Latest news about Bitcoin and all cryptocurrencies. Your daily crypto news habit.
The initial coin offering (ICO) is a innovative crowdfunding model that enables new businesses to sidestep traditional early seed investment. In 2017, ICOs raised over $4 billion of beginning time capital and massively disrupted conventional finance.Through the ICO fundraising model, new companies can raise capital by issuing crypto tokens on a blockchainâââmost normally Ethereumâââand circulating them to token purchasers in return for making a money related commitment to the task. In July 2017, the Securities and Exchange Commission (SEC) discharged a report which inferred that specific tokens could be delegated securities and subject to control. Almost EVERY SINGLE ICO to date has been an unregistered securities offering, posing under the guise of utility tokens. Also SEC Chairman Jay Clayton said:
âI believe every ICO Iâve seen is a security.â
The âutility tokenâ defence might not work. Chairman Clayton warned against using the phrase utility token. ICOs that violate securities laws could soon confront punishments or graver consequences. Depending on their function, crypto tokens might be classified as Utility tokens or Security tokens.
Utility Token â
UtIlity tokens represent a unit of account for the network. The bigger the network grows, the more utility in the token, and because the number of tokens is fixed. As the size of the network and transaction volumes within it grows, this will create demand for the tokens.
It is important to note that âutility tokenâ is an organizational distinctionânot a legal one. The SEC has not given official guidance on utility tokens, so the industry does not with certainty whether they are subject to securities regulations.
Bloombergâs Matt Levine compares utility tokens to the Starbucks card:
A Starbucks gift card is probably not a security, even though you pay money to a corporation for the card and expect to get back something in the future, because you are not investing the money in the expectation of profit: Youâre investing it in the expectation of coffee.
UtIlity tokens have a use case and are not designed as investments, but that doesnât mean that they donât bring any profit. They have a certain use case inside the project and donât represent companyâs share. Utility tokens may grow in price, if the demand for service or product increases. So buying such tokens of a project, that solves real problems of users and is constantly being developed and improved, may give great profit in future.
Golem is a pertinent example, allowing users to lend their own PCâs power to the network which collectively employs it to run a remote supercomputer. Users earn GNT for connecting to the network, but they can also buy them via an exchange. Basic Attention Token is similar, with users rewarded in BAT for using the BRAVE browser and viewing ads.
Also Filecoin âwhich raised an ICO-record $257 millionâplans to provide a decentralised cloud storage service that will take advantage of unused computer hard drive space. ICO contributors received tokens that they will be able to use to purchase storage space from Filecoin once the service has launched.
Security Token â
One of the major topics of discussion in cryptocurrency right now is around the development of security tokens. Security tokens gives their holders to ownership rights of a company. A security tokenâs value is derived from a tradable asset; subsequently, it is liable to government laws controlling traditional securities. Security tokens can be utilised to change conventional IPOs(initial public offerings) and issue company shares, profits, and voting rights over the blockchain frameworks.
Joshua Stein, the CEO of tokenized securities startup Harbor said â
A security token represents traditional, private security interest. It could represent a share in a company, an LP interest in a fund or a trust, a member share in an LLC. Essentially, youâre taking something that today you have on paper and youâre putting an electronic wrapper around it.
Hereâs the definition right from the Securities Act of 1933
âThe next mega trend in crypto will be assets migrating to the blockchain in the form of tokens. pretty much any security is better denominated as a token than traditional forms of ownership. This is the future, not share certificates in filing cabinets.ââ Trevor Koverko, CEO of Polymath Inc. (https://www.icoinvestor.tv/info/polymath-ceo-trevor-koverko-security-tokens-are-the-future-1440/ )
Polymath is doing for securities tokens what Ethereum did for utility tokens. Polymathâs ST20 security token protocol embeds regulatory requirements into the tradable tokens themselves, which are only available to verified and authorized participants.
Also Online retailer Overstock recently announced that tZERO, one of its portfolio companies, will hold an ICO to fund the development of a licensed security token trading platform.The tZERO tokens that are issued from this ICO will be in accordance with SEC regulations. tZERO token holders will be entitled to quarterly dividends from the profits generated by the tZERO platform.
The first major wave of security token offerings has already begun; starting with the launch of Nexo, a crypto-backed instant loan platform by Credissimo; a leading European FinTech Group that has been a key player in Online Consumer Lending and E-commerce Financing for over 10 years. The company generates operating revenues from crypto-backed loans. The companyâs positive bottom line is called its Net Profit and, when achieved, 70% from it will be reinvested back into the company to fund more crypto-backed loans, and a fixed 30% from the Net Profit is paid out as dividends to NEXO Token holders in the given accounting period.
How Do We Actually Distinguish Security and Utility Token ?
With a specific end goal to decide if a digital token is a security, we can apply the Howey Test. This is used to confirm regardless of whether or not a transaction qualifies as an âinvestment contractâ.If it meets the criteria, at that point it will be considered as a security and will be subject to additional disclosure and regulation requirements.
So as to be named a investment contract under the Howey Test, a token must meet the following prerequisites:
- There is an investment of money.
- The user expects to profit from the investment.
- The investment of money is in a common enterprise.
- Any profit comes from the efforts of a third-party or promoter.
How is Security Token Different From Utility Token ? was originally published in Hacker Noon on Medium, where people are continuing the conversation by highlighting and responding to this story.
Disclaimer
The views and opinions expressed in this article are solely those of the authors and do not reflect the views of Bitcoin Insider. Every investment and trading move involves risk - this is especially true for cryptocurrencies given their volatility. We strongly advise our readers to conduct their own research when making a decision.