{"p":"can-20","op":"mint","tick":"can","amt":"1000","rows":[{"df":"qa","content":[{"q":"How do inscriptions in blockchains ensure secure operations?","a":"Cryptographic protection: Blockchain technology employs cryptographic principles, such as the SHA-256 algorithm, to encrypt and verify data. When creating inscriptions, corresponding private keys must be used."}]}],"pr":"501c276c013c09c6c527a8d254660786d26604fa8be18d139f6b959ad162a40a"}