How is Security Token Different From Utility Token?

Table of Contents

Read Time: 5 minutes

The initial coin offering (ICO) is an innovative crowdfunding model that enables new businesses to sidestep traditional early seed investment. In 2017, ICOs raised over $4 billion of beginning time capital and massively disrupted conventional finance. Through the ICO fundraising model, new companies can raise capital by issuing crypto tokens on a blockchain — most normally Ethereum — and circulating them to token purchasers in return for making a money-related commitment to the task. In July 2017, the Securities and Exchange Commission (SEC) discharged a report which inferred that specific tokens could be delegated securities and subject to control. Almost EVERY SINGLE ICO to date has been an unregistered securities offering, posing under the guise of utility tokens. Also, SEC Chairman Jay Clayton said:

I believe every ICO I’ve seen is security.

The “utility token” defense might not work. Chairman Clayton warned against using the phrase utility token. ICOs that violate securities laws could soon confront punishments or graver consequences. Depending on their function, crypto tokens might be classified as Utility tokens or Security tokens.

Utility Token –

UtIlity tokens represent a unit of account for the network. The bigger the network grows, the more utility in the token, and because the number of tokens is fixed. As the size of the network and transaction volumes within it grows, this will create demand for the tokens.

It is important to note that “utility token” is an organizational distinction–not a legal one. The SEC has not given official guidance on utility tokens, so the industry does not with certainty whether they are subject to securities regulations.

Bloomberg’s Matt Levine compares utility tokens to the Starbucks card:

A Starbucks gift card is probably not security, even though you pay money to a corporation for the card and expect to get back something in the future, because you are not investing the money in the expectation of profit: You’re investing it in the expectation of coffee.

UtIlity tokens have a use case and are not designed as investments, but that doesn’t mean that they don’t bring any profit. They have a certain use case inside the project and don’t represent the company’s share. Utility tokens may grow in price if the demand for service or product increases. So buying such tokens of a project, that solves real problems of users and is constantly being developed and improved, may give great profit in the future.

Golem is a pertinent example, allowing users to lend their own PC’s power to the network which collectively employs it to run a remote supercomputer. Users earn GNT for connecting to the network, but they can also buy them via an exchange. Basic Attention Token is similar, with users rewarded in BAT for using the BRAVE browser and viewing ads.

Also Filecoin – which raised an ICO-record $257 million–plans to provide a decentralized cloud storage service that will take advantage of unused computer hard drive space. ICO contributors received tokens that they will be able to use to purchase storage space from Filecoin once the service has launched.

Launch your ICO or STO Effortlessly: Visit Tokenic

Token Sale Platform to issue and manage Utility and Security token offerings on Ethereum, EOS and Stellar Blockchain platforms

Security Token —

One of the major topics of discussion in cryptocurrency right now is around the development of security tokens. Security tokens give their holders to ownership rights of a company. A security token’s value is derived from a tradable asset; subsequently, it is liable to government laws controlling traditional securities. Security tokens can be utilized to change conventional IPOs(initial public offerings) and issue company shares, profits, and voting rights over the blockchain frameworks.

Joshua Stein, the CEO of tokenized securities startup Harbor said —

A security token represents traditional, private security interest. It could represent a share in a company, an LP interest in a fund or a trust, a member share in an LLC. Essentially, you’re taking something that today you have on paper and you’re putting an electronic wrapper around it.

Here’s the definition right from the Securities Act of 1933

The next mega-trend in crypto will be assets migrating to the blockchain in the form of tokens. pretty much any security is better denominated as a token than traditional forms of ownership. This is the future, not share certificates in filing cabinets.

– Trevor Koverko, CEO of Polymath Inc.

Polymath is doing for securities tokens what Ethereum did for utility tokens. Polymath’s ST20 security token protocol embeds regulatory requirements into the tradable tokens themselves, which are only available to verify and authorized participants.

Also, Online retailer Overstock recently announced that tZERO, one of its portfolio companies, will hold an ICO to fund the development of a licensed security token trading platform. The tZERO tokens that are issued from this ICO will be in accordance with SEC regulations. tZERO token holders will be entitled to quarterly dividends from the profits generated by the tZERO platform.

The first major wave of security token offerings has already begun; starting with the launch of Nexo, a crypto-backed instant loan platform by Credissimo; a leading European FinTech Group that has been a key player in Online Consumer Lending and E-commerce Financing for over 10 years. The company generates operating revenues from crypto-backed loans. The company’s positive bottom line is called its Net Profit and, when achieved, 70% from it will be reinvested back into the company to fund more crypto-backed loans, and a fixed 30% from the Net Profit is paid out as dividends to NEXO Token holders in the given accounting period.

How Do We Actually Distinguish Security and Utility Token?

With a specific end goal to decide if a digital token is a security, we can apply the Howey Test. This is used to confirm regardless of whether or not a transaction qualifies as an ‘investment contract’.If it meets the criteria, at that point it will be considered as security and will be subject to additional disclosure and regulation requirements.

So as to be named an investment contract under the Howey Test, a token must meet the following prerequisites:

  • There is an investment of money.
  • The user expects to profit from the investment.
  • The investment of money is in a common enterprise.
  • Any profit comes from the efforts of a third-party or promoter.

Do you know: Tokenic is a Token Sale Platform to issue and manage Utility and Security token offerings on Ethereum, EOS and Stellar Blockchain platforms. Contact Us to know more.

Also, do check out our earlier blog posts.

At QuillHash, we understand the Potential of Blockchain and have a good team of developers who can develop any blockchain applications like Smart Contracts, dApps,Smart Coins, DeFi, DEX on the any Blockchain Platform like EthereumEOS and Hyperledger.

To be up to date with our work, Join Our Community :-

Telegram | Twitter | Facebook | LinkedIn


Related Articles

View All


$NUWA failed to rug on BSC and was front-run by the MEV bot 0x286E09932B8D096cbA3423d12965042736b8F850.

The bot made ~$110,000 in profit.

Are you concerned about your enterprise's security in Web 3.0? Look no further!

Let's delve deeper into and learn effective solutions to mitigate them. Our experts have covered unconventional approaches, from Zero- Trust Security Model to Bug Bounty Programmes.


Hey folks👋,

Web3 security is like a game of whack-a-mole, except the moles are hackers who keep popping up no matter how hard you hit them. 🤦‍♀️

But fear not; we've got some tips to keep your crypto safe⬇️⬇️

Unlock the power of Web3 for your enterprise with enhanced security measures!

💪🌐 Our latest blog post delves into the world of Web3-powered enterprises and how to ensure maximum security in this new frontier.🔒

Read part 1 of our series now: 🚀


Load More

Amidst FTX Saga, Hacker Swept More Than $25 Million in 2nd week of November

The contract reinvested (the earn function was not called) before the user pledged (depositAll function) without settling the reward, which means that when the user pledged, the contract did not settle the previous reward and instead conducted a new investment.

Become a Quiffiliate!
Join our mission to safeguard web3

Sounds Interesting, Right? All you have to do is:


Refer QuillAudits to Web3 projects for audits.


Earn rewards as we conclude the audits.


Thereby help us Secure web3 ecosystem.

Total Rewards Shared Out: $190K+