Too Long; Didn't Read
This is the second part of an essay that explores the different types of security tokens that are likely to become relevant building blocks in the next wave of tokenization platform. As the security token space evolves, we should transition from a model in which all security tokens are based on the same financial protocol, essentially representing shares in a private vehicle, to architectures with different crypto-financial primitives that can be composed into sophisticated tokenized financial offerings.