Deploy wasm for logic, call off chain apis with adapters, orchestrate with pi calculus based language. All tolology execution flows and data items capture origins in signed form to allow to built security in low trust environment. Discovery and registry are built on kademalia and signed dht, and trust chains in future.