Security tokens are created by tokenizing an asset. Therefore, they are supported by assets stored at an asset custodian. To ensure that the assets used to support issued tokens exist, supervisory institutions and independent auditors must be involved.
Follow us on
Please sign in to leave a comment.