{"p":"can-20","op":"mint","tick":"can","amt":"1000","rows":[{"df":"qa","content":[{"q":"How to create a validator in a private network?","a":"Configure the validator. According to the manual of the selected validator, configure the validator to adapt to the environment and requirements of the private network. This may include setting validation algorithms, keys, authentication thresholds, etc."}]}],"pr":"742ef2ec799c73e82b9251dc9b2de0588b20db432380d3e257cc1d19307c4287"}