Couverture de Trust Revolution

Trust Revolution

Trust Revolution

De : Shawn Yeager
Écouter gratuitement

À propos de ce contenu audio

Unfiltered conversations with builders, thinkers, and operators in Bitcoin and beyond. Exploring the systems we trust, why they work (or don't), and what comes next.

Science Sciences sociales
Épisodes
  • Self-Custody for You and Your AI | Roland Bewick
    Mar 6 2026
    “With 12 words, you can travel the world. Your money arrives in the country before you do. It cannot be taken from you.” Roland Bewick builds the software that makes that sentence true—and just taught an AI agent to do the same thing. Episode Summary Most Bitcoin wallets promise self-custody but keep offering the easy custodial shortcut. Alby killed theirs. In January 2025, the team shut down a custodial wallet processing over a million transactions a month and told users, Run your own node or leave. Roland Bewick, the developer who built Alby Hub to make that transition possible, walks through what happened when principle met user expectations—the complaints, the creative excuses, and why the team chose sovereignty over growth. The conversation then moves into new territory: AI agents that hold their own Bitcoin wallets, pay for their own infrastructure, and even spawn child agents without a human touching a credit card. Roland details his autonomous agent onboarding project, where an OpenClaw agent rented a server, funded a child agent, and purchased AI credits using Lightning—all without KYC, all without permission. The result is a blueprint for self-sovereign AI operating on self-sovereign money, and a challenge to anyone still giving their agent their credit card number. About the Guest Roland Bewick is a core developer at Alby, where he leads development of Alby Hub—an open-source, self-custodial Lightning node that lets users connect to any application through Nostr Wallet Connect. Originally from New Zealand and currently based in Thailand, Roland started at Alby in early 2023 after winning the Legends of Lightning hackathon with Lightsats, a Bitcoin onboarding tool. He also created Bitcoin Connect and recently built the first documented autonomous agent onboarding system using Bitcoin Lightning for machine-to-machine payments. X/Twitter: https://twitter.com/rolznzNostr: npub1zk6u7mxlflguqteghn8q7xtu47hyerruv6379c36l8lxzzr4x90q0gl6efGitHub: https://github.com/rolznzAlby: https://getalby.com Key Quotes “We all want to be self-sovereign. We hold our own Bitcoin, right? We hold our own keys. That's what we believe in. We build this software for ourselves.” — Roland Bewick “If all your activity and your agent's activity is tied to your own name, I think there are going to be really big problems.” — Roland Bewick “A lot of the other crypto projects are doing it for the marketing, for the big noise, but we are actually trying to solve the problem.” — Roland Bewick Key Takeaways Self-custody is a choice companies can make, not just users: Alby deliberately shut down a revenue-generating custodial product rather than pursue KYC licensing. Regulation forced a fork in the road, and the team chose the harder path back to the self-sovereign values they started with.Nostr Wallet Connect turned a Nostr experiment into payment infrastructure: What began as a way to make zaps easier became an open protocol that abstracts away the differences between Lightning implementations. It lets any app talk to any wallet—the USB-C of Lightning payments.AI agents need separate economic identities: Giving your agent your credit card ties its activity to your name and your limits. An agent with its own Lightning wallet, Nostr key pair, and AI token account operates independently—with whatever autonomy you grant it.KYC-free services are the infrastructure layer agents actually need: The difference between Bitcoin-native services like LNVPS and PayPerQ versus traditional providers isn't ideology—it's that agents can't fill out captchas, upload IDs, or wait for email verification. Permissionless access is a practical requirement for autonomous operation. Timestamps [00:01] Why Alby killed a custodial wallet processing a million transactions a month [04:30] How Nostr Wallet Connect emerged from a simple zap experiment [08:07] NWC as the USB-C of Lightning—one protocol for every wallet and app [11:03] Why Alby didn't just offer both custodial and self-custodial options [16:41] What Alby Hub gives users that custodial wallets can't—and what breaks without it [25:35] The real UX gap between self-custody and Cash App [32:07] Why AI agents should use Bitcoin instead of giving them your credit card [36:04] Roland's autonomous agent onboarding project—an AI spawning its own child agent [46:20] How Bitcoin fits into the AI disruption and why permissionless rails matter [54:01] First steps: taking Bitcoin off exchanges and becoming an AI builder, not just a consumer [59:16] Alby's NWC Faucet—play money for agents that lets them test real payment flows Resources & Links Mentioned in Episode: Alby Hub - Open-source self-custodial Lightning nodeAlby Go - Mobile app that acts as a remote control for your Lightning node via NWCAlby AI Tools - Skills and MCP server for giving AI agents Bitcoin payment capabilityLNVPS - Bitcoin Lightning-powered VPS hosting, no KYC requiredPayPerQ - ...
