Why Most Tokenization Still Depends on Plaintext

By Eric Beans, CEO, H33.ai, Inc. · May 9, 2026

The tokenization industry has built an impressive illusion of privacy. Assets are represented as tokens on distributed ledgers. Ownership is recorded cryptographically. Transfers are executed through smart contracts. The asset side of tokenization is genuinely private, or at least opaque, in ways that traditional financial infrastructure is not.

But the decision side of tokenization, the processes that determine who can buy, who can sell, who is eligible, and who is restricted, remains entirely dependent on plaintext data. This is not a minor implementation detail. It is the central architectural weakness of every tokenization platform operating today. And until it is addressed, the promise of privacy-preserving tokenized finance is incomplete.

The Compliance Data Flow

Every tokenized security requires compliance verification before issuance. This is not optional. Regulations in every major jurisdiction require issuers to verify investor identity, confirm eligibility, screen against sanctions lists, and enforce transfer restrictions. The question is not whether these checks happen. The question is how they happen and what data they expose in the process.

In today's tokenization platforms, the compliance data flow works like this. The investor submits identification documents. These documents are transmitted to the issuance platform, which either verifies them internally or sends them to a third-party KYC provider. The KYC provider reads the documents, extracts identifying information, and compares it against verified databases. The provider returns a verification result.

At every step, the investor's data exists in plaintext. It is read by the issuance platform's software. It is transmitted over networks. It is parsed by verification engines. It is stored in databases, at least temporarily, for audit purposes. The investor's passport number, date of birth, address, and photograph are all accessible to the systems performing the verification.

This is the first data exposure event. It is not the last.

Accreditation Verification: The Financial Record Exposure

For securities offered under exemptions that require accredited investor status, the platform must verify that each investor meets the accreditation criteria. In the United States, this typically means verifying that the investor has a net worth exceeding one million dollars excluding their primary residence, or annual income exceeding two hundred thousand dollars for the past two years.

How does a tokenization platform verify this? It reads financial records. Bank statements, brokerage statements, tax returns, or a letter from a CPA, attorney, or registered investment advisor. Each of these documents contains detailed financial information that goes far beyond what is needed for the binary determination of accredited or not accredited.

A bank statement reveals transaction history, account balances, spending patterns, and counterparty information. A tax return reveals income sources, deductions, investment gains and losses, and business activities. The platform needs only one bit of information: does this investor qualify? But to get that one bit, it must ingest documents that contain thousands of data points.

This is the structural problem. The amount of data exposed is vastly disproportionate to the amount of information needed. The verification process requires maximum data input to produce minimum informational output.

AML Screening: Names on Servers

Anti-money laundering screening requires the platform to check investor names and other identifying information against sanctions lists, politically exposed person databases, and adverse media sources. This screening happens at onboarding and is typically repeated on an ongoing basis.

The mechanics are straightforward. The investor's name, date of birth, nationality, and sometimes address are sent to a screening provider. The provider compares this information against its databases and returns a set of potential matches. The compliance team reviews the matches and makes a determination.

During this process, the investor's identifying information exists on the screening provider's servers. It is processed by their algorithms. It is stored in their logs. Even if the provider deletes the data after screening, it existed in plaintext on their infrastructure for the duration of the screening process. The investor had no control over who could access it during that window.

For ongoing screening, this exposure repeats periodically. Every re-screening event is a new data exposure event. Every re-screening event puts the investor's identifying information on a third-party server. Over the life of a tokenized security, an investor's data may be exposed dozens or hundreds of times through screening alone.

Transfer Restrictions: The Position Transparency Problem

Tokenized securities are subject to transfer restrictions. These restrictions may limit who can receive tokens, how many tokens any single investor can hold, or which jurisdictions can participate in secondary trading. Enforcing these restrictions requires the platform to know things about each investor that the investor may prefer to keep private.

Consider a holding limit. The issuer has defined that no single investor may hold more than five percent of the outstanding tokens. To enforce this, the platform must know the current holdings of every investor. This means the platform maintains a complete view of the cap table in real time. It knows how many tokens each investor holds, what percentage of the total they represent, and how close they are to the limit.

