Institutional Layer
Where the failure lands in real architecture.
This layer describes how epistemic failures become institutional realities.
Once systems are deployed in the real world, enforcement pressure does not remain abstract. It migrates. It moves through layers of architecture until it reaches the point where a decision cannot be deferred.
That point becomes the trust boundary.
Wallets as the Trust Boundary
Wallets are the trust boundary because they are where execution is authorized and where the system cannot pass responsibility further.
No matter how decentralized the network is, the wallet must decide whether an action occurs.
This is where compliance, control, and risk collapse into a single moment.
Decision Boundary
A decision boundary is the layer that must ultimately approve, deny, or shape execution.
Decision boundaries are not chosen. They are discovered.
They are wherever the system can no longer defer judgment.
Enforcement Migration
Enforcement migration is the pattern where pressure moves down-stack until it reaches the layer that cannot escape making a decision.
Protocols push enforcement to applications.
Applications push enforcement to wallets.
Wallets push enforcement to users.
The pressure always finds the boundary.
Execution-Time Responsibility
Execution-time responsibility means that compliance and safety obligations land where transactions are formed and signed, not where narratives or policies are written.
Responsibility follows execution.
Property-Based Enforcement
Property-based enforcement checks whether an action satisfies constraints, independent of who performs it.
It asks: “Is this action allowed?”
Not: “Who is this person?”
This is the only form of enforcement compatible with structural privacy.
Identity-Based Enforcement
Identity-based enforcement governs by attaching rules to persons, accounts, or profiles.
It requires attribution, memory, and monitoring.
Identity-based enforcement always leads to surveillance.
Boundary-Based Evaluation
Boundary-based evaluation performs checks at discrete decision moments rather than through continuous observation.
This is the institutional analogue of proof at decision points.
Continuous Monitoring
Continuous monitoring is ongoing observation used to infer risk, intent, or compliance.
It emerges automatically when property-based enforcement is not available.
Authority / Custody / Intent Convergence (Wallet Triad)
The wallet is where authority (permission), custody (control), and intent (what the user is trying to do) converge into a single act.
This convergence is why wallets become governance targets.
Compliance Without Surveillance
Compliance without surveillance is the design goal where constraints are enforced deterministically at execution, not inferred from behavior.
This is not a political ideal.
It is an architectural one.
Institutional Summary
The institutional layer of Hidden Surface can be summarized in one line:
Enforcement pressure migrates until it reaches the layer that must decide. That layer becomes the trust boundary, and inherits governance by default.