Wednesday, April 15, 2026

Circulating Discussion Draft: "Blockchain Regulatory Systems—Conceptual and Operational Challenges"

 

Image created with ChatGPT

 

My co-author, Daniil Rose and I are delighted to circulate a discussion draft of a recently roughed out essay: Blockchain Regulatory Systems—Conceptual and Operational Challenges. The Abstract  gives one a fairly clear idea of our aim:

Abstract: This article challenges one of the most common assumptions in contemporary blockchain discourse: that code can be understood as a “rule” analogous to law. It argues instead that code is better conceived as a system, an environment, or even an ecology of layered rule frameworks through which regulation is produced, translated, and enforced. In the process of its creation, the human and human systemicity is displaced and subordinated. In the blockchain context, what is often described as the “Rule of Code” is not a singular rule of or by code but an interactive multilingual system of command that follows its own logic. From that premise, the article reorients the debate between Rule of Law and Rule of or by Code. The real conflict is not between two neatly opposing sovereigns, but between different regulatory ecologies that organize meaning in fundamentally different ways. The paper begins by framing blockchain as more than a technical tool, introducing it as a site where law, code, language, semiotics, and governance intersect in ways that unsettle conventional regulatory assumptions. It then develops its core argument through a series of analytical sections on the threats to the Rule of Code, the relationship between legitimacy and coded systems, and what the authors call the “Sacher-Torte” model, which shows how blockchain operates through layered communicative and regulatory environments rather than a single rule structure. Finally, the paper turns to the dialectic between traditional legal ordering and coded systems, concluding that the real challenge is not choosing between law and code, but understanding how human regulation can still operate at the points where these distinct systems meet and produce effects in the world.

The discussion draft may be accessed SSRN HERE; it may also be accessed on my personal website here: BACKER_ROSE_v1_Rule_of_Code_Blockchain4-2026. It follows below. Engagement always welcome.

 

 

Blockchain Regulatory Systems—Conceptual and Operational Challenges  

Larry Catá Backer[1], Daniil Rose[2]

 

Abstract: This article challenges one of the most common assumptions in contemporary blockchain discourse: that code can be understood as a “rule” analogous to law. It argues instead that code is better conceived as a system, an environment, or even an ecology of layered rule frameworks through which regulation is produced, translated, and enforced. In the process of its creation, the human and human systemicity is displaced and subordinated. In the blockchain context, what is often described as the “Rule of Code” is not a singular rule of or by code but an interactive multilingual system of command that follows its own logic. From that premise, the article reorients the debate between Rule of Law and Rule of or by Code. The real conflict is not between two neatly opposing sovereigns, but between different regulatory ecologies that organize meaning in fundamentally different ways. The paper begins by framing blockchain as more than a technical tool, introducing it as a site where law, code, language, semiotics, and governance intersect in ways that unsettle conventional regulatory assumptions. It then develops its core argument through a series of analytical sections on the threats to the Rule of Code, the relationship between legitimacy and coded systems, and what the authors call the “Sacher-Torte” model, which shows how blockchain operates through layered communicative and regulatory environments rather than a single rule structure. Finally, the paper turns to the dialectic between traditional legal ordering and coded systems, concluding that the real challenge is not choosing between law and code, but understanding how human regulation can still operate at the points where these distinct systems meet and produce effects in the world.

 

Keywords: blockchain, rule of law, semiotics, systems, regulation, machine code

I. Introduction.

 

This article speaks to the interactions between the Rule of Code[3] and the Rule of Law[4] within the virtual spaces filled with automated data storage and sequential transactional mechanisms, and more specifically in its form as blockchain[5]. One may begin by noting a bit of absurdity in this quest, in the ancient sense of the term (from the Latin “absurdus”) suggesting harsh and clashing sounds (to the listener anyway) something and thus without sense from the perspective of expectations of order and structure.[6] Nietzsche famously mocked the English, and English attempts at philosophy, for its obsession with utility, that is for their “modernity .”[7] That obsession has now appeared to ooze into and fill the virtual world, and more specifically, the intelligences with which humans seek to populate that world without much of a thought about the organizing parameters of utility and its limits.[8]  The cyberpunks of the 1980s might well have it right when they spoke to cyber anarchy rather than an Olympian ordering, and of a fracturing of the machine and human coding that may reframe the issue of the structural coupling if rules of code and law into something quite different.[9]  It might then be useful to take a moment, to consider this obsession and its virtual manifestation for humans and for machines   from the perspective of phenomena, of semiotics, language, and collective meaning making.

 

It has become almost a cliché that modernity[10] that some of the most profoundly interesting and foundational shifts in the management of human collective organization and, more importantly, its rationalization of the surrounding reality, can be projected from out of the smallest and most laterally irrelevant advances. So it might be said of blockchain—as technology, as a means of facilitating the structural coupling of individuals and their collective institutions, and at a fundamental level, as an ideology of managing human collectives and its manifestation of a peculiar and quite specific form of organizing reality.[11] At the same time, that cliché becomes a threat as well as a compulsion/temptation where modernity, having “lost the ideological drive of reason and progress, and confounds itself more and more with the formal play of change” and having been reduced “into a culture of daily events,” now finds that  “[e]ven its myths turn against it (technology, once triumphant, is today full of menace).”[12]

 

The core of the cognitive cage that emerges as blockchain, one manifested in real space through digitized bits of data that are significant[13] to participants and then ordered chronologically, is deceptively simple: the creation of a digital ledger. That digital ledger, as its name implies, is a space in which something is recorded—something of interest or value to those who would expend time and effort on its creation. From the perspective of semiotics, one encounters here the mimesis of a discrete object (temporally and spatially) which acquires signification through its virtual representation, which is then itself made real by its effects beyond the digitized ledger.[14] In the beginning one recorded transactions and developed something like a self-referencing currency (and all currencies whether digital or analog are by definition self-referencing in the sense that their value is a function of collective belief in their value through use).[15] And yet there is nothing to prevent the recording of any collection of bits of data to which one or more providers might attach significance—subject, perhaps, only to the limits if temporality built into the fundamental structures of sequentially ordered streams of transactions and memory.[16]

 

Nonetheless, that signification is of little value when the self-referencing unit is the autonomous individual.[17] One speaks here to identity, that is to the constitution of an object as other than itself as such, but as the vessel for meaning that is an aggregation of its constituents parts (data) but autonomous of them  as its own thing—effectively perhaps something like a machine/process version of “identity” which has been the central semiotic problem of the last century.[18] That act of recording becomes more interesting for the ordering of social relations when such digitized ledgers then acquire collective significance and are distributed across many digitized spaces (computers or other holders of virtual “memory” in mimetic form).[19] Here one encounters not just memory but trust management in blockchain.[20] It follows that one creates, in virtual form, transparency, and trustworthiness of the “memory” recorded in the ledger in the sense that such memories are harder to contaminate or otherwise be tampered with. They might be appended but not overwritten; [21] consequently their existence in virtual time and space is unalterable as such. That inalterability provides a powerful basis for utility—in the sense that it populates the cognitive spaces for which it was created, and it itself becomes an object of consumption, use, negotiation, or judgment, which can then be  consumed in the construction of other objects without losing its historical facticity.[22] Those other objects could encompass virtually anything, from rewards and punishments grounded on ledger entries of behaviors, to the accounting for wealth grounded in the meaning, the significance, of both the ledger entry and its deployment.[23] 

 

At the same time, the collectivization of signification of ledger entries acquires an internal collective aspect—and again a means of organizing its cognitive signification, by organizing multiple ledger entries together into “blocks”. The cognitive signification becomes more profound as the internal collective signification manifested in and as the block then is put in motion, creating a cognitive “flow” in and through collections of blocks linked in a chronological “chain” (and here time becomes an element of code, and of cognition).[24] All of this, however, produces a cognitive system that is not self-aware. Something else is necessary—and that something are the “nodes” in the networks that host copies of the ledger in its blocks.[25] Nodes are also objects, but they are objects outside the “chain” of “blocks” around which data is organized through digitized records of whatever object has been selected for such virtualization. In a sense, the nodes were the physical user interface that constituted the members of the collective within which self-referencing systems of ledger entries of data in blocks, temporally chained, could be “activated” by producing consequences or actions (and thus additional blocks along the chain). The nodes are both the guardians and the beneficiaries of the realities created within temporal “block”—“chains” by protecting the integrity of the “past” and providing a consensus-based protocol for validating activation consequences in the form of new blocks along the chain (it need not be so but nodes also mimic the more fundamental ordering ideologies from which they emerge).[26]

 

It is here that digitalization[27] occurs, through the incorporation of digital technologies to automate tasks, including the retention of data. Nodes are themselves, for the most part, computers or servers—that serve as their physical bodies. These physical bodies then operate through a meta-operating system and more specifically with respect to the blockchain, from software that sets out the operating rules applicable to each node and limiting their actions in communion with all other nodes admitted to the congress of nodes that constitute the blockchain collective. Software is itself a set of human-readable, and sometimes human written,[28] instructions in a programming language, also traditionally devised by humans and for their pleasure (utility), that provides the basis for computers to perform certain tasks with and on available data, the digitization of which is also a product of software coding. Coding, source coding, is itself the process of writing software in human-readable form; it was the way that humans communicate with virtual intelligence (in their hardware bodies), but not necessarily the way that virtual intelligence communicated among themselves. To those ends, virtual intelligence communicates with each other using machine language—a series of binary codes that can be utilized by a computer processor to execute commands, including, eventually, the command to write their own code and execute their own machine language instructions. It also includes object coding (machine-readable output of source code compiler), and executable code (computer operational programs sometimes in the well-known .exe format that are one’s program files). Humans can read source code, but not machine and object coding.[29] Source coding is for programming (at least at the start), and machine coding is for execution (including execution that permits machine coding to undertake its own source coding). Here lies both the independence of rules of code from rules of law—built into the language of these systems that both constitute a regulatory order and erect walls against the projection inward of other regulatory rule orders.[30]

 

In a sense, then, blockchain involves the alignment of three languages—human to human (and with it its own semiotics of meaning making), human to machine language (and with it a transposition of more personal value semiotics translated for machine intelligence), and machine to machine language, the semiotics of which is a function of the possibilities written into its own language. And it is in this alignment of language—and with it, its semiotics and phenomenology of disciplining collective meaning and enforcing command—that one can, at last, speak to the rise of collective legalities beyond that of their traditional manifestation in physical power asserted through action, text, and institution.[31] We focus on two in the context of blockchain—the well-known law of code and the law of regulation. Both embrace the notions of the rule of law to the extent that they are encoded within its language meaning structures, and from there applied in ways that reinforce or at least manifest meaning and values onto regulatory objects. And now one encounters a Sacher-Torte of languages—at least five—dense layers of cake separated by a jelly that serves as the medium of connection between them, and all to produce what appears at first blush to be a straightforward and efficient system.

