Another month and more articles about security tokens. Below you will find the compilation of my writings through last month. It includes new discussions on governance, privacy and even started a new section about whether security tokens require a new blockchain. The entire selection is up to 34 articles that cover most of the important aspects of the security token ecosystem.
Happy reading.
· Do Security Tokens Need a New Blockchain? Benefits and Challenges Part II(October 2018): https://hackernoon.com/do-security-tokens-need-a-new-blockchain-benefits-and-challenges-part-ii-de480e54c12a
· Do Security Tokens Need a New Blockchain? Benefits and Challenges [Part I](October 2018): https://hackernoon.com/do-security-tokens-need-a-new-blockchain-benefits-challenges-part-i-48f281f5101e
· The Future of Security Tokens: Myths and Realities(October 2018): https://hackernoon.com/the-future-of-security-tokens-myths-and-realities-d3371cee9c65
· 20 Ideas About Security Tokens That Most People Disagree With Part II(September 2018): https://hackernoon.com/20-ideas-about-security-tokens-that-most-people-disagree-with-part-ii-44dbc44ea456
· 20 Ideas About Security Tokens That Most People Disagree With Part I(September 2018): https://hackernoon.com/20 -ideas-about-security-tokens-that-most-people-disagree-with-part-i-df86650fe55b
· Want to Understand Security Tokens? Look at this Market Taxonomy(July 2018): https://hackernoon.com/want-to-understand-security-tokens-look-at-this-market-taxonomy-aa70fedfb1aa
· The Launch of Open Finance and the Day Security Tokens Became Real(July 2018): https://medium.com/coinmonks/the-launch-of-open-finance-and-the-day-security-tokens-became-real-6bb48767d5b5
· What We Need To Enable The Security Token Thesis(May 2018):https://medium.com/coinmonks/what-we-need-to-enable-the-security-token-thesis-2eade6ee96f2
· Security Tokens vs. Fat Protocols(May 2018):https://medium.com/coinmonks/security-tokens-vs-fat-protocols-9c4e247d889c
· A Taxonomy for Understanding Tokenized Illiquid Assets and Security Tokens(May 2018): https://medium.com/datadriveninvestor/a-taxonomy-for-understanding-tokenized-illiquid-assets-and-security-tokens-271f0576f9ec
· Some Cool Protocols to Consider for the Next Generation of Security Token Platforms(October 2018): https://hackernoon.com/some-cool-protocols-to-consider-for-the-next-generation-of-security-token-platforms-98697f0c55e6
· The Blocks of a Security Token Platform(June 2018):https://hackernoon.com/the-blocks-of-a-security-token-platform-cd8aada4af43
· The Security Token Derivatives are Coming(June 2018):https://medium.com/coinmonks/security-token-derivatives-are-coming-8439555e7e5a
· How to Value a Security Token? Part I: Factors to Consider(July 2018):https://hackernoon.com/how-to-value-a-security-token-part-i-factors-to-consider-5a5a79b3e5d9
· Five Simple Features that can Improve the Current Generation of Security Token Platforms(September 2018):https://medium.com/coinmonks/five-simple-features-that-can-improve-the-current-generation-of-security-token-platforms-1868c41dadbd
· The Case Against Security Tokens in Ethereum(September 2018):https://hackernoon.com/the-case-against-security-tokens-in-ethereum-cc08e0b00c2f
· Security Tokens 2.0: About On-Chain Governance [Part II](October 2018): https://hackernoon.com/security-tokens-2-0-about-on-chain-governance-part-ii-ca9378cea172
· Security Tokens 2.0: Some Thoughts Off-Chain vs. On-Chain Governance(October 2018): https://hackernoon.com/security-token-2-0-some-thoughts-off-chain-vs-on-chain-governance-2cba087389ab
· Liberal Radicalism and Security Tokens: Quadratic Voting as a Governance Protocol(September 2018): https://hackernoon.com/liberal-radicalism-and-security-tokens-part-i-quadratic-voting-as-a-governance-protocol-10705af3697a
· What Blockchain Technologists Should Know About Voting Theory(August 2018): https://hackernoon.com/what-blockchain-technologists-should-know-about-voting-theory-f9bac8e5a1c9
· A Different Way to Think About Security Tokens: Programmable Regulation(July 2018): https://medium.com/coinmonks/a-different-way-to-think-about-security-tokens-programmable-regulation-78f785fbd21a
· These Three New Trends in Game Theory could Be Part of the Next Big Blockchain(July 2018): https://medium.com/coinmonks/these-three-new-trends-in-game-theory-could-be-part-of-the-next-big-blockchain-6fe961bd81db
· · Voting and Governance in Security Tokens(June 2018):https://medium.com/coinmonks/voting-and-governance-in-security-tokens-1e3d041dabb8
· The Middleman of Trust: The Oracle Paradox and Five Protocols that can Bring External Data into the Blockchain(July 2018):https://hackernoon.com/the-middleman-of-trust-the-oracle-paradox-and-five-protocols-that-can-bring-external-data-into-the-df39b63e92ae
· Bulletproofs: The New Kid in Blockchain Security Land(October 2018): https://hackernoon.com/bulletproofs-the-new-kid-in-blockchain-security-land-e730fc0efe14
· The Elephant in the Room: Security and Privacy Protocols in Security Tokens(October 2018): https://hackernoon.com/the-elephant-in-the-room-security-and-privacy-protocols-in-security-tokens-a6687af8d1d6
· From Ethereum to Enigma: Understanding Privacy Protocols in the Blockchain(July 2018): https://hackernoon.com/from-ethereum-to-enigma-understanding-privacy-protocols-in-the-blockchain-ef0b0b76a1a8
· Security Tokens 2.0(August 2018): Four Protocols that can Power the Next Wave of Tokenized Securities: https://hackernoon.com/security-tokens-2-0-four-protocols-that-can-power-the-next-wave-of-tokenized-securities-92e9eda8887f
· Security Token 2.0 Protocols Part III: Fund and Derivative Tokens(September 2018): https://hackernoon.com/security-token-2-0-protocols-part-iii-fund-and-derivative-tokens-68f594cbb438
· Security Token 2.0 Protocols Part II(September 2018): Hybrid Tokens(August 2018): https://hackernoon.com/security-token-2-0-protocols-part-ii-hybrid-tokens-c66bd151b049
· Security Token 2.0 Protocols: Debt Tokens(August 2018):https://hackernoon.com/security-token-2-0-protocols-debt-tokens-af17d5c91a25
· The Security Token 2.0 Stack(August 2018):https://hackernoon.com/the-security-token-2-0-stack-206b305f5dcd
· Why Security Token Need a Different Type of Consensus?(September 2018): https://medium.com/@jrodthoughts/why-security-token-need-a-different-type-of-consensus-9a952ff321b4
· Some Ideas About a Consensus Protocol for Security Tokens: Part I:https://hackernoon.com/some-ideas-about-a-consensus-protocol-for-security-tokens-part-i-bda1f0fac54f