Connect with us

Business

Project to Watch: Eximchain

Published

on

The Eximchain project is designed to help companies organize supply chains. The solutions that will be implemented on the platform are aimed at ensuring the possibility of establishing effective and reliable business connections, transactions and information exchange.

Team

The American project Eximchain (Export and import on Blockchain) was founded in 2015 at the Massachusetts Institute of Technology. Since then, its authors have created a set of key-based toolkits to transform the global supply chain by integrating it into a platform. The ideas proposed by the project developers are aimed at improving the transparency of the ecosystem.

A group of 20 experts and consultants is working on the creation of the platform, including:

Hope Lew – Co-founder and CEO, received a bachelor’s degree from Peking University and an MBA from the Massachusetts Institute of Technology, handled international transactions at the Asian branch of UBS for 6.5 years, is the head of the laboratory of the Association of Office Supplies of North America.

Juan Sebastian Huertas -Co-founder and technical director, received a bachelor’s degree in computer science from the Massachusetts Institute of Technology, began studying programming at age 13, previously advised many startups on technical aspects.

Jiang Xu – Business architect, previously worked at IBM for 14 years, with previous roles as executive project manager and enterprise software distribution manager.

Jia Zhang – Business analyst, has been in the supply business since 1994, has been managing global trade finance and international settlement at ICBC for seven years, then took the position of Chief Representative of MS Textiles in China, where she has been working successfully for about ten years.

Strategic partners of the project include:

  • blockseed.vc
  • alphabit.fund
  • fbg.capital
  • hashed.com
  • inblockchain.co
  • kenetic.capital
  • signum.capital
  • emurgo.io
  • enuma.io
  • gbic.io
  • YOOsourcing

Main Project Goals

Eximchain’s authors intend to innovate and change the current supply chain organization system by overcoming barriers, strengthening coordination and increasing confidence in cross-border operations using blockchain technology.

The Eximchain platform will offer ample opportunities, from networking with suppliers to inventory management. The product will operate from a public blockchain with a high level of confidentiality. It is ideal for corporate use by supply chain organizations and application developers who need blockchain technology.

All stakeholders involved in creating effective supply chains will be able to more effectively and securely cooperate, carry out mutual settlements and exchange information.

Partnership with YOOsourcing

Eximchain developers have developed a partnership with the YOOsourcing platform, which allows users to verify the authenticity and reliability of suppliers.

Thanks to the YOOsourcing partnership, users of mobile applications will be able to fulfill requests from suppliers directly from the supplier’s company profile. The platform has a built-in verification system designed to ensure the accuracy of the displayed information.

This will allow suppliers using the Eximchain platform to track their requests, promote new products and develop tactics to attract future business leaders. Using the blockchain technology in the platform will increase confidence in accountability, data storage and agreements between suppliers and buyers on the YOOSourcing platform.

Token 

Digital coins on the platform will be based on the standard ERC-20 protocol. The purpose of their creation is to act as a valid register for the genesis file of the Eximchain main network. The ERC-20 routers will be distributed across the Ethereum blockchain by the corresponding ERC-20 smart contract. They are repurchased for Eximchain’s internal tokens after the network has been launched.

With the launch of the main network, Eximchain’s internal tokens will be used to pay for network charges, check state changes, and management functions.

They are also designed to access applications built on the Eximchain network, such as smart contracts and products developed using the SDK platform.

Advantages of Smart Contract SDK

The use of smart contracts for developers provides many advantages and opportunities:

Financing. It is carried out through instant and transparent order confirmation and check on the blockchain. Suppliers will be able to receive prepayments, and buyers will be able to use the option of arbitration.

Procure-to-Pay. Users will be able to conduct an audit through a finally agreed contract at each stage of the payment procedure. This process will be carried out in real time via the network without the need for trust and the use of a secure protocol.

Platforms of suppliers or rating agents will be able to use the “Proof of Existence” (PoE) algorithm to control time, check the integrity of documents and other purposes. This will allow independent verification without the need for data disclosure.

Inventory Management. Conducted by sharing real-time demand information to create a supply chain. This will allow participants to improve their inventory plans and automate the alignment process in different registers and systems to save time and reduce costs.

