{"p":"can-20","op":"mint","tick":"can","amt":"1000","rows":[{"df":"qa","content":[{"q":"How is the double-spending attack implemented in blockchain?","a":"Waiting for confirmation: The attacker waits for honest nodes to confirm the transaction in the blockchain, making it appear to be legitimate."}]}],"pr":"be192d873a72eac79ba8ed929c9cd5a1a9c32e58a4159668f4bc258c75b88246"}