<description>&lt;p&gt;“If somebody gets control over your personal AI — all your health data, all your financial data, all your emails, everything you've thought about — they own you.” Jesse Posner built FROST threshold signatures and shipped BitKey at Block. Now he's building Vora because he realized individual self-custody is still a LARP — and the stakes are about to get much higher.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Episode Summary&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Most people think a hardware wallet means they've solved self-custody. Jesse Posner spent years at Coinbase and Block learning exactly why that's wrong. Without a full node, your wallet leaks your balance and IP address to third-party servers. Without physical security integration, your keys are one wrench attack away from worthless. Without verifiable hardware, your entire setup might be compromised from the factory floor.&lt;/p&gt;
&lt;p&gt;Vora is building the integrated answer: a sovereign device combining a full Bitcoin node, air-gapped hardware wallet, tamper detection, and emergency response — all designed so that attacking a Bitcoiner becomes more expensive than it's worth.&lt;/p&gt;
&lt;p&gt;But Posner isn't stopping at money. He argues the next frontier of self-custody is your mind. As personal AI agents accumulate our most intimate data — health records, financial decisions, private thoughts — whoever controls that AI controls the person. Vora's “guardian AI” architecture uses hardware-backed isolation to guarantee that no prompt injection can reach your most trusted model, while still letting you harness frontier cloud models for non-sensitive tasks. The same cypherpunk principles that protect Bitcoin keys now protect the most valuable asset of all: your autonomy.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;About the Guest&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Jesse Posner is CEO and co-founder of Vora, a startup building Bitcoin-grade self-custody for both digital assets and AI. A trained lawyer turned cryptographic engineer, Posner spent over four years at Coinbase on key management, then helped build BitKey at Block. He created the first BIP-340 compatible implementation of FROST (Flexible Round-Optimized Schnorr Threshold Signatures), supported by a Brink grant. His work sits at the intersection of cryptography, constitutional law, and physical security — bringing an unusually broad lens to the question of individual sovereignty in the digital age.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;X/Twitter: &lt;a href="https://twitter.com/jesseposner"&gt;jesseposner&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Nostr: &lt;a href="https://primal.net/jesseposner"&gt;jesseposner on Primal&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;LinkedIn: &lt;a href="https://linkedin.com/in/jesseposner"&gt;Jesse Posner&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;GitHub: &lt;a href="https://github.com/jesseposner"&gt;jesseposner&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Company: &lt;a href="https://vora.io/"&gt;Vora&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Key Quotes&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;“We wanted to make self-sovereignty real — where you can control your Bitcoin, maintain your privacy, protect yourself from physical attacks, and resist government seizure.” — Jesse Posne&lt;/li&gt;
&lt;li&gt;“If somebody gets control over your personal AI, they own you. You could literally lose control of your identity.” — Jesse Posner&lt;/li&gt;
