Too Long; Didn't Read
This is the second part of a series exploring the potential of security tokens based on debt assets. In the first part,<a href="https://hackernoon.com/cashflow-on-the-blockchain-part-i-tokenized-debt-and-security-tokens-18054dbf7dc" target="_blank">In the first part</a>, we explored the potential of tokenized debt as one products that can unlock the potential of security tokens in the short terms. Today, I would like to deep dive into the building blocks of debt-based security tokens and explore the dynamics of a protocol for this type of crypto-security.