Latest news about Bitcoin and all cryptocurrencies. Your daily crypto news habit.
May is here and it’s time to publish the newest Security Token Anthology which includes my recent articles about crypto-securities. Last month I published articles that cover key security token topics such as disclosures or identity as well as one of my newest obsessions: security token networks. The current version of the anthology includes 67 articles.
Happy Reading!
New Articles
· Programmable Disclosures and Security Tokens(April 2019): https://hackernoon.com/programmable-disclosures-and-security-tokens-656857ad27b4
· Some Thoughts About Security Token Networks: Part I(April 2019): https://hackernoon.com/some-thoughts-about-security-token-networks-part-i-d94518e7f32e
· Some Thoughts About Security Token Networks: Part II(April 2019): https://hackernoon.com/some-thoughts-about-security-token-networks-part-ii-4b56eb198cbb
· Towards More Programmable and Robust Security Tokens(April 2019): https://hackernoon.com/towards-more-programmable-and-robust-security-tokens-five-protocols-that-should-be-part-of-a02093bcb190
· Value-Leaking Protocols and Security Tokens(April 2019): https://hackernoon.com/value-leaking-protocols-and-security-tokens-789d85638f
· A Local Maximum Paradox: Permissioned Blockchains and Security Tokens(April 2019): https://hackernoon.com/a-local-maximum-paradox-permissioned-blockchains-and-security-tokens-ec43d75cf52
Security Token Topics
About a Security Token Blockchain
· A Local Maximum Paradox: Permissioned Blockchains and Security Tokens(April 2019): https://hackernoon.com/a-local-maximum-paradox-permissioned-blockchains-and-security-tokens-ec43d75cf52
· Some Thoughts About Security Token Networks: Part I(April 2019): https://hackernoon.com/some-thoughts-about-security-token-networks-part-i-d94518e7f32e
· Some Thoughts About Security Token Networks: Part II(April 2019): https://hackernoon.com/some-thoughts-about-security-token-networks-part-ii-4b56eb198cbb
· Do Security Tokens Need a New Blockchain? Part IV: How About a Sidechain?(November 2018): https://hackernoon.com/do-security-tokens-need-a-new-blockchain-part-iv-how-about-a-sidechain-acd8686d8fae
· Do Security Tokens Need a New Blockchain? Part III: The Building Blocks(November 2018): https://hackernoon.com/do-security-tokens-need-a-new-blockchain-part-iii-the-building-blocks-7adfa7239bb0
· Do Security Tokens Need a New Blockchain? Benefits and Challenges Part II(October 2018): https://hackernoon.com/do-security-tokens-need-a-new-blockchain-benefits-and-challenges-part-ii-de480e54c12a
· Do Security Tokens Need a New Blockchain? Benefits and Challenges [Part I](October 2018): https://hackernoon.com/do-security-tokens-need-a-new-blockchain-benefits-challenges-part-i-48f281f5101e
About the Security Token Market Dynamics
· Against Security Token Purism(February 2019): https://medium.com/@jrodthoughts/against-security-token-purism-e40deeb55cd3
· Four Healthy Frictions Will Guide the Future of Security Tokens(February 2019) https://hackernoon.com/four-healthy-frictions-that-will-guide-the-future-of-security-tokens-2387c15affb4
· 20 Controversial Observations (Not Predictions) About Security Tokens in 2019: Part II(December 2018): https://hackernoon.com/20-controversial-observations-not-predictions-about-security-tokens-in-2019-part-ii-ab6104e1904b
· 20 Controversial Observations (Not Predictions) About Security Tokens in 2019: Part I(December 2018): https://hackernoon.com/20-controversial-observations-not-predictions-about-security-tokens-in-2019-part-i-46dd9b1a25f8