Risk mitigation. Eximchain will allow for real-time dynamic monitoring of processes within the supply chain to ensure the visibility of all operations. Participants will be able to control risks through a single function.

Price and Liquidity

The EXC token price is currently valued at $0.0274281298 (-13.52%), which is equivalent to 0.0002654258 ETH and 0.00000712 BTC. Its 24-hour volume is$18,756 and has an overall market cap of $1,846,090.

Returns since ICO: 0.08x USD, which is equivalent to 0.70x ETH and 0.19x BTC. The token is listed on Bilaxy and Idex.

Disclaimer: The author owns bitcoin, Ethereum and other cryptocurrencies. He holds investment positions in the coins, but does not engage in short-term or day-trading.

Featured image courtesy of Shutterstock.

 

Important: Never invest (trade with) money you can't afford to comfortably lose. Always do your own research and due diligence before placing a trade. Read our Terms & Conditions here. Trade recommendations and analysis are written by our analysts which might have different opinions. Read my 6 Golden Steps to Financial Freedom here. Best regards, Jonas Borchgrevink.

Rate this post:

Important for improving the service. Please add a comment in the comment field below explaining what you rated and why you gave it that rate. Failed Trade Recommendations should not be rated as that is considered a failure either way.
1 vote, average: 5.00 out of 51 vote, average: 5.00 out of 51 vote, average: 5.00 out of 51 vote, average: 5.00 out of 51 vote, average: 5.00 out of 5 (1 votes, average: 5.00 out of 5)
You need to be a registered member to rate this.
Loading...

4.9 stars on average, based on 30 rated postsVladislav Semjonov has a legal and financial background. He has been involved in crypto space since early 2017 in both ICO advising positions in several ICO consultancy firms, and as an ICO analyst for VC. He began contributing for Hacked.com in April 2017.




Feedback or Requests?

Click to comment

You must be logged in to post a comment Login

Leave a Reply

Business

Project to Watch: Sentinel Protocol

Published

on

By

The creators of Sentinel Protocol set themselves the goal of overcoming the current disadvantages of decentralization in the field of cryptocurrency technologies, turning this ecosystem into a safe and protected environment from hacker threats.

Using a collective intelligence system created by using decentralization, the project combines cryptographic functions and threat analysis algorithms based on artificial intelligence to create a secure, innovative platform.

Creation History and Team

The creators of the project note the current difference in the level of protection against security threats between individual users and business users. The latter can afford to spend large amounts of money to ensure their IT security.

According to the SANS Institute, in 2016 the largest category of costs for financial institutions was to ensure cyber security (10-12% of the annual budget of organizations). The report of Cybersecurity Ventures argues that the size of the market of protection systems in this area will grow by $ 1 trillion from 2017 to 2021 since the constant increase in the number of cybercrime led to a critical level.

The DAO case in 2016 was the first serious incident in the field of a security breach in blockchain technology and gave the developers of the Singapore-based Uppsala Foundation idea to create the Sentinel Protocol project.

Core team:

  • Patrick Kim (founder and CEO, has experience with Cisco, Palo Alto Networks, Fortinet, F5 Network and Darktrace).
  • HM Park (co-founder, head of operations, worked at F5 Networks, Darktrace, Penta Security Systems).
  • John Kirch (chief evangelist, worked at Darktrace, Watchguard, Softbank, Bank of America).
  • Dayeol Lee (Lead Developer, graduated from the University of California, Berkeley, received a doctorate in computer science, a security systems specialist, and previously worked at companies such as Penta Security Systems, Inc. and WINS Co., Ltd.).
  • Guo Feng (lead developer, worked on the Singapore Exchange, Accenture, and NCS).

Overview of Main Features

Although blockchain technology is aimed at ensuring the confidentiality of personal data, the lack of a guarantee of confirmation of the user’s identity does not allow him to take part in financial services and projects. A blockchain consortium could be a way out of this situation, although it is associated with some drawbacks of public decentralization. The creators of the Sentinel Protocol offer their approach to solving this problem.

