Another month and is time to release another edition of the Security Token Anthology which compiles some of my recent articles about crypto-securities. Last month I added articles about diverse topics such as governance, programmability and introduced the concept of multi-asset collateralized security tokens to refer to digital securities that represent a dynamic pool of underlying assets. The current version of the anthology includes 55 articles.
Happy Reading!
· Taking the First Step in Security Token Governance: Extending Security Token Protocols with Voting Rights(January 2019): https://hackernoon.com/taking-the-first-step-in-security-token-governance-extending-security-token-protocols-with-voting-6d8bb6e9f407
· Some Ideas to Unlock Programmability in Security Tokens(January 2019): https://hackernoon.com/some-ideas-to-unlock-programmability-in-security-tokens-19407dbd4bb7
· Some Ideas About Collateralized Multi-Asset Security Tokens: Part I(January 2019): https://hackernoon.com/some-ideas-about-collateralized-multi-asset-security-tokens-part-i-7dea880d79bf
· Some Ideas About Collateralized Multi-Asset Security Tokens: Part II(January 2019): https://hackernoon.com/some-ideas-about-collateralized-multi-asset-security-tokens-part-ii-101da5b28211
· Security Tokens in the Bitcoin Blockchain(January 2019): https://hackernoon.com/a-match-not-made-in-heaven-but-possible-security-tokens-in-the-bitcoin-blockchain-673a55c44dab
· Thin Security Token Protocols: A Taxonomy(January 2019): https://hackernoon.com/thin-security-token-protocols-a-taxonomy-172c0c6c734b
· Do Security Tokens Need a New Blockchain? Part IV: How About a Sidechain?(November 2018): https://hackernoon.com/do-security-tokens-need-a-new-blockchain-part-iv-how-about-a-sidechain-acd8686d8fae
· Do Security Tokens Need a New Blockchain? Part III: The Building Blocks(November 2018): https://hackernoon.com/do-security-tokens-need-a-new-blockchain-part-iii-the-building-blocks-7adfa7239bb0
· Do Security Tokens Need a New Blockchain? Benefits and Challenges Part II(October 2018): https://hackernoon.com/do-security-tokens-need-a-new-blockchain-benefits-and-challenges-part-ii-de480e54c12a
· Do Security Tokens Need a New Blockchain? Benefits and Challenges [Part I](October 2018): https://hackernoon.com/do-security-tokens-need-a-new-blockchain-benefits-challenges-part-i-48f281f5101e
· 20 Controversial Observations (Not Predictions) About Security Tokens in 2019: Part II(December 2018): https://hackernoon.com/20-controversial-observations-not-predictions-about-security-tokens-in-2019-part-ii-ab6104e1904b
· 20 Controversial Observations (Not Predictions) About Security Tokens in 2019: Part I(December 2018): https://hackernoon.com/20-controversial-observations-not-predictions-about-security-tokens-in-2019-part-i-46dd9b1a25f8
· Thin Protocols, Lack of Network Effects and A Theory of Value for Security Tokens(December 2018): https://hackernoon.com/thin-protocols-lack-of-network-effects-and-a-theory-of-value-for-security-tokens-7e8a3bd3b9d
· Clearing Through the Hype: The Inevitable Series A Crunch Facing Security Token Startups(November 2018):https://hackernoon.com/clearing-through-the-hype-the-inevitable-series-a-crunch-facing-security-token-startups-a60dfdae25a8
· The Biggest Dilemma in Security Tokens: Infrastructure vs. Applications(November 2018): https://hackernoon.com/the-biggest-dilemma-in-security-tokens-infrastructure-vs-applications-2a9a6a54a10b
· The Future of Security Tokens: Myths and Realities(October 2018):https://hackernoon.com/the-future-of-security-tokens-myths-and-realities-d3371cee9c65
· 20 Ideas About Security Tokens That Most People Disagree With Part II(September 2018): https://hackernoon.com/20-ideas-about-security-tokens-that-most-people-disagree-with-part-ii-44dbc44ea456
· 20 Ideas About Security Tokens That Most People Disagree With Part I(September 2018): https://hackernoon.com/20 -ideas-about-security-tokens-that-most-people-disagree-with-part-i-df86650fe55b
