Too Long; Didn't Read
This is the second part of an article exploring ideas about identity capabilities in security tokens<a href="https://hackernoon.com/some-reflections-about-identity-and-security-tokens-part-i-e9ed2da93a6b">. In the first part</a>, we explored some of the basic principles of identity and extrapolated them to the world of crypto-securities. Today, I would like to focus in a technical model to enable some of those principles integrated with existing security token platforms.