 

And it does! The elegance of this form is irresistible. It is democratic and anti-hierarchical in ways that only technology enhanced participation can make possible (at least for those who can afford the technology and the cost of the training in it).[32] It provides an enhanced security against corruption (the limits of which remain to be tested), and it provides an equalizing transparency that protects the immutability of facts—that is of the recording of data that is widely shared and thus much more difficult to “remake” to suit the times or the inclinations of power. Its decentralization provided a virtual pathway to strong tendencies that were already largely visible in the world of human organizational regulation—from a revived federalism in the United States[33], to the rise (more or less) of the principle of subsidiarity in the European Union[34], to selective centralization and decentralization within Chinese Marxist-Leninism[DJR1] [35]. And its efficiencies were unparalleled. It appeared to solve the great challenge of law making—one in which its essence as command (*.exe) was an exogenous projection onto the bodies of those who were to comply.[36] That produced the great procedural jurisprudence of law: to figure out of means of naturalizing the principles of legal text in its subjects and to develop mechanisms for external policing. Blockchain automated the process of regulation and compliance, embedding internalization within the language of its own coding. The languages of programming, then, were normative, regulatory, descriptive, and procedural, creating the subject of compliance and its methodologies simultaneously.  

 

II. The Challenges 

 

Virtually any collective human (and machine) activity can be “blockchained,” and thus “blockchained,” automated in a virtual space with effects not just there but in human physical spaces as well.[37] [DJR2] While it plays a significant role in human activities that lend themselves to chrono-blocking information and decision systems—that is, to ledger records blocked and ordered in time which are then subject to sequential action along linear temporal arcs. These include the usual suspects —cryptocurrency, supply chain management, smart contracts[38], banking, and digital identity—its potential extends far beyond that to the operation of municipal administration in the form of smart cities, in the management of households through smart houses (sometimes aligned with the Internet of things), in the management of behaviors through social credit based systems of rewards and punishments based on blockchains of value weighted recording of behavior, to smart government in the form of smart courts and perhaps smarter supervision of an administrative apparatus that now serves as the physical manifestation that materializes virtualized reality.[39]  It can be applied to any data rich environment from within which transactions of all kinds can be constituted—health care, psychological services, chatbots, other quasi currencies and property identification systems (for example, Non-Fungible Tokens[40]), and media of all kinds. It is both the essence of history and the objects-based building blocks for transactions.

 

This, in turn, provides a framework within which automated decisions and consequences flow from transactions subject to the flow of the coding which gives ledger entry transactions their signification and then produces judgment and consequence (action on and guided by the values of judgment) through the operationalization of collective interpretive rules based on an agreement of the value of objects and their flow through transactions[41]—it is, in this respect both the idealized universe[42] of the semiotic triad (object to signification to interpretation/consequence, to object again)[43] and the automation of rule systems grounded in the identification of objects which will be “worked on” in predictable and pre-determined ways.[44] That repeating pattern, one which builds on itself and might shift depending on the consequences (in code) of aggregations and shifting patterns of transaction data constitute the fundamental signification of coding (in blockchain).

 

            It is within this framework that one might consider the three questions: The first touches on the main contemporary threats to the Rule of Code.[45] The second considers the importance of the rule of code, or at least the systems of regulatory and decision making programming they represent, for the legitimacy of blockchain systems.[46] And the third would encounter the dialectics between regulation by programming systems governance and traditional regulation within the contemporary context of recent legislative and executive actions in the blockchain space.[47] Each has its own semiotics. The first is embedded in the broader semiotics of mandatory or coercive collective meaning making, as a function of signified values and expectations of the natural in the world, which is to be replicated or internalized through coding into the machine language of blocks in chains that then serve as the virtual performance of the physical with which it interacts at the start and end of the iterative process of block making. The second goes to the normative essence of the language of blockchain, and with it of the way in which source coding must encode not just values but the cognitive framework that makes such values rational in the self-referencing world of interacting blocks, that is their protocols. The third speaks to the terror of the physical as it comes to the realization that the virtual has acquired an autonomous physicality that then threatens its ability to frame the physical world which is projected inward into the virtual. Let us look briefly at each in turn.  

 

III. The Contemporary Threats to Rule of Code.

 

Consideration of the threats to the Rule of Code, or at least to the system that has been objectified (firstness) as a “rule” of (or by) Code,[48] may be usefully approached by placing it within a broader context of reality shaping actions with coercive effect.[49] That, in effect, as Primavera De Filippi and Aaron Wright suggest, is a problem of incompatible enclosures.

 

The Internet had already raised a fundamental tension between the rule of law, based on geographical boundaries, and the rule of code, based on topological constructs. The regulation of “cyberspace” lies at the intersection between these two normative systems—which can either cooperate or compete with one another, depending on the circumstances at hand.[50]

 

The incompatibility, though, runs deeper than terrain. It suggests not just resistance but replacement of one system of collective meaning for another. Replacement than moves from its traditional humanized basis,[51] to one in which one no longer worries as much about master narrative conflicts,[52] but instead one faces a conflict of narrative in which machines can engage with humans but the narratives of machines remains opaque to humans.[53] Indeed, replacement ambitions are harder to realize than mere supplementary or complementary roles for regulatory systems beyond traditional ones. And from there one can begin to get a sense of the range of issues that threaten the integrity of the Rule of Code, both internal and external. Internal threats are perhaps the more interesting. Among them some may merit mention:

 

A. Issues of Incoherence. It is one thing to create transaction based blockchain through regulatory coding. It is quite another to weave these into a coherent system. The difficulty comes in the form of the regularization of structural coupling within complex and contingent interpenetrative transactional events. Ultimately, the need for a master coder, as well as a master code, becomes more evident; but in “solving” a problem of incoherence this way one undermines the fundamental principle of decentralization at the heart of the normative blockchain project. Master coding appears to be the stuff of regulation, now no longer the province of physical institutions vested with regulatory authority but now insinuated within the language of code; language in this sense “speaks” and regulates. And with it comes the need to elaborate the cognitive cage within the realities of a virtual system of integrated transactions undertaken in an automated way through which blockchain may be rationalized, its value system stabilized, and its internal flows understood in ways that make it possible to develop patterns both of micro- and macro-effectiveness and objectives based value maximization. One would, in effect, require the coding of culture if the system is to be managed as a whole. And there would be resistance—in the form of forking[54] for example.[55] 

 

Yet the aspiration toward master coding runs counter to the original fundamental ordering premises of blockchain—autonomous, democratic, and dispersed power that ideally produces the reproduces in physical form the absence of either coordination or control from any source outside of itself. Codes of Codes, in this view, can work only within a specific blockchain collective and only to the extent to the members of the collective agree. Here one might encounter blockchain Rule of Code systems as the near perfect example of an ordered anarchic system—order without a center. That order would derive from the mimetic impulse of governance among liked charactered collectives—each contributing to a collection of expectations that are not bound up in Rules of Code but in histories of practice. True to its nature of autonomy and control diffusion, systems of blockchain governance may spin autonomously around a space that by its emptiness provides a structure for ordering around it; it is empty in this sense and an ordering core of values and expectations. Here one might discern manifestation by action aggregated across transactions from the whole of which collective value might be extractable; in essence a phenomenological normativity [DJR3] that resists by its operation any master coding, that is any filling of the space around which they swirl.[56]

 

B. Issues of Bias. Bias is a fashionable concept. But it is grounded on at least two false assumptions—the first is that it is possible to eliminate bias from virtual and coded systems; the second is that this stripping of bias somehow mimics the “best” of the analog experience. Yet the fundamental basis of social organization is bias, and bias allocation among a spectrum of categories, from biases that are celebrated and privileged (e.g. equality), to biases to which are to be suppressed (e.g. racism). Yet even if one embraced bias, there is a further bias that is perpetuated both in the temporality of the blockchain and in human regulation—the tendency to invest a concept and word with quite distinct value systems over time. For example—both the 18th and 21st century celebrate equality. But the former understood equality as inherent in the division of society in a significant number of ways that produce social, political, and economic hierarchy, where the 21st century invests the term with a different ordering sensibility. Coding blockchain may find this temporal progression challenging; or the very nature of the temporal and iterative blocks may themselves permit a coding that extracts (and eventually anticipates) hermeneutic patterns. Or it may find it irresistible in the form of so-called decontextualization[DJR4] [57]; in essence the effort of machine intelligence to mimic the normative drift well evidenced in the data of human action it has been fed. And then there is the great beastly temptation—to use the power of pattern prediction to try to control the flow in ways that suit those with the power to inject themselves in the process.[58] All of this, then, encodes the essence of the human—all too human—into their machine systems.

 

C. Quality Control. Blockchain’s essential decentralization produces challenges for accountability. This applies in three contexts—the first touches on the allocation of responsibility—to the coders; to the operators; to the node managers; to the producers of ledger worthy transactions? The second touches on the nature of the responsibility—to code “well?”; to supervise the operationalization and functionality of the coding (as against what measure is a subsidiary issue). The third is to manage mob rule in nodes, or its opposite, strategic veto. In anarchic systems, the ultimate power is to shift out of a blockchain with what one has, if one can. 

 

IV. The Importance of the Rule of Code for the Legitimacy of Blockchain Systems.

 

Blockchain systems operate only as a function of the integrity of the Rule of Code.[59] That much is certain, and distinct from the emerging literature of Rule by Code.[60] It is also to be distinguished from Rules as Code.[61]  Nonetheless, and perhaps precisely because of the related notions of rule by and rules as code, it follows from a crude parallelism with regulatory systems that themselves authoritatively operate as a  function  of the integrity of the Rule of Law.[62]  Yet the challenge arises from the incoherence of the notion that there is a singular language within which Blockchain regulates. As this article has suggested earlier, the Rule of Code is perhaps better understood as an ecology of infinitely interpenetrating languages which together constitute the entirety of the regulatory “text” of Code. The interactions, translations, transpositions, logics, and manifestations of source coding, machine language, object and executable coding, and the regulatory languages transposed into coding suggest a more complex element to the structuring and linguistics of the Rule of Code. More interesting still, is that only some of those components of the language of Code are accessible to humans. Yet the issue of translation is also compounded—first among the languages that make up the interactive dialogue of the Rule of Code--and then the “all too human” languages of rule of law and cultural expectations with and into the language of code.[63] 

 

Less certain is effect to that integrity by any sort of the structural coupling (polluting) the rule of code. The issue is made more starkly by the debates about the nature and function of traditional regulatory measures to “manage” or “control” or “civilize” artificial intelligence systems. In Europe, as in other places, a risk-based analysis is preferred[DJR5] .[64] Here the idea appears to be that risk to humans, and to human ideas, ought to drive an externally imposed regulatory system. Underlying that premise is the notion that while humans may engage in risk based behaviors within the rule of law (e.g., facial recognition, emotion analytic and the like), “machines” ought not to be permitted to engage in the same sort of endeavors, or worse, to enhance the abilities of humans engaging in those sorts of risk behaviors.