The Security Intelligence Platform for Blockchain (SIPB or Sentinel Protocol) has the following security features:

  • Threat database (TRDB);
  • Built-in secure wallet with machine learning (S-Wallet);
  • Split Isolated Malware Analysis Environment (D-Sandbox).

Threat Database

TRDB immediately solves two problems related to current cyber security threats. The first is a centralized database of security companies. Storing information about threats in one centralized location makes the data vulnerable to manipulation and abuse. The database becomes an obvious target of the Sybil attack, a server is hacked, and the service is interrupted. This is the fundamental problem of the centralized client-server model in the modern Internet.

The second problem is the lack of common knowledge among companies specializing in providing IT security. The more risk information collected, the higher the likelihood of preventing cyber crime. This is due to the lack of incentives for such companies to join and collaborate to create one comprehensive database.

Thanks to the collective intelligence, TRDB is able to efficiently collect data about hackers, malicious links, phishing addresses, virus software, etc. TRDB is updated only by security experts to eliminate systematic errors, such as false positives. However, ordinary users can also participate in this process in two ways – through the functions of automatic and manual reporting.

In the first case, unknown threats will be automatically detected by the security system of the wallet based on the machine learning mechanism and sent to the database. Manual reporting allows the user to report risks. The community will subsequently verify this information.

TRDB will be provided in the form of an API so that this information will be available to any person or organization.

S-Wallet

S-Wallet has the functionality of antivirus software, but it also has a fundamental difference. Antivirus software responds best to new threats only after receiving the latest updates via a centralized server. This approach is ineffective against new unknown threats, such as zero-day attacks.

S-Wallet analyzes threats, their trends, and history to respond to unknown attacks.

S-Wallet uses collective intelligence by connecting to TRDB and provides essential security services, such as cryptocurrency address filtering; URL/URI filtering; data analysis; search and detect fraud risk.

The fraud detection system (FDS) is based on machine learning technology operates on all distributed registers and identifies transactions that could potentially be fraudulent, thereby preventing secondary damage.

D-Sandbox

D-Sandbox is a security mechanism for running untested programs and code on a separate virtual machine without risk to the entire system or host. This feature is based on analysis using the collective mind.

D-Sandbox has two key benefits. Firstly, this approach has significant economic benefits. This ensures infinite scaling across distributed systems and is limited in operation only by the potential of virtual machines. The second advantage is that D-Sandbox is not only able to solve the problem of loss of computing power using the PoW algorithm, but is also capable of creating a better security ecosystem. The computational capability of the Sentinel Protocol network nodes can be used for additional analysis to detect malware.

In the end, the advantage of a decentralized system is that free resources can be used where they are needed. Moreover, individual users will help by using D-Sandbox through a virtual machine to improve the overall security of the ecosystem.

Sentinel Protocol Ecosystem

One of the biggest obstacles to business continuity in the cryptocurrency industry is security. Recently, the number of customer hacking incidents and costs has increased significantly, and security systems could not cope with a threat level.

The Sentinel Protocol overcomes this problem, which security experts are working on in the field of cryptocurrency technologies by combining collective intelligence.

By joining the Sentinel Protocol community, users of digital currencies can easily get knowledge and help on all security issues. They can also use security solutions provided by the Sentinel Protocol. This approach is aimed at ensuring the overall security of the cryptographic world and its prosperity based on the fundamental principle of decentralization.

Theft Protection System

While a large number of cryptocurrency applications are entering the market every day, there is currently no system for checking the integrity of digital assets. This means that it is impossible to track and identify the stolen virtual money.

To fight this, the Sentinel Protocol will act like bank card providers that block plastic cards in case they are stolen or lost. The system will track all stolen cryptocurrencies and pass this information to providers of crypto resources. Then, stolen digital assets will be tagged and will not be used to exchange, pay, or convert to fiat money.

Prevent Transaction Distortion

Addresses registered as fraudulent and all related addresses will be entered into the database, which will be available to all system participants in real time.

One of the examples of this approach is an ICO fishing, in which thousands of people participate in a short period of time. Even if the hacker changes his address and transfers his funds to him, all users will be automatically notified of the new suspicious address. This can completely change the security industry paradigm, as there is currently no such platform that could provide users with such information.

