Perpetual contracts are the most valuable and frequently traded products in the on-chain financial ecosystem, but they also pose the most significant systemic risks. In March 2025, Hyperliquid's HLP pool suffered significant losses due to whales using excessive leverage and repeatedly withdrawing collateral on the platform, exposing structural weaknesses in its mark-price mechanism and liquidation process. Such events remind us that beyond superficial trading depth and user growth, the true stability of Perp DEX ultimately stems from the resilience of its risk model under extreme market conditions. Whether it's market maker losses, liquidation cascades, or systemic risks triggered by individual actions, they are all directly related to the same core issue: how the protocol is priced, how risk is allocated, and how leverage and liquidation are handled. Therefore, without understanding the risk control architecture, one cannot truly understand Perp DEX's competitive advantage. This article will start with the "risk model" and systematically break down the core architecture, sources of risk, differences in risk control, and future trends of Perp DEX, providing a professional and comprehensive analytical framework for funds, quantitative traders, and Web3 investors. Perp DEX's Risk Model: The Protocol's Lifeline The risk model is the protocol's dynamic risk control hub, determining its survival under extreme market conditions. It is similar to the risk engine in traditional finance, but more complex because on-chain systems cannot be subject to temporary manual intervention. A mature Perp DEX risk model is a system composed of multiple core components, and its architecture and interrelationships are shown in the following diagram: Figure 1: (This figure illustrates how the risk model starts with price inputs, is processed through the core risk control layer, and ultimately outputs the overall stability and capital efficiency of the system through the risk buffer layer. It reveals the intrinsic connections between modules such as the price model, margin rules, liquidation mechanism, and insurance fund.) These modules together form the protocol's "risk skeleton." A weakness in any one of these components could lead to structural failures during major market movements. LPs or market makers may experience uncontrollable losses (common in AMM models). The agreement was insolvent, and the insurance fund was quickly depleted. Delayed liquidation triggered a chain reaction of margin calls and widespread losses. Oracle was manipulated, triggering an arbitrage attack. The uncontrolled risk of a multi-asset, multi-leverage portfolio led to a total margin call. In other words, the risk model determines how much capital a protocol can support, what types of traders it can serve, and whether it can survive in extreme market conditions. Therefore, the risk model ultimately determines the upper limit of all indicators such as trading experience, market depth, capital efficiency, protocol revenue, and token value capture. This is why, in the past two years, competition in Perp DEX has shifted to underlying risk control architecture, rather than just transaction mining or fee wars. Breakdown of core modules of mainstream PERP architecture and risk model The architectural evolution of Perp DEX is essentially a path of "how risk is redistributed". Phase 1 (Off-chain Order Book): The risk lies in the robustness of the centralized matching nodes. Represented by dYdX, this design ensures transaction efficiency, but the risk is highly concentrated on the availability and security of off-chain matching. Phase Two (AMM): Risk is transferred to the directional exposure of the liquidity pool. For example, in GMX, under the AMM model, LPs bear extremely strong directional risk, making permanent loss, extreme market deviations, and MEV (Mean Equity) unavoidable issues for this architecture. The third stage (On-Chain Order Book - CLOB): Risk shifts to reliance on the performance and determinism of the underlying public blockchain. A representative project is Hyperliquid, where 70-80% of perpetual transaction volume is now concentrated in the order book model. This high-performance on-chain environment also means an unprecedented reliance on TPS, mempool stability, and contract execution security. Frontier Exploration (Hybrid Mode): The risk lies in the logic and feedback loop of the dynamic switching between the order book and liquidity pool. Taking Drift on Solana as an example, it uses AMM as a deep backup mechanism and automatically replenishes quotes when the order book lacks liquidity, thereby finding a new balance between execution quality and capital efficiency. The differences between the different architectures are ultimately reflected in the design of the following four core risk control modules: 2.1. Price Model: The System's Benchmark The price model determines the fairness of transactions, liquidation triggers, and funding rates, serving as the underlying benchmark for perpetual contract systems. It faces challenges such as oracle latency, manipulation, and MEV (Mean Equity). Mature systems employ multi-source aggregation, TWAP (Transfer-Only-Pay), and maximum deviation limits to enhance resistance to attacks. AMM (Automated Market Maker) architectures also require internal pricing mechanisms to simulate liquidity depth, a core variable in their risk exposure. 