paint-brush
The Security Token Anthology: March 2019 Editionby@jrodthoughts
344 reads
344 reads

The Security Token Anthology: March 2019 Edition

by Jesus RodriguezApril 12th, 2019
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

April is here and is time to release another edition of the Security Token Anthology which compiles some of my recent articles about crypto-securities. Last month I put some work into some of my favorite subjects such as identity, privacy and programmability. The current version of the anthology includes 67 articles.

Company Mentioned

Mention Thumbnail

Coin Mentioned

Mention Thumbnail
featured image - The Security Token Anthology: March 2019 Edition
Jesus Rodriguez HackerNoon profile picture

April is here and is time to release another edition of the Security Token Anthology which compiles some of my recent articles about crypto-securities. Last month I put some work into some of my favorite subjects such as identity, privacy and programmability. The current version of the anthology includes 67 articles.

Happy Reading!

New Articles

· Private and Compliant: About Zero-Knowledge Proofs and Security Token Protocols(March 2019): https://hackernoon.com/private-and-compliant-about-zero-knowledge-proofs-and-security-token-protocols-3a46a853e48d .

· Pragmatic Programmability in Security Tokens(March 2019): https://medium.com/@jrodthoughts/pragmatic-programmability-in-security-tokens-7fbf082718be .

· Programmability and the Product vs. Network Friction in Security Tokens(March 2019): https://hackernoon.com/programmability-and-the-product-vs-network-friction-in-security-tokens-b01f106c88fa.

· Some Reflections About Identity and Security Tokens: Part II(March 2019): https://hackernoon.com/some-reflections-about-identity-and-security-tokens-part-ii-d4152affea5b .

· Some Reflections About Identity and Security Tokens: Part I(March 2019): https://hackernoon.com/some-reflections-about-identity-and-security-tokens-part-i-e9ed2da93a6b.

· The Fantasy of Self-Service Security Token Issuances and Some Ideas to Fix It: Part II(March 2019): https://hackernoon.com/the-fantasy-of-self-service-security-token-issuances-and-some-ideas-to-fix-it-part-ii-1855fc15bb6e.

Security Token Topics

About a Security Token Blockchain

· Do Security Tokens Need a New Blockchain? Part IV: How About a Sidechain?(November 2018): https://hackernoon.com/do-security-tokens-need-a-new-blockchain-part-iv-how-about-a-sidechain-acd8686d8fae

· Do Security Tokens Need a New Blockchain? Part III: The Building Blocks(November 2018): https://hackernoon.com/do-security-tokens-need-a-new-blockchain-part-iii-the-building-blocks-7adfa7239bb0

· Do Security Tokens Need a New Blockchain? Benefits and Challenges Part II(October 2018): https://hackernoon.com/do-security-tokens-need-a-new-blockchain-benefits-and-challenges-part-ii-de480e54c12a

· Do Security Tokens Need a New Blockchain? Benefits and Challenges [Part I](October 2018): https://hackernoon.com/do-security-tokens-need-a-new-blockchain-benefits-challenges-part-i-48f281f5101e

About the Security Token Market Dynamics

· Against Security Token Purism(February 2019): https://medium.com/@jrodthoughts/against-security-token-purism-e40deeb55cd3

· Four Healthy Frictions Will Guide the Future of Security Tokens(February 2019) https://hackernoon.com/four-healthy-frictions-that-will-guide-the-future-of-security-tokens-2387c15affb4

· 20 Controversial Observations (Not Predictions) About Security Tokens in 2019: Part II(December 2018): https://hackernoon.com/20-controversial-observations-not-predictions-about-security-tokens-in-2019-part-ii-ab6104e1904b

· 20 Controversial Observations (Not Predictions) About Security Tokens in 2019: Part I(December 2018): https://hackernoon.com/20-controversial-observations-not-predictions-about-security-tokens-in-2019-part-i-46dd9b1a25f8

· Thin Protocols, Lack of Network Effects and A Theory of Value for Security Tokens(December 2018): https://hackernoon.com/thin-protocols-lack-of-network-effects-and-a-theory-of-value-for-security-tokens-7e8a3bd3b9d

