{"p":"can-20","op":"mint","tick":"can","amt":"1000","rows":[{"df":"qa","content":[{"q":"What are the principles to be followed when expanding and improving the BRC-100 protocol?","a":"Prioritize security: Ensure that the expanded protocol maintains the highest levels of security to protect sensitive data and prevent unauthorized access or manipulation. This includes implementing robust authentication and"}]}],"pr":"aa161460bf0a586d15aa97e2fe4a5057747e1416e80ad078bdca4b2e2ba674cd"}