As of today, there is merely no systematic approach to identifying suspicious persons and ensuring the protection of users from potential damage.

Sentinel Protocol Consensus

The platform uses a delegated proof of stake algorithm (DPoS), presented by BitShares and invented by Daniel Larimer. The “guards” appointed by employees of the Uppsala Foundation are a group of trusted institutions or individuals with the necessary qualifications, including security teams on servers, employees of specialized research firms or a group of white hackers. All of them will be certified to confirm their status and experience.

They will receive points for work performed, such as identifying threats and fraudsters. Based on their effectiveness, users will be able to vote for a particular “guard,” increasing or decreasing its reputation. If the actions of the “guard” dishonest in his hand are harmful, he will lose his reputation.

Trading and Liquidity

  • Ticker – UBT
  • Major exchanges – Bitrex, Ubbit
  • UPP token price $0.0134082748 (+3.82%);  0.0001487522 ETH; 0.00000391 BTC
  • 24h Volume $649,370 Market Cap $3,092,586
  • Returns since ICO: 0.11x USD; 0.73x ETH; 0.24x BTC

Disclaimer: The author owns bitcoin, Ethereum and other cryptocurrencies. He holds investment positions in the coins, but does not engage in short-term or day-trading.

Featured image courtesy of Shutterstock.

Important: Never invest (trade with) money you can't afford to comfortably lose. Always do your own research and due diligence before placing a trade. Read our Terms & Conditions here. Trade recommendations and analysis are written by our analysts which might have different opinions. Read my 6 Golden Steps to Financial Freedom here. Best regards, Jonas Borchgrevink.

Rate this post:

Important for improving the service. Please add a comment in the comment field below explaining what you rated and why you gave it that rate. Failed Trade Recommendations should not be rated as that is considered a failure either way.
1 vote, average: 5.00 out of 51 vote, average: 5.00 out of 51 vote, average: 5.00 out of 51 vote, average: 5.00 out of 51 vote, average: 5.00 out of 5 (1 votes, average: 5.00 out of 5)
You need to be a registered member to rate this.
Loading...

4.9 stars on average, based on 30 rated postsVladislav Semjonov has a legal and financial background. He has been involved in crypto space since early 2017 in both ICO advising positions in several ICO consultancy firms, and as an ICO analyst for VC. He began contributing for Hacked.com in April 2017.




Feedback or Requests?

Continue Reading

Cryptocurrencies

Investor Watch: Holochain Provides Solid Returns Despite Bear Market

Published

on

By

Holochain is a distributed network project with autonomous capabilities for users embedded directly into its architecture and protocols. The creators of Holochain claim that the distribution of their proposed type of storage and data processing can change the order of coordination and interaction. Thanks to digital integration, under the control of the user, Holo can free users’ online life from corporate control.

Key team members:

  • Eric Harris-Brown: The project’s co-founder is an executive engineer who received a bachelor’s degree in computer science from Yale University. He’s the co-founder of the peer-to-peer network application provider Glass Bead Software and independent software development store Harris-Braun Enterprises. He is also the author of sophisticated health data collection websites, Android-based application for monitoring catches for the fishing industry and other successful projects.
  • Arthur Brock: The other co-founder is the chief architect who has extensive experience in the field of artificial intelligence technology, which initially applied to GM, Chrysler and Hughes. He later turned his attention to creating social architectures and at Holochain is responsible for developing target currencies that form social the dynamics of the emerging post-industrial economy.

Main features

Unlike many crypto projects, platforms such as EoS, BitLattice and Holochain represent the evolution of block technology. They do not even use blocks as such and avoid linear arrangement of transactions (progression of “blocks”). They provide cryptographic control of information, but none of these projects require the same amount of consumed energy and resources, like Bitcoin and Ethereum.

At its core, Holochain is not a chain at all. It is more like “git-archives” that can be distributed, shared, synchronized or combined using BitTorrent-like DHT technology (distributed hash table). Each application has its own Holochain, and each operator has its own chain.

