paint-brush
Thin Security Token Protocols: A Taxonomyby@jrodthoughts
537 reads
537 reads

Thin Security Token Protocols: A Taxonomy

by Jesus RodriguezJanuary 29th, 2019
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

Security tokens offer a blank canvas to reimagine the finance ecosystem with programmability as a first-class citizen. The possibilities are immense but where to start? To build an open, programmable financial system, security tokens will require a new wave of blockchain protocols. However, the security token use cases today are basic enough that don’t need too many protocols beyond a compliance stack. At the same time, its hard to envision sophisticated financial use cases without having the corresponding blockchain protocols. From that perspective, you can say security tokens are experiencing a very aggressive form of the traditional friction between infrastructure and applications in technology markets.
featured image - Thin Security Token Protocols: A Taxonomy
Jesus Rodriguez HackerNoon profile picture
Jesus Rodriguez

Jesus Rodriguez

@jrodthoughts

L O A D I N G
. . . comments & more!

About Author

Jesus Rodriguez HackerNoon profile picture
Jesus Rodriguez@jrodthoughts

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite
Bitcoininsider
Freefoto
Snapperbuzz