The following post is a walkthrough on the methodology we followed to value Perlin’s native network token, the PERL.
I like this modelling technique. Very fleshed out in comparison to the other tokens out there.
Do you think it’ll be applicable for security tokens?
Probably even better applicable to security tokens. Glad you liked our work.