{"p":"can-20","op":"mint","tick":"can","amt":"1000","rows":[{"df":"qa","content":[{"q":"How can blockchain technology be applied to network security?","a":"Authentication and authorization: Blockchain technology provides a secure and transparent authentication"}]}],"pr":"9e93aa75af9b2ab71a82346153712376a5ddbadc95b7506ce021ce965f91e5fa"}