Digital Assets, Tokenization, and NFTs

Section VII: Ethereum Framework

Army Cyber Institute

April 9, 2026

Digital Assets, Tokenization, and NFTs

  • Digital assets are items of value or rights expressed in digital form.
    • Some exist within centralized platforms (game items, licenses, domain names).
    • Today’s focus is on assets cryptographically controlled on blockchains.
  • Tokenization represents digital or real-world claims as on-chain tokens.

A Taxonomy of Digital Assets

  • Native coins (e.g., ETH): secure the chain; pay for computation and data.

  • Fungible tokens (ERC‑20 class): interchangeable units (stablecoins, governance).

  • Non‑fungible tokens (ERC‑721/1155 class): unique identifiers with metadata.

  • Asset‑backed and reference tokens: real-world assets (RWAs), wrapped assets, receipts.

The key distinction is what the token references and who enforces it. Purely on-chain assets are defined by code and consensus. Asset-backed tokens are only as trustworthy as the custodian or legal structure behind them.

Why Tokenize? Problems and Promises

  • The problem: traditional asset systems rely on siloed ledgers, manual settlement, and intermediaries that add cost, delay, and opacity.

  • Programmability: assets as APIs, enabling automation and composability.

  • Provenance: append‑only ownership history and verifiable scarcity.

  • Market access: fractionalization and 24/7 settlement across borders.

  • Risks: custody & keys, market manipulation, off‑chain dependencies, regulation.

Tokenization History — Early Experiments

  • Colored Coins (2012): proposed tagging Bitcoin outputs to represent non-BTC assets; relied on off-chain agreement to interpret the tags.

  • Mastercoin / Omni (2013): layered token issuance on Bitcoin via OP_RETURN; added simple logic but hit script and metadata limits.

  • Counterparty (2014): enabled user-defined assets and early collectibles on Bitcoin; demonstrated interest in richer on-chain representations.

  • Lesson learned: these projects showed that some builders wanted richer asset primitives, but adoption remained narrow. The friction — limited scripts, inconsistent off-chain indexers, and minimal composability — revealed that the substrate itself needed to support stateful logic natively.

timeline
  2012 : Colored Coins (metadata on Bitcoin outputs)
  2013 : Mastercoin / Omni (token layers on Bitcoin)
  2014 : Counterparty (assets, early collectibles)
  2014 : Namecoin experiments (names/identities)

From Experiments to NFTs — A Combined Timeline

timeline
  2017 : CryptoPunks & CryptoKitties popularize NFT scarcity and provenance
  2018-2019 : Marketplaces (OpenSea, SuperRare) and metadata standards mature
  2020-2021 : Fractional.art, NFTfi, Aavegotchi integrate NFTs with DeFi & gaming
  2021-2023 : Beeple's $69M sale, BAYC boom, brand & celebrity adoption; market correction
  2024+ : Utility & identity NFTs (POAPs, Lens, ticketing, loyalty, credentials)

Fungible vs Non-Fungible — Design Implications

  • Fungible assets: track balances and allowances; code optimizes for arithmetic safety, batch transfers, and spending permissions.
  • Non-fungible assets: track unique identifiers; design centers on metadata integrity, ownership transfer hooks, and provenance tracking.
  • Multi-asset contracts: combine both patterns; shared logic with type or ID differentiation for games, marketplaces, and multi-currency systems.
  • Design priorities diverge: efficiency and allowance safety dominate fungible design; metadata integrity and transfer correctness dominate NFT design.

NFTs: What Are We Actually Buying?

  • Token ownership ≠ intellectual property ownership by default.

  • Token points to metadata which may reference media (image, model, etc.).

  • Rights live in licenses/terms; on‑chain standards rarely encode legal rights.

    • Owning Real World Assets (RWA) NFTs does not grant ownership of real-world items without a separate, legally recognized agreement.
  • Good practice: clear licensing combined with content hashes to anchor files.

  • Example: Bored Ape Yacht Club granted commercial rights to holders via an explicit license, while many other projects granted nothing at all. When Yuga Labs acquired CryptoPunks, one of the first actions was to grant IP rights that the original project never provided — illustrating how token ownership alone was insufficient.