· Want to Understand Security Tokens? Look at this Market Taxonomy(July 2018): https://hackernoon.com/want-to-understand-security-tokens-look-at-this-market-taxonomy-aa70fedfb1aa
· The Launch of Open Finance and the Day Security Tokens Became Real(July 2018): https://medium.com/coinmonks/the-launch-of-open-finance-and-the-day-security-tokens-became-real-6bb48767d5b5
· What We Need To Enable The Security Token Thesis(May 2018):https://medium.com/coinmonks/what-we-need-to-enable-the-security-token-thesis-2eade6ee96f2
· Security Tokens vs. Fat Protocols(May 2018):https://medium.com/coinmonks/security-tokens-vs-fat-protocols-9c4e247d889c
· A Taxonomy for Understanding Tokenized Illiquid Assets and Security Tokens(May 2018): https://medium.com/datadriveninvestor/a-taxonomy-for-understanding-tokenized-illiquid-assets-and-security-tokens-271f0576f9ec
· Security Tokens in the Bitcoin Blockchain(January 2019): https://hackernoon.com/a-match-not-made-in-heaven-but-possible-security-tokens-in-the-bitcoin-blockchain-673a55c44dab
· Platforms vs. Networks: Decentralization Vectors in Security Tokens(December 2018): https://hackernoon.com/platforms-vs-networks-decentralization-vectors-in-security-tokens-ae0a97212922
· Against Security Token Standards(November 2018):https://hackernoon.com/against-security-token-standards-ae896cc5bb4
· Some Cool Protocols to Consider for the Next Generation of Security Token Platforms(October 2018): https://hackernoon.com/some-cool-protocols-to-consider-for-the-next-generation-of-security-token-platforms-98697f0c55e6
· The Blocks of a Security Token Platform(June 2018):https://hackernoon.com/the-blocks-of-a-security-token-platform-cd8aada4af43
· Some Ideas to Unlock Programmability in Security Tokens(January 2019): https://hackernoon.com/some-ideas-to-unlock-programmability-in-security-tokens-19407dbd4bb7
· Thin Security Token Protocols: A Taxonomy(January 2019): https://hackernoon.com/thin-security-token-protocols-a-taxonomy-172c0c6c734b
· Some Ideas About Collateralized Multi-Asset Security Tokens: Part II(January 2019): https://hackernoon.com/some-ideas-about-collateralized-multi-asset-security-tokens-part-ii-101da5b28211
· Some Ideas About Collateralized Multi-Asset Security Tokens: Part I(January 2019): https://hackernoon.com/some-ideas-about-collateralized-multi-asset-security-tokens-part-i-7dea880d79bf
· Cashflow on the Blockchain Part III: Reimagining Debt with Security Tokens(December 2018): https://hackernoon.com/cashflow-on-the-blockchain-part-iii-reimagining-debt-with-security-tokens-b724b5791755
· Cashflow on the Blockchain Part II: A Protocol for Tokenized Debt(December 2018): https://hackernoon.com/cashflow-on-the-blockchain-part-ii-a-protocol-for-tokenized-debt-5433ca2d8c33
· Cashflow on the Blockchain Part I: Tokenized Debt and Security Tokens(December 2018): https://hackernoon.com/cashflow-on-the-blockchain-part-i-tokenized-debt-and-security-tokens-18054dbf7dc
· Three Non-Trivial Capabilities of Derivatives that can Unlock the Potential of Security Tokens(November 2018):https://hackernoon.com/three-non-trivial-capabilities-of-derivatives-that-can-unlock-the-potential-of-security-tokens-f05b9807ffc8
· The Security Token Derivatives are Coming(June 2018):https://medium.com/coinmonks/security-token-derivatives-are-coming-8439555e7e5a
· How to Value a Security Token? Part I: Factors to Consider(July 2018):https://hackernoon.com/how-to-value-a-security-token-part-i-factors-to-consider-5a5a79b3e5d9
· Five Simple Features that can Improve the Current Generation of Security Token Platforms(September 2018):https://medium.com/coinmonks/five-simple-features-that-can-improve-the-current-generation-of-security-token-platforms-1868c41dadbd
· The Case Against Security Tokens in Ethereum(September 2018):https://hackernoon.com/the-case-against-security-tokens-in-ethereum-cc08e0b00c2f