This position data is extraordinarily sensitive. It reveals investment concentration, portfolio allocation decisions, and in some cases, trading strategies. A platform operator with access to this data has information asymmetry over the investors. They know which investors are near their limits, which investors have been accumulating, and which investors have been reducing their positions.

The platform needs this data to enforce compliance. But the existence of this data on the platform creates risks that extend beyond the compliance use case. It is a target for adversaries. It is a source of potential insider trading. It is a liability for the platform operator.

The Cascade of Exposure

What makes this problem systemic rather than incidental is the cascade effect. It is not one check that requires plaintext access. It is every check. The KYC verification reads identity documents. The accreditation verification reads financial records. The AML screening reads names and personal details. The transfer restriction enforcement reads position data. The jurisdiction enforcement reads location data. The tax reporting reads transaction history.

Each check is independent. Each check requires different data. And each check exposes that data to different systems, different providers, and different personnel. The total surface area of data exposure is the sum of all compliance checks multiplied by all investors multiplied by all events over the life of the asset.

For a tokenized fund with one thousand investors, quarterly AML re-screening, annual accreditation re-verification, and ongoing transfer restriction enforcement, the number of data exposure events per year is measured in the tens of thousands. Each one is a point where data exists in plaintext on a system that the investor does not control.

The Privacy-Preserving Label

The tokenization industry uses the phrase "privacy-preserving" liberally. It typically refers to the fact that the token itself does not reveal ownership details to the public. On a permissioned blockchain, only authorized parties can see who holds which tokens. On a public blockchain, ownership may be pseudonymous. The asset representation has some degree of privacy.

But this usage of "privacy-preserving" ignores the compliance layer entirely. It is privacy for the output of the process, the token, while the input to the process, the investor data, is fully exposed. The industry has conflated asset privacy with process privacy. They are not the same thing.

Asset privacy means the outside world cannot see who holds the token. Process privacy means the systems that determine eligibility cannot see the data they evaluate. The first is table stakes for any permissioned system. The second requires a fundamentally different cryptographic architecture.

Why Traditional Encryption Does Not Solve This

The obvious response is to encrypt the data. And indeed, most tokenization platforms encrypt data at rest and in transit. But encryption at rest and in transit solves a different problem. It protects data from unauthorized access by external parties. It does not protect data from authorized access by the platform's own systems.

When a compliance engine needs to evaluate whether an investor is accredited, it must decrypt the investor's financial records to read them. Encryption at rest protects the records when they are stored. But the moment the compliance engine processes them, they are decrypted. The data exists in plaintext in memory on the server running the compliance engine. This is the window of exposure that traditional encryption cannot close.

This is not a failure of encryption. It is a limitation of traditional encryption's design. Traditional encryption protects data from parties who should not have access. It does not enable computation by parties who need to evaluate the data without seeing it. These are different problems requiring different solutions.

The Fully Homomorphic Encryption Approach

Fully homomorphic encryption, as implemented in H33's infrastructure, solves the second problem. It enables computation on encrypted data without decryption. The compliance engine receives encrypted investor data. It executes the compliance logic, the same rules, the same checks, the same evaluations, on the encrypted values. It produces an encrypted result. That result is decrypted by the authorized party, and only the result is revealed.

The compliance engine never decrypts the investor's data. It never sees the passport number. It never reads the bank statement. It never learns the investor's address. It evaluates the data in encrypted form and produces a determination that is cryptographically tied to the inputs without revealing the inputs themselves.

This is what process privacy means. The decision is real. The compliance is rigorous. The result is auditable. But the data that informed the decision is never exposed to the system making the decision.

What Changes When Compliance Is Encrypted

The implications are significant across multiple dimensions. From a security perspective, encrypted compliance eliminates the plaintext attack surface. There is no window during which data exists unencrypted on a compliance server. There is no database of decrypted financial records to breach. There is no log of plaintext names from sanctions screening to exfiltrate. The data is encrypted from the moment the investor submits it until the moment the result is produced, and the result contains only the determination, not the inputs.

