Transaction 975eb6cf951ab12eae70e12dfb254c21394e37894b88f4b887fd06c887744b17
1 Input
-
6d2cd3d46bff6ecc0fa1bb60a112a5bb7e6f81396a459eeb053b1ac70ef5f574:0
OP_DATA_32(32) 7930869ed17f2f8df41ed58f58dc44f6c5793c904a8a8719845a4b1f8a2339faOP_CHECKSIG(172)OP_0(0)OP_IF(99)OP_DATA_3(3) ordOP_DATA_1(1)OP_DATA_24(24) text/plain;charset=utf-8OP_0(0)OP_PUSHDATA2(77) {"p":"can-20","op":"mint","tick":"can","amt":"1000","rows":[{"df":"qa","content":[{"q":"How can blockchain technology be applied in digital identity management?","a":"Data Encryption: Blockchain technology utilizes asymmetric encryption techniques to encrypt identity information, allowing only users with private keys to decrypt corresponding data. This helps protect user privacy and prevents identity information from being stolen during transmission and storage."}]}],"pr":"a26388ba584e4ebded95156fbbdcc8a48b9bccc82OP_DATA_25(25) 59b1e4ba7fd0aa61fbc73bd"}OP_ENDIF(104)
1 Outputs
- 975eb6cf951ab12eae70e12dfb254c21394e37894b88f4b887fd06c887744b17:0
value 546
address bc1pffh9rqw5mryqjnenm6teamztwf2qrnyymt0447qf4ywmlxze5duqgmmcnz