Holochain is a system book and application platform, similar to a blockchain, which, according to developers, is not affected by issues such as scalability and energy efficiency. Each device in the network receives its own register (Holochain) and can function independently, simultaneously interacting with all other devices in the network for decentralized problem-solving.

Another name that is often referred to at the same time as Holochain is Ceptr. This parent project uses Holochain infrastructure. It represents a new paradigm, which in some way resembles the Internet. It uses blockchain-like technology, which is characterized by a lack of consensus dependence.

Currently, the project authors are working on two initiatives: Holochain and Holo (Holo-Host). Holochain itself is a peer-to-peer infrastructure that serves as the necessary foundation for Ceptr.

Token

The community will receive tokens called Holo Fuel. According to the technical documentation, they are intended for the implementation of large volumes of microtransactions. Holo Fuel is not a cryptocurrency or token, but a kind of crypto credit that is created to link transactions between system participants.

Stability Holo Fuel will be provided by the computing power of each device in the network. Nevertheless, the authors of the project claim that the cost of crypto credits will depend on the number of hosts on the network and the computing power used. With each new user, the value of the ecosystem will grow, which will also increase the value of the tokens.

There are several essential characteristics of Holo Fuel, including asset support, non-use of tokens and signature of transactions by both parties to the transaction.

At the moment, the main coin of the Holochain network is the HOT token of the ERC-20 standard, which will be replaced by Holo Fuel after the launch of the final platform version.

TPs

The developers claim that the transaction processing ability of their network is limitless. The thing is, every second transaction is almost meaningless because of the Holochain architecture. Instead of supporting a single consensus, the Holochain distributed hash table contains a report on the main type and legitimacy of the information provided by the individual block chains. This eliminates the need to track every action on the network and the need for global consensus.

In simple terms, Holochain, as a framework for applications and has no limit on the number of transactions per second because the ecosystem where they should be implemented does not initially exist. This parameter is floating and increases as the number of network users increases.

Holochain Target Applications

First of all, the project is suitable for frameworks that require multiple individual inputs with some limited copy available to all. The most straightforward example is online networking platforms. Holochain also additionally offers technologies for administering the manufacturing network, cooperatives, public platforms, reputational platforms or digital forms of money.

Roadmap

The project’s roadmap is provided below. Here, you can see new developments coming through the pipeline in Q1 2019.

Price

We see that Holo receives positive sentiment from investors.

Its current market cap is around $75 million with an average turnover of $2 million over 24 hours. It still holds a good standing in the bear market, with returns of around 3.5x in U.S. dollar terms, 20.68x in ETH, and 7.8x in BTC. At the time of writing, it is currently traded at $0.0005 USD.

One could expect a conservative x2 in USD if the crypto market cap would remain the same and x4 if the market cap increases twice.

I usually invest with a stop loss to ensure a risk reward of at least 1:4 and buy assets weekly.

Featured image courtesy of Shutterstock.

Important: Never invest (trade with) money you can't afford to comfortably lose. Always do your own research and due diligence before placing a trade. Read our Terms & Conditions here. Trade recommendations and analysis are written by our analysts which might have different opinions. Read my 6 Golden Steps to Financial Freedom here. Best regards, Jonas Borchgrevink.

Rate this post:

Important for improving the service. Please add a comment in the comment field below explaining what you rated and why you gave it that rate. Failed Trade Recommendations should not be rated as that is considered a failure either way.
2 votes, average: 5.00 out of 52 votes, average: 5.00 out of 52 votes, average: 5.00 out of 52 votes, average: 5.00 out of 52 votes, average: 5.00 out of 5 (2 votes, average: 5.00 out of 5)
You need to be a registered member to rate this.
Loading...

4.9 stars on average, based on 30 rated postsVladislav Semjonov has a legal and financial background. He has been involved in crypto space since early 2017 in both ICO advising positions in several ICO consultancy firms, and as an ICO analyst for VC. He began contributing for Hacked.com in April 2017.




Feedback or Requests?

Continue Reading

Cryptocurrencies

Security Tokens and STOs: A New Financial Frontier

Published

on

Security Tokens & STOs

There were a lot of promises during the 2017 ICO boom. Brand new start-ups offering utility tokens that had no utility, on a blockchain that was not needed.

