{"type":"rich","version":"1.0","provider_name":"Transistor","provider_url":"https://transistor.fm","author_name":"Crazy Wisdom","title":"Episode #539: Zero Trust Everything: Rebuilding the Internet's Money Layer","html":"<iframe width=\"100%\" height=\"180\" frameborder=\"no\" scrolling=\"no\" seamless src=\"https://share.transistor.fm/e/390c4201\"></iframe>","width":"100%","height":180,"duration":4098,"description":"In this episode of the Crazy Wisdom Podcast, host Stewart Alsop sits down with David Lachmish, co-founder of Ika, to explore the cutting-edge world of decentralized cryptography and its real-world applications. They cover the foundational problem of zero-trust custody and interoperability in crypto, breaking down why most people end up relying on centralized custodians despite crypto's original promise of removing third-party trust, and how Ika's novel 2PC-MPC cryptographic protocol addresses this with decentralized wallets (d-wallets) that require both the user and the Ika network to generate a signature. The conversation also touches on AI agents and the critical need for access control guardrails when agents handle real financial transactions, the philosophical parallels between crypto's growing pains and the early internet, decentralized governance and its potential to reshape how societies make decisions, and a surprising look at how decentralized certificate authorities could dramatically improve everyday internet security. David also gives a first public mention of an upcoming privacy-focused project called Encrypt.Links mentioned:- Ika website: https://ika.xyz- Ika on X: https://x.com/iкаdotxyz- David Lachmish on X: https://x.com/d3h3d_- Encrypt (upcoming project): https://encrypt.xyzTimestamps00:00 - David Lachmish introduces Ika and DWallet Labs, explaining their cybersecurity and cryptography background led them to solve zero trust custody and interoperability.05:00 - The d wallet concept is revealed as a decentralized signing mechanism controlled jointly by user and network, requiring new cryptography breakthroughs.10:00 - Crypto's philosophical parallels to early Internet are drawn, framing scams and misuse as inevitable growing pains of transformative infrastructure.15:00 - Wallet abstraction and agent constraints are explored, comparing future seamless crypto interaction to modern WiFi versus early modem connections.20:00 - Public key...","thumbnail_url":"https://img.transistorcdn.com/UZbrDrlO5VTfDNcq188THwbv0T09vcmLyzx3BcPI9bs/rs:fill:0:0:1/w:400/h:400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81Y2Rj/OGFiMTYyMGFkNTM5/N2NjOWI2MWM5YzQ1/YTc2Ny5qcGc.webp","thumbnail_width":300,"thumbnail_height":300}