paint-brush
Thin Security Token Protocols: A Taxonomyby@jrodthoughts
537 reads
537 reads

Thin Security Token Protocols: A Taxonomy

by Jesus Rodriguez5mJanuary 29th, 2019
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

Security tokens offer a blank canvas to reimagine the finance ecosystem with programmability as a first-class citizen. The possibilities are immense but where to start? To build an open, programmable financial system, security tokens will require a new wave of blockchain protocols. However, the security token use cases today are basic enough that don’t need too many protocols beyond a compliance stack. At the same time, its hard to envision sophisticated financial use cases without having the corresponding blockchain protocols. From that perspective, you can say security tokens are experiencing a very aggressive form of the traditional friction between infrastructure and applications in technology markets.

Company Mentioned

Mention Thumbnail
featured image - Thin Security Token Protocols: A Taxonomy
Jesus Rodriguez HackerNoon profile picture
Jesus Rodriguez

Jesus Rodriguez

@jrodthoughts

Chief Scientist, Managing Partner at Invector Labs. CTO at IntoTheBlock. Angel Investor, Writer, Boa

Learn More
LEARN MORE ABOUT @JRODTHOUGHTS'S
EXPERTISE AND PLACE ON THE INTERNET.
L O A D I N G
. . . comments & more!

About Author

Jesus Rodriguez HackerNoon profile picture
Jesus Rodriguez@jrodthoughts
Chief Scientist, Managing Partner at Invector Labs. CTO at IntoTheBlock. Angel Investor, Writer, Boa

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite
Bitcoininsider
Freefoto
Snapperbuzz