· Clearing Through the Hype: The Inevitable Series A Crunch Facing Security Token Startups(November 2018):https://hackernoon.com/clearing-through-the-hype-the-inevitable-series-a-crunch-facing-security-token-startups-a60dfdae25a8

· The Biggest Dilemma in Security Tokens: Infrastructure vs. Applications(November 2018): https://hackernoon.com/the-biggest-dilemma-in-security-tokens-infrastructure-vs-applications-2a9a6a54a10b

· The Future of Security Tokens: Myths and Realities(October 2018):https://hackernoon.com/the-future-of-security-tokens-myths-and-realities-d3371cee9c65

· 20 Ideas About Security Tokens That Most People Disagree With Part II(September 2018): https://hackernoon.com/20-ideas-about-security-tokens-that-most-people-disagree-with-part-ii-44dbc44ea456

· 20 Ideas About Security Tokens That Most People Disagree With Part I(September 2018): https://hackernoon.com/20 -ideas-about-security-tokens-that-most-people-disagree-with-part-i-df86650fe55b

· Want to Understand Security Tokens? Look at this Market Taxonomy(July 2018): https://hackernoon.com/want-to-understand-security-tokens-look-at-this-market-taxonomy-aa70fedfb1aa

· The Launch of Open Finance and the Day Security Tokens Became Real(July 2018): https://medium.com/coinmonks/the-launch-of-open-finance-and-the-day-security-tokens-became-real-6bb48767d5b5

· What We Need To Enable The Security Token Thesis(May 2018):https://medium.com/coinmonks/what-we-need-to-enable-the-security-token-thesis-2eade6ee96f2

· Security Tokens vs. Fat Protocols(May 2018):https://medium.com/coinmonks/security-tokens-vs-fat-protocols-9c4e247d889c

· A Taxonomy for Understanding Tokenized Illiquid Assets and Security Tokens(May 2018): https://medium.com/datadriveninvestor/a-taxonomy-for-understanding-tokenized-illiquid-assets-and-security-tokens-271f0576f9ec

About Security Token Platforms

· The Fantasy of Self-Service Security Token Issuances and Some Ideas to Fix It: Part II(March 2019): https://hackernoon.com/the-fantasy-of-self-service-security-token-issuances-and-some-ideas-to-fix-it-part-ii-1855fc15bb6e.

· The Fantasy of Self-Service Security Token Issuances and Some Ideas to Fix It: Part I(February 2019): https://hackernoon.com/the-fantasy-of-self-service-security-token-issuances-and-some-ideas-to-fix-it-part-i-5a1bc00b3a4a

· Security Tokens in the Bitcoin Blockchain(January 2019): https://hackernoon.com/a-match-not-made-in-heaven-but-possible-security-tokens-in-the-bitcoin-blockchain-673a55c44dab

· Platforms vs. Networks: Decentralization Vectors in Security Tokens(December 2018): https://hackernoon.com/platforms-vs-networks-decentralization-vectors-in-security-tokens-ae0a97212922

· Against Security Token Standards(November 2018):https://hackernoon.com/against-security-token-standards-ae896cc5bb4

· Some Cool Protocols to Consider for the Next Generation of Security Token Platforms(October 2018): https://hackernoon.com/some-cool-protocols-to-consider-for-the-next-generation-of-security-token-platforms-98697f0c55e6

· The Blocks of a Security Token Platform(June 2018):https://hackernoon.com/the-blocks-of-a-security-token-platform-cd8aada4af43

About Programmability

· Pragmatic Programmability in Security Tokens(March 2019): https://medium.com/@jrodthoughts/pragmatic-programmability-in-security-tokens-7fbf082718be .

· Programmability and the Product vs. Network Friction in Security Tokens(March 2019): https://hackernoon.com/programmability-and-the-product-vs-network-friction-in-security-tokens-b01f106c88fa.

