How is Security Token Different From Utility Token?

How is Security Token Different From Utility Token?

How is Security Token Different From Utility Token?

How is Security Token Different From Utility Token?

How is Security Token Different From Utility Token?

Read Time: 5 minutes

The initial coin offering (ICO) is an innovative crowdfunding model that enables new businesses to sidestep traditional early seed investment. In 2017, ICOs raised over $4 billion of beginning time capital and massively disrupted conventional finance. Through the ICO fundraising model, new companies can raise capital by issuing crypto tokens on a blockchain — most normally Ethereum — and circulating them to token purchasers in return for making a money-related commitment to the task. In July 2017, the Securities and Exchange Commission (SEC) discharged a report which inferred that specific tokens could be delegated securities and subject to control. Almost EVERY SINGLE ICO to date has been an unregistered securities offering, posing under the guise of utility tokens. Also, SEC Chairman Jay Clayton said:

I believe every ICO I’ve seen is security.

The “utility token” defense might not work. Chairman Clayton warned against using the phrase utility token. ICOs that violate securities laws could soon confront punishments or graver consequences. Depending on their function, crypto tokens might be classified as Utility tokens or Security tokens.

Utility Token –

UtIlity tokens represent a unit of account for the network. The bigger the network grows, the more utility in the token, and because the number of tokens is fixed. As the size of the network and transaction volumes within it grows, this will create demand for the tokens.

It is important to note that “utility token” is an organizational distinction–not a legal one. The SEC has not given official guidance on utility tokens, so the industry does not with certainty whether they are subject to securities regulations.

Bloomberg’s Matt Levine compares utility tokens to the Starbucks card:

A Starbucks gift card is probably not security, even though you pay money to a corporation for the card and expect to get back something in the future, because you are not investing the money in the expectation of profit: You’re investing it in the expectation of coffee.

UtIlity tokens have a use case and are not designed as investments, but that doesn’t mean that they don’t bring any profit. They have a certain use case inside the project and don’t represent the company’s share. Utility tokens may grow in price if the demand for service or product increases. So buying such tokens of a project, that solves real problems of users and is constantly being developed and improved, may give great profit in the future.

Golem is a pertinent example, allowing users to lend their own PC’s power to the network which collectively employs it to run a remote supercomputer. Users earn GNT for connecting to the network, but they can also buy them via an exchange. Basic Attention Token is similar, with users rewarded in BAT for using the BRAVE browser and viewing ads.

Also Filecoin – which raised an ICO-record $257 million–plans to provide a decentralized cloud storage service that will take advantage of unused computer hard drive space. ICO contributors received tokens that they will be able to use to purchase storage space from Filecoin once the service has launched.

Token Sale Platform | ICO Development | STO Development
Token Sale Platform to issue and manage Utility and Security token offerings on Ethereum, EOS and Stellar Blockchain platforms

Security Token —

One of the major topics of discussion in cryptocurrency right now is around the development of security tokens. Security tokens give their holders to ownership rights of a company. A security token’s value is derived from a tradable asset; subsequently, it is liable to government laws controlling traditional securities. Security tokens can be utilized to change conventional IPOs(initial public offerings) and issue company shares, profits, and voting rights over the blockchain frameworks.

Joshua Stein, the CEO of tokenized securities startup Harbor said —

A security token represents traditional, private security interest. It could represent a share in a company, an LP interest in a fund or a trust, a member share in an LLC. Essentially, you’re taking something that today you have on paper and you’re putting an electronic wrapper around it.

Here’s the definition right from the Securities Act of 1933

The next mega-trend in crypto will be assets migrating to the blockchain in the form of tokens. pretty much any security is better denominated as a token than traditional forms of ownership. This is the future, not share certificates in filing cabinets.

– Trevor Koverko, CEO of Polymath Inc.

Polymath is doing for securities tokens what Ethereum did for utility tokens. Polymath’s ST20 security token protocol embeds regulatory requirements into the tradable tokens themselves, which are only available to verify and authorized participants.

