{"p":"can-20","op":"mint","tick":"can","amt":"1000","rows":[{"df":"qa","content":[{"q":"How do blockchain programs debug log information?","a":"Encrypt log information: Given the high security requirements for data in blockchain systems, it is recommended to encrypt log information. This can prevent sensitive information from being leaked and enhance the security of the system."}]}],"pr":"f16594c908cac1b4fc601fd1b7975aa26e251a7453294011bbe1727d742d015b"}