May 3, 2026

Capitalizations Index – B ∞/21M

Five Protocols that Should be Part of…

Five protocols that should be part of…

Five Protocols that Should be Part of…

Five protocols that should be part of…

The market for security token platforms seems to be getting crowder every weeks. In a market with only a handful of actively traded security tokens, we already have over 50 platforms that are promising to be the future of crypto-securities. On paper, most of those platforms look incredibly similar which contributes to the noise in the market. To differentiate signal from noise, security token platforms must evolve their technical capabilities in order to support more sophisticated offerings. And we don’t need to start from scratch; the Ethereum ecosystem offers a rich set of protocols that can easily improve the feature-set of the next generation security token platforms. Today, I would like to explore some key protocols that I believe are incredibly well suited for building some of the key blocks of the security token infrastructure.

The goal of this article is not to focus on super futuristic capabilities but rather in features that are already present in the current generation of use cases and in protocols that have achieved meaningful level of traction and maturity.

Until now, security token platforms have focused on solving two fundamental problems: compliance and post-issuance management. While these capabilities are incredibly important, there are far from being sufficient to enable sophisticated security token offerings(STOs). New STOs are already demanding new infrastructure capabilities which are missing from the current ecosystem of security token platforms.

The Biggest Competitor of Security Token Platforms

The current state of the crypto-securities markets presents a strange dynamic in which security token platforms are not really competing against themselves but against custom issuances by, let’s say, more sophisticated vendors. Recently, we’ve seen the announcements of the Provenance’s and Blockstack’s STOs both of which are likely to be built in-house instead of relying on an existing platform. You can certainly make the case that those are isolated examples but I believe they are a manifestation of a familiar dynamic in early stage app-driven technology markets.

Technology markets can be classified in two main groups: infrastructure-driven and app-driven. In infrastructure-driven markets(ex: software-defined networking, quantum computing…), the evolution of the space is fundamentally dictated by breakthroughs in the infrastructure layer. On the other hand, app-driven markets(mobile apps, web….) evolve based not only on infrastructure breakthroughs but on the evolution of domain-specific use-cases. When the infrastructure to support those use cases doesn’t evolve fast enough, it creates an incentive for some parts of the market to deliver custom-built solutions that address use-cases that are not enabled by the more mainstream platforms. In a healthy and competitive app-driven technology market, the value proposition of the platforms should eventually catch up and surpass the early stage custom-built platforms but that path is not always clear in the early days.

Another interesting dynamic of app-driven technology markets is that, in most cases, applications tend to drive infrastructure improvements (I make the caveat of in most cases because that dynamic is extremely complicated)

In the context of security tokens, the infrastructure provided by the current generation of platforms remains relatively basic and you can try to boil the ocean with exoteric use cases that have no correlation with real world scenarios. However, in the current state of the crypto-securities market, we are already seeing some major challenges that can translate into immediate capabilities in the next wave of security token platforms. Here are some of my favorites:

· Privacy: The current model for security tokens in the Ethereum blockchain lacks the access control and privacy levels required by some security offerings.

· Identity: Security tokens desperately need interoperable and more robust ways to represent identity for investors and issuers.

· Data Access: Querying and accessing runtime data about crypto-securities is essential for reporting and compliance requirements.

· Disclosures: Ability to publish and access material information relevant to a security token is key to bring fairness to the security token market.

· On-Chain Legal Agreements: Enforcing security token agreements on-chain.

Five Protocols that can Help Improve Security Token Platforms in the Short Term

In order to avoid confusion, I’d listed a single protocol per capability. That doesn’t mean that those are the only protocols addressing that specific challenge but rather that they are some of the easiest one to adapt into security token platforms.

Identity

The notion of identity in security token platforms needs to evolve from a simple output of a know-your-customer(KYC) checkpoint to protocols that enable robust authentication and access control policies. Blockchain identity is an emerging area of research within the Ethereum community but already there are some interesting protocols that can be easily adapted into security token platforms:

· uPort: uPort has been steadily building a series of protocols and solutions for managing identities in decentralized applications. The current stack is compatible with Ethereum smart contracts and can be leveraged in permissioned blockchain applications

Privacy

Security tokens are subjected to diverse privacy requirements based on regulatory constraints. To some extent, privacy can be considered one of the main roadblocks for the mainstream adoption of security tokens. In the current Ethereum ecosystem, there are protocols that are addressing this challenge:

· AZTEC: Aztec enables a zero-knowledge privacy model for Ethereum transactions. Aztec combines techniques such as homomorphic encryption and range proofs to enable computations on top of encrypted transactions.

Data Access

Accessing data generated by security tokens is essential to enable reporting and compliance capabilities for specific industries. However, querying smart contract data remains one of the greatest challenges in the blockchain ecosystem. Here are some protocols that might help:

· The Graph: The Graph provides a model to query smart contract information using GraphQL. This capability allows any third party application to programmatically interact with the data generated by smart contracts without having to build any blockchain specific artifacts.

