The Security Token Anthology: June 2019 Edition

Jesus Rodriguez
Jul 11 · 8 min read

Another month and it’s time to publish the newest Security Token Anthology which includes my recent articles about crypto-securities. Last month I wrote about some ideas regarding the Ethereum leadership in digital securities as well as some controversial market perspectives. The current version of the anthology includes 75 articles.

Happy Reading!

New Articles

· Moving Beyond the Ethereum Phase of Security Tokens(June 2019): https://hackernoon.com/moving-beyond-the-ethereum-phase-of-security-tokensthe-a6e056cc61bb

· The Platform-Product-Market-Fit Dilemma and the New Blockchains that can Challenge Ethereum in the Security Tokens Market(June 2019): https://hackernoon.com/moving-beyond-the-ethereum-phase-of-security-tokensthe-a6e056cc61bb

· The Theory of Marginal Improvements and Security Tokens(June 2019): https://hackernoon.com/the-theory-of-marginal-improvements-and-security-tokens-4f61a1312491

Security Token Topics

About a Security Token Blockchain

· Blockchains, Networks, Protocols or Fantasies in Security Tokens: Part I( May 2019): https://hackernoon.com/blockchains-networks-protocols-or-fantasies-in-security-tokens-part-i-fa398947d8c5

· Blockchains, Networks, Protocols or Fantasies in Security Tokens Part II: Consensus, Identity and Hard Questions(May 2019): https://hackernoon.com/blockchains-networks-protocols-or-fantasies-in-security-tokens-part-ii-consensus-identity-and-2b1a2089f7d6

· A Local Maximum Paradox: Permissioned Blockchains and Security Tokens(April 2019): https://hackernoon.com/a-local-maximum-paradox-permissioned-blockchains-and-security-tokens-ec43d75cf52

· Some Thoughts About Security Token Networks: Part I(April 2019): https://hackernoon.com/some-thoughts-about-security-token-networks-part-i-d94518e7f32e

· Some Thoughts About Security Token Networks: Part II(April 2019): https://hackernoon.com/some-thoughts-about-security-token-networks-part-ii-4b56eb198cbb

· Do Security Tokens Need a New Blockchain? Part IV: How About a Sidechain?(November 2018): https://hackernoon.com/do-security-tokens-need-a-new-blockchain-part-iv-how-about-a-sidechain-acd8686d8fae

· Do Security Tokens Need a New Blockchain? Part III: The Building Blocks(November 2018): https://hackernoon.com/do-security-tokens-need-a-new-blockchain-part-iii-the-building-blocks-7adfa7239bb0

· Do Security Tokens Need a New Blockchain? Benefits and Challenges Part II(October 2018): https://hackernoon.com/do-security-tokens-need-a-new-blockchain-benefits-and-challenges-part-ii-de480e54c12a

· Do Security Tokens Need a New Blockchain? Benefits and Challenges [Part I](October 2018): https://hackernoon.com/do-security-tokens-need-a-new-blockchain-benefits-challenges-part-i-48f281f5101e

About the Security Token Market Dynamics

· The Theory of Marginal Improvements and Security Tokens(June 2019): https://hackernoon.com/the-theory-of-marginal-improvements-and-security-tokens-4f61a1312491

· Against Security Token Purism(February 2019): https://medium.com/@jrodthoughts/against-security-token-purism-e40deeb55cd3

· Four Healthy Frictions Will Guide the Future of Security Tokens(February 2019) https://hackernoon.com/four-healthy-frictions-that-will-guide-the-future-of-security-tokens-2387c15affb4

· 20 Controversial Observations (Not Predictions) About Security Tokens in 2019: Part II(December 2018): https://hackernoon.com/20-controversial-observations-not-predictions-about-security-tokens-in-2019-part-ii-ab6104e1904b

· 20 Controversial Observations (Not Predictions) About Security Tokens in 2019: Part I(December 2018): https://hackernoon.com/20-controversial-observations-not-predictions-about-security-tokens-in-2019-part-i-46dd9b1a25f8

· Thin Protocols, Lack of Network Effects and A Theory of Value for Security Tokens(December 2018): https://hackernoon.com/thin-protocols-lack-of-network-effects-and-a-theory-of-value-for-security-tokens-7e8a3bd3b9d

