May 17, 2026

Capitalizations Index – B ∞/21M

Five things to know to run a successful blockchain startup

Five things to know to run a successful blockchain startup

By Mattias Hjelmstedt, CEO and Co-founder of Utopia Music, the cutting-edge, blockchain-powered music tracking and attribution platform, which was recently ranked among the 15 new companies in the Crypto Valley Top 50.

During the height of the crypto boom, everybody from Paris Hilton to the Venezuelan government seemed to be either setting up or promoting ICOs as token values skyrocketed. Even ICOs that were blatant jokes like the Useless Ethereum Token reportedly raised $200,000. Those days are over.

The crypto winter has given the blockchain sector the opportunity to step back, take stock, and mature. In this market, only blockchain firms with a solid business case and sound tokenomics will attract investment. Here are 5 things you need to know to run a successful blockchain start-up:      

1. Think about whether you really need blockchain or whether your project could be implemented more efficiently with a conventional database. The most important consideration here is whether trust between users is a major concern. In a field where immutable, time-stamped records are important to all parties, like supply chain management or legal data storage — blockchain could be useful. If you plan to deploy the system internally within an organisation, a normal database would probably be better.

2. Develop a compelling value proposition. Remember that most people don’t care about blockchain technology as much as you do. Many blockchain startups fall into the trap of being too tech focussed and forgetting about the customer. A good value proposition should clearly state who your target market is and how your product will help them.

3. Create a roadmap that sets out how you will scale your project. It is great to dream big, but think about whether your user base will need to reach a critical mass before your platform is useful. If so, you will need to establish a compelling reason for early adopters to come onboard. This may involve altering your business model in the short term to create incentives for users to adopt your technology while the user base is smaller.    

4. Think about whether you really need a utility token or whether a security token would be more appropriate. A utility token needs to play an integral role in the future operation of your platform. Don’t try to shoehorn a utility token into a preconceived business model: if you just want to raise capital, issue a security token instead.  


5. Simplify your tokenomics. The speculative bubble is over. Investors will only invest in an ICO or STO if the token is clearly linked to a useful digital service or underlying asset. Less is more: your white paper needs to be simple, clear and explicit about the link between the token and its underlying value.

Published at Sat, 16 Mar 2019 19:36:14 +0000

Previous Article

Cboe Will Not Relist ₿itcoin Futures Contracts for March

Next Article

Prominent Academic: Bitcoin and Crypto Not True Currencies Until They Can Establish Stability

You might be interested in …

Global Banking System Under Threat As Hackers Crack NSA, SWIFT Again

Hacker group Shadow Brokers has allegedly proved the US National Security Agency (NSA) hacked SWIFT international banking network.


NSA ‘Documents And Files’ Show SWIFT Transactions ‘Monitored’

In “documents and files” released Friday, Reuters reports, the group said it had evidence the NSA used SWIFT to “monitor money flows among some Middle Eastern and Latin American banks.”

The news marks the second time Shadow Brokers has laid claim to compromising NSA secrets. In August 2016, the group said it had entered an agency affiliate and taken details of cyberweapons, which it planned to auction for one million bitcoins.

If true, it is also a further blow to SWIFT, which last year recorded several high-level security failures worth hundreds of millions of dollars.

“NSA hacked a bunch of banks, oil and investment companies in Palestine, UAE, Kuwait, Qatar, Yemen, more,” Mustafa Al-Bassam, computer science researcher at University College London, commented on the findings.

bitcoin Core Dev: Implications Beyond Spying ‘Burning Question’

Reactions from within the cryptocurrency community meanwhile focussed on the broader implications of Shadow Brokers’ latest attack.

Core developer Wladimir van der Laan wrote on Twitter “(finding) indication of tools for manipulation of banks/markets, more than spying” was now the “burning question.”

//platform.twitter.com/widgets.js

As the traditional financial system comes under increasing threat from cyber criminals, bitcoin could emerge as the go-to method for storing wealth thanks to its decentralized blockchain and SHA 256 encryption, especially when compared to the ‘honeypot’ of banks’ centralized databases.

Microsoft Back In Spying Spotlight

The released data does not only focus on SWIFT, but also on Microsoft. Having been outed as involved in NSA spying activities by Wikileaks’ Vault 7 dump in March, the corporation this time is facing stolen code for compromising Windows, “at least some of which still work.”

In a responsorial statement, Microsoft protested ignorance. No official correspondence regarding the threat had been received.

“Other than reporters, no individual or organization has contacted us in relation to the materials released by Shadow Brokers,” it told Reuters.

Windows 10

Regarding the specifics of the SWIFT hack, it appears Dubai-headquarted service bureau Eastnets could be a major target.

Like Microsoft, the SWIFT intermediary denied any malicious activity had occurred.

The reports of an alleged hacker-compromised EastNets Service Bureau network is totally false and unfounded,” the BBC quotes a spokesperson as saying. “The EastNets Network Internal Security Unit has run a complete check of its servers and found no hacker compromise or any vulnerabilities.”

NSA spying activities are claimed to have affected not just companies, but politicians and even everyday consumers.

As part of Vault 7, WikiLeaks suggested end-user electronic devices such as smartphones and smart TVs could have become microphones for intelligence officers to listen in on.

Even Donald Trump and his family may have fallen victim.

What do you think about the Shadow Brokers’ latest claims? Let us know in the comments below!


Images courtesy of Swift, Twitter, Shutterstock

The post Global Banking System Under Threat As Hackers Crack NSA, SWIFT Again appeared first on Bitcoinist.com.

10 Causes that Accept Bitcoin and Cryptocurrency Contributions

BTCMANAGER 10 Causes that Accept bitcoin and Cryptocurrency Contributions Donations in cryptocurrency have been increasing in frequency. Due to their transparency and accountability, non-profit organizations have started to accept contributions in digital currencies, and this […]