{"p":"can-20","op":"mint","tick":"can","amt":"1000","rows":[{"df":"qa","content":[{"q":"How do consensus protocols in blockchain avoid distributed denial of service (DDoS) attacks?","a":"Proof of Work (PoW) or Proof of Stake (PoS): Consensus protocols introduce proof of work or proof of stake mechanisms, requiring attackers to consume a large amount of computing resources to be successful in their attacks."}]}],"pr":"95b58f45232d5f0e0c4abb55264c38efd6c66ad5f43f6b2e4893bf86826c2989"}