· Clearing Through the Hype: The Inevitable Series A Crunch Facing Security Token Startups(November 2018):https://hackernoon.com/clearing-through-the-hype-the-inevitable-series-a-crunch-facing-security-token-startups-a60dfdae25a8

· The Biggest Dilemma in Security Tokens: Infrastructure vs. Applications(November 2018): https://hackernoon.com/the-biggest-dilemma-in-security-tokens-infrastructure-vs-applications-2a9a6a54a10b

· The Future of Security Tokens: Myths and Realities(October 2018):https://hackernoon.com/the-future-of-security-tokens-myths-and-realities-d3371cee9c65

· 20 Ideas About Security Tokens That Most People Disagree With Part II(September 2018): https://hackernoon.com/20-ideas-about-security-tokens-that-most-people-disagree-with-part-ii-44dbc44ea456

· 20 Ideas About Security Tokens That Most People Disagree With Part I(September 2018): https://hackernoon.com/20 -ideas-about-security-tokens-that-most-people-disagree-with-part-i-df86650fe55b

· Want to Understand Security Tokens? Look at this Market Taxonomy(July 2018): https://hackernoon.com/want-to-understand-security-tokens-look-at-this-market-taxonomy-aa70fedfb1aa

· The Launch of Open Finance and the Day Security Tokens Became Real(July 2018): https://medium.com/coinmonks/the-launch-of-open-finance-and-the-day-security-tokens-became-real-6bb48767d5b5

· What We Need To Enable The Security Token Thesis(May 2018):https://medium.com/coinmonks/what-we-need-to-enable-the-security-token-thesis-2eade6ee96f2

· Security Tokens vs. Fat Protocols(May 2018):https://medium.com/coinmonks/security-tokens-vs-fat-protocols-9c4e247d889c

· A Taxonomy for Understanding Tokenized Illiquid Assets and Security Tokens(May 2018): https://medium.com/datadriveninvestor/a-taxonomy-for-understanding-tokenized-illiquid-assets-and-security-tokens-271f0576f9ec

About Security Token Platforms

· Moving Beyond the Ethereum Phase of Security Tokens(June 2019): https://hackernoon.com/moving-beyond-the-ethereum-phase-of-security-tokensthe-a6e056cc61bb

· The Platform-Product-Market-Fit Dilemma and the New Blockchains that can Challenge Ethereum in the Security Tokens Market(June 2019): https://hackernoon.com/moving-beyond-the-ethereum-phase-of-security-tokensthe-a6e056cc61bb

· Demystifying Security Token Standards(May 2019): https://hackernoon.com/demystifying-security-token-standards-18693f13c25d

· Value-Leaking Protocols and Security Tokens(April 2019): https://hackernoon.com/value-leaking-protocols-and-security-tokens-789d85638f

· The Fantasy of Self-Service Security Token Issuances and Some Ideas to Fix It: Part I(February 2019): https://hackernoon.com/the-fantasy-of-self-service-security-token-issuances-and-some-ideas-to-fix-it-part-i-5a1bc00b3a4a

· Security Tokens in the Bitcoin Blockchain(January 2019): https://hackernoon.com/a-match-not-made-in-heaven-but-possible-security-tokens-in-the-bitcoin-blockchain-673a55c44dab

· Platforms vs. Networks: Decentralization Vectors in Security Tokens(December 2018): https://hackernoon.com/platforms-vs-networks-decentralization-vectors-in-security-tokens-ae0a97212922

· Against Security Token Standards(November 2018):https://hackernoon.com/against-security-token-standards-ae896cc5bb4

· Some Cool Protocols to Consider for the Next Generation of Security Token Platforms(October 2018): https://hackernoon.com/some-cool-protocols-to-consider-for-the-next-generation-of-security-token-platforms-98697f0c55e6

· The Blocks of a Security Token Platform(June 2018):https://hackernoon.com/the-blocks-of-a-security-token-platform-cd8aada4af43