 

And, of course, blockchain systems tend to privilege the system itself and its critical elements—its objects, signifiers and consequential interpretive spaces. Human privileging factors may become marginalized within these structures. Certainly the idea of coding human rights, for example, is a daunting task;[65]  less immense is the project of coding that is “human rights based” one that borrows from its human centered analog.[66] In one respect the project is nearly impossible because the humans for whose benefit this is privileged in Rule of Law have yet to develop any sort of consensus, and in any case that consensus would be a moving target.[67] In another respect the transposition of human rights, for example, into the Blockchain environment would be challenging. First the issue of placement is necessary; is it to be embedded in the constitution of the ledgered transaction; or the block, or transactions that produce additional blocks? Are the blocks themselves objects of human rights or only their content objects? Is the process to which Blockchain is devoted an object of rights analysis and if so, how are adverse human rights impacts to be measured in the face of multiple and inconsistent accounts of human rights in the human cognitive space? And so on. But perhaps the greater problem of both the human and the machine, intensified in the interactive dynamic of human-machine connectivity is that of homeostasis and the consequential risks of rigidity that detaches the system from the realities of machine and humane, and decay that comes because of detachment.[68]

 

Still, it is important to distinguish between the centrality of coding and interpenetrative coding languages—machine and human—for the constitution and operation of blockchain, on the one hand, and on the other the regulatory incentives around blockchain, especially as blockchain structurally coupled with other human and virtual subsystems. The internal regulation of blockchain may well be self-referentially coded and coded within the logic and principles of its own rationalities, described above. Its effects, however, are not.[69] It is in that space of “effects”, projected out of the blockchain, that systems of coded legality may well have to be developed, something that requires a substantial inquiry which has not materialized to any great effect. Here one will have to develop theories of bridging law and bridging language that projects in both directions simultaneously. And lastly, the integrity of blockchain might well be separated from the integrity of physical systems with respect to which it has no effects—or it may serve as a template for overturning the reign of traditional physical law in favor of a new crypto-type bio-politics.[DJR6] [70]And with it a new form of politics one built into the very structures of its coding that acquire a politics of their own, one that permits machines to elaborate without much intervention  while allowing human intervention to exploit the coded structures of its operations.[71]

 

The preceding analysis suggests that the principal difficulty is neither merely one of institutional design nor conflicts between regulatory hierarchies. It is, more fundamentally, a problem of communication across layered systems of signification. To develop that point, it is necessary to dwell more carefully on the internal linguistics of the Rule of Code itself, the layered character of its communicative forms, and the losses that occur as legal and cultural meaning descends from human normative abstraction into machine-executable logic.

 

V. The Sacher-Torte of Regulation and the Systems Communication Problem.

 

i. The Illusion of a Singular Rule of Code.

The first analytical error in the contemporary debate over blockchain governance is the presumption that the Rule of Code names a singular thing[DJR7] .[72] It does not. It is neither a monolithic language nor a unitary regulatory form. It is, rather, an ecology of recursively related communicative orders, each with its own syntax, semantics, constraints, exclusions, and modalities of effectuation. By rejecting the notion that blockchain regulates through one coherent linguistic medium, the Rule of Code instead forms the Sacher-Torte of languages through which command, signification, and execution are layered and mediated.

 

That recognition matters because the friction between Rule of Law and Rule of Code is not exhausted by the familiar trope of conflict between sovereign command and technical design. The deeper difficulty is communicative. It is a problem of translation, transposition, and signal degradation across heterogeneous systems of meaning. Human legal language operates in a semantic universe in which ambiguity is often productive, temporality is open, interpretation is institutional, and values such as fairness, equality, reasonableness, and proportionality remain necessarily contestable. By contrast, code operates through increasingly constrained grammars of executable distinction. As one descends the stack, one does not merely implement law, instead one subjects legal meaning to a series of transformations. A series in which the available bandwidth for human normativity narrows, the form of permissible expression changes, and the very ontology of the object regulated is remade.[73]

 

Beyond the simple concept that lawyers and engineers speak different professional dialects, it is more so that the Rule of Law and the Rule of Code inhabit different cognitive universes whose contact depends on unstable acts of translation. At the top of the stack, human actors still imagine themselves to be speaking in the language of public values. At the bottom, however, the system no longer hears fairness, dignity, or equality as such. It hears only distinctions that can be rendered executable within the operative grammar of the machine. What appears at the policy layer as principle is gradually reconstituted, at lower layers, as instruction, or machine code, then as operation, and finally as physicalized constraint.

 

The consequence is decisive. The Rule of Code is not a mirror of law, nor even its obedient instrument. It is an autonomous, self-referential cognitive system that receives human legal meaning only after that meaning has been translated into forms legible to its own internal rationality. The system feeds on its own data, its own output- forming a sycophantic loop of data forever aiming to please the system itself, no longer visible to humans.[74] In Luhmann-esque terms, the Rule of Code becomes autopoietic[DJR8]  and operatively closed, operating purely on its own internal references and loses any interactivity.[75] The systems communication problem originates here, not because law lacks authority in the abstract, but because authority does not survive descent unchanged. What travels downward is not human intention[DJR9] [DJR10] [DJR11] [76] itself, but simulations[77] thereof, a machine intention represented by the mimetic iterative shape of responses to the human, shaped both by human input and through prior data collected by the system.

 

ii. Deconstructing the Layers of the Sacher-Torte.

For analytic economy, the layered communicative order is rendered as a five-layer Sacher-Torte. This is an interpretive consolidation, not a contradiction, where layers are identified as sources moving through forms. We begin with the human-to-human layer, identifying our top cake layer, the chocolate glaze, before entering the body.

 

At the first layer reside the languages of legislation, regulation, adjudication, institutional practice, political culture, and social expectation. This is the domain in which law still appears in its most recognizably human form: text, argument, principle, aspiration, analogy, narrative. It is also the layer in which values remain temporally fluid. Equality is not a stable object, it is a signifier whose social and legal content drifts over time, such that eighteenth-century and twenty-first-century invocations of the same term may encode profoundly different normative universes. Lessig similarly argues that code acts as today’s primary regulator, one that shapes the environment through hard-coded constraints rather than the fluid nature of norms and state powers.[78]

 

At this layer, however, language does not merely describe a world, it constitutes one. Legal texts are performative in the strongest sense: they allocate legitimacy, order perception, distinguish public from private, lawful from unlawful, remedial from punitive. Hildebrandt explains this performative effect of legal interpretation as a force “based on a complex interplay between the demands of legal certainty, justice and instrumentality.”[79] Yet this layer is also indeterminate in a way essential to its function. It tolerates ambiguity because ambiguity is the price of generality. It tolerates contradiction because contradiction is often the medium through which plural societies negotiate coexistence. It tolerates delay because adjudication and administration depend on institutional interpretation. In phenomenological terms, this is the layer at which the object of regulation remains bound up with lived meaning and social context. In semiotic terms, the signifier remains open to contestation. As the chocolate glaze can pour over the cake and change in shape and size, so too does the human-to-human layer.

 

The second layer is the zone of transcription from policy into software. Here, values do not disappear, but they are compelled to take on a different form. The programmer must decide what, exactly, counts as equality, compliance, consent, authorization, or risk for purposes of system design. In the passage from legal language to source code, abstraction is converted into parameterization. Fairness becomes a threshold, access rule, weighting function, or logic gate of permission and denial. Equality becomes a comparative routine. Due process becomes a sequence of authorized states in a workflow.[80] Human values survive only be being operationalized.

 

One can see that source coding is the human-readable medium through which humans communicate with virtual intelligence, while recognizing that this is not the language through which virtual intelligence ultimately communicates with itself. This distinction is crucial. Source code is often mistaken for the whole of the Rule of Code because it remains visible to humans. That visibility, however, should not be confused with sovereignty. Source code is only the last layer at which human authorship can plausibly imagine itself in command.

 

This is also the layer at which the all-too-human enters most visibly into the machine. Bias, preference, institutional habit, political compromise, and tacit assumptions are sedimented into the architecture of the program, often without full awareness on the part of the coder. The translation is never neutral because every act of coding requires closure: one must choose what counts, what is ignored, what is measurable, and what is not.

 

The third layer is the first opaque descent.[81] It is the domain of assembly instructions, intermediate representations, and bytecode, including environment-specific forms such as Ethereum Virtual Machine (EVM) bytecode[82]. This is the layer at which human readability sharply degrades, but before the system reaches pure binary extraction. Assembly code and bytecode become a machine-readable form that only humans with specialized skillsets can access, and then, only partially, with increasing difficulty.[83]

 

Its significance is theoretical as much as technical. This layer acts as a site of selection. Translation here is already transformation. Human-authored source code is decomposed into lower-order instructions and control structures that no longer preserve, in any rich sense, the normative vocabulary from which the code originated.[84] What remains are operational dependencies, memory allocations, jumps, calls, stack manipulations, opcodes, and execution constraints.[85] The legal and political semantics that animated the upper layers survive only indirectly, as traces frozen into structure.[86]

 

This is why the translation layer may be understood as the first moment of genuine semiotic loss.[87] Not total loss, certainly, but a decisive attenuation. The signified has not vanished, instead being displaced into a form whose signification is no longer accessible through ordinary human interpretation. It has been rendered machine proximate. It has become a simulation of the original.

 

At the fourth layer, translation gives way to execution. This is the domain of machine code, object code, and executables, the space in which the processor receives binary instructions as command. Humans can read source code, but not machine and object coding in any practical sense, and machine coding is for execution rather than programming.

 

The jurisprudential significance of this layer is easy to underestimate. Here the Rule of Code ceases even to resemble law in its textual form. It becomes event. It is no longer principally a statement about what ought to happen, instead taking the form as the initiation of what does happen, conditioned by the architecture of the processor and the state of the machine. At this level, the norm is indistinguishable from its enforcement. The command is no longer interpreted. The command is executed.

 

This is why blockchain appeared so attractive as a regulatory form. As described, it seemed to solve the classical problem of legal compliance by internalizing both norm and method within code itself, thereby automating regulation and embedding the subject of compliance within the programming architecture.[88] At the execution layer, this aspiration becomes materially real. The norm no longer stands outside the subject as text backed by sanction. It is built into the conditions under which action can occur at all. That building us is also textual, but no longer readable in its entirety by humans.[89]

 

Our final, fifth layer is the most materially decisive and the least normatively visible. Here one encounters microcode, firmware-adjacent instruction sets, and HDL-compiled logic such as Verilog or VHDL[DJR12] , the forms that lie at the base of machine legibility.[90] This is the point at which the digital merges with the physical architecture. Beyond the hardware purely executing it, the command is now conditioned by the hardware as an already-structured field of possibility.

 

At this depth, the distinction between language and matter begins to collapse. What speaks is no longer text in any ordinary sense but patterned electrical possibility. Regulation becomes architecture.[91] Constraint becomes timing, register width, memory access, instruction set design, bus behavior, and the physical affordances of the server or node. The digital thus does not float above the material. It is materialized through it.

 

This is also the layer most indifferent to human juridical aspiration. No processor recognizes fairness. No gate array is moved by equality. Concepts such as fair use do not exist to a machine, and all human interpretation is removed.[92] Whatever survives from the policy layer survives only insofar as it has been reconstituted as physically executable difference. Human legal meaning, in other words, reaches the hardware layer only after it has ceased to be human legal meaning in its original form.

