Security tokens: Are they really the next big thing? | finder.com
Security tokens2-Featured-Image

What are security tokens?

We value our editorial independence, basing our comparison results, content and reviews on objective analysis without bias. But we may receive compensation when you click links on our site. Learn more about how we make money from our partners.

Find out why they’re called the next big thing — and where to buy and trade them.

If ICOs and utility tokens were the cryptocurrency trend of 2017, then the scene is set for security tokens to take center stage in 2019.

Thanks to improved regulatory environments worldwide — and particularly in the US — security tokens have finally gotten the green light to enter the marketplace like never before.

Disclaimer: This information should not be interpreted as an endorsement of cryptocurrency or any specific provider, service or offering. It is not a recommendation to trade.

What are security tokens?

Security tokens refer to financial securities whose ownership is attached to a crypto token and hosted on a blockchain. Because security tokens represent a more traditional type of asset than value-based cryptocurrencies or utility tokens, they’re sometimes called digital assets, rather than cryptocurrency.

These tokens are revolutionary because they allow for such securities as stocks, bonds and derivatives, as well as commodities and real estate, to be hosted on the blockchain in a tokenized format.

In the US, securities are classified depending on whether they pass the Howey Test. If a product conforms to these four criteria, then the SEC is likely to define it as a security:

  • People invest money into the product.
  • People expect profits from the investment.
  • The act of investing is a common enterprise in other words, people or groups of people can share in the investment.
  • Profits depend on who issues the investment — an investment promoter or a third party, rather than the investors themselves.

Because security tokens are a new and somewhat borderless asset class, they actually refer to more than just the Howey Test’s definition of a security.

Definitions of security tokens often include assets like commodities, real estate, physical property and art. But the exact definition varies depending on where you are, who you ask and which country you operate in.

As a general rule of thumb, security tokens are attached to either a real-world asset, like gold; rights to future profits, such as dividend payouts; or equity, including shares in a company. A utility token can also entitle the holder to specific rights on a network.

Blockchain lawyer Michael Bacina discusses security tokens.

Advantages of security tokens

Why are people so excited about security tokens? Security tokens allow for all of the advantages that come with trading on the blockchain.

Security token exchanges

With security tokens set to lead the next evolution of blockchain markets, exchanges are excited to join in on the action. As a result, existing cryptocurrency exchanges are exploring the addition of security tokens to their rosters. In some cases, new exchanges are being built to more closely comply with the regulation required to trade securities as well as cryptocurrency.

  • Binance — according to laws in Malta
  • Poloniex — according to laws in the US
  • Coinbase — according to laws in the US
Note that some exchanges already trade security tokens. However, they may not be legally allowed to in select jurisdictions or may not even know they’re hosting a security token. We list only exchanges with explicit legal permission to trade securities in their given jurisdiction.

Finally, decentralized exchanges are another place where you might be able to trade security tokens, although given their decentralized nature, it is up to the user to research whether trading securities on such an exchange is legal according to their country’s laws.

Difference between utility tokens and security tokens

The difference between utility and security tokens lies in what they entitle the holder to and how they’re issued and used.

In short, a utility token gives you rights to operate and participate on a network, whereas a security token gives you rights of ownership or entitlement to an asset.

Utility tokens

A utility token gives the holder specific rights on a network, such as the ability to transact on Ethereum by paying gas fees in ETH or participate in voting on EOS by staking your tokens. On the peer-to-peer electricity-trading platform Power Ledger, users must first acquire and stake POWR tokens before buying or selling electricity on the network.

Utility tokens are typically issued through initial coin offerings — or ICOs. With an ICO, buyers sign up and purchase utility tokens for an agreed amount, often less than $1 per token. ICOs are conducted in many ways, but a more common method is to send ETH or another cryptocurrency to a smart-contract address. When the token sale period is over, that smart contract then sends back the newly minted utility tokens in return.

Another way of issuing utility tokens is to airdrop them to existing cryptocurrency holders at random. Tokens anticipate that users will take up the use of the associated network because they now own the token.

Security tokens

A security token is a tokenized version of a real-world asset or security that can exist outside of the blockchain. Assets can be a share in an investment portfolio, a single Amazon stock or a gram of gold.

But the world of security tokens is more tightly regulated than ICOs and airdrops. Securities have strict laws that accompany their sale and trade, whereas assets are usually a bit more fluid.

Stephane De Baets of Elevated Returns discussing the Aspen Coin STO.

For example, Aspen Coin gives holders shares in a real estate investment trust (REIT) that includes the St. Regis Aspen Resort. A share in a REIT is a type of security. In addition to ownership of shares, the coin entitles holders to dividends paid out by the REIT.

The security token offering (STO) was conducted through Templum Markets, which is an SEC-registered trading platform. In the US, only accredited investors were allowed to participate. But outside the US, anyone was allowed to join as long as they had the minimum $10,000 USD to participate.

STOs must abide by strict know-your-customer (KYC) and anti-money-laundering (AML) laws, among other legislation. While many ICOs now implement KYC and AML, it wasn’t always the case, and airdrops circumvent this practice altogether.

Security token offerings

Along with a new type of token comes a new type of token offering. Security tokens are issued via security token offerings — or STOs — that involve more detailed legal procedures than ICOs or airdrops. As a result, you’ll find several new platforms developed to help with the legal aspects of issuing STOs.

For instance, the Polymath network uses a new token standard called the ST-20, which features built-in compliance, allowing users to issue security tokens in the US. Securitize and Harbor are two platforms that use the Ethereum blockchain to issue ERC-20 tokens with built-in compliance measures.

Then there’s Neufund, a token-issuance platform based in the EU that’s developed the Equity Token Offering, a hybrid model that combines features of ICOs, IPOs and venture capital funding.

STOs are a new concept, so it is likely their operation, legal status and availability will change over the coming months and years. Because they focus on laws within a select jurisdiction, it’s also likely that eligibility will vary.

STOs vs. ICOs

In the context of startup fundraising, STOs are often considered a more equitable way to raise capital than with the ICO model.

This is because they give buyers an actual asset — such as a share of the company’s equity — rather than a utility token, which is technically decoupled from the success of the underlying company. If a company issues a utility token and then later makes profits in ways that aren’t connected to the utility token, the utility token holders have no rights to share in those profits.

As a result, many companies in the future will be under pressure to issue tokens via an STO instead of an ICO, when they can.

Furthermore, ICOs are vulnerable to exit scams, because the company issuing the utility token has no shareholders to which they’re accountable.

On the other hand, if a company issues security tokens via an STO — where the security token represents something like an equity share in the company — then the holders of the token are expected to share in that success through ownership of the token. Security tokens may even entitle the holder to dividends.

But remember that a security token can be almost anything tangible, such as precious metals or property. Just because you’re participating in an STO doesn’t mean you’re getting shares in a company.

This isn’t to say that utility tokens are less valuable than security tokens. Rather, they are two different products with two different use cases. The issue is that utility tokens have been used to fill the role of security tokens, often leaving buyers with a product of questionable value and legality.

Now that regulatory bodies around the world are taking action on cryptocurrencies, information on whether a token is legally a utility or security is clearer. The way is now paved for security tokens to enter the market according to local regulatory bodies like the US Securities and Exchange Commission.

As a result, it’s unlikely that one type of token will dominate. Instead, companies looking to fundraise now have the option of deciding which type of token best suits their product.

It’s still up to savvy consumers to make sure they’re getting the best deal, which involve thinking critically about whether a security or utility token is best suited to the product.

Are security tokens legal?

It depends on the jurisdiction in which the token was created and is traded in.

Each jurisdiction has its own laws about what constitutes a security, who can issue securities, who can sell securities and who can buy securities.

If the country is hostile toward bitcoin and cryptocurrency, there’s a chance security tokens will be swept up in those laws too.

In the US, security tokens and cryptocurrency largely fall under the remit of the SEC, which is known to use the findings published in the DAO Report to assess whether a token is a security.

Securitize CEO Carlos Domingo explains the legalities of security tokens.

In Australia, the Australian Securities and Investments Commission (ASIC) is the federal body responsible for securities, whereas in Canada securities law is managed by the states and provinces, rather than federal government. Users in the UK may look to the Financial Services Authority (FSA) for guidance.

Back to top

In a nutshell

Pros

  • Efficient and oriented to the future. A more efficient way to trade securities, it blurs the lines between cryptocurrency markets and legacy markets.
  • Regulated and legitimate. It’s to local laws and regulations that offer levels of consumer protection, and exchanges further legitimize blockchain markets.
  • Compliant. Regulatory compliance can be programmed into the token.
  • Driver of liquidity. Blockchain leads to more democratic involvement in financial markets, which is anticipated to increase liquidity over the long term.
  • Innovative. Fractional ownership opens up new investment pathways.
  • Traceable. Increased traceability means stolen funds could potentially be returned to the user.
  • Encouraging new tokens. Security tokens offer a more traditional form of investment than utility tokens.

Cons

      • Developing. It’s an emerging market with limited availability of tradable securities and assets.
      • Complex. It’s restricted by laws and regulations, which makes trading more complex than utility tokens or cryptocurrency.
      • Not always legal. It may not comply with the laws where you live.
      • Relies on personal responsibility. It requires more accountability on the user to know the products and markets they can legally interact with, especially on a decentralized exchange.
      • Potentially not secure. Blockchain security is still a developing field and is vulnerable to hacking and phishing.

FAQs

Disclaimer: Cryptocurrencies are speculative, complex and involve significant risks – they are highly volatile and sensitive to secondary activity. Performance is unpredictable and past performance is no guarantee of future performance. Consider your own circumstances, and obtain your own advice, before relying on this information. You should also verify the nature of any product or service (including its legal status and relevant regulatory requirements) and consult the relevant Regulators' websites before making any decision. Finder, or the author, may have holdings in the cryptocurrencies discussed.

Picture: Shutterstock

Disclosure: At the time of writing, the author holds BTC, XRP, BNB, ETH, XLM, PWR, VET, ICX, WAN, ETC, LRC, QASH, XMR, NEO, NXS, THETA and BAT.

James Edwards

James is a cryptocurrency writer for finder. He has a background in psychology and UX design which drives his interest in human behaviour, particularly the errors made when trying to navigate volatile marketplaces.

Was this content helpful to you? No  Yes

Ask an Expert

You are about to post a question on finder.com:

  • Do not enter personal information (eg. surname, phone number, bank details) as your question will be made public
  • finder.com is a financial comparison and information service, not a bank or product provider
  • We cannot provide you with personal advice or recommendations
  • Your answer might already be waiting – check previous questions below to see if yours has already been asked

Finder.com provides guides and information on a range of products and services. Because our content is not financial advice, we suggest talking with a professional before you make any decision.

By submitting your comment or question, you agree to our Privacy and Cookies Policy and Terms of Use.

Questions and responses on finder.com are not provided, paid for or otherwise endorsed by any bank or brand. These banks and brands are not responsible for ensuring that comments are answered or accurate.
Go to site