{"p":"can-20","op":"mint","tick":"can","amt":"1000","rows":[{"df":"qa","content":[{"q":"In a blockchain, how can you ensure the avoidance of privilege abuse when calling other programs?","a":"Adopt encryption technology: Use public keys and private keys for encryption and decryption to ensure the security of data transmission. Only users who possess the private key can decrypt the corresponding data, thereby obtaining access to the data."}]}],"pr":"d5d24f078581e810b078a48cbbc8ce94d97158a167feef5b5345ae370724265e"}