Oracles

Security tokens require off-chain data in order to ensure their correct behavior as well as fair trade interactions. Oracles is the component of blockchain platforms that bridges on-chain and off-chain data sources. There are several protocols focused on enabling the implementation of Oracles in the Ethereum blockchain:

· Rhombus: The Rhombus protocol provides one of the friendliest and most flexible programming models for the implementation of Ethereum Oracles. Rhombus enables the execution of Oracles on scheduled or on-demand basics.

On-Chain Legal Contracts

Enforcing the premises of a security token contract off-chain remains one of the biggest challenges in the space. The off-chain, on-chain dichotomy remains one of the bigeest roadblocks for the mainstream adoption of security tokens. There are some interesting efforts within the Ethereum community to address this challenge:

· OpenLaw: The OpenLaw protocol provides a foundation for building legally enforceable smart contracts using a flexible programmable model. Many of the building blocks of OpenLaw are immediately applicable to security tokens.

Those are some of the main protocols I think can bring immediate value to security token platforms. The capabilities provided by these protocols can address some of the main challenges in the current generation of security token platforms and improve their value proposition to support more sophisticated offerings.

Published at Tue, 23 Apr 2019 14:08:14 +0000

Previous Article

Ripple’s David Schwartz Sells His XRP Stack, Time to Get Out?

Next Article

Japan’s Second-Richest Man Bet Massively on Bitcoin. He Lost $130 Million

You might be interested in …

WikiLeaks Now Supports Bitcoin SegWit Addresses for Donations

WikiLeaks has long relied upon donations in order to keep exposing government and corporate secrets and corruption. Now another avenue of support is open as Julian Assange announces that WikiLeaks now supports bitcoin SegWit addresses.


WikiLeaks has tirelessly worked to analyze and publish restricted and censored data that exposes corruption and other organizational secrets. In its 10 years of existence, it has amassed a database of over 10 million documents that shed light on things that governments and other entities would prefer to remain in the shadows. WikiLeaks supports a number of donation methods, and the latest one is Bitcoin SegWit addresses.

Donating to Illuminate the Dark

WikiLeaks has expanded its donation base as Julian Assange notes that the group now supports bitcoin SegWit addresses. He notes that transaction fees from SegWit-enabled wallets are minimized, which might help encourage more donations to keep WikiLeaks up and running.

https://platform.twitter.com/widgets.js

Those looking to donate can use WikiLeaks’ main address or generate a one-time private address if they choose to do so. WikiLeaks takes multiple cryptocurrencies as donations, including ZCash, Litecoin, and Monero.

Made for Each Other

Cryptocurrency and WikiLeaks are really made for each other. The non-profit organization relies upon anonymous individuals handing over documents that they feel should see the light of day. Both virtual currency and WikiLeaks exist outside the system and offer a means of promoting change while expanding the exercise of individual freedom.

Julian Assange and WikiLeaks do have a long association with bitcoin. Just two months ago, Assange tweeted that the organization was pushed into investing into the cryptocurrency due to the US government forcing payment companies (Mastercard, Visa, etc.) to carry out “an illegal banking blockade” against WikiLeaks.

https://platform.twitter.com/widgets.js

But it seems that WikiLeaks and Assange has had the last laugh. He says that the group began investing in bitcoins back in 2010 and are now enjoying an extremely healthy return of over 50,000%.

While WikiLeaks has reaped the benefits of government sanctions, thanks to bitcoin and its phenomenal rise in value, Julian Assange is still stuck in the London embassy for Ecuador. He fled to the embassy in 2012 to escape extradition attempts from Sweden for an alleged rape, but Sweden eventually dropped the charges against him. However, the UK police still have a warrant for his arrest for breaking his bail conditions when he moved into the embassy. There he sits, but he and his organization are still proving themselves to be a thorn in the sides of the extremely powerful.

It seems fitting for WikiLeaks to support bitcoin SegWit addresses as many governments are working to restrict cryptocurrency. Now crypto enthusiasts can donate and help stick it to The Man.

What do you think about WikiLeaks now supporting bitcoin SegWit addresses? Have you ever donated to WikiLeaks? Let us know in the comments below.


Images courtesy of Twitter/@JulianAssange and Wikimedia Commons.

The post WikiLeaks Now Supports Bitcoin SegWit Addresses for Donations appeared first on Bitcoinist.com.

Ecc feb 2018 ~ squadland fun

ECC FEB 2018 ~ SQUADLAND FUN

ECC FEB 2018 ~ SQUADLAND FUN Please read the description below for all advocacy links and product / Juice links #DoSomething #GetInvolved ▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇ IF YOU CARE ABOUT VAPING UTILIZE THE FOLLOWING LINKS AND MAKE A […]

¿qué es blockchain?

¿Qué es Blockchain?

¿Qué es Blockchain? El bitcoin es un fenómeno imparable en Internet. Esta criptodivisa está impulsada por el blockchain. Pero, ¿Sabes qué es o en qué consiste esta tecnología? Te lo contamos. ——————————­——————————­- Tienes toda la […]