The Security Token Anthology: December 2018 Edition

Jesus Rodriguez
Jan 11 · 6 min read

It’s the first month of 2019 and it’s time for another edition of the security token anthology. Below you will find the compilation of my writings in 2018. My first article about security tokens came out in May 2018 and seven months after we have a compilation of almost 50 articles(49 to be exact) that debate different aspects of the security token ecosystem. Last month, I outlined some of my perspectives about the security token market for 2019 in a two-part series and wrote a three-part article about debt protocols.

Happy reading.

About a Security Token Blockchain

· Do Security Tokens Need a New Blockchain? Part IV: How About a Sidechain?(November 2018): https://hackernoon.com/do-security-tokens-need-a-new-blockchain-part-iv-how-about-a-sidechain-acd8686d8fae

· Do Security Tokens Need a New Blockchain? Part III: The Building Blocks(November 2018): https://hackernoon.com/do-security-tokens-need-a-new-blockchain-part-iii-the-building-blocks-7adfa7239bb0

· Do Security Tokens Need a New Blockchain? Benefits and Challenges Part II(October 2018): https://hackernoon.com/do-security-tokens-need-a-new-blockchain-benefits-and-challenges-part-ii-de480e54c12a

· Do Security Tokens Need a New Blockchain? Benefits and Challenges [Part I](October 2018): https://hackernoon.com/do-security-tokens-need-a-new-blockchain-benefits-challenges-part-i-48f281f5101e

About the Security Token Market Dynamics

· 20 Controversial Observations (Not Predictions) About Security Tokens in 2019: Part II(December 2018): https://hackernoon.com/20-controversial-observations-not-predictions-about-security-tokens-in-2019-part-ii-ab6104e1904b

· 20 Controversial Observations (Not Predictions) About Security Tokens in 2019: Part I(December 2018): https://hackernoon.com/20-controversial-observations-not-predictions-about-security-tokens-in-2019-part-i-46dd9b1a25f8

· Thin Protocols, Lack of Network Effects and A Theory of Value for Security Tokens(December 2018): https://hackernoon.com/thin-protocols-lack-of-network-effects-and-a-theory-of-value-for-security-tokens-7e8a3bd3b9d

· Clearing Through the Hype: The Inevitable Series A Crunch Facing Security Token Startups(November 2018):https://hackernoon.com/clearing-through-the-hype-the-inevitable-series-a-crunch-facing-security-token-startups-a60dfdae25a8

· The Biggest Dilemma in Security Tokens: Infrastructure vs. Applications(November 2018): https://hackernoon.com/the-biggest-dilemma-in-security-tokens-infrastructure-vs-applications-2a9a6a54a10b

· The Future of Security Tokens: Myths and Realities(October 2018):https://hackernoon.com/the-future-of-security-tokens-myths-and-realities-d3371cee9c65

· 20 Ideas About Security Tokens That Most People Disagree With Part II(September 2018): https://hackernoon.com/20-ideas-about-security-tokens-that-most-people-disagree-with-part-ii-44dbc44ea456

· 20 Ideas About Security Tokens That Most People Disagree With Part I(September 2018): https://hackernoon.com/20 -ideas-about-security-tokens-that-most-people-disagree-with-part-i-df86650fe55b

· Want to Understand Security Tokens? Look at this Market Taxonomy(July 2018): https://hackernoon.com/want-to-understand-security-tokens-look-at-this-market-taxonomy-aa70fedfb1aa

· The Launch of Open Finance and the Day Security Tokens Became Real(July 2018): https://medium.com/coinmonks/the-launch-of-open-finance-and-the-day-security-tokens-became-real-6bb48767d5b5

· What We Need To Enable The Security Token Thesis(May 2018):https://medium.com/coinmonks/what-we-need-to-enable-the-security-token-thesis-2eade6ee96f2

· Security Tokens vs. Fat Protocols(May 2018):https://medium.com/coinmonks/security-tokens-vs-fat-protocols-9c4e247d889c

· A Taxonomy for Understanding Tokenized Illiquid Assets and Security Tokens(May 2018): https://medium.com/datadriveninvestor/a-taxonomy-for-understanding-tokenized-illiquid-assets-and-security-tokens-271f0576f9ec

About Security Token Platforms

· Platforms vs. Networks: Decentralization Vectors in Security Tokens(December 2018): https://hackernoon.com/platforms-vs-networks-decentralization-vectors-in-security-tokens-ae0a97212922

· Against Security Token Standards(November 2018):https://hackernoon.com/against-security-token-standards-ae896cc5bb4

· Some Cool Protocols to Consider for the Next Generation of Security Token Platforms(October 2018): https://hackernoon.com/some-cool-protocols-to-consider-for-the-next-generation-of-security-token-platforms-98697f0c55e6

· The Blocks of a Security Token Platform(June 2018):https://hackernoon.com/the-blocks-of-a-security-token-platform-cd8aada4af43

About Financial Protocols and Security Tokens

· Cashflow on the Blockchain Part III: Reimagining Debt with Security Tokens(December 2018): https://hackernoon.com/cashflow-on-the-blockchain-part-iii-reimagining-debt-with-security-tokens-b724b5791755

· Cashflow on the Blockchain Part II: A Protocol for Tokenized Debt(December 2018): https://hackernoon.com/cashflow-on-the-blockchain-part-ii-a-protocol-for-tokenized-debt-5433ca2d8c33

· Cashflow on the Blockchain Part I: Tokenized Debt and Security Tokens(December 2018): https://hackernoon.com/cashflow-on-the-blockchain-part-i-tokenized-debt-and-security-tokens-18054dbf7dc