Metadata and Storage Models

  • On-chain storage: metadata or media bytes are written directly into the smart contract’s state.
    • Immutable and permanent as long as the chain exists.
    • Gas costs make this practical only for small files or manifests.
  • Off-chain, content-addressed storage (IPFS, Arweave): files stored outside the blockchain but addressed by their hash rather than a fixed location.
    • The hash acts as a fingerprint: if the file changes, the address changes.
    • Tamper-evident and verifiable, but requires someone to “pin” or pay for long-term availability.
  • Off-chain, location-addressed storage (traditional web servers / HTTPS URLs): data retrieved from a specific domain and path like https://example.com/file.json.
    • Cheap and flexible but mutable — the host can change or remove the file without detection.
    • Depends entirely on the operator’s honesty and infrastructure.

Royalties, Economics, and Marketplace Realities

  • Royalties are signals, not rules. Standards like EIP-2981 let creators publish a preferred royalty percentage on-chain, but marketplaces choose whether to honor it. Some pay creators on every resale; others bypass royalties to attract traders with lower fees.

  • Primary vs secondary markets work differently. Primary sales (mints) are event-driven — allowlists, fixed prices, or auctions set initial distribution. Secondary markets discover ongoing demand through open trading, but liquidity is never guaranteed.

  • Wash trading distorts signals. A wallet buying from itself inflates volume and price history. Thin markets mean a few large orders can swing prices dramatically. Provenance proves history, not value — a long chain of sales does not imply healthy demand.

Minting and Market Design Patterns

  • Allowlists and phases: staged mint windows that control who can mint and when; used to shape demand and reward early community members.
  • Auctions: Different methods of offering NFTs
    • English: ascending bids until highest bidder wins.
    • Dutch: price starts high and falls until enough buyers commit.
    • Batch: many bids collected, one clearing price for all winners.
  • Reveals and fairness: if token traits are visible before or during minting, insiders can selectively mint rare items. Commit–reveal schemes (hash a secret at mint, reveal later) and verifiable random functions (VRFs) ensure trait assignment is both fair and auditable after the fact.

Real‑World Assets (RWAs) and Tokenization

  • Reference tokens for fiat, commodities, or securities rely on off‑chain enforcement.

  • Custody, auditing, and legal agreements determine safety—not just code.

  • Benefits: fractionalization, 24/7 settlement, programmable compliance.

  • Risks: jurisdictional complexity, oracle/data integrity, redemption gates.

  • Examples in practice: Ondo Finance tokenized U.S. Treasuries (OUSG) to offer on-chain yield exposure backed by BlackRock funds. Paxos issues PAXG, a gold-backed token where each token represents one troy ounce held in London vaults. Centrifuge tokenizes real-world invoices and loans as collateral for on-chain lending pools. In each case, the token’s trustworthiness depends on the custodian and legal structure, not just the smart contract.

Enterprise Tokenization and Permissioned Ledgers

  • Permissioned ledgers (e.g., Hyperledger Fabric, Corda): known participants, authenticated identities, governed access.
  • Assets as chaincode: unique tokens represent equipment, documents, or credentials within controlled networks.
  • Use cases: provenance tracking, maintenance records, certification, or supply-chain assurance.
  • Pros: high throughput, privacy channels, auditability, clear governance.
  • Cons: limited openness; trust rests on consortium operations rather than public consensus.

Critiques and Misunderstandings

  • Environmental impact: proof-of-work once consumed vast energy; post-Merge proof-of-stake cut usage by >99%, but energy and sustainability questions remain relevant to system design.
  • Speculation and hype: early markets often priced art and collectibles irrationally, leading to bubbles, scams, and disillusionment.
  • ‘Right-click save’ critique: copying an image ≠ owning its token; NFTs record provenance, not exclusivity or copyright.
  • Ownership vs access: tokens reference off-chain media; control of the token does not guarantee control of the file or rights.

System Architecture — Where Everything Lives

  • On‑chain state is canonical for ownership; metadata may be off‑chain.
  • Events drive discovery; indexers reflect, not define, truth.
  • Wallets sign; contracts enforce; markets render.

system_arch C Creator / Issuer K Smart Contract (Token Standard) C->K  deploys U Users & Wallets U->K  sign tx S On-Chain State Balances · Ownership · Approvals K->S M Metadata (on-chain / IPFS / HTTP) K->M  tokenURI X Events / Logs K->X  emits F Media Files M->F  references I Indexers X->I  consumed by V Marketplaces / Apps I->V  powers

Common Pitfalls in NFT Projects

  • Mutable metadata without disclosure — changing assets after sale erodes buyer trust.

  • Centralized hosting with no content hashes — link rot and silent content swaps.

  • Over-broad approvals and compromised marketplaces — poorly scoped permissions let attackers drain wallets.

  • Ambiguous or missing rights — no license means buyers cannot know what they are permitted to do.

  • Verification discipline: always check the contract address and token ID before trusting an NFT. Verify metadata hashes and storage locations (IPFS CID or Arweave TX). Use provenance graphs to spot fakes. Beware spoofed domains, fake collections, and phishing signing prompts.

Real World Examples

  • CryptoPunks (2017): 10,000 algorithmically generated avatars on Ethereum. No explicit IP license at launch — rights were retroactively granted after Yuga Labs’ acquisition. Demonstrates how token ownership alone does not confer rights.

  • Starbucks Odyssey (2022–2024): loyalty NFTs on Polygon granting members access to exclusive experiences. Showed enterprise interest in utility-based tokens, but was discontinued — illustrating that even well-resourced projects can fail to find product-market fit.

  • Propy (2017–present): tokenized real estate transactions. The on-chain record represents a legal transfer processed through traditional title and escrow — the blockchain layer adds transparency but does not replace the legal framework.

  • U.S. DoD supply-chain pilots: permissioned ledger experiments tracking aircraft parts and maintenance records as unique tokens, prioritizing auditability and provenance over public tradability.

Looking Forward: Dynamic Assets

  • Dynamic NFTs and programmable rights; evolving metadata schemes.

  • Royalty signaling standards and market enforcement debates.

  • Cross‑chain identity and portability; wallets as identity hubs.

  • Data availability advances enable richer on‑chain assets at lower cost.

  • Central Bank Digital Currencies (CBDCs): many central banks are exploring or piloting tokenized sovereign currency. CBDCs apply the same tokenization logic — programmable, auditable digital claims — but under centralized issuance and policy control. They represent a major design space where the concepts from this lecture (token standards, metadata, on-chain vs off-chain enforcement) intersect directly with monetary policy and national security.

Key Takeaways

  • Tokenization maps claims to on‑chain objects with programmable control.

  • NFTs provide provenance and uniqueness; rights depend on explicit licenses.

  • Storage choices (on‑chain/IPFS/HTTP) determine integrity and trust.

  • Standards enable composability; design discipline prevents common harms.

Microlab: Token Autopsy

Time: 10–15 minutes

  1. Setup (2 min): Each pair receives a short description of a fictional token project: its name, what it claims to represent, its metadata storage method, and its approval model.

  2. Analysis (5 min): For your project, answer:

    • What does the chain actually guarantee vs what is an off-chain promise?
    • Where is the metadata stored and what are the integrity risks?
    • What approval scope does the marketplace require, and what could go wrong?
  3. Prescription (3 min): Write one concrete improvement the project should implement before launch.