2.2. Liquidation Model: A Key Risk Buffer The liquidation mechanism determines the system's ability to withstand price fluctuations and is the most critical risk buffer layer of a perpetual protocol. Its security boundary consists of the initial margin, maintenance margin, and liquidation buffer. The execution logic (partial liquidation, full liquidation, auction) directly impacts user experience and system efficiency. Liquidation itself also faces attack surfaces such as on-chain congestion and bid manipulation. 2.3. Insurance Funds: The Last Line of Defense The insurance fund is used to absorb losses from margin calls. Its size and usage rules directly reflect the agreement's risk tolerance and serve as the system's "last line of defense" in extreme market conditions. The design needs to balance security and capital efficiency: too large a size will affect returns, while too small a size will easily trigger automatic liquidation, damaging the agreement's reputation. 2.4. Position Management: The System's Global Risk Controller Position management ensures the system doesn't spiral out of control due to excessive concentration of one-sided positions. Mechanisms such as position limits, dynamic margin requirements, and funding rates are used to regulate market forces. For multi-asset and long-tail assets, managing correlation and manipulation risks presents even greater challenges. Risk model trade-off analysis in mainstream cases Current mainstream platforms are transitioning towards CLOB or CLOB-Centric hybrid solutions to achieve better matching accuracy and capital efficiency. The table below systematically compares the risk model characteristics and core trade-offs of four representative projects: Chart 2 (This chart compares Hyperliquid, Aster, edgeX, and Lighter side-by-side from six dimensions: core architecture, pricing model, liquidation mechanism, insurance fund, major risks, and core trade-offs, demonstrating the risk preferences and trade-offs under different technology routes.) Key points of case analysis: Hyperliquid achieves near-CEX efficiency and depth, but its matching logic combines on-chain settlement and order book verification, increasing system complexity and reliance on risk control mechanisms. It requires a large HLP liquidity pool and complex risk control mechanisms, transferring extremely high risk control pressure to liquidity providers and the protocol itself. Aster: The liquidation mechanism is based on the principle of "reducing risk layer by layer". It improves capital efficiency and robustness during periods of low volatility through the "risk pooling" strategy, but at the cost of a more complex risk transmission path and extreme sensitivity to parameter settings. edgeX uses ZK-Rollup technology to ensure extremely high transparency and verifiability, reducing reliance on external insurance funds. However, this comes at the cost of performance limitations imposed by L2 data availability and state commit latency. The system needs to rely on redundancy mechanisms, verifiable playback, and robust monitoring to mitigate the impact of these risks on overall stability. Lighter: Under the "verifiable off-chain order book" architecture, auditability and on-chain trust are given priority, but at the cost of performance that cannot reach the upper limit of pure off-chain matching. Therefore, it is more suitable for users who prefer transparency, verifiability and lower systemic risk. Conclusion: Security Boundaries and Future Trends By 2025, Perp DEX's security boundary had transitioned from "smart contract security" to "system-level security." On-chain matching, oracle price sources, liquidation logic, risk parameters, LP liquidity pool exposure control, robustness of the market-making mechanism, and the integrity of cross-chain messages together constitute an interdependent security framework. Three major trends for the future: 1. Semi-automated risk control: On-chain mechanisms are insufficient to cope with complex attacks. In the future, a "semi-automated governance" system will be formed by combining off-chain real-time monitoring and dynamic parameter adjustment. 2. Compliance Integration: The hybrid model of "no custody required but subject to regulation" will become key to attracting institutional-grade liquidity. Verifiable KYC and compliant liquidity pools will become the new infrastructure. 3. Technology-driven expansion of security boundaries: Technologies such as zero-knowledge proofs, high-performance L2, and modular design will enable complex real-time risk models to run on the blockchain, elevating risk control capabilities to the level of financial infrastructure. The winners of the future will no longer be those who compete on transaction fees or depth, but rather those who can integrate technological security, financial engineering, and compliance frameworks.Perpetual contracts are the most valuable and frequently traded products in the on-chain financial ecosystem, but they also pose the most significant systemic risks. In March 2025, Hyperliquid's HLP pool suffered significant losses due to whales using excessive leverage and repeatedly withdrawing collateral on the platform, exposing structural weaknesses in its mark-price mechanism and liquidation process. Such events remind us that beyond superficial trading depth and user growth, the true stability of Perp DEX ultimately stems from the resilience of its risk model under extreme market conditions. Whether it's market maker losses, liquidation cascades, or systemic risks triggered by individual actions, they are all directly related to the same core issue: how the protocol is priced, how risk is allocated, and how leverage and liquidation are handled. Therefore, without understanding the risk control architecture, one cannot truly understand Perp DEX's competitive advantage. This article will start with the "risk model" and systematically break down the core architecture, sources of risk, differences in risk control, and future trends of Perp DEX, providing a professional and comprehensive analytical framework for funds, quantitative traders, and Web3 investors. Perp DEX's Risk Model: The Protocol's Lifeline The risk model is the protocol's dynamic risk control hub, determining its survival under extreme market conditions. It is similar to the risk engine in traditional finance, but more complex because on-chain systems cannot be subject to temporary manual intervention. A mature Perp DEX risk model is a system composed of multiple core components, and its architecture and interrelationships are shown in the following diagram: Figure 1: (This figure illustrates how the risk model starts with price inputs, is processed through the core risk control layer, and ultimately outputs the overall stability and capital efficiency of the system through the risk buffer layer. It reveals the intrinsic connections between modules such as the price model, margin rules, liquidation mechanism, and insurance fund.) These modules together form the protocol's "risk skeleton." A weakness in any one of these components could lead to structural failures during major market movements. LPs or market makers may experience uncontrollable losses (common in AMM models). The agreement was insolvent, and the insurance fund was quickly depleted. Delayed liquidation triggered a chain reaction of margin calls and widespread losses. Oracle was manipulated, triggering an arbitrage attack. The uncontrolled risk of a multi-asset, multi-leverage portfolio led to a total margin call. In other words, the risk model determines how much capital a protocol can support, what types of traders it can serve, and whether it can survive in extreme market conditions. Therefore, the risk model ultimately determines the upper limit of all indicators such as trading experience, market depth, capital efficiency, protocol revenue, and token value capture. This is why, in the past two years, competition in Perp DEX has shifted to underlying risk control architecture, rather than just transaction mining or fee wars. Breakdown of core modules of mainstream PERP architecture and risk model The architectural evolution of Perp DEX is essentially a path of "how risk is redistributed". Phase 1 (Off-chain Order Book): The risk lies in the robustness of the centralized matching nodes. Represented by dYdX, this design ensures transaction efficiency, but the risk is highly concentrated on the availability and security of off-chain matching. Phase Two (AMM): Risk is transferred to the directional exposure of the liquidity pool. For example, in GMX, under the AMM model, LPs bear extremely strong directional risk, making permanent loss, extreme market deviations, and MEV (Mean Equity) unavoidable issues for this architecture. The third stage (On-Chain Order Book - CLOB): Risk shifts to reliance on the performance and determinism of the underlying public blockchain. A representative project is Hyperliquid, where 70-80% of perpetual transaction volume is now concentrated in the order book model. This high-performance on-chain environment also means an unprecedented reliance on TPS, mempool stability, and contract execution security. Frontier Exploration (Hybrid Mode): The risk lies in the logic and feedback loop of the dynamic switching between the order book and liquidity pool. Taking Drift on Solana as an example, it uses AMM as a deep backup mechanism and automatically replenishes quotes when the order book lacks liquidity, thereby finding a new balance between execution quality and capital efficiency. The differences between the different architectures are ultimately reflected in the design of the following four core risk control modules: 2.1. Price Model: The System's Benchmark The price model determines the fairness of transactions, liquidation triggers, and funding rates, serving as the underlying benchmark for perpetual contract systems. It faces challenges such as oracle latency, manipulation, and MEV (Mean Equity). Mature systems employ multi-source aggregation, TWAP (Transfer-Only-Pay), and maximum deviation limits to enhance resistance to attacks. AMM (Automated Market Maker) architectures also require internal pricing mechanisms to simulate liquidity depth, a core variable in their risk exposure. 2.2. Liquidation Model: A Key Risk Buffer The liquidation mechanism determines the system's ability to withstand price fluctuations and is the most critical risk buffer layer of a perpetual protocol. Its security boundary consists of the initial margin, maintenance margin, and liquidation buffer. The execution logic (partial liquidation, full liquidation, auction) directly impacts user experience and system efficiency. Liquidation itself also faces attack surfaces such as on-chain congestion and bid manipulation. 2.3. Insurance Funds: The Last Line of Defense The insurance fund is used to absorb losses from margin calls. Its size and usage rules directly reflect the agreement's risk tolerance and serve as the system's "last line of defense" in extreme market conditions. The design needs to balance security and capital efficiency: too large a size will affect returns, while too small a size will easily trigger automatic liquidation, damaging the agreement's reputation. 2.4. Position Management: The System's Global Risk Controller Position management ensures the system doesn't spiral out of control due to excessive concentration of one-sided positions. Mechanisms such as position limits, dynamic margin requirements, and funding rates are used to regulate market forces. For multi-asset and long-tail assets, managing correlation and manipulation risks presents even greater challenges. Risk model trade-off analysis in mainstream cases Current mainstream platforms are transitioning towards CLOB or CLOB-Centric hybrid solutions to achieve better matching accuracy and capital efficiency. The table below systematically compares the risk model characteristics and core trade-offs of four representative projects: Chart 2 (This chart compares Hyperliquid, Aster, edgeX, and Lighter side-by-side from six dimensions: core architecture, pricing model, liquidation mechanism, insurance fund, major risks, and core trade-offs, demonstrating the risk preferences and trade-offs under different technology routes.) Key points of case analysis: Hyperliquid achieves near-CEX efficiency and depth, but its matching logic combines on-chain settlement and order book verification, increasing system complexity and reliance on risk control mechanisms. It requires a large HLP liquidity pool and complex risk control mechanisms, transferring extremely high risk control pressure to liquidity providers and the protocol itself. Aster: The liquidation mechanism is based on the principle of "reducing risk layer by layer". It improves capital efficiency and robustness during periods of low volatility through the "risk pooling" strategy, but at the cost of a more complex risk transmission path and extreme sensitivity to parameter settings. edgeX uses ZK-Rollup technology to ensure extremely high transparency and verifiability, reducing reliance on external insurance funds. However, this comes at the cost of performance limitations imposed by L2 data availability and state commit latency. The system needs to rely on redundancy mechanisms, verifiable playback, and robust monitoring to mitigate the impact of these risks on overall stability. Lighter: Under the "verifiable off-chain order book" architecture, auditability and on-chain trust are given priority, but at the cost of performance that cannot reach the upper limit of pure off-chain matching. Therefore, it is more suitable for users who prefer transparency, verifiability and lower systemic risk. Conclusion: Security Boundaries and Future Trends By 2025, Perp DEX's security boundary had transitioned from "smart contract security" to "system-level security." On-chain matching, oracle price sources, liquidation logic, risk parameters, LP liquidity pool exposure control, robustness of the market-making mechanism, and the integrity of cross-chain messages together constitute an interdependent security framework. Three major trends for the future: 1. Semi-automated risk control: On-chain mechanisms are insufficient to cope with complex attacks. In the future, a "semi-automated governance" system will be formed by combining off-chain real-time monitoring and dynamic parameter adjustment. 2. Compliance Integration: The hybrid model of "no custody required but subject to regulation" will become key to attracting institutional-grade liquidity. Verifiable KYC and compliant liquidity pools will become the new infrastructure. 3. Technology-driven expansion of security boundaries: Technologies such as zero-knowledge proofs, high-performance L2, and modular design will enable complex real-time risk models to run on the blockchain, elevating risk control capabilities to the level of financial infrastructure. The winners of the future will no longer be those who compete on transaction fees or depth, but rather those who can integrate technological security, financial engineering, and compliance frameworks.

Risk control is the lifeline: Analyzing the underlying game theory of Perp DEX through the Hyperliquid incident.

2025/12/05 12:00

Perpetual contracts are the most valuable and frequently traded products in the on-chain financial ecosystem, but they also pose the most significant systemic risks.

In March 2025, Hyperliquid's HLP pool suffered significant losses due to whales using excessive leverage and repeatedly withdrawing collateral on the platform, exposing structural weaknesses in its mark-price mechanism and liquidation process. Such events remind us that beyond superficial trading depth and user growth, the true stability of Perp DEX ultimately stems from the resilience of its risk model under extreme market conditions.

Whether it's market maker losses, liquidation cascades, or systemic risks triggered by individual actions, they are all directly related to the same core issue: how the protocol is priced, how risk is allocated, and how leverage and liquidation are handled. Therefore, without understanding the risk control architecture, one cannot truly understand Perp DEX's competitive advantage.

This article will start with the "risk model" and systematically break down the core architecture, sources of risk, differences in risk control, and future trends of Perp DEX, providing a professional and comprehensive analytical framework for funds, quantitative traders, and Web3 investors.

Perp DEX's Risk Model: The Protocol's Lifeline

The risk model is the protocol's dynamic risk control hub, determining its survival under extreme market conditions. It is similar to the risk engine in traditional finance, but more complex because on-chain systems cannot be subject to temporary manual intervention.

A mature Perp DEX risk model is a system composed of multiple core components, and its architecture and interrelationships are shown in the following diagram:

Figure 1: (This figure illustrates how the risk model starts with price inputs, is processed through the core risk control layer, and ultimately outputs the overall stability and capital efficiency of the system through the risk buffer layer. It reveals the intrinsic connections between modules such as the price model, margin rules, liquidation mechanism, and insurance fund.)

These modules together form the protocol's "risk skeleton." A weakness in any one of these components could lead to structural failures during major market movements.

  • LPs or market makers may experience uncontrollable losses (common in AMM models).
  • The agreement was insolvent, and the insurance fund was quickly depleted.
  • Delayed liquidation triggered a chain reaction of margin calls and widespread losses.
  • Oracle was manipulated, triggering an arbitrage attack.
  • The uncontrolled risk of a multi-asset, multi-leverage portfolio led to a total margin call.

In other words, the risk model determines how much capital a protocol can support, what types of traders it can serve, and whether it can survive in extreme market conditions. Therefore, the risk model ultimately determines the upper limit of all indicators such as trading experience, market depth, capital efficiency, protocol revenue, and token value capture.

This is why, in the past two years, competition in Perp DEX has shifted to underlying risk control architecture, rather than just transaction mining or fee wars.

Breakdown of core modules of mainstream PERP architecture and risk model

The architectural evolution of Perp DEX is essentially a path of "how risk is redistributed".

  • Phase 1 (Off-chain Order Book): The risk lies in the robustness of the centralized matching nodes. Represented by dYdX, this design ensures transaction efficiency, but the risk is highly concentrated on the availability and security of off-chain matching.
  • Phase Two (AMM): Risk is transferred to the directional exposure of the liquidity pool. For example, in GMX, under the AMM model, LPs bear extremely strong directional risk, making permanent loss, extreme market deviations, and MEV (Mean Equity) unavoidable issues for this architecture.
  • The third stage (On-Chain Order Book - CLOB): Risk shifts to reliance on the performance and determinism of the underlying public blockchain. A representative project is Hyperliquid, where 70-80% of perpetual transaction volume is now concentrated in the order book model. This high-performance on-chain environment also means an unprecedented reliance on TPS, mempool stability, and contract execution security.
  • Frontier Exploration (Hybrid Mode): The risk lies in the logic and feedback loop of the dynamic switching between the order book and liquidity pool. Taking Drift on Solana as an example, it uses AMM as a deep backup mechanism and automatically replenishes quotes when the order book lacks liquidity, thereby finding a new balance between execution quality and capital efficiency.

The differences between the different architectures are ultimately reflected in the design of the following four core risk control modules:

2.1. Price Model: The System's Benchmark

The price model determines the fairness of transactions, liquidation triggers, and funding rates, serving as the underlying benchmark for perpetual contract systems. It faces challenges such as oracle latency, manipulation, and MEV (Mean Equity). Mature systems employ multi-source aggregation, TWAP (Transfer-Only-Pay), and maximum deviation limits to enhance resistance to attacks. AMM (Automated Market Maker) architectures also require internal pricing mechanisms to simulate liquidity depth, a core variable in their risk exposure.

2.2. Liquidation Model: A Key Risk Buffer

The liquidation mechanism determines the system's ability to withstand price fluctuations and is the most critical risk buffer layer of a perpetual protocol. Its security boundary consists of the initial margin, maintenance margin, and liquidation buffer. The execution logic (partial liquidation, full liquidation, auction) directly impacts user experience and system efficiency. Liquidation itself also faces attack surfaces such as on-chain congestion and bid manipulation.

2.3. Insurance Funds: The Last Line of Defense

The insurance fund is used to absorb losses from margin calls. Its size and usage rules directly reflect the agreement's risk tolerance and serve as the system's "last line of defense" in extreme market conditions. The design needs to balance security and capital efficiency: too large a size will affect returns, while too small a size will easily trigger automatic liquidation, damaging the agreement's reputation.

2.4. Position Management: The System's Global Risk Controller

Position management ensures the system doesn't spiral out of control due to excessive concentration of one-sided positions. Mechanisms such as position limits, dynamic margin requirements, and funding rates are used to regulate market forces. For multi-asset and long-tail assets, managing correlation and manipulation risks presents even greater challenges.

Risk model trade-off analysis in mainstream cases

Current mainstream platforms are transitioning towards CLOB or CLOB-Centric hybrid solutions to achieve better matching accuracy and capital efficiency. The table below systematically compares the risk model characteristics and core trade-offs of four representative projects:

Chart 2 (This chart compares Hyperliquid, Aster, edgeX, and Lighter side-by-side from six dimensions: core architecture, pricing model, liquidation mechanism, insurance fund, major risks, and core trade-offs, demonstrating the risk preferences and trade-offs under different technology routes.)

Key points of case analysis:

  • Hyperliquid achieves near-CEX efficiency and depth, but its matching logic combines on-chain settlement and order book verification, increasing system complexity and reliance on risk control mechanisms. It requires a large HLP liquidity pool and complex risk control mechanisms, transferring extremely high risk control pressure to liquidity providers and the protocol itself.
  • Aster: The liquidation mechanism is based on the principle of "reducing risk layer by layer". It improves capital efficiency and robustness during periods of low volatility through the "risk pooling" strategy, but at the cost of a more complex risk transmission path and extreme sensitivity to parameter settings.
  • edgeX uses ZK-Rollup technology to ensure extremely high transparency and verifiability, reducing reliance on external insurance funds. However, this comes at the cost of performance limitations imposed by L2 data availability and state commit latency. The system needs to rely on redundancy mechanisms, verifiable playback, and robust monitoring to mitigate the impact of these risks on overall stability.
  • Lighter: Under the "verifiable off-chain order book" architecture, auditability and on-chain trust are given priority, but at the cost of performance that cannot reach the upper limit of pure off-chain matching. Therefore, it is more suitable for users who prefer transparency, verifiability and lower systemic risk.

Conclusion: Security Boundaries and Future Trends

By 2025, Perp DEX's security boundary had transitioned from "smart contract security" to "system-level security." On-chain matching, oracle price sources, liquidation logic, risk parameters, LP liquidity pool exposure control, robustness of the market-making mechanism, and the integrity of cross-chain messages together constitute an interdependent security framework.

Three major trends for the future:

1. Semi-automated risk control: On-chain mechanisms are insufficient to cope with complex attacks. In the future, a "semi-automated governance" system will be formed by combining off-chain real-time monitoring and dynamic parameter adjustment.

2. Compliance Integration: The hybrid model of "no custody required but subject to regulation" will become key to attracting institutional-grade liquidity. Verifiable KYC and compliant liquidity pools will become the new infrastructure.

3. Technology-driven expansion of security boundaries: Technologies such as zero-knowledge proofs, high-performance L2, and modular design will enable complex real-time risk models to run on the blockchain, elevating risk control capabilities to the level of financial infrastructure.

The winners of the future will no longer be those who compete on transaction fees or depth, but rather those who can integrate technological security, financial engineering, and compliance frameworks.

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

US Dollar Index (DXY) hovers near multi-week low ahead of US PCE data

US Dollar Index (DXY) hovers near multi-week low ahead of US PCE data

The post US Dollar Index (DXY) hovers near multi-week low ahead of US PCE data appeared on BitcoinEthereumNews.com. The US Dollar Index (DXY), which tracks the Greenback against a basket of currencies, struggles to capitalize on the overnight bounce from its lowest level since late October and trades with a mild negative bias during the Asian session on Friday. The index is currently placed around the 99.00 mark, down less than 0.10% for the day, as traders now await the crucial US inflation data before placing fresh directional bets. The September US Personal Consumption Expenditure (PCE) Price Index will be published later today and will be scrutinized for more cues about the Federal Reserve’s (Fed) future rate-cut path. This, in turn, will play a key role in determining the next leg of a directional move for the Greenback. In the meantime, dovish US Federal Reserve (Fed) expectations overshadow Thursday’s upbeat US labor market reports and continue to act as a headwind for the buck. Recent comments from several Fed officials suggested that another interest rate cut in December is all but certain. The CME Group’s FedWatch Tool indicates an over 85% probability of a move next week. Furthermore, reports suggest that White House National Economic Council Director Kevin Hassett is seen as the frontrunner to become the next Fed Chair and is expected to enact US President Donald Trump’s calls for lower rates, which, in turn, favors the USD bears. Nevertheless, the DXY remains on track to register losses for the second straight week, and the fundamental backdrop suggests that the path of least resistance for the index remains to the downside. Hence, any attempted recovery is more likely to get sold into and remain limited. US Dollar Price Last 7 Days The table below shows the percentage change of US Dollar (USD) against listed major currencies last 7 days. US Dollar was the strongest against the Swiss…
Share
BitcoinEthereumNews2025/12/05 13:43
SSP Stock Surges 11% On FY25 Earnings And European Rail Review

SSP Stock Surges 11% On FY25 Earnings And European Rail Review

The post SSP Stock Surges 11% On FY25 Earnings And European Rail Review appeared on BitcoinEthereumNews.com. SSP Group stock rebounded strongly today. (Photo Illustration by Pavlo Gonchar/SOPA Images/LightRocket via Getty Images) SOPA Images/LightRocket via Getty Images Shares in travel food retailer SSP Group rose sharply today after the company posted solid FY25 results, highlighting good growth in two of its four regional divisions, and a decision to review its under‑performing Continental European rail business. The food and beverage (F&B) company’s stock closed 11.3% up in London on the back of a revenue rise of 7.8% (at constant currency) to £3.6 billion ($4.8 billion) in the 12 months to September. Operating profit jumped by 12.7% to £223 million ($298 million). Under statutory IFRS reporting, however, operating profit fell 58% to £86 million, which SSP said in a statement “reflected £183 million of non‑underlying expenses and impairment charges.” The decision to review its rail business in Continental Europe—the biggest of the F&B giant’s four divisions by revenue at £1,205 million ($1,607 million)—was welcomed by the market, given its weak performance of 2% like-for-like (LFL) growth. A carrot was also dangled— a reward to shareholders arising from the July IPO of SSP’s Indian joint venture Travel Food Services (TFS) with K Hospitality, India’s largest privately held F&B company. SSP Group CEO Patrick Coveney said in a statement: “We acknowledge there is more to do to strengthen our operational performance, most notably in Continental Europe, where we have now reset our team, model, and balance sheet, and have a range of initiatives underway. In addition, we are launching a wide-ranging review of our rail business in Continental Europe. We are also considering options to realise value for our shareholders in line with the delivery of the TFS free float requirement.” SSP currently retains a 50.01% stake in TFS and said: “We believe that India’s market potential, combined with TFS’s attractive…
Share
BitcoinEthereumNews2025/12/05 13:37
What Advisors Should Know as the Market Matures

What Advisors Should Know as the Market Matures

The post What Advisors Should Know as the Market Matures appeared on BitcoinEthereumNews.com. In today’s “Crypto for Advisors” newsletter, Gregory Mall from Lionsoul Global breaks down crypto yield, highlighting its maturity, along with its role in a portfolio. We look at why yield may ultimately become crypto’s most durable bridge to mainstream portfolios. Then, in “Ask an Expert,” Kevin Tam highlights key investments from the recent 13F filings, including the news that combined United Arab Emirates sovereign exposure hit $1.08 billion, making them the fourth-largest global holder. Yield in Digital Assets: What Advisors Should Know as the Market Matures For most of its history, crypto has been defined by directional bets: buy, hold, and hope the next cycle delivers. But a quieter transformation has been unfolding beneath the surface. As the digital asset ecosystem has matured, one of its most important and misunderstood developments has been the emergence of yield: systematic, programmatic, and increasingly institutional. The story begins with infrastructure. Bitcoin introduced self-custody and scarcity; Ethereum extended that foundation with smart contracts, turning blockchains into programmable platforms capable of running financial services. Over the past five years, this architecture has given rise to a parallel, transparent credit and trading ecosystem known as decentralized finance (DeFi). While still niche relative to traditional markets, DeFi has grown from under $1 million of total value locked in 2018 to well over $100 billion at peak (DefiLlama). Even after the 2022 downturn, activity has rebounded sharply. For advisors, this expansion matters because it has unlocked something crypto rarely offered in its early years: cash-flow-based returns, not reliant on speculation. But the complexity behind those yields and the risks beneath the surface require careful navigation. Where Crypto Yield Comes From Yield in digital assets does not come from a single source but from three broad categories of market activity. 1. Trading and liquidity provision Automated market makers (AMMs)…
Share
BitcoinEthereumNews2025/12/05 13:14