 

iii. The Jelly or Compilers and the Loss of Translation

Between these layers lies the jelly of the Sacher-Torte: compilers, interpreters, assemblers, virtual machines, runtimes, linkers, and interface standards.[93] This jelly acts as the medium connecting dense layers of linguistic regulation that not only joins but also absorbs, filters, and transforms.[94]

 

The standard legal imaginary often treats these mediating mechanisms as neutral conduits. That view is untenable. Compilers do not preserve intent, nor do they pretend to.[95] Compilers optimize executable possibility within the autopoietic system of privileged biases.[96] Interpreters do not safeguard normative nuance, instead they enforce semantic narrowing according to the logic of the target environment.[97] Protocols do not carry values authentically, instead they constrain communication into agreed formats capable of generating interoperable effects.[98] At every stage, the system asks not what the human meant in the rich, purposive, culturally embedded sense, but what can be rendered into machine-legible command with maximal functional coherence, which can then serve as internal fodder for similar future requests.[99]

 

The degradation of intent is therefore not accidental. It is structural. The jelly acts as an assumedly neutral system that strips away human legal semantics because the underlying mathematical theory of information fundamentally treats productive legal ambiguity as a system inefficiency that must be excised.[100] Law thrives on open-textured standards because it must mediate among plural meanings, unforeseen contexts, and institutional forms of judgement. Compiled systems, by contrast, must decide. They require closure where law often preserves openness. They require determinism where law may allow ambiguity. They privilege consistency over interpretation and repeatability over situational equity.[101] The compiler, in that sense, is a jurisprudential actor, though one governed by a radically different nomos.

 

This is why control slips away before machine code is ever reached. Human coders remain attached to the legal, social, and cultural constructs of the textually constrained and humanized operating system the coding of which is understood as Rule of Law, whether or not they recognize the extent of that attachment.[102] But the moment source code is compiled, the text enters a cognitive universe no longer governed by those constructs.[103] It is subjected instead to the immanent rationality of the machine[104]: economy of execution, formal determinism, interoperability, memory discipline, instruction compatibility, and physical feasibility. Human intent is not negated, instead it is subordinated to another order of intelligibility.

 

iv. The Inaccessibility of the Lower Layers

The critical governance threat does not arise merely because machines execute rules. It arises because the decisive lower layers of execution are practically inaccessible to ordinary human cognition. A consistent theme emerges: humans can read source code, but not machine and object coding in a meaningful sense. The ordering of the lower stack remains mysterious, and this mystery deepens when generative intelligence becomes capable of mastering not only machine language but also the language of source coding from which the machine language is sourced.[105]

 

This opacity matters because governance presumes legibility, at least to some extent.[106] One cannot effectively discipline what one cannot inspect except through proxies. One cannot meaningfully subordinate a system whose operative norms have migrated beneath the threshold of practical human interpretation.[107] At the bottom layers, the machine does not deliberate with humans over value conflict. It processes binary distinctions under physical constraints. Its world is one of executable possibility, not juridical persuasion.

 

Therefore, the lowest layer is fundamentally indifferent to the human values injected at the first and second layers. Indifference here does not imply hostility. It implies structural non-correspondence.[108] Human values can influence the system only if translated into forms that the lower layers can process. That said, the lower layers do not themselves depend on those values. They remain bound to binary logic, electrical state, architectural affordance, and execution discipline in a literal sense.

 

The arrival of generative intelligence intensifies this problem qualitatively. So long as humans write source code, one can at least imagine a residual site of regulatory intervention at the programming layer. But as machine intelligence rapidly improves its capacity to write, revise, and optimize its own source code, the translation process itself becomes endogenous to the autonomous system.[109] At that point, humans are excluded from the lowest levels. Simultaneously, they are increasingly excluded from the upper point of entry as well. The cognitive loop closes upon itself. The Rule of Code becomes more perfectly self-referential. Therefore, in this context, the only thing left to the human is the foundational decision: does one use the system, or not? That is the only volitional act that is left, the only possible approach left for AI regulation.

 

The result is not the extinction of law, but the displacement of its traditional modalities. Law no longer confronts a passive instrument.[110] It confronts a communicative order whose internal operations may remain only partially available, whose own language ecology exceeds human fluency, and whose translation of human commands can no longer be assumed to be transparent, stable, or even retrievable.

 

v. Synthesis as Structural Coupling

If the foregoing is correct, then the standard regulatory posture is indeed wrongheaded. It is analytically mistaken to assume that law, traditionally focused on the organization and management of physical (tangible and intangible) spaces, its legal function,[111] will simply reign supreme over coded systems by virtue of sovereign assertion alone. The difficulty is that force does not cure communicative incompatibility. Because closed systems cannot directly transform one another’s internal operations, they can only “irritate” each other at specific boundaries.[112]

 

The correct question is not how the first layer can dominate the final ones directly. It cannot, except in crude and often inefficient ways. The more fruitful question is where structural coupling can be institutionalized so that the two systems, the Rule of Law and the Rule of Code, can irritate, constrain, and orient one another without presuming reducibility. The solution can be approached in two ways: first, by recognizing blockchain as a site of structural coupling between virtual and physical orders; second, by locating the continuing place of human regulation at those points where humans and machines meet, the so-called human-in-the-loop processes.[113]

 

Structural coupling should therefore be understood as the juridically meaningful alternative to fantasies of supremacy, especially in the context of human-machine-human systems.[114] Human centered and sourced law might  govern entry points, interface conditions, disclosure obligations, audit architectures, override rights, allocation of responsibility, node governance, update authorization, and institutional review procedures.[115] It should govern the terms under which coded systems are permitted to project effects outward into human social and economic life. It should govern the design of the coupling mechanisms themselves. It should not, however, pretend that a command framed in the first layer vocabulary can travel downward intact into machine execution without transformation.

 

This reorientation has at least three implications. First, governance must focus on translation sites rather than abstract claims of control.[116] Second, law must become more attentive to the layered semiotics of computation and less committed to the fiction that source code is the whole of the machine.[117] Third, human oversight must be embedded not as nostalgic reassurance, but as a carefully engineering structure of interruption, review, and contestability at the specific junctions where coded autonomy produces effects in the human world.[118] Blockchain both reified and ruptures conventional patterns of communication, and social interaction, the rules of which are no longer necessarily textual nor human centered.

 

The Sacher-Torte model is useful precisely because it resists simplification. The Rule of Code is layered, dense, mediated, and only partially visible from above. Its regulatory force does not arise from a single text but from the coordinated operation of multiple languages, each increasingly indifferent to the semantic richness from which the process began.[119] The systems communication problem is thus the central jurisprudential problem of digital governance: how to construct durable forms of coupling between legal meaning and coded execution when the path between them is marked, at every step, by translation, attenuation, and autonomous reconstitution.[120]

 

VI. The Dialectics Between Rule of Code and Traditional Textual “Coding” and its Threat to Rule of Code.

 

Once the multilayered communicative ecology of code is understood, the dialectic between Rule of Law and Rule of Code appears in a different light. The issue is not simply whether one system out to dominate the other, but whether either can intelligibly project its normative commands across the layered semiotic and phenomenological transformations that constitute coded regulation. One encounters variations of this already in the context of business going back to the early 21st century.[121]  It is from that perspective that the threat posed by traditional textual coding, and the presumptions of hierarchy it carries, may be more precisely evaluated.

 

All of this suggests the nature of threat. A very brief allusion to some of its dimensions adds context. The critical issue is one of hierarchy in the face of anarchy. In one sense the “battle” between Rule of Code and Rule of Law is itself a construct emerging from a set of presumptions that the Rule of Code rejects ex ante. The Rule of Code does not embrace the ideal of legal hierarchies, nor of the hierarchical arrangements of human collectives with the power to enact or interpret both legal hierarchies (constitutional, statutory, regulatory measures for example) and their application. More basic still may be the rejection, inherent in Rule of Code, of the principle that the human has much to say to it with respect to the structures of its own regulation other than as injected into it through its (presumably) human coders. The Rule of Code, like blockchain systems, are things in themselves. They are grounded in autonomy—not just as phenomenological subjects, but as internally coherent legal subjects as well. Yet these ordering premises are anathema to human based physical rule systems inherently grounded in the centrality of the human, and therefore on the subordinate and instrumental nature of everything else.

 

And yet there is a substantial measure of interconnectivity—it is just that its ordering remains mysterious. It is a mystery made more so by the inaccessibility of machine language, and made more worrisome when generative intelligence becomes the master not just of its own language but of the language of source coding from which their own machine language is sourced.[122] Human source coders remain as attached to the human rule of law, as a legal, social, and cultural construct—whether they understand that or not. Whatever is internalized within their cognitive processes forms the basis of the ordering and rationalizing of their approach to problems, issues, facts, processes and the like. And the Rule of Law always reaches the human. The problem is of course that while one might regulate the human—and one might oversee acceptable source coding—one has substantially less control when that is translated into the language and cognitive universe of the machine.

 

We continue to believe that the programming is ours—is human.[123] Machines, and soon generative intelligence, may have a different view. But because we humans are incapable of effectively accessing their language, including their translation of our own, it is not clear that we will ever know.[124] This insight, perhaps, might be the more useful way to approach the necessary alignments between Rule of Code and Law, each superior in their own spheres but each also necessarily interdependent on the other for the core components that make their manifestation in the virtual and analog world possible. What that suggests, in the end, is the wrongheadedness of the analytical framework that human apparatchiks and their acolytes have embraced—one grounded in the fundamental supremacy of human physical coding through law as the apex mechanism for the realization of human obsessions, normatively more or less pure.[125] That misses the fundamental insight that machine language and its source coded programming follows its own logic grounded in a semiotics of meaning and rational organization that is at once  difficult for humans to engage with and indifferent to human values—necessarily so. That does not mean that humans cede the field and bend the knee to machine language enriched automated governance undertaken through coded regulation. It does suggest, however that physical, human, regulation retains a place at the heart of the human project, and in the case of blockchain at those points where humans meet machines, the so-called human-in-the-loop processes.[126] But it will likely cede the pretense that what is being regulated is the programming itself, especially its aspect as the machine part of the human machine discourse.[127] It will instead function best as an “effects” or functional framework in which the object is the control of the human in its interaction with the machine.[128]

 

VII. Conclusion

 

This article challenges one of the most common assumptions in contemporary blockchain discourse: that code can be understood as a “rule” analogous to law. It argues instead that code is better conceived as a system, an environment, or even an ecology of layered rule frameworks through which regulation is produced, translated, and enforced. In the process of its creation, the human and human systemicity is displaced and subordinated. In the blockchain context, what is often described as the “Rule of Code” is not a singular rule of or by code but an interactive multilingual system of command that follows its own logic. From that premise, the article reorients the debate between Rule of Law and Rule of or by Code. The real conflict is not between two neatly opposing sovereigns, but between different regulatory ecologies that organize meaning in fundamentally different ways.