· Thin Protocols, Lack of Network Effects and A Theory of Value for Security Tokens(December 2018): https://hackernoon.com/thin-protocols-lack-of-network-effects-and-a-theory-of-value-for-security-tokens-7e8a3bd3b9d
· Clearing Through the Hype: The Inevitable Series A Crunch Facing Security Token Startups(November 2018):https://hackernoon.com/clearing-through-the-hype-the-inevitable-series-a-crunch-facing-security-token-startups-a60dfdae25a8
· The Biggest Dilemma in Security Tokens: Infrastructure vs. Applications(November 2018): https://hackernoon.com/the-biggest-dilemma-in-security-tokens-infrastructure-vs-applications-2a9a6a54a10b
· The Future of Security Tokens: Myths and Realities(October 2018):https://hackernoon.com/the-future-of-security-tokens-myths-and-realities-d3371cee9c65
· 20 Ideas About Security Tokens That Most People Disagree With Part II(September 2018): https://hackernoon.com/20-ideas-about-security-tokens-that-most-people-disagree-with-part-ii-44dbc44ea456
· 20 Ideas About Security Tokens That Most People Disagree With Part I(September 2018): https://hackernoon.com/20 -ideas-about-security-tokens-that-most-people-disagree-with-part-i-df86650fe55b
· Want to Understand Security Tokens? Look at this Market Taxonomy(July 2018): https://hackernoon.com/want-to-understand-security-tokens-look-at-this-market-taxonomy-aa70fedfb1aa
· The Launch of Open Finance and the Day Security Tokens Became Real(July 2018): https://medium.com/coinmonks/the-launch-of-open-finance-and-the-day-security-tokens-became-real-6bb48767d5b5
· What We Need To Enable The Security Token Thesis(May 2018):https://medium.com/coinmonks/what-we-need-to-enable-the-security-token-thesis-2eade6ee96f2
· Security Tokens vs. Fat Protocols(May 2018):https://medium.com/coinmonks/security-tokens-vs-fat-protocols-9c4e247d889c
· A Taxonomy for Understanding Tokenized Illiquid Assets and Security Tokens(May 2018): https://medium.com/datadriveninvestor/a-taxonomy-for-understanding-tokenized-illiquid-assets-and-security-tokens-271f0576f9ec
About Security Token Platforms
· Value-Leaking Protocols and Security Tokens(April 2019): https://hackernoon.com/value-leaking-protocols-and-security-tokens-789d85638f
· The Fantasy of Self-Service Security Token Issuances and Some Ideas to Fix It: Part I(February 2019): https://hackernoon.com/the-fantasy-of-self-service-security-token-issuances-and-some-ideas-to-fix-it-part-i-5a1bc00b3a4a
· Security Tokens in the Bitcoin Blockchain(January 2019): https://hackernoon.com/a-match-not-made-in-heaven-but-possible-security-tokens-in-the-bitcoin-blockchain-673a55c44dab
· Platforms vs. Networks: Decentralization Vectors in Security Tokens(December 2018): https://hackernoon.com/platforms-vs-networks-decentralization-vectors-in-security-tokens-ae0a97212922
· Against Security Token Standards(November 2018):https://hackernoon.com/against-security-token-standards-ae896cc5bb4
· Some Cool Protocols to Consider for the Next Generation of Security Token Platforms(October 2018): https://hackernoon.com/some-cool-protocols-to-consider-for-the-next-generation-of-security-token-platforms-98697f0c55e6
· The Blocks of a Security Token Platform(June 2018):https://hackernoon.com/the-blocks-of-a-security-token-platform-cd8aada4af43
About Programmability
· Towards More Programmable and Robust Security Tokens(April 2019): https://hackernoon.com/towards-more-programmable-and-robust-security-tokens-five-protocols-that-should-be-part-of-a02093bcb190
· Some Ideas to Unlock Programmability in Security Tokens(January 2019): https://hackernoon.com/some-ideas-to-unlock-programmability-in-security-tokens-19407dbd4bb7
About Financial Protocols and Security Tokens