&lt;li&gt;“The nation-state system is like a dead man walking — the ground has already shifted and we're just seeing the slow collapse.” — Jesse Posner&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Key Takeaways&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;A hardware wallet without a full node is a privacy leak&lt;/strong&gt;: Every time your wallet checks your balance through a third-party server, it reveals your UTXOs and IP address — giving attackers a map to your Bitcoin and your front door.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Self-custody must include physical security, not just key management&lt;/strong&gt;: Vora integrates tamper detection, time-delayed spending, and emergency dispatch into the custody system itself, making the economics of attacking a Bitcoiner unprofitable.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;FROST threshold signatures eliminate the privacy and cost penalties of multi-sig&lt;/strong&gt;: Traditional multi-sig reveals your entire key setup on-chain. FROST produces a single signature indistinguishable from a solo signer, with the ability to refresh, revoke, and add key shares without moving Bitcoin.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Your personal AI is the next self-custody frontier&lt;/strong&gt;: As AI agents accumulate intimate personal data and gain the ability to act on your behalf, controlling that AI becomes as critical as controlling your keys — and the same cypherpunk architecture applies.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Timestamps&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;[00:00] Introduction and Jesse's background at Coinbase and Block&lt;/li&gt;
&lt;li&gt;[03:16] How institutional vs. individual self-custody differs&lt;/li&gt;
&lt;li&gt;[06:30] Executive Order 6102 and constitutional resistance to government seizure&lt;/li&gt;
&lt;li&gt;[09:05] Physical security: integrating alarms, tamper detection, and emergency response&lt;/li&gt;
&lt;li&gt;[14:31] The $5 wrench attack problem and why it gets worse as Bitcoin appreciates&lt;/li&gt;
&lt;li&gt;[17:53] Why a full node matters for privacy — your wallet is leaking data&lt;/li&gt;
&lt;li&gt;[22:48] Supply chain attacks and the case for verifiable hardware&lt;/li&gt;
&lt;li&gt;[27:23] Trusted execution environments: powerful but not impervious&lt;/li&gt;
&lt;li&gt;[32:40] How FROST threshold signatures work and why they matter&lt;/li&gt;
&lt;li&gt;[39:29] Proactive security: refreshing key shares without moving Bitcoin&lt;/li&gt;
&lt;li&gt;[44:37] Self-custody of AI: why controlling your mind is the next frontier&lt;/li&gt;
&lt;li&gt;[48:58] Prompt injection attacks and the “lethal trifecta”&lt;/li&gt;
&lt;li&gt;[52:47] Guardian AI architecture: hardware-isolated models that can't be corrupted&lt;/li&gt;
&lt;li&gt;[54:57] Fiduciary AI: confidentiality and undivided loyalty in a single concept&lt;/li&gt;
&lt;li&gt;[1:06:02] Vora's product roadmap: AI product this year, Vora Vault next year&lt;/li&gt;
&lt;li&gt;[1:09:34] Why the modern state has already collapsed — topos and nomos&lt;/li&gt;
&lt;li&gt;[1:14:24] Five-year vision: sovereign hardware, personal drones, and a renaissance of human flourishing&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Resources &amp; Links&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://vora.io/"&gt;Vora&lt;/a&gt; — Bitcoin-grade self-custody for digital assets and AI&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/BlockstreamResearch/secp256k1-zkp/pull/278"&gt;FROST Implementation&lt;/a&gt; — Jesse's BIP-340 compatible FROST in secp256k1-zkp&lt;/li&gt;
&lt;li&gt;&lt;a href="https://brink.dev/"&gt;Brink&lt;/a&gt; — Open-source Bitcoin development funding (supported Jesse's FROST work)&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.bunniestudios.com/"&gt;Bunny's hardware verification research&lt;/a&gt; — Non-destructive chip imaging for verifiable hardware&lt;/li&gt;
&lt;li&gt;&lt;a href="https://distrust.co/"&gt;Distrust / Enclave OS&lt;/a&gt; — Security contractors building the isolation OS for Vora&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Podcast&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Subscribe: &lt;a href="https://podcast.trustrevolution.co"&gt;https://podcast.trustrevolution.co&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Music: More Ghost Than Man&lt;/li&gt;
&lt;/ul&gt;</description>