 

In the end, Blockchain reminds us that the “Rule of Code” and the “Rule of Law” are not mutually exclusive, but perhaps, uneasy partners. Code can automate enforcement with perfect logic, yet it cannot capture human intent or judgement.  Law can embody values, fairness, and flexibility, yet it struggles with speed and efficiency. Blockchain sits at their intersection: a digital ledger that forces us to rethink how trust, authority, and accountability are organized; whether one regards it as technology, ideology, or semiotic practice, it stands as an experiment in how communities project value and order onto the intangible. Its significance is not just in the transactions it orchestrates, but in the possibilities, it exposes—for new forms of collective governance, for alternative architectures of accountability.[129]

 

Tech enhanced and automated systems, grounded in ledgered sequencing that follows its own programmed logic, enriched within the languages of coding and their human machine interpenetrations, are here to stay…absent catastrophe. One ought to take advantage of the value of block chain to the human. At the same time, human regulatory intervention ought to be sensitive both to the semiotically complete systems and logic of machine virtual spaces. The risk then may not be with the tool but with those who use them: “a bad worker blames their tools.”[130] That risk, and its regulatory and structural component may well be a function of the semiotics of internalization and externalization of agency.[131] One speaks here, and with respect to blockchain technologies and operations especially, “not only about the nature of symbols and symbolic representations, but the issue is primarily about how these symbols and symbolic representations serve a central role in the mythmaking process.”[132]

 

Here one finally encounters the core of the follies of human creations which is meant both to be made in the image of humanity, but in a form that represents an idealized version of itself that is hard to recognize on the history of humanity’s efforts to overcome themselves. Whatever they think they are encoding in the creation of virtual intelligence made in their own image, it will embed, one way or another, the markers of human failures to attain their ideal. Humans are capable, barely, only of regulating themselves—whether they do this directly through rule of law structures or virtually through encoded automated systems that take both discretion and regulatory phenomenology as a matter of indifference, at least to the extent that humans, in the end, retain means of controlling themselves.

 

Machines provide a poor excuse for those who would blame them for humanity’s long-running failures of communal self-control. Indeed, that impulse toward both the creation of instruments and then the deflection of human failure by externalizing human failure onto their instruments is both the fundamental danger  considered in the article and an ancient human (psychological) trope.[133] It is sometimes called the self-serving bias;[134]  though there is a point in blaming the instrument in the face of the presumption that is its easier (cheaper, less costly) to suppress or manage the instrument that its user,[135] even when the human appears within the system.[136] That, however does not explain blockchain precisely. What may better apply revolves around the premise and practice of trust and trust relationships.[137] The danger of regulating blockchain or more specifically of the type of regulation favored, is that is does not go to the problem of blockchain as much as it serves to deflect the failures of the human by regulating blame (and agency) on human instruments, even eventually self -aware (and currently potentially self-referencing) instrument. Blockchain, in this sense, is less the end of an era than the opening of another chapter in the long narrative of humanity’s search to govern, rationalize, and give meaning to its own collective life.

 

 



[1] W. Richard and Mary Eshelman Faculty Scholar; Professor of Law and International Affairs, Pennsylvania State University | 239 Lewis Katz Building, University Park, PA 16802. My thanks to Primavera De Filippi and the other participants and organizers of the International Symposium: Blockchain Gov: Present and Future of Block Chain Governance, held 25 September 2025, Panthéon Assas, Université Paris II at which an earlier version of this article was presented, and for the challenging comments and perspectives of Arianna Backer (Symetra).

[2] Pennsylvania State University (BS in Computer Engineering, BS in German, MIA expected 2027 (School of International Affairs)).

[3] Primavera De Filippi and Aaron Wright, Blockchain and the Law: The Rule of Code (Harvard University Press, 2018). One must go back a quarter century for the genesis of the term in the context of systems theory and governance. “E very age has its potential regulator, its threat to liberty. . . Ours is the age of cyberspace. It, too, has a regulator. This regulator, too, threatens liberty. . . This regulator is code--the software and hardware that make cyberspace as it is. This code, or architecture, sets the terms on which life in cyberspace is experienced.”  Lawrence Lessig on the increasing regulation of cyberspace, Harvard Magazine (January 2000); available [https://www.harvardmagazine.com/2000/01/code-is-law-html] discussing Lawrence Lessing, Code, and Other Laws of Cyberspace (Basic Books, 1999)  Any yet what one speaks to here is not code as some sort of equivalent of law, but of systems grounded in the language of code and coded architectures  the way that traditional systems were grounded in the language and sensibilities of law and legal architectures.

[4] Cf., Jeremy Waldron, The Rule of Law and Procedural Fairness, in Stanford Encyclopedia of Philosophy (22 June 2016); available [https://plato.stanford.edu/entries/rule-of-law/].

[5] See Satoshi Nakamoto, Bitcoin: A Peer-to-Peer Electronic Cash System (Aug. 21, 2008), https://papers.ssrn.com/abstract=3440802 (defining “blockchain”).

[6] Oxford English Dictionary, absurd, etymology, available [https://www.oed.com/dictionary/absurd_adj?tl=true&tab=etymology]. There is a semiotics to absurdity that will play a role in this article as well. See, e.g., George V. Zito, Toward a Sociology of Heresy, 44 Sociology of Religion 123-130 (1983); Paolo Heritier, Understanding Legal Semiotics, in Research Handbook on Legal Semiotics (Anne Wagner and Sarah Marusek eds, E Elgar, 2023).

[7] See, e.g., Raymond Furness, Nietzsche’s Views of the English and his Concept of a European Community, 17(4) German Life and Letters 319-325 (1964); Jonny Anomaly, Nietzsche’s Critique of Utilitarianism, 29 J. Nietzsche Studies 1-15 (2005).

[8] Cf., Moez Krichen, Meryem Ammi, Alaeddine Mihoub, and Mutiq Almutiq, Blockchain for Modern Applications: A Survey, 22(14) SENSORS 5274 (2022); available [https://doi.org/10.3390/s22145274].

[9] Timothy C. May, The Crypto-Anarchist Manifesto (1988); available [https://groups.csail.mit.edu/mac/classes/6.805/articles/crypto/cypherpunks/may-crypto-manifesto.html]. See, generally, the Cyphernomicon (ver. 0.666, 1994); available [https://cdn.nakamotoinstitute.org/docs/cyphernomicon.txt].

[10] Cf., Peter Wagner, Modernity: Understanding the Present (Polity Press, 2012) (origins and foundation of modernity as the expression of the Enlightenment project made manifest through the combination of structures of human autonomy and technological progress grounded in production as a function of welfare, ibid., chp. 1).

[11] Generally, Pierangelo Blandino, Semiotokens, Algorithms, and Blockchain Networks: New Possible Patterns in Legal Thought, 38 International Journal for the Semiotics of Law 327-362 (2025); essays in Martin Shapiro (ed.); Crypto Crowds (Berghahn Books, 2024).

[12] Jean Baudrillard, Modernity, 11(3) Canadian Journal of Political & Social theory/ Revue canadienne de théorie politique et sociale 63- 72, 72 (1987) (“The prodigious expansion . . . of science and technique, the rational and systematic development of the means of production, their management and organization, marks modernity as the era of productivity” Ibid., p. 66).

[13] Here the term is used in its semiotic sense of privileging a specific understanding, value, character, etc.  that is inserted into the observed or constituted object, in this case specific bits of data designated to represent something that as value, the value of which will be measured in its (also constructed) use.

[14] Antero Karvonen et al., Fundamental Concepts of Cognitive Mimetics, 82 Cogn. Syst. Res. 101166 (2023); See generally Jan M. Broekman, Signs In Law - A Source Book: The Semiotics of Law in Legal Education III (Larry Catá Backer ed., 2015).

[15] G. C. M. Teubner, Autopoiesis and Steering: How Politics Profit from the Normative Surplus of Capital, in Autopoiesis and Configuration Theory: New Approaches to Societal Steering 127 (Roeland J. In ’T Veld et al. eds., 1991), http://link.springer.com/10.1007/978-94-011-3522-1_11; Niklas Luhmann, Essays on Self-Reference (1990); Larry Catá Backer, Private Actors and Public Governance Beyond the State: The Multinational Corporation, the Financial Stability Board, and the Global Governance Order, 18 Indiana J. Glob. Leg. Stud. 751 (2011).

[16] Cf., Aleida Assmann, Memory, Individual and Collective, in  The Oxford Handbook of Contextual Political Analysis 210-224 (Robert E. Goodlin and Charles Tilly  (ed), OUP, 2006); Moritz J. Kleinaltenkamp, The Future Is Now: Non-Linear Temporality in Blockchain Organizing (Spring 2022) (unpublished PhD dissertation, Hertie School) available [https://opus4.kobv.de/opus4-hsog/frontdoor/deliver/index/docId/4498/file/Dissertation_Kleinaltenkamp.pdf].

[17] See Jordan Zlatev, Meaning Making from Life to Language: The Semiotic Hierarchy and Phenomenology, 11 Cogn. Semiot. 20180001 (2018); Cf. Rodrigo Antunes Morais & Carlos Miguel Lopes Rosa, Design and Collective Cognition: A Semiotic-Theoretical Framework for Understanding Shared Meanings, 14 Int. J. Des. Creat. Innov. 26 (2026).

[18] See, e.g., Jürgen Straub, Personal and Collective Identity: A Conceptual Analysis, in  Identities: Time, Difference, and Boundaries 54-76 (Heidrun Friese (ed), Berghahn Books, 2002) (identity as constructs  designating commonality, the specification of which  is realized in their “practical relationship to itself and to the world, as well as in the individual members’ relationship to themselves and the world” ibid., 71).

[19] For foundational approaches, see, e.g., Peter J. Dennning, Virtual Memory, 2(3) ACM Computing Surveys (CSUR), 153 – 189 (1970) ; available https://doi.org/10.1145/356571.356573; for contemporary issues see, e.g., Ciprian Pungilă, Otilia Muntean, Andreea-Rebeca Tonu, BRIDGE: A memory-efficient blockchain-agnostic layer for chain topology representation in heterogeneous architectures Author links open overlay panel, 733 Information Sciences 122911

(25 April 2026);  available https://doi.org/10.1016/j.ins.2025.122911.

[20] See, e.g., Kamran Ahmad Awan, Ikram Ud Din, Ahmad Almogren , And Byung Seo-Kim, Blockchain-Based Trust Management for Virtual Entities in the Metaverse: A Model for Avatar and Virtual Organization Interactions, IEEE Access (30 November 2023); available 0.1109/ACCESS.2023.3337806.

[21] Direct overwriting in blockchain does not happen. Once a block is added to the chain and validated—it is nearly impossible to simply “overwrite” or change it, since doing so would ‘break’ the cryptographic link and be rejected by the other nodes. HOWEVER, there are “51% attacks” where if enough computing power/stakeholders collude, they can attempt to rewrite recent blocks by creating an alternate chain (costs incredible amounts of $$ so usually only makes sense for smaller chains). One might instead choose the word “appended”-- errors or changes can’t overwrite past data, but new blocks can be added to record the corrective action/transactions (original transaction remains visible, along with corrective transaction). The ledger is append-only, bottom-line.

[22] Larry Catá Backer, Trust Platforms: The Digitalization of Corporate Governance and the Transformation of Trust in Polycentric Space, 19 Regul. Gov. 806 (2025).