· Some Ideas to Unlock Programmability in Security Tokens(January 2019): https://hackernoon.com/some-ideas-to-unlock-programmability-in-security-tokens-19407dbd4bb7

About Financial Protocols and Security Tokens

· Collateralized Debt Positions for Security Tokens(February 2019): https://hackernoon.com/collateralized-debt-positions-for-security-tokens-28b7ec8f5522

· About the Relationship Between Stablecoins and Security Tokens(February 2019): https://hackernoon.com/about-the-relationship-between-stablecoins-and-security-tokens-a26e43f15d9a

· Thin Security Token Protocols: A Taxonomy(January 2019): https://hackernoon.com/thin-security-token-protocols-a-taxonomy-172c0c6c734b

· Some Ideas About Collateralized Multi-Asset Security Tokens: Part II(January 2019): https://hackernoon.com/some-ideas-about-collateralized-multi-asset-security-tokens-part-ii-101da5b28211

· Some Ideas About Collateralized Multi-Asset Security Tokens: Part I(January 2019): https://hackernoon.com/some-ideas-about-collateralized-multi-asset-security-tokens-part-i-7dea880d79bf

· Cashflow on the Blockchain Part III: Reimagining Debt with Security Tokens(December 2018): https://hackernoon.com/cashflow-on-the-blockchain-part-iii-reimagining-debt-with-security-tokens-b724b5791755

· Cashflow on the Blockchain Part II: A Protocol for Tokenized Debt(December 2018): https://hackernoon.com/cashflow-on-the-blockchain-part-ii-a-protocol-for-tokenized-debt-5433ca2d8c33

· Cashflow on the Blockchain Part I: Tokenized Debt and Security Tokens(December 2018): https://hackernoon.com/cashflow-on-the-blockchain-part-i-tokenized-debt-and-security-tokens-18054dbf7dc

· Three Non-Trivial Capabilities of Derivatives that can Unlock the Potential of Security Tokens(November 2018):https://hackernoon.com/three-non-trivial-capabilities-of-derivatives-that-can-unlock-the-potential-of-security-tokens-f05b9807ffc8

· The Security Token Derivatives are Coming(June 2018):https://medium.com/coinmonks/security-token-derivatives-are-coming-8439555e7e5a

· How to Value a Security Token? Part I: Factors to Consider(July 2018):https://hackernoon.com/how-to-value-a-security-token-part-i-factors-to-consider-5a5a79b3e5d9

· Five Simple Features that can Improve the Current Generation of Security Token Platforms(September 2018):https://medium.com/coinmonks/five-simple-features-that-can-improve-the-current-generation-of-security-token-platforms-1868c41dadbd

· The Case Against Security Tokens in Ethereum(September 2018):https://hackernoon.com/the-case-against-security-tokens-in-ethereum-cc08e0b00c2f

About Disclosures

· About Disclosures and Information Asymmetry in Security Tokens(November 2018): https://hackernoon.com/about-disclosures-and-information-asymmetry-in-security-tokens-fc83c350548a

About Liquidity


· Some Big Picture Thoughts About Liquidity and Security Tokens(November 2018): https://hackernoon.com/some-thoughts-about-liquidity-and-security-tokens-d3c3f52b417a

About Voting and Governance

· Taking the First Step in Security Token Governance: Extending Security Token Protocols with Voting Rights(January 2019): https://hackernoon.com/taking-the-first-step-in-security-token-governance-extending-security-token-protocols-with-voting-6d8bb6e9f407

· Security Tokens 2.0: About On-Chain Governance [Part II](October 2018): https://hackernoon.com/security-tokens-2-0-about-on-chain-governance-part-ii-ca9378cea172

· Security Tokens 2.0: Some Thoughts Off-Chain vs. On-Chain Governance(October 2018): https://hackernoon.com/security-token-2-0-some-thoughts-off-chain-vs-on-chain-governance-2cba087389ab

· Liberal Radicalism and Security Tokens: Quadratic Voting as a Governance Protocol(September 2018): https://hackernoon.com/liberal-radicalism-and-security-tokens-part-i-quadratic-voting-as-a-governance-protocol-10705af3697a

