The Three Pillars of Security Token Adoption

The Three Pillars of Security Token Adoption

Jesus Rodriguez just penned a new opinion piece on the three fundamental approaches that the security token industry will have to wrestle with. It all comes down to dealing with the current limitations of our digital infrastructure. 


In his new piece titled Blockchains, Networks, Protocols or Fantasies in Security Tokens: Part Ianalyst Jesus Rodriguez outlines three fundamental approaches the security token industry needs moving forward. In the long-term, the space will need to develop its own blockchains specializing in tokenized securities.

According to Rodriguez, we “don’t yet understand what capabilities will be needed beyond [our current] point.” He spells out what the future might look like in his new piece.

The Three Fundamental Approaches

There are three security token infrastructural approaches which Rodriguez believes are most viable for the future. Each has their pros and cons, but the best option, he says, is for security tokens to have their separate blockchains. Simply put, existing public blockchains like Ethereum cannot resolve all of the compliance questions without major hiccups along the way.

Thin Protocols 

Thin protocols are one option Rodriguez mentions in his piece. These would likely be run on the Ethereum blockchain and generally address compliance, identity, or financial primitives. This would be the first phase or ‘tier 1’.

Security Token Networks

The second possible phase would rely on having these security tokens on separate networks, with public blockchains like Ethereum providing the fundamental infrastructure. This can be done through sidechains. Rodriguez cites Provenance or Bumbiont as possible “tier 2” networks specializing in digital securities.

Security Token Blockchains

The final step, these would be standalone distributed ledger systems specializing in security tokens. We have already seen such efforts from Blockstream, Polymath, and others.

Of course, security token blockchains would require an altogether new mode of consensus. It would have to incorporate strictly compliant KYC procedures along with lawful transfer or ownership of assets.

The Future Moving Forward

Currently, we have barely scratched the surface of tier 1, but all of these three tiers are happening simultaneously. However, as the security token space develops, issuers will realize that separate blockchains specializing in security tokens are necessary. After all, the strict legal requirements mean that it is largely inevitable. The question is, how soon can the industry create such systems?

As of now, we’re still in the beginning stages.


Do you believe security tokens need their own separate blockchains specializing in compliance? Do we need to invent new consensus protocols for security tokens? Let us know your thoughts in the comments below. 

Image courtesy of HackerNoon. 

Cookies & Privacy

TheTokenist.io uses cookies to provide you with a great experience and enables you to enjoy all the functionality of the site.