paint-brush
Some Reflections About Identity and Security Tokens: Part Iby@hackernoon-archives
383 reads
383 reads

Some Reflections About Identity and Security Tokens: Part I

by Jesus Rodriguez6mMarch 26th, 2019
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

Identity is the key element that differentiate security tokens from other blockchain protocols. In the current generation of security token platforms, identity is constrained to the use of “white lists” which represent a directory of investors approved to perform specific transactions. While white lists enable identity-based capabilities, they do not represent a form of identity in and out itself. As the security token space evolves, identity should evolve as a standalone protocols that are used across different security token platforms. Achieving this requires a careful balance between securities law, the characteristics of distributed ledger runtimes and decades of research in identity management protocols. In this two part article, I would like to explore some ideas about identity protocols that could be relevant to the next wave of security token platforms.

Companies Mentioned

Mention Thumbnail
Mention Thumbnail
featured image - Some Reflections About Identity and Security Tokens: Part I
Jesus Rodriguez HackerNoon profile picture
Jesus Rodriguez

Jesus Rodriguez

@hackernoon-archives

L O A D I N G
. . . comments & more!

About Author

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite
Campaign-archive
Snapperbuzz
Coinerblog