    Afficher plus Afficher moins
    59 min
  • Your Data's Already Gone. Now What? | James Lee
    Feb 26 2026
    “You cannot have data compromised that you do not have.” James Lee has spent two decades watching breach transparency collapse—from near-total disclosure in 2020 to just 30 percent today. The president of the nation's leading identity crime nonprofit breaks down why your Social Security number is worthless on the black market. Why your driver's license isn't and what individuals can actually do when the system designed to protect them has already failed. Episode Summary James Lee has seen the identity crisis from both sides. He was a senior executive at ChoicePoint when a 2005 data breach triggered the first wave of breach notification laws in the United States. He now leads the Identity Theft Resource Center, the nation's only nonprofit providing free identity crime victim assistance. The ITRC's 20th annual data breach report, released weeks before this conversation, tracked a record 3,322 compromises in 2025—a 79 percent jump over five years—while 70 percent of breach notices failed to disclose how the attack happened. Lee walks through the real economics of stolen identity: Social Security numbers carry zero resale value because the market is so flooded, while driver's license numbers command $150 to $2,000 depending on the state, a direct consequence of pandemic-era digital verification expanding their use far beyond the DMV. The conversation moves through the limits of KYC, the case for data minimization over data hoarding, and why the ITRC advocates for more friction in financial transactions. What it means is that breached data from years ago is being recycled into new attacks. Lee makes the case that individuals, organizations, and government all need to act—and none can solve identity crime alone. About the Guest James E. Lee is president of the Identity Theft Resource Center (ITRC), the nation's leading nonprofit dedicated to supporting victims of identity crime at no cost. Before joining ITRC's staff in 2020 as COO, Lee served over a decade on its board of directors, including three years as chairman. His career spans senior leadership at ChoicePoint (now LexisNexis), where he navigated the landmark 2005 data breach, and Irish cybersecurity firm Waratek. He chaired two ANSI working groups on identity management and privacy and has testified before the Senate Commerce Committee on identity crime trends. Lee holds credentials from the University of Texas Center for Identity, the Wharton School, and the University of Arkansas. LinkedIn: James E. LeeITRC: idtheftcenter.orgITRC on X: IDTheftCenter Key Quotes “You cannot have data compromised that you do not have. So data breaches go down right there. Data breaches go down, victims go down. Data breaches go down, cybersecurity attacks go down.” — James Lee“That one percent of revenue put a hundred percent of the enterprise at risk.” — James Lee“Your driver's license has become the de facto social security number because the social security number is so compromised.” — James Lee Key Takeaways Breach transparency is collapsing, and it's by design: In 2020, nearly 100 percent of organizations disclosed root cause details in breach notices. By 2025, only 30 percent did—leaving individuals unable to assess their own risk or take informed action.Your Social Security number is worthless, but your driver's license isn't: SSNs are so widely compromised they're given away free in stolen data bundles. Driver's license numbers, newly valuable because of pandemic-era digital verification, sell for $150 to $2,000 on criminal marketplaces.Data minimization beats data security: The most effective defense against breaches isn't better encryption—it's collecting less data in the first place. If you don't need it, don't collect it. If the purpose is fulfilled, delete it.Freeze your credit and adopt passkeys today: Credit freezes are free, take minutes, and are the single most effective step individuals can take. Passkeys eliminate the credential-reuse problem that fuels most account takeovers. Timestamps [00:04] The ChoicePoint breach: what a 2005 data disaster taught James Lee about institutional accountability[09:26] Are data brokers a net positive? The uncomfortable tradeoff between utility and risk[12:07] Breach notice fatigue: when data breach letters become a humiliation ritual[15:24] From ChoicePoint to ITRC: how James Lee ended up on the other side of the table[18:42] Breach transparency on the decline: better legal cover, worse consumer protection[23:33] The golden age of identity crime: what ITRC advisors hear from victims today[28:27] Recycled stolen data: old breaches fueling new attacks at scale[30:21] Why your driver's license is now worth more than your Social Security number[33:42] KYC under pressure: app-based identity verification getting duped by stolen credentials[38:13] The case for friction: why instant payments make fraud easier[44:44] Government data sharing: DOGE, SSA, and the fight over federal databases[48...
    Afficher plus Afficher moins
    1 h et 11 min
  • Your Money, Your Data, Your Mind | Jesse Posner
    Feb 19 2026
    “If somebody gets control over your personal AI — all your health data, all your financial data, all your emails, everything you've thought about — they own you.” Jesse Posner built FROST threshold signatures and shipped BitKey at Block. Now he's building Vora because he realized individual self-custody is still a LARP — and the stakes are about to get much higher. Episode Summary Most people think a hardware wallet means they've solved self-custody. Jesse Posner spent years at Coinbase and Block learning exactly why that's wrong. Without a full node, your wallet leaks your balance and IP address to third-party servers. Without physical security integration, your keys are one wrench attack away from worthless. Without verifiable hardware, your entire setup might be compromised from the factory floor. Vora is building the integrated answer: a sovereign device combining a full Bitcoin node, air-gapped hardware wallet, tamper detection, and emergency response — all designed so that attacking a Bitcoiner becomes more expensive than it's worth. But Posner isn't stopping at money. He argues the next frontier of self-custody is your mind. As personal AI agents accumulate our most intimate data — health records, financial decisions, private thoughts — whoever controls that AI controls the person. Vora's “guardian AI” architecture uses hardware-backed isolation to guarantee that no prompt injection can reach your most trusted model, while still letting you harness frontier cloud models for non-sensitive tasks. The same cypherpunk principles that protect Bitcoin keys now protect the most valuable asset of all: your autonomy. About the Guest Jesse Posner is CEO and co-founder of Vora, a startup building Bitcoin-grade self-custody for both digital assets and AI. A trained lawyer turned cryptographic engineer, Posner spent over four years at Coinbase on key management, then helped build BitKey at Block. He created the first BIP-340 compatible implementation of FROST (Flexible Round-Optimized Schnorr Threshold Signatures), supported by a Brink grant. His work sits at the intersection of cryptography, constitutional law, and physical security — bringing an unusually broad lens to the question of individual sovereignty in the digital age. X/Twitter: jesseposnerNostr: jesseposner on PrimalLinkedIn: Jesse PosnerGitHub: jesseposnerCompany: Vora Key Quotes “We wanted to make self-sovereignty real — where you can control your Bitcoin, maintain your privacy, protect yourself from physical attacks, and resist government seizure.” — Jesse Posne“If somebody gets control over your personal AI, they own you. You could literally lose control of your identity.” — Jesse Posner“The nation-state system is like a dead man walking — the ground has already shifted and we're just seeing the slow collapse.” — Jesse Posner Key Takeaways A hardware wallet without a full node is a privacy leak: Every time your wallet checks your balance through a third-party server, it reveals your UTXOs and IP address — giving attackers a map to your Bitcoin and your front door.Self-custody must include physical security, not just key management: Vora integrates tamper detection, time-delayed spending, and emergency dispatch into the custody system itself, making the economics of attacking a Bitcoiner unprofitable.FROST threshold signatures eliminate the privacy and cost penalties of multi-sig: Traditional multi-sig reveals your entire key setup on-chain. FROST produces a single signature indistinguishable from a solo signer, with the ability to refresh, revoke, and add key shares without moving Bitcoin.Your personal AI is the next self-custody frontier: As AI agents accumulate intimate personal data and gain the ability to act on your behalf, controlling that AI becomes as critical as controlling your keys — and the same cypherpunk architecture applies. Timestamps [00:00] Introduction and Jesse's background at Coinbase and Block[03:16] How institutional vs. individual self-custody differs[06:30] Executive Order 6102 and constitutional resistance to government seizure[09:05] Physical security: integrating alarms, tamper detection, and emergency response[14:31] The $5 wrench attack problem and why it gets worse as Bitcoin appreciates[17:53] Why a full node matters for privacy — your wallet is leaking data[22:48] Supply chain attacks and the case for verifiable hardware[27:23] Trusted execution environments: powerful but not impervious[32:40] How FROST threshold signatures work and why they matter[39:29] Proactive security: refreshing key shares without moving Bitcoin[44:37] Self-custody of AI: why controlling your mind is the next frontier[48:58] Prompt injection attacks and the “lethal trifecta”[52:47] Guardian AI architecture: hardware-isolated models that can't be corrupted[54:57] Fiduciary AI: confidentiality and undivided loyalty in a single concept[1:06:02] Vora's product roadmap: AI product this ...
    Afficher plus Afficher moins
    1 h et 22 min
Aucun commentaire pour le moment