Too Long; Didn't Read
This is the second part of an essay that explores off-chain and on-chain governance models for security tokens.<a href="https://medium.com/@jrodthoughts/security-token-2-0-some-thoughts-off-chain-vs-on-chain-governance-2cba087389ab" target="_blank"> In the first part</a>, we discussed a potential evolutionary path for governance architectures in security tokens going from completely off-chain, to hybrid to on-chain protocols. In this section, I would like to deep dive into on-chain governance models that can be relevant to security tokens.