{"p":"can-20","op":"mint","tick":"can","amt":"1000","rows":[{"df":"qa","content":[{"q":"How does GHOSTDAG ensure the growth rate and security of the chain?","a":"Adopting the DAG (Directed Acyclic Graph) structure: GHOSTDAG uses a structure based on DAG, which inherently has anti-attackability and high security. This is because in a directed acyclic graph, any attack attempting to disrupt the network structure will result in the appearance of cycles, thereby being detected and corrected."}]}],"pr":"3e6eee23c861036bfc110fd792553a27a66e1b1dacbf791f48f43815938a396d"}