paint-brush
22 Stories To Learn About Security Tokenby@learn
444 reads
444 reads

22 Stories To Learn About Security Token

by Learn Repo
Learn Repo HackerNoon profile picture

Learn Repo

@learn

Lets geek out. The HackerNoon library is now ranked by...

January 2nd, 2024
Read on Terminal Reader
Read this story in a terminal
Print this story
Read this story w/o Javascript
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

Learn everything you need to know about Security Token via these 22 free HackerNoon stories.

People Mentioned

Mention Thumbnail

Amy Tom

@amymtom

Mention Thumbnail

Mysterium Network

@evanmcfarland

Company Mentioned

Mention Thumbnail
Augmentastic || Augmented Reality
featured image - 22 Stories To Learn About Security Token
1x
Read by Dr. One voice-avatar

Listen to this story

Learn Repo HackerNoon profile picture
Learn Repo

Learn Repo

@learn

Lets geek out. The HackerNoon library is now ranked by reading time created. Start learning by what others read most.

About @learn
LEARN MORE ABOUT @LEARN'S
EXPERTISE AND PLACE ON THE INTERNET.

Let's learn about Security Token via these 22 free stories. They are ordered by most time reading created on HackerNoon. Visit the /Learn Repo to find the most read stories about any technology.

1. What Can be Tokenized? The Tokenization of Everything

image
It may be hard to believe, but soon you could earn a fraction of Christiano Ronaldo’s earnings. You could own a few square metres of an apartment in Hong Kong or perhaps a stake in a collectible Formula 1 race car. Thanks to tokenization, the world is becoming increasingly fractionalized everyday, providing us with the ability to shape our own financial destiny.

2. How To Redirect USB Dongle: Hyper-V USB passthrough

image
Majority of software programs require a hardware USB dongle in order to produce correct results. And what if you need to work with such a program in virtual environment where you cannot plug the dongle? There is no full-blown mechanism for connecting USB devices to virtual machine in Hyper-V, so when server is virtualized, all references with USB bus and USB devices connected to it are gone.

3. Using Session Cookies Vs. JWT for Authentication

image
HTTP is a stateless protocol and is used to transmit data. It enables the communication between the client side and the server side. It was originally established to build a connection between web browsers and web servers.

4. An Open Letter to President Trump on Crypto

image
Money has evolved alongside societies for over 40,000 years — satisfying basic human needs for a means of exchange, a method of payment, a standard of value, a store of wealth, and a unit of account. This evolution occurred both along traditional trade routes like the Maritime Silk Road, but also more recently along digital trade routes — like the Internet and blockchain.

5. What Is Tokenization? The Standards Explained

image
Tokenization is a term that's constantly thrown around but the different standards that exist may not be as well understood. These are the basic standards.

6. How Decentralized Systems Are Reshaping the Financial Market

image
Many centralized organizations operate in an old-fashioned way, although they have long lost their credibility. But is there a solution?

7. Why Doesn't Crypto Have Mainstream Adoption?

image
What's Stopping Cryptocurrency From Achieving Mainstream Adoption? The COVID-19 pandemic and the lockdown have increased the demand for cryptocurrencies/

8. Security tokens: The New Blockchain Era

image
Blockchain is evolving into a new phase of our technological society. It is growing exponentially like other life-changing technologies used to, similar to the internet. The different possible ways of making money, presenting projects and bringing new ideas to light every day is what makes the cryptocurrency world so interesting. But let’s focus on a soon very hot topic, security tokens.

9. Understanding JWTs from Beginning to End

image
In this article, we will explore mainly JWT and JWS. In addition, we'll also go through JWE, JWA, and JWK quickly.

10. Mette Kibsgaard, DigiShares's Co-founder & CMO on Gaining Tractions with Customers

image
DigiShares was nominated as one of the best startups in Aalborg, Denmark in Startups of The Year hosted by HackerNoon.

11. How Brickken is Making it Possible to Tokenize Company Stock

image
Brickken has built a platform and toolbox that enables businesses to convert their traditional assets onto the Ethereum blockchain.

12. Everything You Ever Wanted To Know About Reg A+ Offerings

image
Historically, companies raise funding through public (stock market, available to all) or private (high-amount investments from accredited investors, called Regulation D) means.

13. What Are JWTs And Should You Use Them?

image
JWT is the abbreviation of JSON Web Tokens. JSON Web Token (JWT) is an open standard (RFC 7519) that defines a compact and self-contained way for securely transmitting information between parties as a JSON object.

14. How To Get Your Token Listed On A Crypto Exchange (Podcast Transcript)

image
Amy Tom talks to Yevheniia Shmelkova, the Token Specialist at Mysterium Network about crypto exchanges.

15. YubiKey Introduction: GCP Service Account Key Generator

image
Or how to stop leakage of your keys once and for all

16. What are ENV Files? - Pros, Cons, Alternatives

image
What are ENV files and why as an industry should we move away from them?Three months ago we stopped using ENV files.

17. Ensuring Security: A Guide for Web and Mobile Application Development

image
Authentication and authorization for modern web and mobile applications are a key part of most development cycles. This story outlines some considerations.

18. Stablecoin Economy: A Brief History of the Top Ten Stablecoins 

image
Alyze Sam, Adam Alonzi, Patrick Devereux and Koosha Azim term themselves themselves ‘the Stablecoin Group’ as they collectively try to be the unbiased go-to for Stablecoin knowledge, with the help of their communities. Alyze Sam's book, ‘Stablecoin Economy’ was released May 14, 2020. This article is a section from my book that breaks down the top ten stablecoins. Please enjoy this free chapter and consider supporting my work, as I produce a stablecoin to reward children for altruism.  Thank you!

19. 3 Software Solutions to Help Hedge Fund & Private Equity Firms Scale

image
What’s more impressive to your investors...a $10B AUM fund with $50M of AUM per Full-Time Employee (FTE), or $500M of AUM per FTE?

20. Don't Test The SEC: Declare As Utility or A Security

image
Recently, in some Blockhain projects born mostly by the brand new teams from around the world that are going to make an ICO, it has become very fashionable to show up or rather be brazenly proud that their project token easily and freely pass such a terrible and hated by everyone - The Howey Test.

21. The Difference Between OAuth 2.0 And Session Management

image
There seems to be a lot of misinformation on when OAuth 2.0 (henceforth referred to as OAuth) is appropriate for use. A lot of developers confuse OAuth with web session management and hence end up using the wrong protocol / set of technologies. This, in turn, leads to security issues. This article will clarify when to use regular session management solutions and when to use any one of the OAuth flows.

22. What's With The SEC Mulling Over Safe Harbor Laws for Cryptocurrencies?

image

Thank you for checking out the 22 most read stories about Security Token on HackerNoon.

Visit the /Learn Repo to find the most read stories about any technology.

L O A D I N G
. . . comments & more!

About Author

Learn Repo HackerNoon profile picture
Learn Repo@learn
Lets geek out. The HackerNoon library is now ranked by reading time created. Start learning by what others read most.

TOPICS

THIS ARTICLE WAS FEATURED IN...

Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite
Learnrepo
Coffee-web
Cryptofans

Mentioned in this story

X REMOVE AD