Certificates, logs, and interfaces as shared artifacts.
Boundary objects compress multi-party truth into a transportable artifact: logs, deltas, proofs.
Applied: attach constraints to each boundary object; reject payloads that cannot be replayed deterministically.