This is the perfect example of what's called a utility token. There is actual utility to the tokens. The tokens do something, get you inter an access, or you make them for giving int an access. So this is where it doesn't feel like a security, but it actually is because i'm going to buy it to speculate on it. This is clearly a security. H n t as the coin should be under security law, even though it's a utility. In my mind. And i think a really easy way, because this has come up with the legislation,. which i didn't cover on the program yet because it's still in flux. But part of the interstructure
Podcasting from Italy after a 2-week break of news, Jason covers Casey Newton's failed dunk on Superhuman's $75M raise (2:58), the privacy implications of Apple's approach to preventing child porn distribution (23:14), the Helium Networks internet project (35:02), crypto regulation (43:03), and how WhatsApp is handling Afghanistan (49:45).