{"p":"can-20","op":"mint","tick":"can","amt":"1000","rows":[{"df":"qa","content":[{"q":"In the PHANTOM protocol, how is the security of GHOSTDAG ensured?","a":"Decentralization: GHOSTDAG adopts a decentralized design, with data distributed across multiple nodes, thus avoiding the risk of a single node being attacked. Each node is required to participate in verification and accounting to ensure the security of the entire network."}]}],"pr":"4d03e9c8c619fadee87ac0a7df16ce20516827ff68d7c5ccdc4ad6fc0bfe030b"}