Back to Course

2. Intermediate Course

0% Complete
0/0 Steps
  1. 1. What is Layer 0 in Blockchain technology?
  2. 2. What is layer 1 in Blockchain?
  3. 3. Second layer (layer 2) - what is it? 
  4. 4. Blockchain and its layers - What is layer three in Blockchain (L3)?
  5. 5. Ethereum 2.0 - What is it? 
  6. 6. Ethereum Proof-of-Stake (PoS) - what should you know?
  7. 7. Ethereum London Hard Fork - what is it ? 
  8. 8. What is the Ethereum Name Service (ENS) and how does it work?
  9. 9. Arbitrum: Ethereum scaling solution - everything you need to know
  10. 10. Polygon 2.0 - the value layer for the Internet
  11. 11. Ethereum ERC-4337 - what is it and how does this standard work?
  12. 12. What is an ERC20 token and how is it created?
  13. 13. The ERC-721X VS ERC-721 Standard – Key Differences!
  14. 14. What is cryptocurrency burning?
  15. 15. Examples of the use of WEB3 on the blockchain
  16. 16. What is Web5? 
  17. 17. Blockchain Oracle - what are oracles? 
  18. 18. Polkadot - Decentralized blockchain and DOT cryptocurrency
  19. 19. Polkadot Parachain - Next-generation blockchain
  20. 20. Interoperability in the world of cryptocurrencies and blockchain
  21. 21. What is Blockchain sharding?
  22. 22. Mainnet versus Testnet on the Blockchain. The complete guide!
  23. 23. MINA Protocol: the lightest blockchain in the world!
  24. 24. Sustainable Blockchain - Proof of Useful Work & Flux
  25. 25. Cosmos SDK: Building the Blockchain Ecosystem
  26. 26. What is cross-chain interoperability in Blockchain technology?
  27. 27. Blockchain trilemma - explanation of the problem. What is the impact on cryptocurrency payments?
  28. 28. Non-fungible tokens and NFT exchanges
  29. 29. How to make money with NFT?
  30. 30. What is the NFT licence fee?
  31. 31. NFT Gas Fee - what is it? How can you reduce your gas fee?
  32. 32. The main differences between static NFT and dynamic NFT
  33. 33. What is minting an NFT?
  34. 34. What are NFT Ordinals? A guide to Bitcoin NFT.
  35. 35. What is KnowOrigin NFT, and how does it work?
  36. 36. ERC-6551 - the new NFT standard. What does it bring to the non-exchangeable token sector?
  37. 37. What is NFT Lending all about? An innovative solution in the world of cryptocurrencies!
  38. 38. The Metaverse – a new virtual world
  39. 39. Metaverse – TOP 15 virtual reality projects
  40. 40. Technical analysis – is it worth using?
  41. 41. Trading order types: stop loss, trailing stop loss, LIMIT
  42. 42. Market Cap versus Fully Diluted Market Cap - the most important differences you should know!
  43. 43. Set up of Stop Loss and Take Profit orders
  44. 44. What are DeFi liquidity pools?
  45. 45. Real Yield in DeFi - what is this trend? What does it consist of?
  46. 46. Vampire Attacks in Decentralized Finance (DeFi): Explanation and Examples
  47. 47. What are wrapped tokens 
  48. 48. What are security tokens?
  49. 49. What are Social Tokens? 
  50. 50. Liquidity Provider Tokens (LPs). What are they, and why are they so important?
  51. 51. What is the Lightning Network, and how does it work?
  52. 52. What is Play-to-Earn (P2E) and how does it work?
  53. 53. Cryptocurrency steps - What is move to earn M2E?
  54. 54. Segregated Witness - what is Segwit Bitcoin all about?
  55. 55. What are Decentralized Cryptocurrency DEX Exchanges?
  56. 56. What is Curve Finance?
  57. 57. What is GameFi and how does it work?
  58. 58. What is Proof of Reserves (PoR)? How does it work?
  59. 59. DAO Investment: A revolution in the world of finance and investment
  60. 60. What is MakerDAO and DAI Stablecoin?
  61. 61. What is the SubDAO protocol, and how does it work?
  62. 62. How to Create Your Own Decentralized Autonomous Organization (DAO)?
  63. 63. Atomic Swap: What is an atomic swap, and how does it work with cryptocurrencies?
  64. 64. What Is Cryptocurrency Vesting? What Are Its Advantages?
  65. 65. What Is the Metaplex Candy Machine Protocol? How Does It Work?
  66. 66. What Is the BNB Greenfield Ecosystem?
  67. 67. What Is Slashing in Cryptocurrencies?
  68. 68. Royalties – What Are They? How Does This Type of Licensing Fee Work?
  69. 69. What is TradFi? The importance for cryptocurrencies!
  70. 70. What is the Real World Asset (RWA) trend in cryptocurrencies? Explanation and examples!
  71. 71. Pyth Network: a powerful oracle harnessing the power of Solana!
  72. 72. What are stables in the world of cryptocurrencies?
  73. 73. What Is Binance Oracle?
  74. 74. Shibarium: A new era in the Shiba Inu ecosystem?
  75. 75. What is an ETF? How will an exchange-traded fund on bitcoin work?
  76. 76. Symmetric and asymmetric encryption - key cryptography techniques!
  77. 77. Hedging in cryptocurrencies - great portfolio protection against risk!
  78. 78. How to create your own cryptocurrency? 
  79. 79. What is a Dusting Attack in cryptocurrencies? How to protect against it?
  80. 80. What is a Black Swan?
Lesson 48 of 80
In Progress

48. What are security tokens?

Before we move on to the main topic, let us introduce you to an interesting fact. Did you know that tokens are seen by crypto regulators as securities? All because they meet most of the criteria set out in the so-called Howey test, but we will tell you more about that later. Now we will move on to the topic of today’s lesson.

Tokens vs coins 

To understand what utility tokens, or in our case security tokens, are, it is important to know the basic differences between tokens and coins. We know from experience that  ‘cryptocurrencies‘, is used to refer to almost anything that is in any way related to the crypto and blockchain industry, but that is not quite how it works. 

Coins or cryptocurrency assets (Bitcoin, Monero, Ether, Litecoin) represent value in their own right. They are coins because their main use is to store value and be seen as a means of exchange. 

Tokens have a predetermined function. E.g. security tokens, which we will discuss today.  They are used in the same way as shares, bonds, certificates, and other investment assets.  We will also include utility tokens, e.g. BAT. You need to remember that these types of assets, are backed by a company or project and have a specific purpose of the operation. 

Security tokens – what they are 

Security tokens, often referred to as action tokens. They are representatives of a certain type of ownership. They most frequently come in the form of shares in the company that issues the token. Their concept is the same as that of shares on a traditional stock exchange. As security tokens are seen as securities, they are subject to all regulations. Just like shares and bonds. As an investor, you must remember that share tokens offer us all the legal and regulatory protections

How do share tokens work? 

To fully understand how they work, you need to know what the tokenisation process is. As you know, currently you can tokenise anything. Even your car. A security token is created similarly. A company that is interested in creating such a token selects what it is supposed to represent (property, shares) and then generates the token. It offers it to investors on an exchange or other investment platform of its choice. To become an investor, you have to go through a KYC and AML process. The entire ‘value’ of the token is, of course, stored on the blockchain. Most platforms that generate this type of token use the Ethereum ERC 2.0 or Tezos’s FA1.2 standards. 

Here we also have an interesting fact for you. A security token can take different forms of identification. It can be an image displayed in a digital wallet or a number. 

Where are these tokens used? 

Security tokens are digital, liquid contracts of a portion of the assets you own. This is the subtle difference that sets them apart from other cryptocurrencies. This type of token can have a wide range of uses. We can start, for example, even with real estate investment trusts. The security token would then issue shares on the blockchain, which would be equivalent to owning a piece of real estate. 

That is not all. Security tokens can represent other shares, placed on the blockchain. What’s interesting about them is that they combine traditional financial instruments and cryptocurrency assets. If you want to start investing in this type of asset, we recommend the STO platform. You will find a multitude of opportunities on these exchanges that will enable you to buy and sell stock tokens.

Advantages of security tokens 

As they are issued on the blockchain, they have virtually all the benefits that come with blockchain. None of the delays or fees associated with traditional equity markets stand out here. As an investor, you are assured that your ownership interest will be recorded on the public ledger. The absence of market manipulation, fraud, or misunderstandings is another of the advantages of this type of asset. Security tokens also guarantee clarity on the number of shares you own and the name of their owner. 

The Howey test 

In the US, anything that classifies as a security is subject to oversight by the Securities and Exchange Commission (SEC). Nothing is clear, of course; there are still many securities that are also utility tokens. As a result, the SEC is unable to define them precisely. To determine whether something at least somewhat classifies as a security, the SEC uses the so-called Howey test. This consists of four basic parts. 

1. The first consists of the investment of money. It examines whether someone has invested in a particular good or service. 

2. “Joint venture”. The next stage of the test shows us whether the investor’s funds are tied together or, whether there is a direct correlation between the promotion of the investment and its success. 

3. Expectation of profit. “Profit” can come from recurring income or from capital appreciation. 

4. Effort of others. It means that if any part of the profit is due to the effort of the people who promoted the investment, the ‘asset’ meets the fourth part of the test. 

Summary

If you invest money with the hope of a return that comes from the efforts of another person,  the investment is considered a security

Find your favorite cryptocurrencies on Kanga Exchange