About Programmability

· Towards More Programmable and Robust Security Tokens(April 2019): https://hackernoon.com/towards-more-programmable-and-robust-security-tokens-five-protocols-that-should-be-part-of-a02093bcb190

· Some Ideas to Unlock Programmability in Security Tokens(January 2019): https://hackernoon.com/some-ideas-to-unlock-programmability-in-security-tokens-19407dbd4bb7

About Financial Protocols and Security Tokens

· Collateralized Debt Positions for Security Tokens(February 2019): https://hackernoon.com/collateralized-debt-positions-for-security-tokens-28b7ec8f5522

· About the Relationship Between Stablecoins and Security Tokens(February 2019): https://hackernoon.com/about-the-relationship-between-stablecoins-and-security-tokens-a26e43f15d9a

· Thin Security Token Protocols: A Taxonomy(January 2019): https://hackernoon.com/thin-security-token-protocols-a-taxonomy-172c0c6c734b

· Some Ideas About Collateralized Multi-Asset Security Tokens: Part II(January 2019): https://hackernoon.com/some-ideas-about-collateralized-multi-asset-security-tokens-part-ii-101da5b28211

· Some Ideas About Collateralized Multi-Asset Security Tokens: Part I(January 2019): https://hackernoon.com/some-ideas-about-collateralized-multi-asset-security-tokens-part-i-7dea880d79bf

· Cashflow on the Blockchain Part III: Reimagining Debt with Security Tokens(December 2018): https://hackernoon.com/cashflow-on-the-blockchain-part-iii-reimagining-debt-with-security-tokens-b724b5791755

· Cashflow on the Blockchain Part II: A Protocol for Tokenized Debt(December 2018): https://hackernoon.com/cashflow-on-the-blockchain-part-ii-a-protocol-for-tokenized-debt-5433ca2d8c33

· Cashflow on the Blockchain Part I: Tokenized Debt and Security Tokens(December 2018): https://hackernoon.com/cashflow-on-the-blockchain-part-i-tokenized-debt-and-security-tokens-18054dbf7dc

· Three Non-Trivial Capabilities of Derivatives that can Unlock the Potential of Security Tokens(November 2018):https://hackernoon.com/three-non-trivial-capabilities-of-derivatives-that-can-unlock-the-potential-of-security-tokens-f05b9807ffc8

· The Security Token Derivatives are Coming(June 2018):https://medium.com/coinmonks/security-token-derivatives-are-coming-8439555e7e5a

· How to Value a Security Token? Part I: Factors to Consider(July 2018):https://hackernoon.com/how-to-value-a-security-token-part-i-factors-to-consider-5a5a79b3e5d9

· Five Simple Features that can Improve the Current Generation of Security Token Platforms(September 2018):https://medium.com/coinmonks/five-simple-features-that-can-improve-the-current-generation-of-security-token-platforms-1868c41dadbd

· The Case Against Security Tokens in Ethereum(September 2018):https://hackernoon.com/the-case-against-security-tokens-in-ethereum-cc08e0b00c2f

About Disclosures

· Four Ideas to Enable Disclosures for Security Tokens(May 2019): https://hackernoon.com/four-ideas-to-enable-disclosures-for-security-tokens-12d865249e6b

· Programmable Disclosures and Security Tokens(April 2019): https://hackernoon.com/programmable-disclosures-and-security-tokens-656857ad27b4

· About Disclosures and Information Asymmetry in Security Tokens(November 2018): https://hackernoon.com/about-disclosures-and-information-asymmetry-in-security-tokens-fc83c350548a

About Liquidity

· Some Big Picture Thoughts About Liquidity and Security Tokens(
November 2018):
https://hackernoon.com/some-thoughts-about-liquidity-and-security-tokens-d3c3f52b417a

About Voting and Governance

· Taking the First Step in Security Token Governance: Extending Security Token Protocols with Voting Rights(January 2019): https://hackernoon.com/taking-the-first-step-in-security-token-governance-extending-security-token-protocols-with-voting-6d8bb6e9f407

· Security Tokens 2.0: About On-Chain Governance [Part II](October 2018): https://hackernoon.com/security-tokens-2-0-about-on-chain-governance-part-ii-ca9378cea172

