رطم What Are Security Tokens? A Guide to Digital Assets – Securities.io
اتصل بنا للحصول على مزيد من المعلومات

الأصول الرقمية 101

What Are Security Tokens? A Guide to Digital Assets

mm

Security tokens function as investment contracts wherein the purchaser anticipates future profits from dividends, revenue share, or market appreciation. Security tokens differ from utility tokens in a couple of ways. The main difference between these tokens is that security tokens follow strict guidelines regarding who can purchase them and how they are transferred.

الأمان مقابل رمز الأداة المساعدة

There are currently two types of tokens in the blockchain space: الرموز الأمنية and utility tokens. It is important to learn the differences between these two types of digital assets. You should also understand that some tokens start as security tokens during their initial offering, but later develop into utility tokens following the development of the platform.

Many investors prefer security tokens because the assets adhere to the SEC’s legal restrictions. Security tokens are the direct result of a desire by investors and businesses to utilize a blockchain-based crowdfunding system that conforms to current IPO requirements. These regulations include the implementation of Know Your Customer (KYC) protocols. KYC laws require all investors to reveal their identities before they can participate in the crowdfunding event.

فوائد الرموز الأمنية

Security tokens provide participants with a more transparent investment experience. Startups offering security tokens must provide investors with a plethora of legally required information, such as the company location, financial statements, business purposes, and management. These are all valuable pieces of data to verify before making any investment. While utility token investments can provide this information, it is not currently legally required.

Additionally, there are a few examples of ramifications for utility token providers who falsified provided information. These laws offer valuable protection to all parties involved, and many in the industry believe them to be critical in curbing fraud and spurring wide-scale crypto adoption.

Due to the unregulated nature of the early crypto market, there was a significant amount of fraudsters in the space. These individuals prey on new investors’ doubts and misgivings to make a profit. One دراسة put the number of fraudulent ICOs in 2017 at eighty percent. Given the amount of fraudulent activity in the market, it is no surprise that investors seek a more secure alternative to the status quo.

مستثمرون على نطاق واسع

Security tokens attract more large-scale investments because they are subject to legislation that protects investors, such as the قانون الأوراق المالية من شنومكس and Section 3 of the قانون البورصة للأوراق المالية 1934. تعتبر وسائل الحماية هذه ضرورية لمنع حدوث نشاط احتيالي في السوق. يوفر هذا الأمان الإضافي معاملة أكثر أمانًا لكل من المستثمرين والشركات التي تتطلع إلى الاستفادة من استراتيجيات جمع التبرعات بتقنية blockchain.

مزيد من الأمان لشركتك

Users are not the only ones benefiting from security tokens. A business that chooses to offer security tokens gains the confidence of knowing that it will not be subject to later legal or financial ramifications resulting from its offering. Its tokens are in line with SEC regulations and, therefore, the company can operate with greater confidence.

الرموز المساعدة

Utility tokens serve a specific purpose within a platform. Additionally, they do not pay investors any dividends or revenue share for holding the coin. A perfect example of a well-known utility coin is the Ethereum (ETH -1.54٪) network. In July 2018, the SEC حكمت that Ethereum was not a security. One senior SEC official stated that while Ethereum may have been a security during its initial coin offering (ICO), in its current status, it functions as a utility token.

اختبار هوي

It is not always easy to determine if a coin is a security or a utility token. Also, it is important to remember that the SEC could alter its language and consider even utility tokens as falling under security laws in the future. Despite the uncertainty of the market, you can employ the Howey Test to self-verify a token’s standing in most scenarios.

  • هل تستثمر المال؟
  • هل تتوقع أرباحًا مقابل استثمارك؟
  • هل تستثمر في مؤسسة مشتركة؟
  • هل ستأتي أرباحك من جهود المروج أو الطرف الثالث؟

The token you are researching is likely a security token if you answered yes to these questions. Additionally, if the profit received from the investment is entirely outside of your control, the chances are good that the token in question falls under security laws. The Howey Test originated during the Supreme Court case SEC ضد WJ Howey شركة The SEC alleged that the Howey Company of Florida violated Securities Laws when it failed to register a land investment agreement with the SEC. The deal involved an investor purchasing half of the company’s unused land so that it could develop the rest of the land into more citrus fields.

The Supreme Court determined that because the investors had no “knowledge, skill, and equipment necessary for the care and cultivation of citrus trees,” they were acting as speculators. In other words, they invested in the land with the hopes of making a profit from the efforts of someone else.

The SEC determined that the investments made were not for the land but instead for the opportunity to share in the future profits of the large citrus fruit enterprise. The Howey test works when applied to cryptocurrencies, but given the shifting nature of tokens, not all coins can be precisely defined using this technique.

عيوب الرموز الأمنية

There are also some disadvantages provided by security tokens. The main obstacle to this type of token is reduced liquidity. You cannot send a security token to just anyone without complying with KYC protocols. These restrictions add another level of complexity to fundraising requirements.

Companies need full transparency to host a Security Token Offering (STO). The SEC requires a treasure trove of information from companies looking to host STOs, including complete financial statements. The organization only approves companies that meet these stringent guidelines one hundred percent.

خيار أكثر أمانًا

Security tokens fill a much-needed niche in the market. The added transparency provided by these tokens should help to spur increased investment. While many love the anonymity provided by many platforms in the decentralized economy, large investors seek the stability required by the current financial systems in place. Security tokens accomplish this task perfectly.

ديفيد هاميلتون هو صحفي متفرغ ومهتم بالبيتكوين منذ فترة طويلة. وهو متخصص في كتابة المقالات حول blockchain. تم نشر مقالاته في العديد من منشورات البيتكوين بما في ذلك Bitcoinlightning.com

المعلن الإفصاح: تلتزم Securities.io بمعايير تحريرية صارمة لتزويد قرائنا بمراجعات وتقييمات دقيقة. قد نتلقى تعويضًا عند النقر فوق روابط المنتجات التي قمنا بمراجعتها.

ESMA: العقود مقابل الفروقات هي أدوات معقدة وتنطوي على مخاطر عالية لخسارة الأموال بسرعة بسبب الرافعة المالية. ما بين 74-89% من حسابات مستثمري التجزئة يخسرون الأموال عند تداول عقود الفروقات. يجب عليك أن تفكر فيما إذا كنت تفهم كيفية عمل عقود الفروقات وما إذا كان بإمكانك تحمل المخاطر العالية بخسارة أموالك.

إخلاء المسؤولية عن النصائح الاستثمارية: المعلومات الواردة في هذا الموقع مقدمة لأغراض تعليمية، ولا تشكل نصيحة استثمارية.

إخلاء المسؤولية عن مخاطر التداول: هناك درجة عالية جدًا من المخاطر التي ينطوي عليها تداول الأوراق المالية. التداول في أي نوع من المنتجات المالية بما في ذلك الفوركس وعقود الفروقات والأسهم والعملات المشفرة.

هذا الخطر أعلى مع العملات المشفرة نظرًا لكون الأسواق لا مركزية وغير منظمة. يجب أن تدرك أنك قد تفقد جزءًا كبيرًا من محفظتك الاستثمارية.

Securities.io ليس وسيطًا أو محللًا أو مستشارًا استثماريًا مسجلاً.