Searching protocol for "isomorphism testing"
Encode law as executable, verifiable L4 programs.
Build efficient, provable set-theory systems
Secure code with a security checklist.