Futures
Access hundreds of perpetual contracts
TradFi
Gold
One platform for global traditional assets
Options
Hot
Trade European-style vanilla options
Unified Account
Maximize your capital efficiency
Demo Trading
Introduction to Futures Trading
Learn the basics of futures trading
Futures Events
Join events to earn rewards
Demo Trading
Use virtual funds to practice risk-free trading
Launch
CandyDrop
Collect candies to earn airdrops
Launchpool
Quick staking, earn potential new tokens
HODLer Airdrop
Hold GT and get massive airdrops for free
Pre-IPOs
Unlock full access to global stock IPOs
Alpha Points
Trade on-chain assets and earn airdrops
Futures Points
Earn futures points and claim airdrop rewards
Promotions
AI
Gate AI
Your all-in-one conversational AI partner
Gate AI Bot
Use Gate AI directly in your social App
GateClaw
Gate Blue Lobster, ready to go
Gate for AI Agent
AI infrastructure, Gate MCP, Skills, and CLI
Gate Skills Hub
10K+ Skills
From office tasks to trading, the all-in-one skill hub makes AI even more useful.
GateRouter
Smartly choose from 30+ AI models, with 0% extra fees
Why Aptos Created Confidential APT to Hide Treasury Movements
Aptos just launched the privacy token, Confidential APT, on its mainnet, maintaining a 1:1 peg with APT. Aptos Labs made “Confidential APT” available on the mainnet to combat concerns about financial privacy.
The community members decided to take this action after reaching a near-unanimous agreement. The network now provides complete protection for its transaction information security.
Aptos Adds Zero-Knowledge Proofs to Boost Security
“Confidential APT” became live on the Aptos mainnet on Friday, following a nearly unanimous vote on a governance motion to include the privacy feature. It employs zero-knowledge proofs to conceal token balances and transfer amounts while allowing transactions to be validated.
Specifically, this technology effectively encrypts token balances and transaction amounts. Although the sender’s and recipient’s addresses are public, the numbers are encrypted. This combination means that the Aptos ledger will remain highly private and secure while also being transparent.
In addition, this encryption makes it difficult for bad actors to monitor large cryptocurrency transactions. This upgrade is expected to dramatically alter user experience, according to experts.
Hiding volume makes it difficult for third parties to manipulate markets.
How Aptos Mitigates Wallet Profiling and Targeted Attacks
Privacy is a key line of defense against advanced cybersecurity threats today. The system uses technology to create data concealment which prevents profiling through attractive wallet identification.
The technology now allows users to maintain balance secrecy which prevents bad actors from identifying affluent users through their visible balances.
With Confidential APT, hackers can no longer profile valuable victims. And it preserves the ecosystem integrity of Aptos. A lower profile for “whales” means greater security for everyone.
Cybersecurity experts applaud this initiative as a critical step towards mainstream adoption of blockchain. It takes the “digital bullseye” off big holders and treasury managers.
Bridging the Gap for Global Institutional Utility
Sherry Xiao, a founding developer at Aptos Labs, explained that the privacy coin’s goal is to prevent competitors from observing treasury movements and transaction methods during on-chain business transactions.
It also tackles the issue of employee pay being permanently available on the blockchain, which reduces the possibility of users being targeted by wallet profiling or frauds.
The institutions require this privacy protection to handle their treasury fund transfers.
The system enables organizations to hide particular financial figures which results in improved capital management capacity for their on-chain operations.
Privacy with a Strong Focus on Compliance
The system provides extensive user privacy protection, meeting all regulatory compliance standards. The token includes a distinct “backdoor” function that enables authorized personnel to conduct security auditing procedures.
This process enables audits to access specific data through a governance procedure.
The trade-off creates a restriction which prevents users from utilizing the network to conduct money laundering activities.