The SEC’s new crypto interpretation does more than classify tokens. It also addresses a question that has sat at the center of infrastructure, exchange, custody, and protocol design for years: when do mining and staking activities involve the offer and sale of a security, and when do they not? The SEC’s fact sheet states that the Commission clarified that “protocol mining” and “protocol staking,” as described in the interpretation, do not involve the offer and sale of a security. The full release then builds out that conclusion in detail across proof-of-work mining, proof-of-stake staking, custodial staking, liquid staking, staking receipt tokens, and related service arrangements.
For founders, CFOs, custodians, exchanges, and infrastructure providers, that is one of the most commercially important parts of the SEC’s new framework. It gives the market a clearer boundary for covered protocol participation activities. But it also shows that the answer depends heavily on how the activity is structured. The SEC is not declaring that every staking-related product is outside securities law. It is saying that covered protocol mining and covered protocol staking activities, carried out in the manner described in the release, do not involve securities transactions.
That distinction matters. The SEC’s logic here is narrow, operational, and fact-sensitive. Businesses that want to rely on it should pay close attention to the actual assumptions built into the release.
What the SEC says about protocol mining
The SEC’s release addresses protocol mining in the context of public, permissionless proof-of-work networks. It explains that proof-of-work incentivizes validation by rewarding miners who contribute computational resources to validate transactions and add blocks to the network. Miners solve cryptographic puzzles, compete to validate blocks, and earn newly generated digital commodities under the terms of the network protocol. The release frames those rewards as compensation for validation services performed under the protocol’s rules.
The SEC’s conclusion is that covered protocol mining activities do not involve the offer and sale of a security. The release says a miner’s expectation to receive rewards is not derived from the essential managerial efforts of others. Instead, the expected financial incentive comes from the miner’s own administrative or ministerial activity in securing the network, validating transactions, and receiving protocol-defined rewards. The SEC expressly says those rewards are payments for services provided to the network, not profits derived from the essential managerial efforts of others.
That is the key legal move. The SEC is treating covered mining activity as service activity, not passive investment activity.
Mining pools are not automatically a securities problem
The release does not stop at solo mining. It also addresses mining pools, which is critical because most real-world proof-of-work participation is not purely solo.
The SEC says that when miners combine computational resources in a mining pool, the analysis does not change so long as the miners still contribute their own computational power and receive rewards based on that contribution. The release says mining pool participation remains administrative or ministerial in nature, and that even though a pool operator may coordinate and maintain the pool, those efforts are not enough to become essential managerial efforts under the SEC’s analysis. The SEC specifically notes that miners are not joining a pool to earn profits passively from the pool operator’s activities.
But the release also quietly shows where the line can move. It notes that this conclusion assumes miners receive a pro rata share based on contributed computational power, not a structure where non-miners buy interests in the pool or miners pay to receive more than a pro rata share. That caveat matters because it shows the SEC is comfortable with pooled infrastructure support, but not necessarily with turning mining participation into something more passive or financially engineered.
For operators, that means mining products still need to be designed carefully. Pool coordination is not the problem. Passive investment-style structuring may be.
What the SEC says about protocol staking
The SEC takes a similarly detailed approach to staking, but the analysis is broader because the market structure is broader.
The release explains that proof-of-stake networks require node operators to stake the network’s digital commodity to become eligible for validator selection and rewards. Validators earn newly generated digital commodities and transaction-fee rewards in accordance with the software protocol. The release emphasizes that staked assets remain locked under protocol rules and that ownership and control do not change merely because the assets are staked.
From there, the SEC walks through several covered staking models: self or solo staking, self-custodial staking directly with a third party, custodial arrangements, and liquid staking. The fact sheet summarizes the bottom line by stating that protocol staking, as described in the interpretation, does not involve the offer and sale of a security.
Again, the SEC’s reasoning is built around the same core theme: covered staking activity is treated as administrative or ministerial participation in network operation, not passive profit-seeking from the essential managerial efforts of others.
Self-staking is the clearest case
The SEC’s cleanest conclusion is self or solo staking.
The release says a node operator that stakes its own digital commodities and validates blocks is not acting with a reasonable expectation of profits derived from the essential managerial efforts of others. The operator contributes its own resources, helps secure and operate the network, and qualifies for protocol-defined rewards by complying with the network’s rules. The SEC treats those rewards as payment for services to the network rather than investment returns.
For founders and protocol teams, that is one of the clearest signals in the release. Pure protocol participation, where the participant is actually doing the network work and earning protocol-defined rewards, sits in a much stronger position than many market participants feared under the older enforcement-heavy environment described in the fact sheet.
Third-party and custodial staking can still fit outside the securities bucket
The market significance of the SEC release comes into sharper view in the sections on third-party and custodial staking.
The SEC says self-custodial staking directly with a third party can still fall outside the securities bucket where the owner grants validation rights to a node operator but retains ownership and control in the described structure. It also says custodial staking arrangements can remain outside the securities bucket where the custodian acts as an agent, does not decide whether, when, or how much to stake, and does not guarantee or fix rewards. In the SEC’s framing, those functions remain administrative or ministerial rather than essential managerial efforts.
That is a major operational point for custodians and trading platforms. The SEC is acknowledging that some service-provider activity can support staking without turning the arrangement into a securities product. But the details matter. The release repeatedly builds the analysis on narrow assumptions: the custodian is acting as agent, not exercising investment-style discretion, and not promising fixed or guaranteed returns.
