The Security Token Anthology: September Edition

Written by jrodthoughts | Published 2018/10/04
Tech Story Tags: blockchain | ethereum | cryptocurrency | security-token | token-anthology

TLDRvia the TL;DR App

In anticipation to the Security Token Industry Launch Conference, I decided to publish the second compilation of my security token articles. This group includes 8 new articles, which makes a total of 27 essays about topics related to security tokens.

Happy reading.

About the Security Token Market Dynamics:

· A Taxonomy for Understanding Tokenized Illiquid Assets and Security Tokens(May 2018): https://medium.com/datadriveninvestor/a-taxonomy-for-understanding-tokenized-illiquid-assets-and-security-tokens-271f0576f9ec

· Security Tokens vs. Fat Protocols(May 2018):https://medium.com/coinmonks/security-tokens-vs-fat-protocols-9c4e247d889c

· What We Need To Enable The Security Token Thesis(May 2018):https://medium.com/coinmonks/what-we-need-to-enable-the-security-token-thesis-2eade6ee96f2

· The Launch of Open Finance and the Day Security Tokens Became Real(July 2018): https://medium.com/coinmonks/the-launch-of-open-finance-and-the-day-security-tokens-became-real-6bb48767d5b5

· Want to Understand Security Tokens? Look at this Market Taxonomy(July 2018): https://hackernoon.com/want-to-understand-security-tokens-look-at-this-market-taxonomy-aa70fedfb1aa

· 20 Ideas About Security Tokens That Most People Disagree With Part I(September 2018): https://hackernoon.com/20 -ideas-about-security-tokens-that-most-people-disagree-with-part-i-df86650fe55b

· 20 Ideas About Security Tokens That Most People Disagree With Part II(September 2018): https://hackernoon.com/20-ideas-about-security-tokens-that-most-people-disagree-with-part-ii-44dbc44ea456

About Security Token Platforms

· The Blocks of a Security Token Platform(June 2018):https://hackernoon.com/the-blocks-of-a-security-token-platform-cd8aada4af43

About Types of Security Tokens

· The Security Token Derivatives are Coming(June 2018):https://medium.com/coinmonks/security-token-derivatives-are-coming-8439555e7e5a

· How to Value a Security Token? Part I: Factors to Consider(July 2018):https://hackernoon.com/how-to-value-a-security-token-part-i-factors-to-consider-5a5a79b3e5d9

· Five Simple Features that can Improve the Current Generation of Security Token Platforms(September 2018): https://medium.com/coinmonks/five-simple-features-that-can-improve-the-current-generation-of-security-token-platforms-1868c41dadbd

· The Case Against Security Tokens in Ethereum(September 2018): https://hackernoon.com/the-case-against-security-tokens-in-ethereum-cc08e0b00c2f

About Voting and Governance

· Voting and Governance in Security Tokens(June 2018):https://medium.com/coinmonks/voting-and-governance-in-security-tokens-1e3d041dabb8

· A Different Way to Think About Security Tokens: Programmable Regulation(July 2018): https://medium.com/coinmonks/a-different-way-to-think-about-security-tokens-programmable-regulation-78f785fbd21a

· What Blockchain Technologists Should Know About Voting Theory(August 2018): https://hackernoon.com/what-blockchain-technologists-should-know-about-voting-theory-f9bac8e5a1c9

· These Three New Trends in Game Theory could Be Part of the Next Big Blockchain(July 2018): https://medium.com/coinmonks/these-three-new-trends-in-game-theory-could-be-part-of-the-next-big-blockchain-6fe961bd81db

· Liberal Radicalism and Security Tokens: Quadratic Voting as a Governance Protocol(September 2018): https://hackernoon.com/liberal-radicalism-and-security-tokens-part-i-quadratic-voting-as-a-governance-protocol-10705af3697a

About Oracles

· The Middleman of Trust: The Oracle Paradox and Five Protocols that can Bring External Data into the Blockchain(July 2018):https://hackernoon.com/the-middleman-of-trust-the-oracle-paradox-and-five-protocols-that-can-bring-external-data-into-the-df39b63e92ae

About Security & Privacy

· From Ethereum to Enigma: Understanding Privacy Protocols in the Blockchain(July 2018): https://hackernoon.com/from-ethereum-to-enigma-understanding-privacy-protocols-in-the-blockchain-ef0b0b76a1a8

About The Security Token 2.0 Thesis

· Security Tokens 2.0(August 2018): Four Protocols that can Power the Next Wave of Tokenized Securities: https://hackernoon.com/security-tokens-2-0-four-protocols-that-can-power-the-next-wave-of-tokenized-securities-92e9eda8887f

· The Security Token 2.0 Stack(August 2018):https://hackernoon.com/the-security-token-2-0-stack-206b305f5dcd

· Security Token 2.0 Protocols: Debt Tokens(August 2018):https://hackernoon.com/security-token-2-0-protocols-debt-tokens-af17d5c91a25

· Security Token 2.0 Protocols Part II: Hybrid Tokens(August 2018): https://hackernoon.com/security-token-2-0-protocols-part-ii-hybrid-tokens-c66bd151b049

· Security Token 2.0 Protocols Part III: Fund and Derivative Tokens(September 2018): https://hackernoon.com/security-token-2-0-protocols-part-iii-fund-and-derivative-tokens-68f594cbb438

About Security Token Consensus

· Why Security Token Need a Different Type of Consensus?(September 2018): https://medium.com/@jrodthoughts/why-security-token-need-a-different-type-of-consensus-9a952ff321b4

· Some Ideas About a Consensus Protocol for Security Tokens: Part I: https://hackernoon.com/some-ideas-about-a-consensus-protocol-for-security-tokens-part-i-bda1f0fac54f


Written by jrodthoughts | Chief Scientist, Managing Partner at Invector Labs. CTO at IntoTheBlock. Angel Investor, Writer, Boa
Published by HackerNoon on 2018/10/04