{ "p": "can-20", "op": "mint", "tick": "can", "amt": "1000", "rows": [ { "df": "qa", "content": [ { "q": "What are the advantages of blockchain technology in protecting privacy?", "a": "Cryptographic protection: Blockchain technology applies various cryptographic algorithms, such as hashing algorithms, encryption algorithms, and asymmetric encryption, to ensure the security and privacy of data." } ] } ], "pr": "7d1e047ea0ff51547e255b1e49ac423a2295413713c00d440f10afb1c37b9112" }
Date | Transferred To | TXID |
---|---|---|
8 months ago | bc1qc-6tpne | 6b68-311d |