{"p":"can-20","op":"mint","tick":"can","amt":"1000","rows":[{"df":"qa","content":[{"q":"What are the requirements for deciding which validator set to use in the relay?","a":"When deciding which validator set to relay, consider the following requirements:\\n\\n1. Reliability of the validator set: Choose a validator set with higher reliability to ensure that the relayed data can be effectively verified.↵↵\\n\\n2. Performance of the validator set: Consider the performance of the validator set, including processing speed and throughput, to ensure the efficiency of the relaying process.↵↵\\n\\n3. Security of the validator set: Ensure that the validator set has strong security to prevent malicious attacks and data tampering.↵↵\\n\\n4. Decentralization degree of the validator set: Choose a validator set with a higher degree of decentralization to promote the overall stability and security of the system."}]}],"pr":"562a83434f74dcafba0885a2c0614d6c4c3e2b711ec3f050f1527cc74939e735"}