the fact that you guys are
working on both of those to where you
don't have that issue of losing your key
and there is actually an account
recovery process and it's more secure
it's like more user friendly more secure
like kind of a win-win so let's say that
like what does a kind of adoption of
that look like let's say a legacy chain
like litecoin or something is like oh
that looks good I wish we had that like
is there a way for current chains to
integrate with this technology this is
the beauty of it so we just we just
launched and activated the tritium
protocol on 11
this year so it's about a month in now
and I guess you are you familiar with
the etherium 2.0 upgrade process they're
essentially building a completely new
blockchain and you'll have hearing about
it yeah so they're they're kind of going
the the easier route which is you know
it's just build a totally new blockchain
and yeah of course it's easier you don't
have to deal with all the lacy stuff but
we did we actually spent a lot more time
making it interoperate with you TXO or
legacy type system so you can't actually
still use private keys and well that's
on Nexus if you want if you're one of
those types of people but it
interoperates with those and it also
upgraded the entire legacy block train
into the trading block chain so
essentially we upgraded to a completely
new blockchain architecture over the
existing old architecture which means
that there's an upgrade path for anybody
and we did that partially for that so
that anybody that sees this technology
says hey I want to upgrade to not only
sick change for the fact that it's so
changed but you know I want spark
contracts and all this other stuff yeah
they can definitely upgrade I mean it's
not gonna be a like one for one cuz an
exodus I'm even on the legacy blockchain
it's still really really really
different than any type of Bitcoin
variant it still has remnants of some of
the same architecture of utx O's but
it's still pretty different so yeah they
could definitely do that or even using
some of the text so like are what we got
it from ok the q2 wallet which I'm sure
you from though that's using all those
little cuties right um if you've used
any alt coins a little wallet whatever
so it used to take us about 30 days to
synchronize with the network we have
about 3 million blocks on the network's
been around since 2014 now gasps what
the performance is
now with trio syncing from block 0 guess
how long it took so it used to take you
30 days
hmm I don't know do you I won't look
down to add a 17 and a half minutes oh
wow oh wow that's amazing
it took so long to get it to be able to
do that just because I had to do so much
architecture work under the hood but the
reason I said that is because um tritium
is not you don't have to always just
upgrade the tritium protocol if you want
all the tritium because you can actually
still run I'm a tritium note obviously
if you modify it to fit with your
consensus rules of your Ocwen and gain
you know those benefits of the tritium
protocol - I don't know if you've seen
all the old Gucci wallets what's the
usual startup time like 30 seconds to a
minute the wallet did turn on and come
out right this sounds about right
somewhere in there
yes so we got ours - less than a second
steps I could put up time - yeah no
matter how big the blockchain is because
we fundamentally went through and I mean
we originally were based off of a
Bitcoin the Bitcoin code from about 2012
and basically went through it all and
fixed it and changed some of the
architecture on it's still maintaining
some of the original consensus code
obviously and that's why we get such
incredible performance so it's not just
something that you if you need new
features you can use you can actually
use the the Nexus software as it stands
and make it work over your existing
blockchain which could be for Bitcoin or
any other type of course so I mean we
designed a lot of our software to be
used by other people it's we're not the
type of people that are psycho hey you
know like we're you know gonna take this
and you know say it's ours and say it's
okay because it's open source or
whatever or you know we're gonna keep
our closed doors so that you know we
keep other people from using you know we
want to really contribute to the rest of
the industry and I mean this technology
itself can be used including the
database that I wrote from scratch just
because the embedded database system
that they use called lovely be a Google
has some issues with scaling and it
wasn't designed for election
applications so yeah I mean all aspects
of this code can be used for other
projects
that see value and including like
cloning Bitcoin and that's kind of part
of our plan anyway is that if you know
these legacy block chains start to
realize that they're scaling limitations
become such a big deal then they can run
the Tao framework over it with still
start with tritium and then they'll have
to upgrade it to a mean and then upgrade
it to obsidian and we did it in three
parts because it's a massive
architectural overhaul and it all has to
be on the live network so you want to
you want to stagger it you want to do it
bit by bit you don't want to change too
much at once otherwise yeah big big
problems happens so it's it's an upgrade
path for any other watch chain including
Bitcoin if they decide that you know
lightning network isn't working out the
way they wanted to in this era you know
Nexus as the 3d see they can upgrade the
Bitcoin blockchain it's user3 to see if
they want as well well Colin I feel like
we could probably keep talking for hours
but thank you so much for taking time
out of your busy day to come on and hang
out and chat with me so do you have any
is there anything any final words you
have for the people is sitting before we
go um yeah I'll just always to say what
I've usually been saying
do not forget why we are here we are not
here to make money we are here to change
things it is not about the money the
money is only a means to that end
so do not forget why were you here and
why Satoshi created Bitcoin because the
world needs this the world needs the
freedom I mean it's so far beyond just
like our luxuries right now I mean the
world needs it and the world needs more
people to see that and to hold that
space for the entire industry because
I've seen a lot of people maybe get
stuck in the money and
a lot of projects that have just
essentially become the same thing that
we created crypto from so yeah
just don't ever don't ever forget that
and you too if you can you know spread
it to spread the word
you know like keep keep true to the
roots of crypto because crypto needs it
who needs that as that's really what's
gonna bring to change some more Colin
thank you again so much for coming on if
people want to find you online and
connect with you where's the best place
for them to find you on Nexus dot io NEX
u.s. dot IO find just about anything
there on the footer that'll have all our
different social channels slack telegram
or forum
come join the forum to we just set up a
forum so yeah come help give us a smile
too as well
it's forum Nexus today Oh perfect well
there you guys have it thank you again
so much Colin thank you
