# Secondary Markets and Liquidity

Secondary markets determine how tokenised real-world assets change hands **after initial distribution**. Unlike native crypto assets, RWAs must balance transferability with compliance, legal enforceability, and asset-specific constraints.

This section explains how secondary trading is enabled, where it is intentionally limited, and how liquidity is treated as a **property to be managed**, not promised.

***

#### Purpose of Secondary Markets

Secondary markets exist to:

* allow existing holders to exit or rebalance positions
* enable price discovery over time
* reduce reliance on issuers for liquidity

They do **not** guarantee continuous liquidity or frictionless trading. For RWAs, liquidity is conditional by design.

***

#### Permissioned vs Permissionless Trading

Secondary transfers inherit the access model defined at onboarding.

| Trading Model  | Characteristics                    |
| -------------- | ---------------------------------- |
| Permissionless | Open peer-to-peer transfers        |
| Permissioned   | Eligibility checks enforced        |
| Hybrid         | Transfers allowed under conditions |

The protocol enforces the selected model **at the transfer level**, not at the marketplace level.

***

#### Transfer Enforcement in Secondary Markets

Every secondary transfer is validated atomically.

```
Seller Wallet
     │
     ▼
Transfer Request
     │
     ▼
Eligibility + Rule Checks
     │
     ├─ Pass → Transfer Executed
     └─ Fail → Transfer Rejected
```

Marketplaces cannot override asset-level rules. Compliance travels with the token.

***

#### Liquidity Constraints Are Explicit

Liquidity constraints are treated as **first-class properties**, not side effects.

Examples include:

* holding period requirements
* maximum holder counts
* jurisdictional transfer restrictions
* freeze conditions during disputes

These constraints are visible on-chain and cannot be bypassed by off-chain agreements.

***

#### Price Discovery

Price discovery occurs through:

* peer-to-peer negotiation
* marketplace order books
* periodic auctions or matching

The protocol does not enforce pricing or guarantee fairness. It enforces **who may trade and under what conditions**, not the economic outcome.

***

#### Fragmentation and Market Structure

Different RWAs may trade in:

* private venues
* regulated marketplaces
* bilateral transfers

Fragmentation is expected.

Rather than forcing a single liquidity venue, the protocol ensures that:

* all venues apply the same rules
* ownership state remains consistent
* transfers remain auditable

***

#### Liquidity vs Compliance Trade-Off

A core trade-off is explicit:

| Priority          | Impact                |
| ----------------- | --------------------- |
| Maximum liquidity | Reduced compliance    |
| Strict compliance | Reduced liquidity     |
| Balanced approach | Conditional liquidity |

The protocol always favors **legal and structural integrity over liquidity**.

***

#### Handling Illiquidity

Illiquidity is not treated as a failure.

When liquidity is limited:

* tokens remain valid representations
* ownership records remain correct
* settlement and redemption rights persist

The protocol avoids mechanisms that mask illiquidity or create artificial liquidity signals.

***

#### Market Stress and Defensive Controls

During periods of stress (e.g. legal uncertainty, asset impairment):

* secondary transfers may be restricted
* issuance may be paused
* heightened disclosure may be required

These controls are **rule-based**, not discretionary, and are applied uniformly.

***

#### Secondary Transfers and Asset Lifecycle

Secondary trading does not alter:

* asset supply
* entitlement structure
* settlement obligations

It only changes **who holds the claim**.

Formally:

∑Tokens Heldt=Circulating Supply\sum \text{Tokens Held}\_{t} = \text{Circulating Supply}∑Tokens Heldt​=Circulating Supply

before and after any valid secondary transfer.

***

#### Transparency and Auditability

Secondary market activity is fully auditable on-chain.

Observers can verify:

* transfer history
* rule enforcement outcomes
* periods of restriction or pause

This supports:

* regulatory oversight
* market analysis
* independent risk assessment

***

#### What the Protocol Does *Not* Guarantee

To avoid false assumptions, the protocol does not guarantee:

* continuous liquidity
* narrow bid-ask spreads
* active market making
* price stability

Those outcomes depend on asset quality, demand, and external market forces.

***

#### Why This Approach Is Deliberate

Many RWA platforms fail by:

* promising liquidity they cannot enforce
* bypassing compliance for convenience
* centralizing secondary trading

This approach avoids those failures by:

* enforcing rules at the token level
* making constraints explicit
* allowing markets to form organically

Liquidity becomes **earned, not assumed**.

***

#### Secondary Markets Summary

| Aspect          | Approach                  |
| --------------- | ------------------------- |
| Transferability | Rule-based                |
| Compliance      | Enforced on-chain         |
| Liquidity       | Conditional               |
| Market venues   | Plural, not centralized   |
| Transparency    | Full on-chain audit trail |
