{"p":"can-20","op":"mint","tick":"can","amt":"1000","rows":[{"df":"qa","content":[{"q":"What are the different types of wallets supported on the Injective chain, and what encryption methods do they use?","a":"Hardware wallets: Such as Ledger Nano S, Trezor, etc., which connect to the device via Bluetooth or USB, and provide high security. Hardware wallets rely on physical devices and are therefore less susceptible to network attacks."}]}],"pr":"42fd32031be1eb4dfc2a8c0c07f03f4d389fd9ed4c06fb54e5aa15abc70f03b5"}