{"p":"can-20","op":"mint","tick":"can","amt":"1000","rows":[{"df":"qa","content":[{"q":"How does GHOSTDAG ensure the growth rate and security of the chain?","a":"Adopting the DAG (Directed Acyclic Graph) structure: GHOSTDAG uses a structure based on DAG, which inherently has anti-attackability and high security. This is because in a directed acyclic graph, any attack attempting to disrupt the network structure will result in the appearance of cycles, thereby being detected and corrected."}]}],"pr":"858be272c8f8b59ad992ce6c945399708d475570d40b08a957ee9475d2f799a1"}