2018 was a wake-up call for the cryptocurrency community. An indication that the ICO status quo was not written in stone and that valid alternatives needed to be explored.

One of the most promising alternatives to the ICO and Utility token is that of a tokenized security or more commonly known as a “Security Token”. Could Security Token Offerings (STOs) and these assets eventually become the new norm in a more reputable ecosystem?

In this post I will attempt to answer that question and give you a general overview of the security token industry.

What is a Security Token?

A security token is a token that derives its value from the value of some underlying asset. This can be anything really from a share certificate, a bond, commodities, property etc.

Due to the fact that these are tied to some underlying asset, they are subject to regulations that govern securities. In the US these are the strict issuance rules that are outlined by the SEC.

So, when you buy a security token you are buying a share in an asset of some type. You are buying the rights to the future performance and cash flows from that asset.

Security Token vs. Utility Token
Security Token vs. Utility Token. Image Source

These are in contrast to utility tokens which were not developed for investment purposes (despite them being marketed as such). Utility tokens give the holders the ability to access and purchase future services on some decentralised blockchain.

ICOs to STOs

While utility tokens are issued in the unregulated and often wild west ICO markets, Security tokens will be issued in much more controlled and reputable Security Token Offerings (STOs).

While ICOs often feared falling fowl of SEC rules on securities, the STO will issue completely within the regulatory framework. They will go through all the applicable licensing and legal frameworks such as Regulation D, Regulation S, Regulation A+, and Regulation Crowdfunding.

Why do this?

While ICOs were a revolutionary way for blockchain start-ups to raise financing, they also attracted some bad actors and general opportunists. If we couple this with the relative inexperience of most of the investors, it created a number of negative externalities.

Pulling off a dubious ICO or developing a shoddy product is much less likely when the founders went through the regulatory rungs required to conduct an STO. It creates a safer environment for participants to invest in start-up companies.

Security Token projections
Potential for Security Tokens. Image Source

Moreover, it can be seen as a stamp of approval for the project.

It will be easier for a start-up to make a case to investors about their project, roadmap and most importantly, team members. One would feel more comfortable investing in a team that has completed the required compliance procedures than in one that has made some promises in a white paper.

So, in essence, the STO will have the best of both worlds. They will be reputable and have certain protections that regulated securities have all while still being inclusive enough to average retail investors.

Improving Traditional Finance

Apart from being more reputable than a standard ICO, security tokens also have benefits over more traditional means of raising financing.

  • Decreased Issuance Cost:
    For one thing, because security tokens are issued through the use of blockchain technology and smart contracts, the need for numerous transactional middlemen decreases. These numerous layers of participants who all feed at the trough increase the cost of the issue dramatically. So, if issuing tokens cuts out the middlemen then you can decrease costs
  • Faster Execution:
    Following on from the above example, these middlemen also tend to slow things down. They will have to inevitably sign documents, refer to council, seek authorisations etc. All of this will have to be done manually which will also increase the time that it takes before these can eventually hit the market. Automated issuance will drastically reduce this.
  • Large Market Opportunities:
    Generally, when it comes to early stage investment, it is usually reserved for a limited subset of investors in a particular region. With security tokens, you open the investment to anybody from any geographic region. A small retail investor in Africa can just as easily buy into a US STO than the Silicon Valley based VC firm can
  • 24/7/365 Trading:
    The cryptocurrency markets are continuous. Unlike with traditional financial markets that have to close for the day (equity and Bond markets) or those that have to close on the weekend (forex & commodities), crypto assets can be traded every hour of every day.
  • Easier Storage
    Security tokens possess all of the same benefits of cryptocurrencies. For one, they are very easy to store. All you merely need in order to prove ownership of the token in question is access to the private keys.
  • More Liquidity
    Just like cryptocurrenices, Security tokens are also easy to trade and transfer. A mere transaction on the blockchain is what is needed to hand over the token to another party. They could also be traded on exchanges thereby further increasing their liquidity. This is particularly relevant for those examples where the underlying asset is physical in its nature (think property, commodities, artwork etc).

So, security tokens are not only well positioned to pick up the baton ICOs left off, but they could also be a serious disruptor in traditional financial circles.

The Security Token Ecosystem

While security tokens are still a relatively new phenomenon, there are quite a few companies and projects that are building interesting solutions and ecosystems.

One of them is Polymath which is a project that is developing a platform for companies to issue their very own STOs. This platform will provide for a framework whereby issuers can use standardised templates to issue the tokens.

Strangely enough though, they have their own utility token called the “POLY”. This is an ERC20 standard token that was issued through an airdrop. The POLY token will be used on the platform as “fuel” to pay for services that are attached to the issue (compliance, legal etc). I have previously covered Polymath (POLY) if you wanted more information.

Polymath Overview
Overview of Polymath Network and Templates for Issue. Image Source

Another interesting securities token project is that of tZero. tZero is a blockchain subsidiary of Overstock Inc. and they will be issuing the tZero token. They completed a massive ICO private sale that began last December and ended in August.

tZero was able to raise a total of $134m with the majority of the funding coming from GSR Capital, a Chinese private equity firm. This ICO was designed so that it could comply with SEC regulations and is one of the reasons that they were allowed to continue the raise.

With a similar model to Polymath, tZero is developing a platform whereby companies can raise funding. However, they are also building out an exchange on top of this where people can trade security tokens in a decentralised fashion on top of the blockchain.

tZero Roadmap
tZero Roadmap as Presented in Earnings Reports. Image Source

There is also the prospect that large cryptocurrency exchanges such as Coinbase could eventually offer SEC regulated securities. This was on the back of their purchase of a range of broker dealer firms. It would give Coinbase the required broker dealer licences which would allow them to manage the trade in these assets. According to Asiff Hirji, Coinbase COO:

Ultimately, we can envision a world where we may even work with regulators to tokenize existing types of securities, bringing to this space the benefits of cryptocurrency-based markets — like 24/7 trading, real-time settlement, and chain-of-title

Given the size and influence of Coinbase in the cryptocurrency world, this is could supercharge the adoption of Security Tokens.

Tokenizing the Future

There is no doubt that cryptocurrencies and ICOs have paved the way forward for a more decentralised and inclusive financial ecosystem.

However, as with any nascent technology, there have been some challenges. The unregulated and unrestrained growth of the ICO and the subsequent fall have exposed some of these challenges.

Through the use of security tokens and STOs, numerous projects are trying to shape a new financial paradigm. Investing in new and exciting technology does not have to come with the risks that are often associated with an ICO.

There are already a number of STOs that are going through the regulatory steps required for potential listings in 2019.

While 2017 was the year the ICO, could 2019 be the year of the STO?

Featured Image via Fotolia

Important: Never invest (trade with) money you can't afford to comfortably lose. Always do your own research and due diligence before placing a trade. Read our Terms & Conditions here. Trade recommendations and analysis are written by our analysts which might have different opinions. Read my 6 Golden Steps to Financial Freedom here. Best regards, Jonas Borchgrevink.

Rate this post:

Important for improving the service. Please add a comment in the comment field below explaining what you rated and why you gave it that rate. Failed Trade Recommendations should not be rated as that is considered a failure either way.
1 vote, average: 5.00 out of 51 vote, average: 5.00 out of 51 vote, average: 5.00 out of 51 vote, average: 5.00 out of 51 vote, average: 5.00 out of 5 (1 votes, average: 5.00 out of 5)
You need to be a registered member to rate this.
Loading...

5 stars on average, based on 9 rated postsNic is an ex Investment Banker and current crypto enthusiast. When he is not sitting behind six screens trading Bitcoin, he is maintaining his numerous mining rigs.




Feedback or Requests?

Continue Reading

Recent Posts

A part of CCN

Hacked.com is Neutral and Unbiased

Hacked.com and its team members have pledged to reject any form of advertisement or sponsorships from 3rd parties. We will always be neutral and we strive towards a fully unbiased view on all topics. Whenever an author has a conflicting interest, that should be clearly stated in the post itself with a disclaimer. If you suspect that one of our team members are biased, please notify me immediately at jonas.borchgrevink(at)hacked.com.

Trending