paint-brush
Security Tokens — Three Types You Should Know Ofby@isaaczcrypto
4,891 reads
4,891 reads

Security Tokens — Three Types You Should Know Of

by Iliya Zaki5mMarch 9th, 2019
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

Similar to traditional <a href="https://hackernoon.com/tagged/security" target="_blank">security</a>, a security token performs the same function except that it confirms ownership through <a href="https://hackernoon.com/tagged/blockchain" target="_blank">blockchain</a> transactions and also make fractional ownership possible. Federal laws that govern securities also apply to Security tokens with the intention of protecting investors on some levels. Security tokens are programmable. Tokenizing securities, in theory, remove the need of a third party by using smart contracts. For example, a loan “tokenized” on a blockchain could automatically make payments without the use of a traditional middleman like a bank. We discussed deeper on the various regulatory requirements around <a href="https://moonwhale.io/security-token-offerings-stos/" target="_blank">security tokens</a> previously on Hackernoon.

People Mentioned

Mention Thumbnail

Companies Mentioned

Mention Thumbnail
Mention Thumbnail
featured image - Security Tokens — Three Types You Should Know Of
Iliya Zaki HackerNoon profile picture
Iliya Zaki

Iliya Zaki

@isaaczcrypto

No longer

Learn More
LEARN MORE ABOUT @ISAACZCRYPTO'S
EXPERTISE AND PLACE ON THE INTERNET.
L O A D I N G
. . . comments & more!

About Author

Iliya Zaki HackerNoon profile picture
Iliya Zaki@isaaczcrypto
No longer

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite