Jesus Rodriguez

Chief Scientist, Managing Partner at Invector Labs. CTO at IntoTheBlock. Angel Investor, Writer, Boa

The Security Token Anthology: March 2019 Edition

April is here and is time to release another edition of the Security Token Anthology which compiles some of my recent articles about crypto-securities. Last month I put some work into some of my favorite subjects such as identity, privacy and programmability. The current version of the anthology includes 67 articles.

Happy Reading!

New Articles

· Private and Compliant: About Zero-Knowledge Proofs and Security Token Protocols(March 2019): https://hackernoon.com/private-and-compliant-about-zero-knowledge-proofs-and-security-token-protocols-3a46a853e48d .

· Pragmatic Programmability in Security Tokens(March 2019): https://medium.com/@jrodthoughts/pragmatic-programmability-in-security-tokens-7fbf082718be .

· Programmability and the Product vs. Network Friction in Security Tokens(March 2019): https://hackernoon.com/programmability-and-the-product-vs-network-friction-in-security-tokens-b01f106c88fa.

· Some Reflections About Identity and Security Tokens: Part II(March 2019): https://hackernoon.com/some-reflections-about-identity-and-security-tokens-part-ii-d4152affea5b .

· Some Reflections About Identity and Security Tokens: Part I(March 2019): https://hackernoon.com/some-reflections-about-identity-and-security-tokens-part-i-e9ed2da93a6b.

· The Fantasy of Self-Service Security Token Issuances and Some Ideas to Fix It: Part II(March 2019): https://hackernoon.com/the-fantasy-of-self-service-security-token-issuances-and-some-ideas-to-fix-it-part-ii-1855fc15bb6e.

Security Token Topics

About a Security Token Blockchain

· Do Security Tokens Need a New Blockchain? Part IV: How About a Sidechain?(November 2018): https://hackernoon.com/do-security-tokens-need-a-new-blockchain-part-iv-how-about-a-sidechain-acd8686d8fae

· Do Security Tokens Need a New Blockchain? Part III: The Building Blocks(November 2018): https://hackernoon.com/do-security-tokens-need-a-new-blockchain-part-iii-the-building-blocks-7adfa7239bb0

· Do Security Tokens Need a New Blockchain? Benefits and Challenges Part II(October 2018): https://hackernoon.com/do-security-tokens-need-a-new-blockchain-benefits-and-challenges-part-ii-de480e54c12a

· Do Security Tokens Need a New Blockchain? Benefits and Challenges [Part I](October 2018): https://hackernoon.com/do-security-tokens-need-a-new-blockchain-benefits-challenges-part-i-48f281f5101e

About the Security Token Market Dynamics

· Against Security Token Purism(February 2019): https://medium.com/@jrodthoughts/against-security-token-purism-e40deeb55cd3

· Four Healthy Frictions Will Guide the Future of Security Tokens(February 2019) https://hackernoon.com/four-healthy-frictions-that-will-guide-the-future-of-security-tokens-2387c15affb4

· 20 Controversial Observations (Not Predictions) About Security Tokens in 2019: Part II(December 2018): https://hackernoon.com/20-controversial-observations-not-predictions-about-security-tokens-in-2019-part-ii-ab6104e1904b

· 20 Controversial Observations (Not Predictions) About Security Tokens in 2019: Part I(December 2018): https://hackernoon.com/20-controversial-observations-not-predictions-about-security-tokens-in-2019-part-i-46dd9b1a25f8

· Thin Protocols, Lack of Network Effects and A Theory of Value for Security Tokens(December 2018): https://hackernoon.com/thin-protocols-lack-of-network-effects-and-a-theory-of-value-for-security-tokens-7e8a3bd3b9d

· Clearing Through the Hype: The Inevitable Series A Crunch Facing Security Token Startups(November 2018):https://hackernoon.com/clearing-through-the-hype-the-inevitable-series-a-crunch-facing-security-token-startups-a60dfdae25a8

· The Biggest Dilemma in Security Tokens: Infrastructure vs. Applications(November 2018): https://hackernoon.com/the-biggest-dilemma-in-security-tokens-infrastructure-vs-applications-2a9a6a54a10b

· The Future of Security Tokens: Myths and Realities(October 2018):https://hackernoon.com/the-future-of-security-tokens-myths-and-realities-d3371cee9c65

· 20 Ideas About Security Tokens That Most People Disagree With Part II(September 2018): https://hackernoon.com/20-ideas-about-security-tokens-that-most-people-disagree-with-part-ii-44dbc44ea456

· 20 Ideas About Security Tokens That Most People Disagree With Part I(September 2018): https://hackernoon.com/20 -ideas-about-security-tokens-that-most-people-disagree-with-part-i-df86650fe55b

· Want to Understand Security Tokens? Look at this Market Taxonomy(July 2018): https://hackernoon.com/want-to-understand-security-tokens-look-at-this-market-taxonomy-aa70fedfb1aa

· The Launch of Open Finance and the Day Security Tokens Became Real(July 2018): https://medium.com/coinmonks/the-launch-of-open-finance-and-the-day-security-tokens-became-real-6bb48767d5b5

· What We Need To Enable The Security Token Thesis(May 2018):https://medium.com/coinmonks/what-we-need-to-enable-the-security-token-thesis-2eade6ee96f2

· Security Tokens vs. Fat Protocols(May 2018):https://medium.com/coinmonks/security-tokens-vs-fat-protocols-9c4e247d889c

· A Taxonomy for Understanding Tokenized Illiquid Assets and Security Tokens(May 2018): https://medium.com/datadriveninvestor/a-taxonomy-for-understanding-tokenized-illiquid-assets-and-security-tokens-271f0576f9ec

About Security Token Platforms

· The Fantasy of Self-Service Security Token Issuances and Some Ideas to Fix It: Part II(March 2019): https://hackernoon.com/the-fantasy-of-self-service-security-token-issuances-and-some-ideas-to-fix-it-part-ii-1855fc15bb6e.

· The Fantasy of Self-Service Security Token Issuances and Some Ideas to Fix It: Part I(February 2019): https://hackernoon.com/the-fantasy-of-self-service-security-token-issuances-and-some-ideas-to-fix-it-part-i-5a1bc00b3a4a

· Security Tokens in the Bitcoin Blockchain(January 2019): https://hackernoon.com/a-match-not-made-in-heaven-but-possible-security-tokens-in-the-bitcoin-blockchain-673a55c44dab

· Platforms vs. Networks: Decentralization Vectors in Security Tokens(December 2018): https://hackernoon.com/platforms-vs-networks-decentralization-vectors-in-security-tokens-ae0a97212922

· Against Security Token Standards(November 2018):https://hackernoon.com/against-security-token-standards-ae896cc5bb4

· Some Cool Protocols to Consider for the Next Generation of Security Token Platforms(October 2018): https://hackernoon.com/some-cool-protocols-to-consider-for-the-next-generation-of-security-token-platforms-98697f0c55e6

· The Blocks of a Security Token Platform(June 2018):https://hackernoon.com/the-blocks-of-a-security-token-platform-cd8aada4af43

About Programmability

· Pragmatic Programmability in Security Tokens(March 2019): https://medium.com/@jrodthoughts/pragmatic-programmability-in-security-tokens-7fbf082718be .

· Programmability and the Product vs. Network Friction in Security Tokens(March 2019): https://hackernoon.com/programmability-and-the-product-vs-network-friction-in-security-tokens-b01f106c88fa.