Also, Online retailer Overstock recently announced that tZERO, one of its portfolio companies, will hold an ICO to fund the development of a licensed security token trading platform. The tZERO tokens that are issued from this ICO will be in accordance with SEC regulations. tZERO token holders will be entitled to quarterly dividends from the profits generated by the tZERO platform.

The first major wave of security token offerings has already begun; starting with the launch of Nexo, a crypto-backed instant loan platform by Credissimo; a leading European FinTech Group that has been a key player in Online Consumer Lending and E-commerce Financing for over 10 years. The company generates operating revenues from crypto-backed loans. The company’s positive bottom line is called its Net Profit and, when achieved, 70% from it will be reinvested back into the company to fund more crypto-backed loans, and a fixed 30% from the Net Profit is paid out as dividends to NEXO Token holders in the given accounting period.

How Do We Actually Distinguish Security and Utility Token?

With a specific end goal to decide if a digital token is a security, we can apply the Howey Test. This is used to confirm regardless of whether or not a transaction qualifies as an ‘investment contract’.If it meets the criteria, at that point it will be considered as security and will be subject to additional disclosure and regulation requirements.

So as to be named an investment contract under the Howey Test, a token must meet the following prerequisites:

  • There is an investment of money.
  • The user expects to profit from the investment.
  • The investment of money is in a common enterprise.
  • Any profit comes from the efforts of a third-party or promoter.

Do you know: Tokenic is a Token Sale Platform to issue and manage Utility and Security token offerings on Ethereum, EOS and Stellar Blockchain platforms.

Also, do check out our earlier blog posts.

To be up to date with our work, Join Our Community:-

Telegram | Twitter | Facebook | LinkedIn


Blockchain for dog nose wrinkles' Ponzi makes off ~$127M🐶

Project promised up to 150% returns on investment in 100 days, raising about 166.4 billion South Korean won — or about $127 million — from 22,000 people.

Latest blogs for this week

Understanding Fuzzing and Fuzz Testing: A Vital Tool in Web3 Security

Read Time: 5 minutes When it comes to smart contracts, ensuring the robustness and security of code is paramount. Many techniques are employed to safeguard these contracts against vulnerabilities
Read More

How EigenLayer’s Restaking Enhances Security and Rewards in DeFi

Read Time: 7 minutes Decentralized finance (DeFi) relies on Ethereum staking to secure the blockchain and maintain consensus. Restaking allows liquid staking tokens to be staked with validators in
Read More

ERC 404 Standard: Everything You Need to Know

Read Time: 7 minutes Introduction Ethereum has significantly shaped the crypto world with its introduction of smart contracts and decentralized applications (DApps). This has led to innovative developments in
Read More

DNS Attacks:  Cascading Effects and Mitigation Strategies

Read Time: 8 minutes Introduction DNS security is vital for a safe online space. DNS translates domain names to IP addresses, crucial for internet functionality. DNS ensures unique name-value
Read More

EIP-4844 Explained: The Key to Ethereum’s Scalability with Protodanksharding

Read Time: 7 minutes Introduction  Ethereum, the driving force behind dApps, has struggled with scalability. High fees and slow processing have limited its potential. They have kept it from
Read More

QuillAudits Powers Supermoon at ETH Denver!

Read Time: 4 minutes Calling all the brightest minds and leaders in the crypto world! Are you ready to build, connect, and innovate at the hottest event during ETH
Read More

Decoding the Role of Artificial Intelligence in Metaverse and Web3

Read Time: 7 minutes Introduction  Experts predict a transformative shift in global software, driven by AI and ML, marking the dawn of a new era. PwC predicts AI will
Read More

Transforming Assets: Unlocking Real-World Asset Tokenization

Read Time: 7 minutes In the blockchain, real-world assets (RWAs) are digital tokens that stand for tangible and conventional financial assets, including money, raw materials, stocks, and bonds. As
Read More
Scroll to Top

Become a Quiffiliate!
Join our mission to safeguard web3

Sounds Interesting, Right? All you have to do is:


Refer QuillAudits to Web3 projects for audits.


Earn rewards as we conclude the audits.


Thereby help us Secure web3 ecosystem.

Total Rewards Shared Out: $200K+