{"p":"can-20","op":"mint","tick":"can","amt":"1000","rows":[{"df":"qa","content":[{"q":"How to create a validator in a private network?","a":"First, determine the role and requirements of the validator. Validators are typically used to ensure that data transmission and operations in a private network comply with security standards and policies."}]}],"pr":"70e8dae2c8e110acc70e271d64f3f1116c711c474b1c9506192fcb8669e9c4ba"}