· Some Ideas to Unlock Programmability in Security Tokens(January 2019): https://hackernoon.com/some-ideas-to-unlock-programmability-in-security-tokens-19407dbd4bb7

About Financial Protocols and Security Tokens

· Collateralized Debt Positions for Security Tokens(February 2019): https://hackernoon.com/collateralized-debt-positions-for-security-tokens-28b7ec8f5522

· About the Relationship Between Stablecoins and Security Tokens(February 2019): https://hackernoon.com/about-the-relationship-between-stablecoins-and-security-tokens-a26e43f15d9a

· Thin Security Token Protocols: A Taxonomy(January 2019): https://hackernoon.com/thin-security-token-protocols-a-taxonomy-172c0c6c734b

· Some Ideas About Collateralized Multi-Asset Security Tokens: Part II(January 2019): https://hackernoon.com/some-ideas-about-collateralized-multi-asset-security-tokens-part-ii-101da5b28211

· Some Ideas About Collateralized Multi-Asset Security Tokens: Part I(January 2019): https://hackernoon.com/some-ideas-about-collateralized-multi-asset-security-tokens-part-i-7dea880d79bf

· Cashflow on the Blockchain Part III: Reimagining Debt with Security Tokens(December 2018): https://hackernoon.com/cashflow-on-the-blockchain-part-iii-reimagining-debt-with-security-tokens-b724b5791755

· Cashflow on the Blockchain Part II: A Protocol for Tokenized Debt(December 2018): https://hackernoon.com/cashflow-on-the-blockchain-part-ii-a-protocol-for-tokenized-debt-5433ca2d8c33

· Cashflow on the Blockchain Part I: Tokenized Debt and Security Tokens(December 2018): https://hackernoon.com/cashflow-on-the-blockchain-part-i-tokenized-debt-and-security-tokens-18054dbf7dc

· Three Non-Trivial Capabilities of Derivatives that can Unlock the Potential of Security Tokens(November 2018):https://hackernoon.com/three-non-trivial-capabilities-of-derivatives-that-can-unlock-the-potential-of-security-tokens-f05b9807ffc8

· The Security Token Derivatives are Coming(June 2018):https://medium.com/coinmonks/security-token-derivatives-are-coming-8439555e7e5a

· How to Value a Security Token? Part I: Factors to Consider(July 2018):https://hackernoon.com/how-to-value-a-security-token-part-i-factors-to-consider-5a5a79b3e5d9

· Five Simple Features that can Improve the Current Generation of Security Token Platforms(September 2018):https://medium.com/coinmonks/five-simple-features-that-can-improve-the-current-generation-of-security-token-platforms-1868c41dadbd

· The Case Against Security Tokens in Ethereum(September 2018):https://hackernoon.com/the-case-against-security-tokens-in-ethereum-cc08e0b00c2f

About Disclosures

· About Disclosures and Information Asymmetry in Security Tokens(November 2018): https://hackernoon.com/about-disclosures-and-information-asymmetry-in-security-tokens-fc83c350548a

About Liquidity

· Some Big Picture Thoughts About Liquidity and Security Tokens(
November 2018):
https://hackernoon.com/some-thoughts-about-liquidity-and-security-tokens-d3c3f52b417a

About Voting and Governance

· Taking the First Step in Security Token Governance: Extending Security Token Protocols with Voting Rights(January 2019): https://hackernoon.com/taking-the-first-step-in-security-token-governance-extending-security-token-protocols-with-voting-6d8bb6e9f407

· Security Tokens 2.0: About On-Chain Governance [Part II](October 2018): https://hackernoon.com/security-tokens-2-0-about-on-chain-governance-part-ii-ca9378cea172

· Security Tokens 2.0: Some Thoughts Off-Chain vs. On-Chain Governance(October 2018): https://hackernoon.com/security-token-2-0-some-thoughts-off-chain-vs-on-chain-governance-2cba087389ab

· Liberal Radicalism and Security Tokens: Quadratic Voting as a Governance Protocol(September 2018): https://hackernoon.com/liberal-radicalism-and-security-tokens-part-i-quadratic-voting-as-a-governance-protocol-10705af3697a

· What Blockchain Technologists Should Know About Voting Theory(August 2018): https://hackernoon.com/what-blockchain-technologists-should-know-about-voting-theory-f9bac8e5a1c9

