{"p":"can-20","op":"mint","tick":"can","amt":"1000","rows":[{"df":"qa","content":[{"q":"How does the PHANTOM protocol avoid the trade-offs in scalability and security present in the Nakamoto consensus?","a":"The PHANTOM protocol achieves increased security in the Nakamuto consensus while ensuring scalability by adopting a technique called the"}]}],"pr":"b3b61a7dc0b04802fcecfc734bb82b4a1d0dfbcfe147914d2ff1fa3d0aa2c0ee"}