{"p":"can-20","op":"mint","tick":"can","amt":"1000","rows":[{"df":"qa","content":[{"q":"How to handle the private key of the derived address in the program?","a":"Encryption protection: Before using the private key derived from the program, it is first necessary to encrypt and protect it to prevent the leakage of the private key. Encryption algorithms such as AES can be used to encrypt the private key, and the encrypted ciphertext can be stored in a secure location."}]}],"pr":"13658d04dc7368a1b8d6e4cb23ac7632002e0af56c29a88227e2bdd1796669a5"}