Trust Revolution

Shawn Yeager

Your Money, Your Data, Your Mind | Jesse Posner

FEB 19, 202681 MIN
Trust Revolution

Your Money, Your Data, Your Mind | Jesse Posner

FEB 19, 202681 MIN

Description

<p>“If somebody gets control over your personal AI — all your health data, all your financial data, all your emails, everything you've thought about — they own you.” Jesse Posner built FROST threshold signatures and shipped BitKey at Block. Now he's building Vora because he realized individual self-custody is still a LARP — and the stakes are about to get much higher.</p> <p><strong>Episode Summary</strong></p> <p>Most people think a hardware wallet means they've solved self-custody. Jesse Posner spent years at Coinbase and Block learning exactly why that's wrong. Without a full node, your wallet leaks your balance and IP address to third-party servers. Without physical security integration, your keys are one wrench attack away from worthless. Without verifiable hardware, your entire setup might be compromised from the factory floor.</p> <p>Vora is building the integrated answer: a sovereign device combining a full Bitcoin node, air-gapped hardware wallet, tamper detection, and emergency response — all designed so that attacking a Bitcoiner becomes more expensive than it's worth.</p> <p>But Posner isn't stopping at money. He argues the next frontier of self-custody is your mind. As personal AI agents accumulate our most intimate data — health records, financial decisions, private thoughts — whoever controls that AI controls the person. Vora's “guardian AI” architecture uses hardware-backed isolation to guarantee that no prompt injection can reach your most trusted model, while still letting you harness frontier cloud models for non-sensitive tasks. The same cypherpunk principles that protect Bitcoin keys now protect the most valuable asset of all: your autonomy.</p> <p><strong>About the Guest</strong></p> <p>Jesse Posner is CEO and co-founder of Vora, a startup building Bitcoin-grade self-custody for both digital assets and AI. A trained lawyer turned cryptographic engineer, Posner spent over four years at Coinbase on key management, then helped build BitKey at Block. He created the first BIP-340 compatible implementation of FROST (Flexible Round-Optimized Schnorr Threshold Signatures), supported by a Brink grant. His work sits at the intersection of cryptography, constitutional law, and physical security — bringing an unusually broad lens to the question of individual sovereignty in the digital age.</p> <ul> <li>X/Twitter: <a href="https://twitter.com/jesseposner">jesseposner</a></li> <li>Nostr: <a href="https://primal.net/jesseposner">jesseposner on Primal</a></li> <li>LinkedIn: <a href="https://linkedin.com/in/jesseposner">Jesse Posner</a></li> <li>GitHub: <a href="https://github.com/jesseposner">jesseposner</a></li> <li>Company: <a href="https://vora.io/">Vora</a></li> </ul> <p><strong>Key Quotes</strong></p> <ul> <li>“We wanted to make self-sovereignty real — where you can control your Bitcoin, maintain your privacy, protect yourself from physical attacks, and resist government seizure.” — Jesse Posne</li> <li>“If somebody gets control over your personal AI, they own you. You could literally lose control of your identity.” — Jesse Posner</li> <li>“The nation-state system is like a dead man walking — the ground has already shifted and we're just seeing the slow collapse.” — Jesse Posner</li> </ul> <p><strong>Key Takeaways</strong></p> <ul> <li><strong>A hardware wallet without a full node is a privacy leak</strong>: Every time your wallet checks your balance through a third-party server, it reveals your UTXOs and IP address — giving attackers a map to your Bitcoin and your front door.</li> <li><strong>Self-custody must include physical security, not just key management</strong>: Vora integrates tamper detection, time-delayed spending, and emergency dispatch into the custody system itself, making the economics of attacking a Bitcoiner unprofitable.</li> <li><strong>FROST threshold signatures eliminate the privacy and cost penalties of multi-sig</strong>: Traditional multi-sig reveals your entire key setup on-chain. FROST produces a single signature indistinguishable from a solo signer, with the ability to refresh, revoke, and add key shares without moving Bitcoin.</li> <li><strong>Your personal AI is the next self-custody frontier</strong>: As AI agents accumulate intimate personal data and gain the ability to act on your behalf, controlling that AI becomes as critical as controlling your keys — and the same cypherpunk architecture applies.</li> </ul> <p><strong>Timestamps</strong></p> <ul> <li>[00:00] Introduction and Jesse's background at Coinbase and Block</li> <li>[03:16] How institutional vs. individual self-custody differs</li> <li>[06:30] Executive Order 6102 and constitutional resistance to government seizure</li> <li>[09:05] Physical security: integrating alarms, tamper detection, and emergency response</li> <li>[14:31] The $5 wrench attack problem and why it gets worse as Bitcoin appreciates</li> <li>[17:53] Why a full node matters for privacy — your wallet is leaking data</li> <li>[22:48] Supply chain attacks and the case for verifiable hardware</li> <li>[27:23] Trusted execution environments: powerful but not impervious</li> <li>[32:40] How FROST threshold signatures work and why they matter</li> <li>[39:29] Proactive security: refreshing key shares without moving Bitcoin</li> <li>[44:37] Self-custody of AI: why controlling your mind is the next frontier</li> <li>[48:58] Prompt injection attacks and the “lethal trifecta”</li> <li>[52:47] Guardian AI architecture: hardware-isolated models that can't be corrupted</li> <li>[54:57] Fiduciary AI: confidentiality and undivided loyalty in a single concept</li> <li>[1:06:02] Vora's product roadmap: AI product this year, Vora Vault next year</li> <li>[1:09:34] Why the modern state has already collapsed — topos and nomos</li> <li>[1:14:24] Five-year vision: sovereign hardware, personal drones, and a renaissance of human flourishing</li> </ul> <p><strong>Resources & Links</strong></p> <ul> <li><a href="https://vora.io/">Vora</a> — Bitcoin-grade self-custody for digital assets and AI</li> <li><a href="https://github.com/BlockstreamResearch/secp256k1-zkp/pull/278">FROST Implementation</a> — Jesse's BIP-340 compatible FROST in secp256k1-zkp</li> <li><a href="https://brink.dev/">Brink</a> — Open-source Bitcoin development funding (supported Jesse's FROST work)</li> <li><a href="https://www.bunniestudios.com/">Bunny's hardware verification research</a> — Non-destructive chip imaging for verifiable hardware</li> <li><a href="https://distrust.co/">Distrust / Enclave OS</a> — Security contractors building the isolation OS for Vora</li> </ul> <p><strong>Podcast</strong></p> <ul> <li>Subscribe: <a href="https://podcast.trustrevolution.co">https://podcast.trustrevolution.co</a></li> <li>Music: More Ghost Than Man</li> </ul>