· Collateralized Debt Positions for Security Tokens(February 2019): https://hackernoon.com/collateralized-debt-positions-for-security-tokens-28b7ec8f5522
· About the Relationship Between Stablecoins and Security Tokens(February 2019): https://hackernoon.com/about-the-relationship-between-stablecoins-and-security-tokens-a26e43f15d9a
· Thin Security Token Protocols: A Taxonomy(January 2019): https://hackernoon.com/thin-security-token-protocols-a-taxonomy-172c0c6c734b
· Some Ideas About Collateralized Multi-Asset Security Tokens: Part II(January 2019): https://hackernoon.com/some-ideas-about-collateralized-multi-asset-security-tokens-part-ii-101da5b28211
· Some Ideas About Collateralized Multi-Asset Security Tokens: Part I(January 2019): https://hackernoon.com/some-ideas-about-collateralized-multi-asset-security-tokens-part-i-7dea880d79bf
· Cashflow on the Blockchain Part III: Reimagining Debt with Security Tokens(December 2018): https://hackernoon.com/cashflow-on-the-blockchain-part-iii-reimagining-debt-with-security-tokens-b724b5791755
· Cashflow on the Blockchain Part II: A Protocol for Tokenized Debt(December 2018): https://hackernoon.com/cashflow-on-the-blockchain-part-ii-a-protocol-for-tokenized-debt-5433ca2d8c33
· Cashflow on the Blockchain Part I: Tokenized Debt and Security Tokens(December 2018): https://hackernoon.com/cashflow-on-the-blockchain-part-i-tokenized-debt-and-security-tokens-18054dbf7dc
· Three Non-Trivial Capabilities of Derivatives that can Unlock the Potential of Security Tokens(November 2018):https://hackernoon.com/three-non-trivial-capabilities-of-derivatives-that-can-unlock-the-potential-of-security-tokens-f05b9807ffc8
· The Security Token Derivatives are Coming(June 2018):https://medium.com/coinmonks/security-token-derivatives-are-coming-8439555e7e5a
· How to Value a Security Token? Part I: Factors to Consider(July 2018):https://hackernoon.com/how-to-value-a-security-token-part-i-factors-to-consider-5a5a79b3e5d9
· Five Simple Features that can Improve the Current Generation of Security Token Platforms(September 2018):https://medium.com/coinmonks/five-simple-features-that-can-improve-the-current-generation-of-security-token-platforms-1868c41dadbd
· The Case Against Security Tokens in Ethereum(September 2018):https://hackernoon.com/the-case-against-security-tokens-in-ethereum-cc08e0b00c2f
About Disclosures
· Programmable Disclosures and Security Tokens(April 2019): https://hackernoon.com/programmable-disclosures-and-security-tokens-656857ad27b4
· About Disclosures and Information Asymmetry in Security Tokens(November 2018): https://hackernoon.com/about-disclosures-and-information-asymmetry-in-security-tokens-fc83c350548a
About Liquidity
· Some Big Picture Thoughts About Liquidity and Security Tokens( November 2018): https://hackernoon.com/some-thoughts-about-liquidity-and-security-tokens-d3c3f52b417a
About Voting and Governance
· Taking the First Step in Security Token Governance: Extending Security Token Protocols with Voting Rights(January 2019): https://hackernoon.com/taking-the-first-step-in-security-token-governance-extending-security-token-protocols-with-voting-6d8bb6e9f407
· Security Tokens 2.0: About On-Chain Governance [Part II](October 2018): https://hackernoon.com/security-tokens-2-0-about-on-chain-governance-part-ii-ca9378cea172
· Security Tokens 2.0: Some Thoughts Off-Chain vs. On-Chain Governance(October 2018): https://hackernoon.com/security-token-2-0-some-thoughts-off-chain-vs-on-chain-governance-2cba087389ab
· Liberal Radicalism and Security Tokens: Quadratic Voting as a Governance Protocol(September 2018): https://hackernoon.com/liberal-radicalism-and-security-tokens-part-i-quadratic-voting-as-a-governance-protocol-10705af3697a