For CFOs and product leads, that should be the immediate takeaway. The more discretion, reward-shaping, or financial engineering the service provider adds, the less comfortable this analysis becomes.
Liquid staking is covered, but the assumptions are doing real work
Liquid staking is where the release becomes especially important for the market.
The SEC says covered liquid staking arrangements can also fall outside the securities bucket. The release describes liquid staking as an arrangement where depositors receive staking receipt tokens issued on a one-for-one basis against deposited digital commodities, allowing them to maintain liquidity without withdrawing the underlying assets from staking. The SEC says those staking receipt tokens evidence ownership of the deposited digital commodities and accrued rewards, and that the generating, issuing, and redeeming of those tokens can occur either programmatically through a protocol or through a third-party liquid staking provider.
The SEC’s conclusion depends on a specific set of assumptions. The liquid staking provider does not decide whether, when, or how much of a depositor’s assets to stake, except as described. If it selects a third-party node operator, that is its only decision in the process and may even be automated. The provider also does not guarantee or otherwise set the amount of rewards owed to depositors, though it may charge fees. Under that fact pattern, the SEC treats the provider’s role as administrative or ministerial rather than managerial in the Howey sense.
That is useful clarity, but it is not blanket immunity for every liquid staking design in the market. The SEC is clearly telling operators that the conclusion follows from the narrow description in the release. Products that go beyond that description may not get the same treatment.
Staking receipt tokens are not being treated like independent securities in the covered case
One of the more technically important sections of the release concerns staking receipt tokens.
The SEC says the offer and sale of a staking receipt token that is a receipt for a non-security crypto asset that is not subject to an investment contract does not involve the offer and sale of a security in the circumstances described. The release says these tokens merely evidence ownership of deposited digital commodities and do not themselves generate rewards. The value of the token is derived from the value of the deposited digital commodity, while the rewards come from the underlying protocol staking activity, which the SEC has already treated as non-security conduct in the covered case.
That is an important distinction for builders. The SEC is not treating the receipt token as a fresh standalone securities instrument just because it can move or be used elsewhere. But it also adds an important limit: if the receipt token is tied to a digital security or to a non-security crypto asset that is itself subject to an investment contract, then the receipt token is treated differently.
In other words, the receipt-token analysis depends on the nature of the underlying asset and the surrounding arrangement. It is not a free-floating exemption.
Ancillary services are allowed—but only because the SEC views them as operational conveniences
The release also discusses ancillary services such as slashing coverage, early unbonding, alternative rewards payment schedules, and aggregation of assets to meet protocol minimums. The SEC says those services, as described, are administrative or ministerial in nature and do not amount to essential managerial efforts.
That matters because many real-world staking businesses differentiate through user experience, convenience, and risk mitigation rather than through deeper investment-style structuring. The SEC is effectively saying that operational support features do not automatically turn a covered protocol staking arrangement into a securities product.
But the release again shows its own limits. It repeatedly notes that activities outside the described services fall outside the scope of the interpretation. So while this is useful room for product design, it is not permission to add unlimited financial engineering around protocol participation.
The real takeaway: the SEC is rewarding protocol participation, not passive yield packaging
The most important thing to understand about this section of the SEC release is not just the result. It is the theory behind the result.
Across mining, staking, liquid staking, and ancillary services, the SEC keeps returning to the same logic: covered activities are administrative or ministerial, the participant is contributing resources or maintaining ownership in the way described, and the expected rewards are tied to protocol-defined services rather than passive profits from managerial efforts.
That means the SEC is drawing a meaningful distinction between infrastructure participation and investment packaging. If the product is really about helping users participate in consensus and earn protocol-defined rewards under a tightly described structure, the SEC is offering more comfort. If the product starts to look like a way to buy yield exposure managed by someone else, the logic becomes much less favorable.
For founders and finance teams, this is the key design principle.
What founders, exchanges, and custodians should do now
The first step is to map the product against the exact fact patterns in the release. If a mining, staking, or liquid staking product is being built to rely on this interpretation, the operator should be honest about where it matches the SEC’s description and where it does not.
Second, review discretion. The SEC is most comfortable where service providers are performing administrative and ministerial functions, not exercising open-ended judgment over whether, when, or how customer assets are used, and not setting or guaranteeing returns.
Third, review communications. Even where the underlying protocol activity fits inside the SEC’s covered framework, product marketing should not turn the arrangement into an investment narrative centered on passive upside from the operator’s expertise. The broader SEC interpretation makes clear that issuer and promoter promises still matter across crypto products.
Finally, review token wrappers and receipts carefully. If a receipt token or liquid staking token is part of the model, the team should analyze not only the token’s form but also the underlying asset and whether the broader arrangement stays inside the SEC’s covered assumptions.
Final thoughts
The SEC’s mining and staking guidance is one of the most operationally valuable parts of the new crypto framework because it gives the market a more concrete path for analyzing core network-participation activities. Covered protocol mining and covered protocol staking, including certain custodial and liquid staking models, are treated as outside the securities bucket because the SEC views them as service-based, administrative participation rather than passive investing in managerial efforts.
But the comfort comes from the details. This is not a general blessing for every staking product in the market. It is a fact-specific framework with visible limits.
For founders, exchanges, custodians, and infrastructure businesses, the message is clear: if the product is really protocol participation, structure it and describe it that way. If it is actually a managed yield product wearing protocol language, the SEC’s reasoning may not carry over.
At Veritas Global, this is where product design and legal architecture need to move together. The strongest staking and infrastructure products will be the ones that align operational reality, token structure, customer rights, and public messaging from the beginning.