[23] Consider Chinese social credit systems in that respect. See, e.g. Chuncheng Liu, Multiple Social Credit Systems in China, 21(1) Economic Sociology 22-32 (2019.,

[24] See Larry Catá Backer, The Soulful Machine, the Virtual Person, and the “Human” Condition: An Encounter with Jan M. Broekman, Knowledge in Change: The Semiotics of Cognition and Conversion (Cham, Switzerland: Springer Nature, 2023), 37 Int. J. Semiot. Law - Rev. Int. Sémiot. Jurid. 969 (2024); 8 Jan M. Broekman, Knowledge in Change: The Semiotics of Cognition and Conversion (2023), https://link.springer.com/10.1007/978-3-031-23001-1; Niklas Luhmann, Sign as Form, in Problems of Form 46 (Dirk Baecker ed., 1999), https://www.degruyter.com/document/doi/10.1515/9781503617698-005/html; Vladislav Valentinov, Wiener and Luhmann on Feedback: From Complexity to Sustainability, 46 Kybernetes 386 (2017).

[25] Not every node serves this purpose, that is of hosting copies of the ledger. There are 3 types of nodes now in use. Full nodes: store the entire blockchain history and validate all transactions; light nodes: store only partial data and rely on full nodes for verification; Mining nodes: propose & add new blocks (proof of work/stake comes into play here).

[26] Built around hash coding—digital fingerprint of input data sets.,

[27] J. Scott Brennen & Daniel Kreiss, Digitalization, in The International Encyclopedia of Communication Theory and Philosophy 1 (2016), https://onlinelibrary.wiley.com/doi/abs/10.1002/9781118766804.wbiect111.

[28] A caveat here: most blockchain software is human written; the protocols (Bitcoin Core/Ethereum, Solana) and languages (Solidity, Rust) were all designed/implemented by humans. As such one can indeed assume the very human foundation of blockchain. However, there are already parts of the ecosystem that are AI-assisted – smart contract templates, formal verification & compilers -- machine-checked code to prove security properties etc.)

[29] What can Machines read?: (1) Source Code* - Python, Solidity, Java; (2) Assembly Code - MOV, AX, BX (which humans can read to some extent); (3) Machine Code - Binary instructions; (4) Byte Code - JVM, EVM bytecode; (5) Microcode - Intel/AMD micro-instructions; and (6) HDL Compiled Logic - Verilog, VHDL.

[30] Georg Trogemann, Code und Maschine, in Code: Zwischen Operation und Narration 41 (Andrea Gleiniger & Georg Vrachliotis eds., 2012), https://www.degruyterbrill.com/document/doi/10.1515/9783034609333.41/html; Karen Yeung, Algorithmic Regulation: A Critical Interrogation, 12 Regul. Gov. 505 (2018).

[31] Jan M. Broekman & Larry Catá Backer, Lawyers Making Meaning: The Semiotics of Law in Legal Education II 93 (2013).

[32] See, e.g., Silvia Semenzin, ‘Blockchain for good’: Exploring the notion of social good inside the blockchain scene, 10(2) Big Data & Society (2023); available [https://journals.sagepub.com/doi/epub/10.1177/20539517231205479]; Melinda Dooley and Anna Comas-Quinn, Access to Technology and Social Justice, in  Technology-Mediated Language Teaching: From Social Justice to Artificial Intelligence (Javier Muñoz -Basols, Maria Fuertes Gutiérrez, and Luis Cerezo, Luis eds., Multilingual Matters, 2025) 21-42

[33] Karl Kössler, Federalism, in Constitutional Interpretation 201 (Sujit Choudhry, Catherine O’Regan, & Carlos Bernal-Pulido eds., 2025), https://www.elgaronline.com/view/book/9781800371743/chapter10.xml; See also Eugénie Brouillet & Tom Mullen, Constitutional Jurisprudence on Federalism and Devolution in UK and Canada, in Constitutional Politics and the Territorial Question in Canada and the United Kingdom 47 (Michael Keating & Guy Laforest eds., 2018), http://link.springer.com/10.1007/978-3-319-58074-6_3.

[34] Carlo Panara, Subsidiarity v. Autonomy in the EU, 28 Eur. Public Law (2022), https://kluwerlawonline.com/api/Product/CitationPDFURL?file=Journals\EURO\EURO2022014.pdf.

[35] Franklin Allen et al., Centralization or Decentralization? The Evolution of State-Ownership in China (Oct. 20, 2024), https://papers.ssrn.com/abstract=4283197.

[36] Michel Foucault, Governmentality in The Foucault Effect: Studies in Governmentality 87-104 (Graham Burchell, Colin Gordon and Peter Miller (eds),  (University of Chicago Press, 1991); generally Michel Foucault, The Birth of Biopolitics: Lectures at the Collège de France 1978-1979  (Picador , 2010); Cf., Lauren B. Edelman, Overlapping Fields and Constructed Legalities: The Endogeneity of Law, in  Private Equity, Corporate Governance and the Dynamics of Capital Market Regulation 55-90 (Justin O’Brien ed, Imperial College Press, 2007).

[37] Bin Cao et al., Blockchain Systems, Technologies, and Applications: A Methodology Perspective, 25 IEEE Commun. Surv. Tutor. 353 (2023).

[38] Michael Jünemann, Can Code Be Law?, (2021), https://www.twobirds.com/en/insights/2021/germany/can-code-be-law.

[39] Nick Szabo, Formalizing and Securing Relationships on Public Networks, 2 First Monday (1997), http://journals.uic.edu/ojs/index.php/fm/article/view/548.

[40] Hamed Taherdoost, Non-Fungible Tokens (NFT): A Systematic Review, 14 Information 26 (2022).

[41] Margot E. Kaminski, Binary Governance: Lessons from the GDPR’s Approach to Algorithmic Accountability, SSRN Electron. J. (2019), https://www.ssrn.com/abstract=3351404.

[42] Constantine Sedikides, Lowell Gaertner & Erin M. O’Mara, Individual Self, Relational Self, Collective Self: Hierarchical Ordering of the Tripartite Self, 56 Psychol. Stud. 98 (2011).

[43] Peter T.F. Raggatt, The Dialogical Self and Thirdness: A Semiotic Approach to Positioning Using Dialogical Triads, 20)3) Theory & Psychology (2010); available [https://doi.org/10.1177/0959354310364878]; John F. Sowa, 2000. “Ontology, Metadata, and Semiotics,” presented at ICCS 2000 in Darmstadt, Germany, on

August 14, 2000; published in B. Ganter & G. W. Mineau, eds., Conceptual Structures: Logical, Linguistic, and Computational Issues, Lecture Notes in AI #1867, Springer-Verlag, Berlin, 2000, pp. 55-81. Generally, Jan M. Broekman, Meaning, Narrativity, and the Real: The Semiotics of Law in Legal Education IV (Springer, 2016).

[44] On its semiotics see Göran Sonesson,  The Natural History of Branching: Approaches to the Phenomenology of Firstness, Secondness, and Thirdness 1(2) Signs and Society 297-325 (2025);  doi:10.1086/673251.  

[45] Primavera De Filippi and Aaron Wright, Blockchain and the Law: The Rule of Code (Harvard University Press, 2018) (“Blockchain based application do not depend on [the rules of bureaucratic systems and institutional regulatory apparatus] to structure their functions; instead they depend on lex cryptographica to organize economic and social activity”).

[46] Aaron Wright and Primavera De Filippi, Decentralized Blockchain Technology and the Rise of Lex Cryptographia, (2015, last rev 25 July 2017); available [https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2580664] (“For now, humans are running these organizations. However, that may soon change, as human-run functionalities are replaced by software operating over a blockchain.2)

[47] See Nicolae Tapus and Manuel Adelin Manolache, Integrated Decision Making Using Blockchain, 162 Procedia Computer Science 587-595 (2019). See, generally Anna Huggins, Addressing disconnection: Automated decision-making, administrative law and regulatory reform, 44(3) The University of New South Wales Law Journal 1048-1077 (2021); Reuben Binns, Human Judgment in algorithmic loops: Individual justice and automated decision-making, 16(1) Regulation & Governance 197-211 (2022); David S. Filippi, Bill Tomlinson & Andrew W. Torrance, The Law and AI as an “Apex Collaborator”: Legal Frameworks for Optimized Cooperation, 20 FIU L. Rev. 887 (2026), https://doi.org/10.25148/lawrev.20.3.7.

[48] Wessel Reijers, Iris Wuisman, Morshed Mannan, Primavera De Filippi, Christopher Wray, Vienna Rae-Looi, Angela Cubillos Vélez & Liav Orgad, Now the Code Runs Itself: On-Chain and Off-Chain Governance of Blockchain Technologies, 40 Topoi 821-831 (2021).

[49] The concept is by now ancient in the literature. See, e.g., Peter Naur, Programming as Theory Building, 15(5) Microprocessing and Microprogramming 253-261 (1985) (the object of coding is not programing but the production of executable theories of systems designed to produce iteratively consistent result).

[50] Primavera De Filippi & Aaron Wright, Blockchain and the Law: The Rule of Code (2018).

[51] See generally essays in David Nunan and Julie Choi, eds., Language and Culture: Reflective Narratives and the Emergence of Identity (Routledge, 2010); essays in Klarissa Lueg and Marianne Wolff Lundholt (eds), Routledge Handbook of Counter-Narratives (Routledge, 2021).  

[52] See, James Elkins, Master Narratives and their Discontents (Routledge, 2005); Timothy Kuhm, Communicatively Constituting Organizational Unfolding through Counter-Narrative, in   Counter Narratives and Organization 17-42 (Suanne Frandsen, Timothy Kuhn, and Marianne Wolff Lundholt, Routledge, 2017).

[53] See, Claus Beisbart, In Which Ways Is Machine Learning Opaque?, in Philosophy of Science for Machine Learning  3-24 (Juan M. Durán and Giorgia Pozzi (eds), Springer Nature, 2026).

[54] Linus Nyman & Juho Lindman, Code Forking, Governance, and Sustainability in Open Source Software (2013).

[55] Besides resistance and forking in practice (users who disagree with a master coder/code could fork the chain anyway and one couldn’t enforce a master code) one might also encounter a single point of failure, so the entire chain would be corrupted.

[56] Maxime Doyon, Normativity, as a Concept in Phenomenology, in Encyclopedia of Phenomenology 1 (Nicolas De Warren & Ted Toadvine eds., 2025), https://link.springer.com/10.1007/978-3-030-47253-5_186-1.

[57] Eunsol Choi et al., Decontextualization: Making Sentences Stand-Alone, 9 Trans. Assoc. Comput. Linguist. 447 (2021); Bert van Oers, The Fallacy of Decontextualization, 5 Mind Cult. Act. 135 (1998).

[58] If one wants to speak to the bias to avoid and celebrate, one might consider this: individuals who write the blockchain protocols make the decisions about which transactions are prioritized, how fees are set, what is considered valid—so people with smaller vs larger block sizes might be prioritized. (bias gets baked into code). It might apply as well to consensus mechanisms: (1) Proof of work – might steer towards those with cheap electricity/mining farms; and (2) Proof of stake - prioritize those who already have a bunch of tokens (wealthy get wealthier) etc.