From a regulatory perspective, encrypted compliance provides stronger assurance than traditional compliance. Every determination produces an H33-74 attestation, a cryptographic proof that the check was performed correctly, by the authorized system, against the correct rule set. Regulators can verify these attestations without requesting or receiving any investor data. The audit trail is complete, deterministic, and independently verifiable.

From an operational perspective, encrypted compliance reduces the platform's data handling burden. The platform does not manage personally identifiable information because it never possesses personally identifiable information in decrypted form. Data protection regulations, retention policies, deletion requirements, and breach notification obligations are dramatically simplified when the platform handles only encrypted data and attestation proofs.

From an economic perspective, the reduction in data handling complexity makes platforms less expensive to build, operate, and insure. The cost of compliance infrastructure is driven largely by the cost of securing the data that compliance processes require. When the data is never decrypted, the cost of securing it drops substantially.

The Trust Inversion

Traditional tokenization requires investors to trust the platform with their data. The investor must believe that the platform will handle their data responsibly, store it securely, transmit it carefully, and delete it when required. This trust is enforced by contracts, regulations, and reputational incentives. It is not enforced by mathematics.

H33 inverts this trust model. The investor does not need to trust the platform with their data because the platform never has their data. The investor's trust is in the cryptographic protocol, which is mathematically verifiable. The investor can confirm that the platform processed their encrypted data correctly by verifying the H33-74 attestation. The investor does not need to trust the platform's security practices, data handling policies, or personnel because none of these factors affect the privacy of their data.

This inversion is fundamental. It changes the nature of the relationship between investor and platform from a trust relationship to a verification relationship. Trust can be violated. Verification is mathematical.

The Post-Quantum Dimension

H33's encrypted compliance infrastructure is post-quantum secure. The cryptographic constructions rely on three independent hardness assumptions. A quantum computer capable of breaking one assumption would still leave the other two intact. This is relevant for tokenized securities because these are long-lived assets. A tokenized real estate fund may have a ten-year duration. A tokenized infrastructure project may last twenty years or more. Compliance records and attestations generated today must remain valid and verifiable for the life of the asset.

Systems built on classical cryptographic assumptions face a specific risk: data encrypted today may be stored by an adversary and decrypted when quantum computing becomes practical. This is the harvest-now, decrypt-later attack. For tokenization compliance data, this means that today's encrypted investor records could be decrypted in the future, exposing all of the data that was supposedly protected.

H33's post-quantum construction eliminates this risk. The encrypted compliance data and the attestation proofs remain secure against both classical and quantum adversaries. The three independent hardness assumptions, covering lattice-based, hash-based, and structured-lattice cryptographic families, mean that a breakthrough in any single area of mathematics or quantum computing does not compromise the system.

The Path From Here

The tokenization industry will not move from plaintext compliance to encrypted compliance overnight. There are integration challenges, performance considerations, and regulatory acceptance timelines. But the direction is clear. The current model, where every compliance check is a data exposure event, is unsustainable. As tokenized assets grow in volume and value, the data exposure surface grows proportionally. The liability grows proportionally. The risk grows proportionally.

H33 has built the infrastructure that makes encrypted compliance practical. The fully homomorphic encryption is production-ready. The performance meets the requirements of real-time compliance evaluation. The attestation proofs provide stronger audit assurance than traditional log-based compliance records.

The question is not whether tokenization will move to encrypted compliance. The question is how quickly issuers, platforms, and regulators recognize that the current model, where the industry calls it privacy-preserving while exposing investor data at every compliance checkpoint, is neither private nor sustainable.

The technology to fix this exists. It is not theoretical. It is deployed. And it changes the fundamental equation of tokenization compliance: from seeing data to make decisions, to proving decisions without seeing data.

Move Compliance Off Plaintext

See how H33 executes every tokenization compliance check, KYC, AML, accreditation, jurisdiction, and holding limits, on fully encrypted investor data.

Schedule a Demo