· Security Tokens 2.0: Some Thoughts Off-Chain vs. On-Chain Governance(October 2018): https://hackernoon.com/security-token-2-0-some-thoughts-off-chain-vs-on-chain-governance-2cba087389ab

· Liberal Radicalism and Security Tokens: Quadratic Voting as a Governance Protocol(September 2018): https://hackernoon.com/liberal-radicalism-and-security-tokens-part-i-quadratic-voting-as-a-governance-protocol-10705af3697a

· What Blockchain Technologists Should Know About Voting Theory(August 2018): https://hackernoon.com/what-blockchain-technologists-should-know-about-voting-theory-f9bac8e5a1c9

· A Different Way to Think About Security Tokens: Programmable Regulation(July 2018): https://medium.com/coinmonks/a-different-way-to-think-about-security-tokens-programmable-regulation-78f785fbd21a

· These Three New Trends in Game Theory could Be Part of the Next Big Blockchain(July 2018): https://medium.com/coinmonks/these-three-new-trends-in-game-theory-could-be-part-of-the-next-big-blockchain-6fe961bd81db

· · Voting and Governance in Security Tokens(June 2018):https://medium.com/coinmonks/voting-and-governance-in-security-tokens-1e3d041dabb8

About Oracles

· The Know-Your-Oracle Thesis: Some Thoughts About Oracles in Security Tokens(February 2019): https://hackernoon.com/the-know-your-oracle-thesis-some-thoughts-about-oracles-in-security-tokens-e0be9932f04e

· The Middleman of Trust: The Oracle Paradox and Five Protocols that can Bring External Data into the Blockchain(July 2018):https://hackernoon.com/the-middleman-of-trust-the-oracle-paradox-and-five-protocols-that-can-bring-external-data-into-the-df39b63e92ae

About Security & Privacy

· Demystifying Security of Security Tokens( May 2019): https://hackernoon.com/demystifying-security-for-security-tokens-3b9ee5e86a18

· Bulletproofs: The New Kid in Blockchain Security Land(October 2018):https://hackernoon.com/bulletproofs-the-new-kid-in-blockchain-security-land-e730fc0efe14

· The Elephant in the Room: Security and Privacy Protocols in Security Tokens(October 2018): https://hackernoon.com/the-elephant-in-the-room-security-and-privacy-protocols-in-security-tokens-a6687af8d1d6

· From Ethereum to Enigma: Understanding Privacy Protocols in the Blockchain(July 2018): https://hackernoon.com/from-ethereum-to-enigma-understanding-privacy-protocols-in-the-blockchain-ef0b0b76a1a8

About The Security Token 2.0 Thesis

· Security Tokens 2.0(August 2018): Four Protocols that can Power the Next Wave of Tokenized Securities: https://hackernoon.com/security-tokens-2-0-four-protocols-that-can-power-the-next-wave-of-tokenized-securities-92e9eda8887f

· Security Token 2.0 Protocols Part III: Fund and DerivativeTokens(September 2018): https://hackernoon.com/security-token-2-0-protocols-part-iii-fund-and-derivative-tokens-68f594cbb438

· Security Token 2.0 Protocols Part II(September 2018): Hybrid Tokens(August 2018): https://hackernoon.com/security-token-2-0-protocols-part-ii-hybrid-tokens-c66bd151b049

· Security Token 2.0 Protocols: Debt Tokens(August 2018):https://hackernoon.com/security-token-2-0-protocols-debt-tokens-af17d5c91a25

· The Security Token 2.0 Stack(August 2018):https://hackernoon.com/the-security-token-2-0-stack-206b305f5dcd

About Security Token Consensus

· Why Security Token Need a Different Type of Consensus?(September 2018): https://medium.com/@jrodthoughts/why-security-token-need-a-different-type-of-consensus-9a952ff321b4

· Some Ideas About a Consensus Protocol for Security Tokens: Part I:https://hackernoon.com/some-ideas-about-a-consensus-protocol-for-security-tokens-part-i-bda1f0fac54f

Jesus Rodriguez

Written by

Chief Scientist, Managing Partner at Invector Labs, Angel Investor, Columnist at CIO.com, Board Member of Several Software Companies