Futures
Access hundreds of perpetual contracts
TradFi
Gold
One platform for global traditional assets
Options
Hot
Trade European-style vanilla options
Unified Account
Maximize your capital efficiency
Demo Trading
Introduction to Futures Trading
Learn the basics of futures trading
Futures Events
Join events to earn rewards
Demo Trading
Use virtual funds to practice risk-free trading
Launch
CandyDrop
Collect candies to earn airdrops
Launchpool
Quick staking, earn potential new tokens
HODLer Airdrop
Hold GT and get massive airdrops for free
Launchpad
Be early to the next big token project
Alpha Points
Trade on-chain assets and earn airdrops
Futures Points
Earn futures points and claim airdrop rewards
Many people’s understanding of privacy transactions still remains at the simple binary of "anonymous vs. public." But Dusk Network’s approach is a bit different—they introduce the Phoenix transaction model at the transaction layer, attempting to find a balance between privacy protection and transaction verification.
The logic behind this design actually comes from real-world financial scenarios. Think about it— in real financial transactions, things like price conditions, counterparty information, and intermediate states should not be publicly disclosed to everyone. But the problem is, the system still needs to verify whether the transaction is legitimate and whether data has been tampered with. This is a contradiction.
The strength of the Phoenix model lies in its non-extreme approach. Unlike some privacy solutions that turn into completely unauditably black boxes, Phoenix allows transaction verification to be triggered under compliance conditions, without breaking privacy boundaries. In other words, privacy and regulation are not necessarily mortal enemies. This design makes Phoenix more suitable for handling the transaction processes of regulated assets, not just pure cryptocurrency transfers.
From a system architecture perspective, Phoenix does not exist in isolation. It works in concert with Dusk’s contract system and asset model. The privacy protections at the transaction layer pave the way for confidential contracts and privacy tokens at higher layers, ensuring that privacy capabilities remain consistent across different levels.
To put it simply, the value of the Phoenix model does not lie in technical tricks alone, but in its ability to genuinely address the practical needs of financial applications—building an executable structure between privacy and verification. This is the key to providing a more suitable transaction foundation for the Dusk network in financial scenarios.