· About Disclosures and Information Asymmetry in Security Tokens(November 2018): https://hackernoon.com/about-disclosures-and-information-asymmetry-in-security-tokens-fc83c350548a
· Some Big Picture Thoughts About Liquidity and Security Tokens( November 2018): https://hackernoon.com/some-thoughts-about-liquidity-and-security-tokens-d3c3f52b417a
· Taking the First Step in Security Token Governance: Extending Security Token Protocols with Voting Rights(January 2019): https://hackernoon.com/taking-the-first-step-in-security-token-governance-extending-security-token-protocols-with-voting-6d8bb6e9f407
· Security Tokens 2.0: About On-Chain Governance [Part II](October 2018): https://hackernoon.com/security-tokens-2-0-about-on-chain-governance-part-ii-ca9378cea172
· Security Tokens 2.0: Some Thoughts Off-Chain vs. On-Chain Governance(October 2018): https://hackernoon.com/security-token-2-0-some-thoughts-off-chain-vs-on-chain-governance-2cba087389ab
· Liberal Radicalism and Security Tokens: Quadratic Voting as a Governance Protocol(September 2018): https://hackernoon.com/liberal-radicalism-and-security-tokens-part-i-quadratic-voting-as-a-governance-protocol-10705af3697a
· What Blockchain Technologists Should Know About Voting Theory(August 2018): https://hackernoon.com/what-blockchain-technologists-should-know-about-voting-theory-f9bac8e5a1c9
· A Different Way to Think About Security Tokens: Programmable Regulation(July 2018): https://medium.com/coinmonks/a-different-way-to-think-about-security-tokens-programmable-regulation-78f785fbd21a
· These Three New Trends in Game Theory could Be Part of the Next Big Blockchain(July 2018): https://medium.com/coinmonks/these-three-new-trends-in-game-theory-could-be-part-of-the-next-big-blockchain-6fe961bd81db
· · Voting and Governance in Security Tokens(June 2018):https://medium.com/coinmonks/voting-and-governance-in-security-tokens-1e3d041dabb8
· The Middleman of Trust: The Oracle Paradox and Five Protocols that can Bring External Data into the Blockchain(July 2018):https://hackernoon.com/the-middleman-of-trust-the-oracle-paradox-and-five-protocols-that-can-bring-external-data-into-the-df39b63e92ae
· Bulletproofs: The New Kid in Blockchain Security Land(October 2018):https://hackernoon.com/bulletproofs-the-new-kid-in-blockchain-security-land-e730fc0efe14
· The Elephant in the Room: Security and Privacy Protocols in Security Tokens(October 2018): https://hackernoon.com/the-elephant-in-the-room-security-and-privacy-protocols-in-security-tokens-a6687af8d1d6
· From Ethereum to Enigma: Understanding Privacy Protocols in the Blockchain(July 2018): https://hackernoon.com/from-ethereum-to-enigma-understanding-privacy-protocols-in-the-blockchain-ef0b0b76a1a8
· Security Tokens 2.0(August 2018): Four Protocols that can Power the Next Wave of Tokenized Securities: https://hackernoon.com/security-tokens-2-0-four-protocols-that-can-power-the-next-wave-of-tokenized-securities-92e9eda8887f
· Security Token 2.0 Protocols Part III: Fund and DerivativeTokens(September 2018): https://hackernoon.com/security-token-2-0-protocols-part-iii-fund-and-derivative-tokens-68f594cbb438
· Security Token 2.0 Protocols Part II(September 2018): Hybrid Tokens(August 2018): https://hackernoon.com/security-token-2-0-protocols-part-ii-hybrid-tokens-c66bd151b049
· Security Token 2.0 Protocols: Debt Tokens(August 2018):https://hackernoon.com/security-token-2-0-protocols-debt-tokens-af17d5c91a25
· The Security Token 2.0 Stack(August 2018):https://hackernoon.com/the-security-token-2-0-stack-206b305f5dcd
· Why Security Token Need a Different Type of Consensus?(September 2018): https://medium.com/@jrodthoughts/why-security-token-need-a-different-type-of-consensus-9a952ff321b4
· Some Ideas About a Consensus Protocol for Security Tokens: Part I:https://hackernoon.com/some-ideas-about-a-consensus-protocol-for-security-tokens-part-i-bda1f0fac54f