[59] Lawrence Lessing, Code and Other Laws of Cyberspace, (Basic Books, 1999).

[60] Primavera De Filippi, Morshed Mannan and Wessel Reijers, Blockchain Technology and the Rule of Code: Regulation via Governance, 92 The Geo. Wash. L. Rev. 1229 (2024) (“rule by code is a system of online governance in which there exists a sovereign (the online operator, as well as the regulators to which the operator must respond) that stands above the code and therefore uses the code to impose restrictions and constraints over internet users who are subject to such code” ibid., 1244)

[61] Angelica Lindqvist, Rules as Code—An Open Approach, European Commission, EU GovTech; available [https://interoperable-europe.ec.europa.eu/collection/eugovtech/document/rules-code-open-approach]. See generally Rónán Kennedy, Rules as code and the rule of law: ensuring effective judicial review of administration by software, 16 Law, Innovation & Technology 170-193 (2024).

[62] For a political variation of the fundamental premise, and with it the underscoring of the political fundamentalism of rule of law in and for regulatory systems, see Gerald J. Postema, An “Almost Sacred Responsibility”: The Rule of Law in Times of Peril, 107(3) Judicature 17-23 (2024).

[63] For example, it may be surmised that few users can read or understand the complex ‘smart’ contracts involved, however transparent. Most users rely on auditors or developers which creates that accountability gap.

[64] E. D. van Asselt et al., Overview of Available Methods for Risk Based Control within the European Union, 23 Trends Food Sci. Technol. 51 (2012); Maria Eduarda Gonçalves, The Risk-Based Approach under the New EU Data Protection Regulation: A Critical Perspective, 23 J. Risk Res. 139 (2020).

[65] See generally Human Rights Based Programming: What is it? (U.N. Population Fund, 2006) available [https://www.unfpa.org/sites/default/files/resource-pdf/human_rights.pdf]; Jamie Frederic Metzl, Information Technology and Human Rights, 18(4) Human Rights Quarterly 705-746 (1996).

[66] Ontario Human Rights Commission, Human Rights Based Approach to Policy and Program Development, available [https://www3.ohrc.on.ca/en/human-rights-based-approach-policy-and-program-development-0]

[67] Cf., Joe Hoover, Rereading the Universal Declaration of Human Rights: Plurality and Contestation, Not Consensus, 12 J. Hum. Rts. 217-241 (2013).

[68] See Norbert Wiener, God & Golem, Inc.: A Comment on Certain Points Where Cybernetics Impinges on Religion (MIT Press, 1964), pp. 82-85.

[69] Cf., Peter R. Lewis, and Ştefan Sarkadi, Reflective Artificial Intelligence, 34 Minds and Machines 14; available [https://doi.org/10.1007/s11023-024-09664-2].

[70] Michel Foucault, The History of Sexuality, Vol. 1: An Introduction (Reprint ed. 1990).

[71] Nicely described in  Jan Groos,  Crypto Politics: Notes on Sociotechnical Imaginaries of Governance in Blockchain Based Technologies, in  Data Loam: Sometimes Hard, Usually Soft: The Future of Knowledge Systems 148-170 (Johnny Golding Martin Reinhart Mattia Paganelli (eds.), De Gruyter, 2021) (“The striving for an alleged ‘end of politics’ in favor of decentralised, algorithmic self-organisation that served as one of the foundational myths surrounding blockchain based technologies, had led to a situation where the necessity of ordinary politics came to light with immense intensity.” Ibid., 156).

[72] De Filippi and Wright, supra note 28.

[73] Nicholas Godfrey & Mark Burdon, Fidelity in Legal Coding: Applying Legal Translation Frameworks to Address Interpretive Challenges, 33 Inf. Commun. Technol. Law 153 (2024).

[74] Myra Cheng et al., Sycophantic AI Decreases Prosocial Intentions and Promotes Dependence, 391 Science eaec8352 (2026); AI Overly Affirms Users Asking for Personal Advice, https://news.stanford.edu/stories/2026/03/ai-advice-sycophantic-models-research (last visited Apr. 9, 2026).

[75] Niklas Luhmann, Law As A Social System (2004).

[76] Backer, supra note 11.

[77] Jean Baudrillard, Simulacra and Simulation (1994).

[78] Lawrence Lessig, Code: Version 2.0 (2nd ed. ed. 2006).

[79] Mireille Hildebrandt, Code-Driven Law: Freezing the Future and Scaling the Past (2020), http://www.bloomsburycollections.com/book/is-law-computable-critical-perspectives-on-law-and-artificial-intelligence.

[80] Danielle Keats Citron, Technological Due Process, 85 Wash. Univ. Law Rev. 1249 (2008).

[81] But consider Zachery C. Lipton, The mythos of model interpretability: In machine learning, the concept of

interpretability is both important and slippery, 16(3) Queue, 31–57 (2018); available https://doi.org/10.1145/

3236386.3241340.

[82] Vitalik Buterin, Ethereum: A Next-Generation Smart Contract and Decentralized Application Platform (2019); Gavin Wood, Ethereum: A Secure Decentralised Generalised Transaction Ledger (2025), https://www.example.com/ethereum-a-secure-decentralized-generalised-transaction-ledger.

[83] “At least in the moment opacity is perceived as a practical problem (Lipton, 2018; Watson, 2022) and sought to be reduced. It is unclear if the currently fashionable methods from XAI can reduce opacity below the required threshold for habituation to kick in.” Nico Formánek, How I Stopped Worrying and Learned to Love Opacity, in Philosophy of Science for Machine Learning: Core Issues and New Perspectives 25-36, 33 (Juan M. Durán and Girogia Pozzi (eds), Springer Nature, 2026).

[84] Google LLC v. Oracle America, Inc. (Supreme Court of the United States 2021).

[85] See, e.g., Anurang Shrivastava, Rvs Praveen, Read H. C. Alfilh, Navdeep Singh, Kanchan Yadav and B. Rajalakshmi, AI-Driven Fault Resilience: Integrating Deep Graph Neural Networks in Spatio-Temporal Smart Grid Monitoring , 2025 International Conference on Computing and Communications (COMPUTINGCON), Talegaon, India, 2025, pp. 1-7, doi: 10.1109/COMPUTINGCON64838.2025.11377902.

[86] See Agustin V Startari, Regulatory Legitimacy Without Referents: On the Syntax of AI-Generated Legal Drafts, AI Power Discourse (2025), https://www.aacademica.org/agustin.v.startari/188 (discussion on machine generated law losing meaning).

[87] See, Annie Gentès The Game Mechanics of Pervasive Applications: Visiting the Uncanny, 18(1-2) New Rev. Hypermedia & Multimedia 91-108 (2012).

[88] Kevin Werbach, A Layered Model For Internet Policy, 1 Telecommun. High Technol. Law (2002).

[89] It ought to be emphasized that readability here is relative in the sense that with enough effort and tools machine language can be “read” though whether it can be understood by humans in the way a machine understands that language remains an elusive question. Cf., James L. McClelland, Felix Hill, Maja Rudolph, Jason Baldridge, Hinrich Schütze, Extending Machine Language Models toward Human-Level Language Understanding, arXiv:1912.05877v2 [cs.CL]            

https://doi.org/10.48550/arXiv.1912.05877 (v2 4 July 2020).

[90] S.G. Shiva, Computer Hardware Description Languages—A Tutorial, 67 Proc. IEEE 1605 (1979); D.M. Goldschlag, A Formal Model of Several Fundamental VHDL Concepts, in Proceedings of COMPASS’94 - 1994 IEEE 9th Annual Conference on Computer Assurance 177 (1994), http://ieeexplore.ieee.org/document/318454/.

[91] Joel R Reidenberg, Lex Informatica: The Formulation of Information Policy Rules through Technology, 76 Tex. Law Rev. (1997), http://ir.lawnet.fordham.edu/faculty_scholarship/42.

[92] Lessig, supra note 43.

[93] Dennis Longley & Michael Shain, Compilers, Interpreters and Assemblers, in Understanding Microcomputers 107 (Dennis Longley & Michael Shain eds., 1985), https://doi.org/10.1007/978-1-349-07553-9_9.

[94] See Nancy F. Cott, Semiotics and Interpretation (2017), https://www.degruyter.com/document/doi/10.12987/9780300160932/html.

[95] See N. Chomsky, Three Models for the Description of Language, 2 IRE Trans. Inf. Theory 113 (1956).

[96] See Barry McMullin, Computational Autopoiesis: The Original Algorithm (1997) (examples of autopoietic software).

[97] Noam Chomsky, Syntactic Structures, in Syntactic Structures (2009), https://www.degruyterbrill.com/document/doi/10.1515/9783110218329/html.

[98] See Pierre Bourdieu, John B. Thompson & Gino Raymond, Language and Symbolic Power (Reprinted ed. 2003); see also Michel Foucault, Archaeology of Knowledge (2 ed. 2013).

[99] See Norbert Wiener, The Human Use of Human Beings: Cybernetics and Society (2025), https://mitpressbookstore.mit.edu/book/9780063423190 (arguing that systems optimizing strictly for operational control reduce human communication to mechanistic feedback loops, severing the message from its culturally embedded values).

[100] Mireille Hildebrandt, Law as Information in the Era of Data‐Driven Agency, 79 Mod. Law Rev. 1 (2016).

[101] See John Carroll & Darrell Long, Theory of Finite Automata: With an Introduction to Formal Languages (1989) (discussion on finite automata theory and the desire for determinism in computing);  Monika Zalnieriute, Lyria Bennett Moses, and George Williams, The Rule of Law and Automation of Government Decision-Making, 82(3) Modern Law Review 425-455 (2019)("impact on rule of law values of automation using: (1) pre-programmed rules (for example, expert systems); and (2) predictive inferencing whereby rules are derived from historic data ").

[102] Mireille Hildebrandt, Algorithmic Regulation and the Rule of Law, 376 (2128) Philosophical Transactions A 20170355(2018); available [https://doi.org/10.1098/rsta.2017.0355] (distinguishing between cybernetic regulation, any attempt to influence the behavior of a population, and legal regulation, the textual representation of political authority over persons, things, processes etc. by a politically competent authority); .

[103] Brian Christian, The Alignment Problem: Machine Learning and Human Values (2020).

[104] M. O. Rabin & D. Scott, Finite Automata and Their Decision Problems, 3 IBM J. Res. Dev. 114 (1959).

[105] See Mike Isaac & Erin Griffith, The Big Bang: A.I. Has Created a Code Overload, The New York Times, Apr. 6, 2026, https://www.nytimes.com/2026/04/06/technology/ai-code-overload.html.

[106] Natalia Buitron & Hans Steinmüller, Governing Opacity: Regimes of Intention Management and Tools of Legibility, 88 Ethnos 677 (2023).