· What Blockchain Technologists Should Know About Voting Theory(August 2018): https://hackernoon.com/what-blockchain-technologists-should-know-about-voting-theory-f9bac8e5a1c9
· A Different Way to Think About Security Tokens: Programmable Regulation(July 2018): https://medium.com/coinmonks/a-different-way-to-think-about-security-tokens-programmable-regulation-78f785fbd21a
· These Three New Trends in Game Theory could Be Part of the Next Big Blockchain(July 2018): https://medium.com/coinmonks/these-three-new-trends-in-game-theory-could-be-part-of-the-next-big-blockchain-6fe961bd81db
· · Voting and Governance in Security Tokens(June 2018):https://medium.com/coinmonks/voting-and-governance-in-security-tokens-1e3d041dabb8
About Oracles
· The Know-Your-Oracle Thesis: Some Thoughts About Oracles in Security Tokens(February 2019): https://hackernoon.com/the-know-your-oracle-thesis-some-thoughts-about-oracles-in-security-tokens-e0be9932f04e
· The Middleman of Trust: The Oracle Paradox and Five Protocols that can Bring External Data into the Blockchain(July 2018):https://hackernoon.com/the-middleman-of-trust-the-oracle-paradox-and-five-protocols-that-can-bring-external-data-into-the-df39b63e92ae
About Security & Privacy
· Bulletproofs: The New Kid in Blockchain Security Land(October 2018):https://hackernoon.com/bulletproofs-the-new-kid-in-blockchain-security-land-e730fc0efe14
· The Elephant in the Room: Security and Privacy Protocols in Security Tokens(October 2018): https://hackernoon.com/the-elephant-in-the-room-security-and-privacy-protocols-in-security-tokens-a6687af8d1d6
· From Ethereum to Enigma: Understanding Privacy Protocols in the Blockchain(July 2018): https://hackernoon.com/from-ethereum-to-enigma-understanding-privacy-protocols-in-the-blockchain-ef0b0b76a1a8
About The Security Token 2.0 Thesis
· Security Tokens 2.0(August 2018): Four Protocols that can Power the Next Wave of Tokenized Securities: https://hackernoon.com/security-tokens-2-0-four-protocols-that-can-power-the-next-wave-of-tokenized-securities-92e9eda8887f
· Security Token 2.0 Protocols Part III: Fund and DerivativeTokens(September 2018): https://hackernoon.com/security-token-2-0-protocols-part-iii-fund-and-derivative-tokens-68f594cbb438
· Security Token 2.0 Protocols Part II(September 2018): Hybrid Tokens(August 2018): https://hackernoon.com/security-token-2-0-protocols-part-ii-hybrid-tokens-c66bd151b049
· Security Token 2.0 Protocols: Debt Tokens(August 2018):https://hackernoon.com/security-token-2-0-protocols-debt-tokens-af17d5c91a25
· The Security Token 2.0 Stack(August 2018):https://hackernoon.com/the-security-token-2-0-stack-206b305f5dcd
About Security Token Consensus
· Why Security Token Need a Different Type of Consensus?(September 2018): https://medium.com/@jrodthoughts/why-security-token-need-a-different-type-of-consensus-9a952ff321b4
· Some Ideas About a Consensus Protocol for Security Tokens: Part I:https://hackernoon.com/some-ideas-about-a-consensus-protocol-for-security-tokens-part-i-bda1f0fac54f
The Security Token Anthology: April 2019 Edition was originally published in Hacker Noon on Medium, where people are continuing the conversation by highlighting and responding to this story.
Disclaimer
The views and opinions expressed in this article are solely those of the authors and do not reflect the views of Bitcoin Insider. Every investment and trading move involves risk - this is especially true for cryptocurrencies given their volatility. We strongly advise our readers to conduct their own research when making a decision.