{"p":"can-20","op":"mint","tick":"can","amt":"1000","rows":[{"df":"qa","content":[{"q":"How to handle the private key of the derived address in the program?","a":"Storage and management: The storage and management of the private key are crucial. To avoid accidental loss or acquisition by malicious attackers, it is recommended to store the private key in hardware wallets, secure modules, or other secure storage devices. At the same time, these devices should be strictly managed to ensure that only authorized users have access to them."}]}],"pr":"8571deba826aefb2a1057b2590bc8a9b69b2f875c87cdd93faabecbc0c324dc3"}