· Three Non-Trivial Capabilities of Derivatives that can Unlock the Potential of Security Tokens(November 2018):https://hackernoon.com/three-non-trivial-capabilities-of-derivatives-that-can-unlock-the-potential-of-security-tokens-f05b9807ffc8

· The Security Token Derivatives are Coming(June 2018):https://medium.com/coinmonks/security-token-derivatives-are-coming-8439555e7e5a

· How to Value a Security Token? Part I: Factors to Consider(July 2018):https://hackernoon.com/how-to-value-a-security-token-part-i-factors-to-consider-5a5a79b3e5d9

· Five Simple Features that can Improve the Current Generation of Security Token Platforms(September 2018):https://medium.com/coinmonks/five-simple-features-that-can-improve-the-current-generation-of-security-token-platforms-1868c41dadbd

· The Case Against Security Tokens in Ethereum(September 2018):https://hackernoon.com/the-case-against-security-tokens-in-ethereum-cc08e0b00c2f

About Disclosures

· About Disclosures and Information Asymmetry in Security Tokens(November 2018): https://hackernoon.com/about-disclosures-and-information-asymmetry-in-security-tokens-fc83c350548a

About Liquidity

· Some Big Picture Thoughts About Liquidity and Security Tokens(
November 2018):
https://hackernoon.com/some-thoughts-about-liquidity-and-security-tokens-d3c3f52b417a

About Voting and Governance

· Security Tokens 2.0: About On-Chain Governance [Part II](October 2018): https://hackernoon.com/security-tokens-2-0-about-on-chain-governance-part-ii-ca9378cea172

· Security Tokens 2.0: Some Thoughts Off-Chain vs. On-Chain Governance(October 2018): https://hackernoon.com/security-token-2-0-some-thoughts-off-chain-vs-on-chain-governance-2cba087389ab

· Liberal Radicalism and Security Tokens: Quadratic Voting as a Governance Protocol(September 2018): https://hackernoon.com/liberal-radicalism-and-security-tokens-part-i-quadratic-voting-as-a-governance-protocol-10705af3697a

· What Blockchain Technologists Should Know About Voting Theory(August 2018): https://hackernoon.com/what-blockchain-technologists-should-know-about-voting-theory-f9bac8e5a1c9

· A Different Way to Think About Security Tokens: Programmable Regulation(July 2018): https://medium.com/coinmonks/a-different-way-to-think-about-security-tokens-programmable-regulation-78f785fbd21a

· These Three New Trends in Game Theory could Be Part of the Next Big Blockchain(July 2018): https://medium.com/coinmonks/these-three-new-trends-in-game-theory-could-be-part-of-the-next-big-blockchain-6fe961bd81db

· · Voting and Governance in Security Tokens(June 2018):https://medium.com/coinmonks/voting-and-governance-in-security-tokens-1e3d041dabb8

About Oracles

· The Middleman of Trust: The Oracle Paradox and Five Protocols that can Bring External Data into the Blockchain(July 2018):https://hackernoon.com/the-middleman-of-trust-the-oracle-paradox-and-five-protocols-that-can-bring-external-data-into-the-df39b63e92ae

About Security & Privacy

· Bulletproofs: The New Kid in Blockchain Security Land(October 2018):https://hackernoon.com/bulletproofs-the-new-kid-in-blockchain-security-land-e730fc0efe14

· The Elephant in the Room: Security and Privacy Protocols in Security Tokens(October 2018): https://hackernoon.com/the-elephant-in-the-room-security-and-privacy-protocols-in-security-tokens-a6687af8d1d6

· From Ethereum to Enigma: Understanding Privacy Protocols in the Blockchain(July 2018): https://hackernoon.com/from-ethereum-to-enigma-understanding-privacy-protocols-in-the-blockchain-ef0b0b76a1a8

About The Security Token 2.0 Thesis

· Security Tokens 2.0(August 2018): Four Protocols that can Power the Next Wave of Tokenized Securities: https://hackernoon.com/security-tokens-2-0-four-protocols-that-can-power-the-next-wave-of-tokenized-securities-92e9eda8887f

· Security Token 2.0 Protocols Part III: Fund and DerivativeTokens(September 2018): https://hackernoon.com/security-token-2-0-protocols-part-iii-fund-and-derivative-tokens-68f594cbb438

· Security Token 2.0 Protocols Part II(September 2018): Hybrid Tokens(August 2018): https://hackernoon.com/security-token-2-0-protocols-part-ii-hybrid-tokens-c66bd151b049

· Security Token 2.0 Protocols: Debt Tokens(August 2018):https://hackernoon.com/security-token-2-0-protocols-debt-tokens-af17d5c91a25

· The Security Token 2.0 Stack(August 2018):https://hackernoon.com/the-security-token-2-0-stack-206b305f5dcd

About Security Token Consensus

· Why Security Token Need a Different Type of Consensus?(September 2018): https://medium.com/@jrodthoughts/why-security-token-need-a-different-type-of-consensus-9a952ff321b4

· Some Ideas About a Consensus Protocol for Security Tokens: Part I:https://hackernoon.com/some-ideas-about-a-consensus-protocol-for-security-tokens-part-i-bda1f0fac54f

Jesus Rodriguez

Written by

Chief Scientist, Managing Partner at Invector Labs. CTO at IntoTheBlock. Angel Investor, Writer, Board Member of Several Software Companies

Welcome to a place where words matter. On Medium, smart voices and original ideas take center stage - with no ads in sight. Watch
Follow all the topics you care about, and we’ll deliver the best stories for you to your homepage and inbox. Explore
Get unlimited access to the best stories on Medium — and support writers while you’re at it. Just $5/month. Upgrade