Futures
Access hundreds of perpetual contracts
TradFi
Gold
One platform for global traditional assets
Options
Hot
Trade European-style vanilla options
Unified Account
Maximize your capital efficiency
Demo Trading
Introduction to Futures Trading
Learn the basics of futures trading
Futures Events
Join events to earn rewards
Demo Trading
Use virtual funds to practice risk-free trading
Launch
CandyDrop
Collect candies to earn airdrops
Launchpool
Quick staking, earn potential new tokens
HODLer Airdrop
Hold GT and get massive airdrops for free
Launchpad
Be early to the next big token project
Alpha Points
Trade on-chain assets and earn airdrops
Futures Points
Earn futures points and claim airdrop rewards
Ethereum Foundation Launches "Hardness" with Dedicated Team to Protect Decentralization Baseline
Author: @fredrik0x, @soispoke, @parithosh_j
Translation: Deep潮 TechFlow
Deep潮 Guide: The Ethereum Foundation recently announced three main protocol cluster priorities: Scaling, User Experience, and Hardness. The first two are straightforward, but what is the third?
Simply put, Hardness is a protocol-level commitment to Ethereum’s core attributes, including censorship resistance, privacy, security, and permissionlessness.
This article is written by three Foundation members responsible for the Hardness direction, detailing the specific work and priorities in this area.
Full text below:
What is Hardness
The Ethereum Foundation recently published a blog outlining three protocol cluster priorities: Scaling, User Experience (UX), and Hardness.
Each addresses different needs for Ethereum’s long-term success. Scaling ensures the network can handle global demand, UX makes it usable for people, and Hardness ensures that as Ethereum grows, it doesn’t lose the core properties that make it valuable.
Hardness refers to a system’s ability to remain reliable in the future. It is a protocol-level commitment aimed at safeguarding Ethereum’s fundamental guarantees: open source, censorship resistance, privacy, security, permissionless, and trust minimization.
These principles have existed since Ethereum’s inception.
Ethereum exists to provide a neutral infrastructure for those who truly need it, even if that means it’s harder, slower, and less convenient. In practice, this means ensuring Ethereum can operate even if centralized systems fail.
Who needs these? Users from sanctioned countries, journalists protecting sources, organizations requiring neutral settlement infrastructure, and institutions seeking to reduce counterparty risk.
Why focus on Hardness now
Ethereum is pushing major upgrades in throughput and usability. But each improvement could be achieved through shortcuts, such as centralizing infrastructure or introducing trusted intermediaries.
Hardness exists to ensure that Ethereum responds to network demands without deviating from its core values.
Today, individuals and institutions rely on these guarantees not as ideals but as essentials. This makes Hardness an increasingly critical focus area.
What Hardness looks like in practice
Within the Ethereum Foundation, three people are responsible for advancing the Hardness direction, each with a different focus:
Thomas Thiery: Censorship resistance and permissionlessness, focusing on protocol layer
Fredrik Svantes: Security, emphasizing privacy and trust minimization
Parithosh Jayanthi: Infrastructure, upgrades, and resilience of sensitive parts of the Ethereum protocol
Hardness spans multiple domains:
Beyond technical R&D, part of the work is to help more people understand and value these core attributes. The team also collaborates with work on ZK, privacy, scaling, UX, and security (such as Trillion Dollar Security, which focuses more on wallets and application layers) to ensure these improvements accelerate without compromising security or decentralization.
Specific tasks include:
Network resilience: Improving tools, testing, and fuzzing to identify vulnerabilities early and ensure quick recovery after failures.
User protection: Reducing preventable fund losses caused by phishing and malicious approvals.
Privacy: Advancing confidential transfers and anonymous broadcasting at the protocol level, enabling users to achieve strong privacy without leaving L1.
Maintaining neutrality: Eliminating single points of failure at the network edge to keep the network neutral and resilient against selective interference.
Long-term preparedness: Post-quantum cryptography is not an immediate threat but an unavoidable one, requiring early preparation.
Rollback and recovery modes: As throughput increases, protocols must be able to slow down and stabilize during anomalies, allowing the network to self-heal rather than cascade into failure.
Incident response readiness: Developing shared public emergency manuals so the ecosystem can respond quickly and transparently in extreme scenarios.
Metrics and reality: Establishing indicators to measure the current level of censorship resistance, how many users can transact privately, and where trust assumptions are quietly creeping in.