· What Blockchain Technologists Should Know About Voting Theory(August 2018): https://hackernoon.com/what-blockchain-technologists-should-know-about-voting-theory-f9bac8e5a1c9

· A Different Way to Think About Security Tokens: Programmable Regulation(July 2018): https://medium.com/coinmonks/a-different-way-to-think-about-security-tokens-programmable-regulation-78f785fbd21a

· These Three New Trends in Game Theory could Be Part of the Next Big Blockchain(July 2018): https://medium.com/coinmonks/these-three-new-trends-in-game-theory-could-be-part-of-the-next-big-blockchain-6fe961bd81db

· · Voting and Governance in Security Tokens(June 2018):https://medium.com/coinmonks/voting-and-governance-in-security-tokens-1e3d041dabb8

About Oracles

· The Know-Your-Oracle Thesis: Some Thoughts About Oracles in Security Tokens(February 2019): https://hackernoon.com/the-know-your-oracle-thesis-some-thoughts-about-oracles-in-security-tokens-e0be9932f04e

· The Middleman of Trust: The Oracle Paradox and Five Protocols that can Bring External Data into the Blockchain(July 2018):https://hackernoon.com/the-middleman-of-trust-the-oracle-paradox-and-five-protocols-that-can-bring-external-data-into-the-df39b63e92ae

About Security & Privacy

· Private and Compliant: About Zero-Knowledge Proofs and Security Token Protocols(March 2019): https://hackernoon.com/private-and-compliant-about-zero-knowledge-proofs-and-security-token-protocols-3a46a853e48d .

· Some Reflections About Identity and Security Tokens: Part II(March 2019): https://hackernoon.com/some-reflections-about-identity-and-security-tokens-part-ii-d4152affea5b .

· Some Reflections About Identity and Security Tokens: Part I(March 2019): https://hackernoon.com/some-reflections-about-identity-and-security-tokens-part-i-e9ed2da93a6b.

· Bulletproofs: The New Kid in Blockchain Security Land(October 2018):https://hackernoon.com/bulletproofs-the-new-kid-in-blockchain-security-land-e730fc0efe14

· The Elephant in the Room: Security and Privacy Protocols in Security Tokens(October 2018): https://hackernoon.com/the-elephant-in-the-room-security-and-privacy-protocols-in-security-tokens-a6687af8d1d6

· From Ethereum to Enigma: Understanding Privacy Protocols in the Blockchain(July 2018): https://hackernoon.com/from-ethereum-to-enigma-understanding-privacy-protocols-in-the-blockchain-ef0b0b76a1a8

About The Security Token 2.0 Thesis

· Security Tokens 2.0(August 2018): Four Protocols that can Power the Next Wave of Tokenized Securities: https://hackernoon.com/security-tokens-2-0-four-protocols-that-can-power-the-next-wave-of-tokenized-securities-92e9eda8887f

· Security Token 2.0 Protocols Part III: Fund and DerivativeTokens(September 2018): https://hackernoon.com/security-token-2-0-protocols-part-iii-fund-and-derivative-tokens-68f594cbb438

· Security Token 2.0 Protocols Part II(September 2018): Hybrid Tokens(August 2018): https://hackernoon.com/security-token-2-0-protocols-part-ii-hybrid-tokens-c66bd151b049

· Security Token 2.0 Protocols: Debt Tokens(August 2018):https://hackernoon.com/security-token-2-0-protocols-debt-tokens-af17d5c91a25

· The Security Token 2.0 Stack(August 2018):https://hackernoon.com/the-security-token-2-0-stack-206b305f5dcd

About Security Token Consensus

· Why Security Token Need a Different Type of Consensus?(September 2018): https://medium.com/@jrodthoughts/why-security-token-need-a-different-type-of-consensus-9a952ff321b4

Some Ideas About a Consensus Protocol for Security Tokens: Part I:https://hackernoon.com/some-ideas-about-a-consensus-protocol-for-security-tokens-part-i-bda1f0fac54f