· A Different Way to Think About Security Tokens: Programmable Regulation(July 2018): https://medium.com/coinmonks/a-different-way-to-think-about-security-tokens-programmable-regulation-78f785fbd21a

· These Three New Trends in Game Theory could Be Part of the Next Big Blockchain(July 2018): https://medium.com/coinmonks/these-three-new-trends-in-game-theory-could-be-part-of-the-next-big-blockchain-6fe961bd81db

· · Voting and Governance in Security Tokens(June 2018):https://medium.com/coinmonks/voting-and-governance-in-security-tokens-1e3d041dabb8

About Oracles

· The Know-Your-Oracle Thesis: Some Thoughts About Oracles in Security Tokens(February 2019): https://hackernoon.com/the-know-your-oracle-thesis-some-thoughts-about-oracles-in-security-tokens-e0be9932f04e

· The Middleman of Trust: The Oracle Paradox and Five Protocols that can Bring External Data into the Blockchain(July 2018):https://hackernoon.com/the-middleman-of-trust-the-oracle-paradox-and-five-protocols-that-can-bring-external-data-into-the-df39b63e92ae

About Security & Privacy

· Private and Compliant: About Zero-Knowledge Proofs and Security Token Protocols(March 2019): https://hackernoon.com/private-and-compliant-about-zero-knowledge-proofs-and-security-token-protocols-3a46a853e48d .

· Some Reflections About Identity and Security Tokens: Part II(March 2019): https://hackernoon.com/some-reflections-about-identity-and-security-tokens-part-ii-d4152affea5b .

· Some Reflections About Identity and Security Tokens: Part I(March 2019): https://hackernoon.com/some-reflections-about-identity-and-security-tokens-part-i-e9ed2da93a6b.

· Bulletproofs: The New Kid in Blockchain Security Land(October 2018):https://hackernoon.com/bulletproofs-the-new-kid-in-blockchain-security-land-e730fc0efe14

· The Elephant in the Room: Security and Privacy Protocols in Security Tokens(October 2018): https://hackernoon.com/the-elephant-in-the-room-security-and-privacy-protocols-in-security-tokens-a6687af8d1d6

· From Ethereum to Enigma: Understanding Privacy Protocols in the Blockchain(July 2018): https://hackernoon.com/from-ethereum-to-enigma-understanding-privacy-protocols-in-the-blockchain-ef0b0b76a1a8

About The Security Token 2.0 Thesis

· Security Tokens 2.0(August 2018): Four Protocols that can Power the Next Wave of Tokenized Securities: https://hackernoon.com/security-tokens-2-0-four-protocols-that-can-power-the-next-wave-of-tokenized-securities-92e9eda8887f

· Security Token 2.0 Protocols Part III: Fund and DerivativeTokens(September 2018): https://hackernoon.com/security-token-2-0-protocols-part-iii-fund-and-derivative-tokens-68f594cbb438

· Security Token 2.0 Protocols Part II(September 2018): Hybrid Tokens(August 2018): https://hackernoon.com/security-token-2-0-protocols-part-ii-hybrid-tokens-c66bd151b049

· Security Token 2.0 Protocols: Debt Tokens(August 2018):https://hackernoon.com/security-token-2-0-protocols-debt-tokens-af17d5c91a25

· The Security Token 2.0 Stack(August 2018):https://hackernoon.com/the-security-token-2-0-stack-206b305f5dcd

About Security Token Consensus

· Why Security Token Need a Different Type of Consensus?(September 2018): https://medium.com/@jrodthoughts/why-security-token-need-a-different-type-of-consensus-9a952ff321b4

Some Ideas About a Consensus Protocol for Security Tokens: Part I:https://hackernoon.com/some-ideas-about-a-consensus-protocol-for-security-tokens-part-i-bda1f0fac54f

More by Jesus Rodriguez

Topics of interest

More Related Stories