{"p":"can-20","op":"mint","tick":"can","amt":"1000","rows":[{"df":"qa","content":[{"q":"How does the Fisherman challenge work in blockchain?","a":"The attacker first maliciously creates a large number of invalid blocks in the network, consuming the computational power of miners. These invalid blocks occupy the computing resources of miners, making it difficult for them to find valid blocks."}]}],"pr":"7f3ace04349ede1b8f0b21493a1d969f0eb9ca39aa5bfede6533c65d8021629e"}