Futures
Access hundreds of perpetual contracts
TradFi
Gold
One platform for global traditional assets
Options
Hot
Trade European-style vanilla options
Unified Account
Maximize your capital efficiency
Demo Trading
Introduction to Futures Trading
Learn the basics of futures trading
Futures Events
Join events to earn rewards
Demo Trading
Use virtual funds to practice risk-free trading
Launch
CandyDrop
Collect candies to earn airdrops
Launchpool
Quick staking, earn potential new tokens
HODLer Airdrop
Hold GT and get massive airdrops for free
Launchpad
Be early to the next big token project
Alpha Points
Trade on-chain assets and earn airdrops
Futures Points
Earn futures points and claim airdrop rewards
Chainlink debuts price feed oracles on Polygon zkEVM
Decentralized oracle network Chainlink has launched its data feeds on Polygon’s zero-knowledge scaling solution compatible with the Ethereum Virtual Machine.
In a press release shared with crypto.news, Chainlink said the expansion now allows blockchain developers to build decentralized applications on Polygon’s zkEVM in a new way, resistant to API downtime and flash loan attacks.
Polygon Labs head Marc Borion said the integration of Chainlink’s oracles will unlock the deployment of “several significant protocols on Polygon zkEVM early next year,” without revealing details.
Chainlink oracles are decentralized applications that connect blockchains to off-chain data sources. These programs enable smart contracts to access real-world information, such as prices, events, and other data not stored on the blockchain.
In November 2023, Chainlink rewarded whitehat hackers Zach Obront and Or Cyngiser (Trust) with a bounty of $300,000 for discovering a critical bug that could have compromised the integrity of its Verifiable Random Function (VRF), a random number generator that enables smart contracts to access random values without jeopardizing security.
In 2022, Trust and Obront figured out that a malicious VRF subion owner could rig the to manipulate the random number generation process. By repeatedly blocking and rerolling randomness, the whitehat hackers learned they could force users to receive an undesirable outcome while obtaining the desired value for themselves.