![]() |
Crazy WisdomIn his series "Crazy Wisdom," Stewart Alsop explores cutting-edge topics, particularly in the realm of technology, such as Urbit and artificial intelligence. Author: Stewart Alsop
In his series "Crazy Wisdom," Stewart Alsop explores cutting-edge topics, particularly in the realm of technology, such as Urbit and artificial intelligence. Alsop embarks on a quest for meaning, engaging with others to expand his own understanding of reality and that of his audience. The topics covered in "Crazy Wisdom" are diverse, ranging from emerging technologies to spirituality, philosophy, and general life experiences. Alsop's unique approach aims to make connections between seemingly unrelated subjects, tying together ideas in unconventional ways. Language: en Genres: Philosophy, Society & Culture Contact email: Get it Feed URL: Get it iTunes ID: Get it |
Listen Now...
Episode #539: Zero Trust Everything: Rebuilding the Internet's Money Layer
Episode 169
Monday, 23 March, 2026
In this episode of the Crazy Wisdom Podcast, host Stewart Alsop sits down with David Lachmish, co-founder of Ika, to explore the cutting-edge world of decentralized cryptography and its real-world applications. They cover the foundational problem of zero-trust custody and interoperability in crypto, breaking down why most people end up relying on centralized custodians despite crypto's original promise of removing third-party trust, and how Ika's novel 2PC-MPC cryptographic protocol addresses this with decentralized wallets (d-wallets) that require both the user and the Ika network to generate a signature. The conversation also touches on AI agents and the critical need for access control guardrails when agents handle real financial transactions, the philosophical parallels between crypto's growing pains and the early internet, decentralized governance and its potential to reshape how societies make decisions, and a surprising look at how decentralized certificate authorities could dramatically improve everyday internet security. David also gives a first public mention of an upcoming privacy-focused project called Encrypt.Links mentioned:- Ika website: https://ika.xyz- Ika on X: https://x.com/iкаdotxyz- David Lachmish on X: https://x.com/d3h3d_- Encrypt (upcoming project): https://encrypt.xyzTimestamps00:00 - David Lachmish introduces Ika and DWallet Labs, explaining their cybersecurity and cryptography background led them to solve zero trust custody and interoperability.05:00 - The d wallet concept is revealed as a decentralized signing mechanism controlled jointly by user and network, requiring new cryptography breakthroughs.10:00 - Crypto's philosophical parallels to early Internet are drawn, framing scams and misuse as inevitable growing pains of transformative infrastructure.15:00 - Wallet abstraction and agent constraints are explored, comparing future seamless crypto interaction to modern WiFi versus early modem connections.20:00 - Public key cryptography's binary ownership problem is explained, leading into MPC secret shares and Fireblocks' centralized access control tradeoffs.25:00 - 2PC MPC protocol is introduced as Ika's breakthrough, enabling decentralized policy enforcement without trusting any single entity.30:00 - Decentralized governance via token staking and code as law is discussed, contrasting corporate representative governance with crypto's direct decision-making.35:00 - Futarchy prediction markets and decision trees are connected to knowledge graphs, tracing humanity's accelerating governance transition.40:00 - Automation's historical parallels are examined, arguing AI's displacement of lawyers and developers mirrors every prior technological revolution.45:00 - Bitcoin and Ethereum's uncertain futures are assessed alongside Ika's positioning in custody and interoperability infrastructure.50:00 - Zero trust interoperability is explained, revealing how bridges create dangerous honeypots that Ika eliminates through native cryptographic control.55:00 - MetaMask's limitations for agents are detailed, contrasting stored private keys against Ika's policy-enforced guardrails for agentic transactions.60:00 - HumanTech's Wallet as a Protocol is presented as a practical way to give agents spending policies while maintaining user cryptographic control.65:00 - Decentralized certificate authorities emerge as Ika's broader cybersecurity vision, eliminating single points of failure across the entire Internet.Key Insights1. Zero Trust Custody and Interoperability: David and his cofounders at DWallet Labs identified that most cryptocurrency is held by centralized custodians, which contradicts crypto's core purpose of removing third-party trust. They set out to create "zero trust custody and zero trust interoperability" — systems where users maintain cryptographic control without sacrificing usability or relying on any single entity.2. The D-Wallet Primitive: Ika is built around a new cryptographic concept called a "d-wallet" — a decentralized wallet controlled jointly by the user and a decentralized network. A signature cannot be generated without the user's participation, meaning even if all network operators are compromised, they cannot act unilaterally. This required inventing new cryptography called 2PC-MPC.3. Access Control as the Missing Layer: Traditional crypto wallets operate on binary ownership — you either have full control or none. The d-wallet model introduces programmable access control policies enforced by a decentralized network, enabling features like spending limits and whitelisted addresses without trusting a centralized company like Fireblocks.4. Bridges Are Crypto's Biggest Security Vulnerability: Interoperability across blockchains typically requires trusting a bridge, which creates a honeypot for hackers. Ika eliminates this by allowing users to natively control assets on multiple chains simultaneously, maintaining cryptographic guarantees without a trusted intermediary.5. AI Agents Need Cryptographic Guardrails: Giving AI agents control over crypto wallets like MetaMask is dangerous due to hallucination and prompt injection risks. Ika enables agents to operate within strict, code-enforced policies — they can transact autonomously but cannot exceed boundaries set by the user, combining automation with genuine security.6. Decentralized Governance as a Structural Advantage: Ika operates as a permissionless network where two-thirds of token-staking operators control the protocol's direction. Even the founding team cannot unilaterally change the network, making governance transparent and resistant to capture — a meaningful contrast to closed, corporate-controlled systems.7. Decentralized Certificate Authorities as a Future Application: Beyond crypto, David envisions d-wallets solving broader cybersecurity problems. Today's internet relies on a handful of certificate authorities whose compromise would break global web security. A decentralized certificate authority built on Ika's infrastructure would require attacking hundreds of operators simultaneously, representing a fundamental upgrade to how trust is managed across the internet.