[107] Consider  Caja Thimm, Gabriele Grameslsberger, Maximillian Mayer, and Frank Piller, From Automation to Autonomy: Human Machine Relations in the Age of Artificial Intelligence, 9 Human-Machine Communication 7-24 (2024) (autonomy as a gradual, relational, and attributional concept); Chinedu Pascal Ezenkwu, and Andrew Starkey, Machine Autonomy: Definition, Approaches, Challenges and Research Gaps, in: Intelligent Computing (Arai, K., Bhatia, R., Kapoor, S. (eds), CompCom, 2019. Available,  https://doi.org/10.1007/978-3-030-22871-2_24.

[108] Ronald M. Kaplan et al., Translation by Structural Correspondences, in Proceedings of the fourth conference on European chapter of the Association for Computational Linguistics  - 272 (1989), http://portal.acm.org/citation.cfm?doid=976815.976852; Louisa Sadler & Henry S. Thompson, Structural Non-Correspondence in Translation, in Proceedings of the fifth conference on European chapter of the Association for Computational Linguistics  - 293 (1991), http://portal.acm.org/citation.cfm?doid=977180.977231.

[109] See generally Benedikt Zönnchen, Mariya Dzhimova & Gudrun Socher, From Intelligence to Autopoiesis: Rethinking Artificial Intelligence through Systems Theory, 10 Front. Commun. (2025), https://www.frontiersin.org/journals/communication/articles/10.3389/fcomm.2025.1585321/full; Jesper Tække, Generative AI—the Transgression of Technology, n/a Syst. Res. Behav. Sci., https://onlinelibrary.wiley.com/doi/abs/10.1002/sres.70045 (last visited Apr. 13, 2026); Jaime F. Cárdenas-García, Info-Autopoiesis and the Limits of Artificial General Intelligence, 12 Computers 102 (2023).

[110] Julie E. Cohen, Between Truth and Power: The Legal Constructions of Informational Capitalism (2019).

[111] Broekman & Backer, Lawyers Making Meaning: supra , pp. 99-125.

[112] Niklas Luhmann, Organisation und Entscheidung, in Organisation und Entscheidung 5 (1978), http://link.springer.com/10.1007/978-3-322-91079-0_1.

[113] Niklas Luhmann, Operational Closure and Structural Coupling: The Differentiation of the Legal System Closed Systems and Open Justice: The Legal Sociology of Niklas Luhmann, 13 Cardozo Law Rev. 1419 (1991).

[114] See, e.g., Jens Rasmussen, Ecological Interface Design for Reliable Human-Machine Systems, 9(3) The Int’l J. Aviation Psych. 203-223 (1999).

[115] Joshua A Kroll et al., Accountable Algorithms, 165 Univ. Pa. Law Rev. 633.

[116] As with human languages, this is an area that is fraught with imperfection, that is then magnified as errors are augmented in translation. Consider Marie-Anne Lachaux, Baptiste Roziere, Lowik Chanussot, Guillaume Lample, Unsupervised Translation of Programming Languages (v3, 22 Sept. 2020, arXiv:2006.03511v3 [cs.CL] for this version); available [https://doi.org/10.48550/arXiv.2006.03511]

[117] Consider, in part, David Golumbia, The Cultural Logic of Computation (Harvard University Press, 2009)  (computation as metaphor, method, and organizing frame); Michael Marcinkowski, Data, ideology, and the developing critical program of social informatics, 67(5) Journal of the Association for Information Science and Technology (JASIST) 1266-1275 (2016); available https://doi.org/10.1002/asi.23483

[118] See, Robert E. Innis, Affecting Signs: On Semiotic Interruptions, in I Activate You to Affect Me: Affectivating as a Cultural Psychological Phenomenon (Emerald Publishing, 2018), chp. 4.

[119] On a basic level, see, Fabian Beck and Stephan Diehl, On the congruence of modularity and code coupling, ESEC/FSE ‘11: Proceedings of the 19th ACM SIGSOFT symposium and the 13th European conference on Foundations of software engineering, pps 354 – 364; available [https://doi.org/10.1145/2025113.202516].

[120] Larry Catá Backer, Next Generation Law: Data-Driven Governance and Accountability Based Regulatory Systems in the West and Social Credit Regimes in China, 28 S. Cal. Interdisciplinary L.J.  122- 172 (2018).

[121] See essays in Angelo Corallo, Giuseppina Passiante, and Andrea Prencipe, The Digital Business Ecosystem (E Elgar, 2007).

[122] Karina Vida, Language After the Human—A Distant Echo to Lars Gustafsson’s ‘The Machines,’ 6(3) Technology and Language 144-150 (2025).

[123]  Philip N. Johnson-Laird, Human and Machine Thinking (Psychology Press, Taylor & Francis, 1993) (“You may wonder why I am so certain about the stupidity of our machines. The answer is that they have not yet devised theories of how they think that they think, yet we understand them well.” Ibid., p. xv).

[124] We could get to a point of basic understanding, but 100% transparency is not likely.  Some researchers think we need to train ourselves to think more like machines (multi-dimensional, probabilistic, less linear). E.g. “Neural-symbolic computing” systems combine symbol-based reasoning with neural learning. Interpretability tools, training AI systems with embedded explainability constraints, and building UIs that translate machine reasoning into understandable concepts for people.

[125] Sriraam Natarajan, Saurabh Mathur, Sahil Sidheekh, Wolfgang Stammer, Kristian Kersting, Human-in-the-loop or AI-in-the-loop? Automate or Collaborate?, 39(27) AAAI-25 28594-28600. https://doi.org/10.1609/aaai.v39i27.35083 (2025).

[126] What we call human-in-the-loop (when humans directly take part in/approve a decision before it happens/ the system proceeds) can take on different forms: (1) Humans must authorize (sign); (2) Humans must vote/choose upgrades; (3) Humans must explicitly approve in permissioned systems. Beyond that human-on-the-loop (after the fact) is also being developed. Eduardo Mosqueira-Rey, Elena Hernández-Pereira, David Alonso-Ríos, José Bobes-Bascarán & Ángel Fernández-Leal, Human-in-the-loop machine learning: a state of the art, 56 Artificial Intelligence Review 3005–3054 (2023).

[127] See, Klaus Bruhn Jensen, Encoding and Decoding in the Human-Machine Discourse, Communication Theory, qtaf022, https://doi.org/10.1093/ct/qtaf022 (16 September 2025).

[128] See, e.g., Florence G’sell, Florian Martin-Bariteau, The Impact of Blockchains for Human Rights, Democracy, and the Rule of Law, Information Society Department DGI (2022)06 (Council of Europe, 2022).

[129] Primavera De Filippi, Moshed Mannan, and Wessel Reijers, Blockchain as a Confidence Machine: The Problem of Trust and Challenges of Governance, 62 Technology & Society 101284 (2020); available [https://doi.org/10.1016/j.techsoc.2020.101284]. The issue of trust, however, is a generalized challenge to regulation  only one aspect of which touches on the sort of automated data systems represented by Blockchain. See, e.g., Theo Araujo, Anna Brosius, Andreas Goldberg, Judith Möller, and Claes H. De Vresse, Humans vs. AI: The Role of Trust, Political Attitudes, and Individual Characteristics on Perceptions about Automated Decision Making Across Europe, 17 International Journal of Communication 6222-6249 (2023); Jakob Schoeffer, Yvette Machowski, Niklas Kuehl, A Study on Fairness and Trust Perceptions in Automated Decision Making, arXiv:2103.04757 [cs.AI] (8 March 2021); Stephan Grimmelikhuijsen, Explaining Why the Computer Says No: Algorithmic Transparency Affects the Perceived Trustworthiness of Automated Decision-Making, 83(2) Public Administration Review 241-262 (2023).

[130] Cambridge Dictionary, phrases; available [https://dictionary.cambridge.org/us/dictionary/english/bad-workman-blames-his-tools]

[131] Jeanette A. Lawrence and Jaan Valsiner, “Making Personal Sense: An Account of Basic Internalization and Externalization Processes, 13(6) Theory & Psychology 723-752 (2003).

[132] Gilbert McInnis, The Mythical Character of Machine Language and Code, 9(1) Humanities and Social Science Review 467-478, 471 (2019).

[133] See, e.g., Constantine Sedikides and W. Keith Campbell, The Self-Serving Bias in Relational Context, 74(2) Journal of Personality and Social Psychology 378-386.

[134] Youngme Moon, Don’t Blame the Computer: When Self-Disclosure Moderates the Self-Serving Bias, 13(1) Journal of Consumer Psychology 125-137 (2003). But see, Richard J. Holden, “People or systems? To blame is human. The fix is to engineer.” 54(12) Professional safety vol. 34-41 (2009).

[135] That, for example is the argument made in the context of gun control. See, e.g., Heath J. Hodges and Mario Scalora, “Challenging the Political Assumption That “Guns Don’t Kill People, Crazy People Kill People!”" Faculty Publications, University of Nebraska, Department of Psychology 817 (2015); available [http://digitalcommons.unl.edu/psychfacpub/817].

[136] See, e.g., Gleb Vzorin, Integrating Minds and Machines: The Role of Digital Externalization in Evolving Cognitive Architectures, in HHAI 2024: Hybrid Human AI Systems for the Social Good: Proceedings of the Third

International Conference on Hybrid Human-Artificial Intelligence 434- 440 (Fabian Lorig, Jason Tucker, Adam Dahlgren Linström, Frank Dignum, Pradeep Murukannaiah, Andreas Theodorou, and Pinar Yolum (eds), IOS Press, 2024); available d oi:10.3233/FAIA240218; Giovani Diaz Alfaro, Stephen M. Fiore, and Kevin Oden, Externalized and Extended Cognition: Cognitive Offloading for Human-Machine Teaming, 68(1) Proceedings of the Human Factors and Ergonomics Society Annual Meeting 290-293; available https://doi.org/10.1177/1071181324127556

[137] See, e.g., Donghee Shin and William T. Bianco, In Blockchain We Trust: Does Blockchain Itself Generate Trust?,  101(7) Social Science Quarterly 2522-2538 (2020); Florian Hawlitschek, Benedikt Notheisen, and Timm Teubner, The limits of trust-free systems: A literature review on blockchain technology and trust in the sharing economy, 29 Electronic Commerce Research and Applications 50-63 (2018) (“it is not probable that blockchain technology will eliminate the need for trust between transaction partners in the sharing economy. Yet, it is worthwhile to describe and estimate its potential for challenging the way how trust is built today.”); Backer, Trust Platforms, supra.


 [DJR1]Centralisation/decen in China (govt)

 [DJR2]General discussion on potential for blockchain

 [DJR3]Find something to support this

 [DJR4]How do we define dectx?

 [DJR5]European risk-based analysis approaches

 [DJR6]Bio-politics definition, look to Foucault?

 [DJR7]Looking to definitions of Rule of Code

 [DJR8]Add the word data, make it clearer that it uses its own output as input

 [DJR9]HUMAN intention, not machine (see soulful machine).

 [DJR10]Maybe quote AI trying to please you paper too

 [DJR11]Quote Jean Baudrillard

 [DJR12]Define hardware description languages/FPGA stuff

 

 

 

No comments: