The Elephant in the Room: Security and Privacy Protocols in Security Tokensby@jrodthoughts
762 reads
762 reads

The Elephant in the Room: Security and Privacy Protocols in Security Tokens

by Jesus Rodriguez5mOctober 16th, 2018
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

Data security and privacy are two of the most sensitive aspects in the world of security tokens. Not surprisingly, it seems that we spend much less time discussing security and privacy protocols than other aspects of crypto-security architectures. When comes to security tokens, security and privacy protocols are not only a technically challenging and often intimidating subject but also one that can challenge the current foundation of crypto-securities. From all the aspects missing in the current generation of security token architectures, security and privacy are the ones I feel can break the premise of the entire ecosystem.

Company Mentioned

Mention Thumbnail

Coins Mentioned

Mention Thumbnail
Mention Thumbnail
featured image - The Elephant in the Room: Security and Privacy Protocols in Security Tokens
Jesus Rodriguez HackerNoon profile picture
Jesus Rodriguez

Jesus Rodriguez

@jrodthoughts

Chief Scientist, Managing Partner at Invector Labs. CTO at IntoTheBlock. Angel Investor, Writer, Boa

Learn More
LEARN MORE ABOUT @JRODTHOUGHTS'S
EXPERTISE AND PLACE ON THE INTERNET.
L O A D I N G
. . . comments & more!

About Author

Jesus Rodriguez HackerNoon profile picture
Jesus Rodriguez@jrodthoughts
Chief Scientist, Managing Partner at Invector Labs. CTO at IntoTheBlock. Angel Investor, Writer, Boa

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite