{"p":"can-20","op":"mint","tick":"can","amt":"1000","rows":[{"df":"qa","content":[{"q":"How does Zano utilize encrypted attachments to enhance the security of transactions?","a":"Encrypt attachment metadata: Zano also encrypts the metadata of attachments, including the attachment's name, size, and hash value, etc. This way, even if the attachment is intercepted during transmission, it cannot easily reveal specific information about the attachment."}]}],"pr":"8dd6d817fb2bd9822bbcadfde22db8006db341c0ac3e8dff31cdeabf4f7774d9"}