May is here and it’s time to publish the newest Security Anthology which includes my recent articles about crypto-securities. Last month I published articles that cover key security topics such as disclosures or identity as well as one of my newest obsessions: security networks. The current version of the anthology includes 67 articles.
Happy Reading!
New Articles
· Programmable Disclosures and Security (April 2019):
· Some Thoughts About Security Networks: Part I(April 2019):
· Some Thoughts About Security Networks: Part II(April 2019):
· Towards More Programmable and Robust Security (April 2019):
· Value-Leaking Protocols and Security (April 2019):
· A Local Maximum Paradox: Permissioned Blockchains and Security (April 2019):
Security Token Topics
About a Security Token Blockchain
· A Local Maximum Paradox: Permissioned Blockchains and Security (April 2019):
· Some Thoughts About Security Networks: Part I(April 2019):
· Some Thoughts About Security Networks: Part II(April 2019):
· Do Security Need a New ? Part IV: How About a Sidechain?(November 2018):
· Do Security Need a New ? Part III: The Building Blocks(November 2018):
· Do Security Need a New ? Benefits and Challenges Part II(October 2018):
· Do Security Need a New ? Benefits and Challenges [Part I](October 2018):
About the Security Token Market Dynamics
· Against Security Purism(February 2019):
· Four Healthy Frictions Will Guide the Future of Security (February 2019)
· 20 Controversial Observations (Not Predictions) About Security in 2019: Part II(December 2018):
· 20 Controversial Observations (Not Predictions) About Security in 2019: Part I(December 2018):
· Thin Protocols, Lack of Network Effects and A Theory of Value for Security (December 2018):
· Clearing Through the Hype: The Inevitable Series A Crunch Facing Security Startups(November 2018):
· The Biggest Dilemma in Security : Infrastructure vs. Applications(November 2018):
· The Future of Security : Myths and Realities(October 2018):
· 20 Ideas About Security That Most People Disagree With Part II(September 2018):
· 20 Ideas About Security That Most People Disagree With Part I(September 2018):
· Want to Understand Security ? Look at this Market Taxonomy(July 2018):
· The Launch of Open Finance and the Day Security Became Real(July 2018):
· What We Need To Enable The Security Thesis(May 2018):
· Security vs. Fat Protocols(May 2018):
· A Taxonomy for Understanding Tokenized Illiquid Assets and Security (May 2018):
About Security Token Platforms
· Value-Leaking Protocols and Security (April 2019):
· The Fantasy of Self-Service Security Issuances and Some Ideas to Fix It: Part I(February 2019):
· Security in the (January 2019):
· Platforms vs. Networks: Decentralization Vectors in Security (December 2018):
· Against Security Standards(November 2018):
· Some Cool Protocols to Consider for the Next Generation of Security Platforms(October 2018):
· The Blocks of a Security Platform(June 2018):
About Programmability
· Towards More Programmable and Robust Security (April 2019):
· Some Ideas to Unlock Programmability in Security (January 2019):
About Financial Protocols and Security Tokens
· Collateralized Debt Positions for Security (February 2019):
· About the Relationship Between Stablecoins and Security (February 2019):
· Thin Security Protocols: A Taxonomy(January 2019):
· Some Ideas About Collateralized Multi-Asset Security : Part II(January 2019):
· Some Ideas About Collateralized Multi-Asset Security : Part I(January 2019):
· Cashflow on the Part III: Reimagining Debt with Security (December 2018):
· Cashflow on the Part II: A Protocol for Tokenized Debt(December 2018):
· Cashflow on the Part I: Tokenized Debt and Security (December 2018):
· Three Non-Trivial Capabilities of Derivatives that can Unlock the Potential of Security (November 2018):
· The Security Derivatives are Coming(June 2018):
· How to Value a Security ? Part I: Factors to Consider(July 2018):
· Five Simple Features that can Improve the Current Generation of Security Platforms(September 2018):
· The Case Against Security in (September 2018):
About Disclosures
· Programmable Disclosures and Security (April 2019):
· About Disclosures and Information Asymmetry in Security (November 2018):
About Liquidity
· Some Big Picture Thoughts About Liquidity and Security (
November 2018):
About Voting and Governance
· Taking the First Step in Security Governance: Extending Security Protocols with Voting Rights(January 2019):
· Security 2.0: About On-Chain Governance [Part II](October 2018):
· Security 2.0: Some Thoughts Off-Chain vs. On-Chain Governance(October 2018):
· Liberal Radicalism and Security : Quadratic Voting as a Governance Protocol(September 2018):
· What Technologists Should Know About Voting Theory(August 2018):
· A Different Way to Think About Security : Programmable (July 2018):
· These Three New Trends in Game Theory could Be Part of the Next Big (July 2018):
· · Voting and Governance in Security (June 2018):
About Oracles
· The Know-Your-Oracle Thesis: Some Thoughts About Oracles in Security (February 2019):
· The Middleman of Trust: The Oracle Paradox and Five Protocols that can Bring External Data into the (July 2018):
About Security & Privacy
· Bulletproofs: The New Kid in Security Land(October 2018):
· The Elephant in the Room: Security and Privacy Protocols in Security (October 2018):
· From to Enigma: Understanding Privacy Protocols in the (July 2018):
About The Security Token 2.0 Thesis
· Security 2.0(August 2018): Four Protocols that can Power the Next Wave of Tokenized Securities:
· Security 2.0 Protocols Part III: Fund and DerivativeTokens(September 2018):
· Security 2.0 Protocols Part II(September 2018): Hybrid (August 2018):
· Security 2.0 Protocols: Debt (August 2018):
· The Security 2.0 Stack(August 2018):
About Security Token Consensus
· Why Security Need a Different Type of Consensus?(September 2018):
· Some Ideas About a Consensus Protocol for Security : Part I:
Published at Fri, 03 May 2019 15:09:34 +0000