  4. Share-out (3 min): Two pairs present their most important finding. Class identifies common patterns across projects.

References

[1]
V. Buterin, “Ethereum: A Next-Generation Smart Contract and Decentralized Application Platform.” Ethereum.org, 2014. Available: https://ethereum.org/content/whitepaper/whitepaper-pdf/Ethereum_Whitepaper_-_Buterin_2014.pdf
[2]
G. Wood, “Ethereum: A Secure Decentralised Generalised Transaction Ledger, EIP-150 Revision.” 2016. Available: https://ethereum.github.io/yellowpaper/paper.pdf
[3]
G. Wang and M. Nixon, SoK: Tokenization on blockchain,” in Proceedings of the 14th IEEE/ACM International Conference on Utility and Cloud Computing Companion, Leicester United Kingdom: ACM, Dec. 2021, pp. 1–9. doi: 10.1145/3492323.3495577.
[4]
P. Tierno, “Tokenized Assets,” Congressional Research Service, Washington, D.C., In Focus IF12670.3, Jan. 2025. Accessed: Sep. 12, 2025. [Online]. Available: https://www.congress.gov/crs_external_products/IF/PDF/IF12670/IF12670.3.pdf
[5]
ethereum.org, “Ethereum history.” Accessed: Mar. 27, 2026. [Online]. Available: https://ethereum.org/en/history/
[6]
Ethereum.org, “What are NFTs?” Accessed: Mar. 18, 2026. [Online]. Available: https://ethereum.org/en/nft/
[7]
L. Ante, “The Non-Fungible Token (NFT) Market and Its Relationship with Bitcoin and Ethereum,” FinTech, vol. 1, no. 3, pp. 216–224, Sep. 2022, doi: 10.3390/fintech1030017.
[8]
B. Hammi, S. Zeadally, and A. J. Perez, “Non-fungible tokens: A review,” IEEE Internet of Things Magazine, vol. 6, no. 1, pp. 46–50, Mar. 2023, doi: 10.1109/IOTM.001.2200244.
[9]
F. Vogelsteller and V. Buterin, EIP-20: Token Standard.” Accessed: Oct. 27, 2025. [Online]. Available: https://eips.ethereum.org/EIPS/eip-20
[10]
IPFS, “IPFS.” Accessed: Mar. 18, 2026. [Online]. Available: https://ipfs.tech
[11]
OpenSea, “OpenSea help center.” Accessed: Mar. 18, 2026. [Online]. Available: https://support.opensea.io
[12]
S. Aramonte, W. Huang, and A. Schrimpf, “DeFi risks and the decentralisation illusion,” BIS Quarterly Review, Dec. 2021, Accessed: Mar. 18, 2026. [Online]. Available: https://www.bis.org/publ/qtrpdf/r_qt2112b.htm
[13]
S. L. Schwarcz, “Next-Generation Securitization: NFTs, Tokenization, and the Monetization of Things.” Accessed: Oct. 21, 2025. [Online]. Available: https://papers.ssrn.com/abstract=4044101
[14]
F. Regner, A. Schweizer, and N. Urbach, NFTs in practice – Non-Fungible Tokens as Core Component of a Blockchain-based Event Ticketing Application,” in 40th International Conference on Information Systems, Munich, DE, Dec. 2019. Available: https://www.researchgate.net/publication/336057493_NFTs_in_Practice_-_Non-Fungible_Tokens_as_Core_Component_of_a_Blockchain-based_Event_Ticketing_Application
[15]
J. Scharfman, “Non-fungible token (NFT) fraud, hacks, and controversies,” vol. 2. in Springer books, vol. 2. pp. 307–325, Dec. 2024. doi: 10.1007/978-3-031-60836-0_11.
[16]
T. Sharma, R. Agarwal, and S. K. Shukla, “Understanding Rug Pulls: An In-Depth Behavioral Analysis of Fraudulent NFT Creators.” Accessed: Oct. 17, 2025. [Online]. Available: http://arxiv.org/abs/2304.07598
[17]
W. A. Kaal, “Digital Asset Market Evolution,” J. Corp. L., vol. 46, p. 909, 2020, Accessed: Sep. 12, 2025. [Online]. Available: https://jcl.law.uiowa.edu/sites/jcl.law.uiowa.edu/files/2021-08/Kaal_Final_Web_0.pdf
[18]
M. Dowling, “Fertile LAND: Pricing Non-Fungible Tokens and Virtual Real Estate.” 2022. Available: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4044101
[19]
N. Szabo, “Smart Contracts: Building Blocks for Digital Markets.” 1996. Accessed: Sep. 12, 2025. [Online]. Available: https://www.truevaluemetrics.org/DBpdfs/BlockChain/Nick-Szabo-Smart-Contracts-Building-Blocks-for-Digital-Markets-1996-14591.pdf
[20]
D. Yaga, P. Mell, N. Roby, and K. Scarfone, “Blockchain technology overview,” National Institute of Standards and Technology, Gaithersburg, MD, NIST IR 8202, Oct. 2018. doi: 10.6028/NIST.IR.8202.
[21]
K. L. Howard, “Blockchain: Emerging Technology Offers Benefits for Some Applications but Faces Challenges,” United States Government Accountability Office, Washington, DC, Technology Assessment GAO-22-104625, Mar. 2022. Accessed: Oct. 27, 2025. [Online]. Available: https://www.gao.gov/assets/gao-22-104625.pdf
[22]
D. Sun, W. Ma, L. Nie, and Y. Liu, SoK: A Taxonomic Analysis of DeFi Rug Pulls: Types, Dataset, and Tool Assessment,” Proc. ACM Softw. Eng., vol. 2, pp. 550–572, Jun. 2025, doi: 10.1145/3728900.
[23]
Y. Zhou, J. Sun, F. Ma, Y. Chen, Z. Yan, and Y. Jiang, “Stop Pulling my Rug: Exposing Rug Pull Risks in Crypto Token to Investors,” in Proceedings of the 46th International Conference on Software Engineering: Software Engineering in Practice, Lisbon Portugal: ACM, Apr. 2024, pp. 228–239. doi: 10.1145/3639477.3639722.
[24]
Legal Information Institute, Cornell Law School, “U.S. Code Definition: Digital Asset.” 2024. Available: https://www.law.cornell.edu/definitions/uscode.php?def_id=26-USC-2050229528-298491989
[25]
Chainalysis, “Chainalysis reports.” Accessed: Mar. 18, 2026. [Online]. Available: https://www.chainalysis.com/reports/