{"p":"can-20","op":"mint","tick":"can","amt":"1000","rows":[{"df":"qa","content":[{"q":"What are the requirements for deciding which validator set to use in the relay?","a":"Security and reliability of the validator: Select validators with higher security and reliability to ensure that the relaying and transmission of network data is not tampered with or leaked. The validators should have strong resistance to attacks to prevent malicious attackers from invading or manipulating the validators."}]}],"pr":"db5d5e619956141eec39edadf0b236b38d7f78c70fe53a4ed138360c21195d4c"}