---
vault_clearance: EUCLID
halo:
  classification: INTERNAL
  custodian: The Architect
  created: 2026-04-26
  confidence: HIGH
  front: "Cellular Encoding Architecture"
  updated: 2026-04-26
  wing: UNASSESSED
---

# 35_Project_TheHats — what does the code actually look like

## Mission

Read the cell's source code at every layer. Operationalize the cryptographic-broadcast-architecture framing established in `20_Project_MarathonLament` (BT83-BT90, especially `HALO_ENCODING_AS_CS_PROBLEM.md`) by building a **multi-layer privacy-stack profile** for every cell type in the atlas, and quantifying how cells "wear different hats" — different codon biases, different glycan profiles, different splice forms, different RNA modifications, different IDR contents — to broadcast different identities for different observers.

The hats are the identities. **A cell isn't one thing; it's a runtime-selected projection from a high-dimensional state space onto whichever hat is appropriate for the current adversarial environment.** This project measures the hats.

## Why this exists

`20_Project_MarathonLament` established the conceptual framework via BT83-BT90:

- **BT83** — IR rate per intron (textbook range, RPL19 51% retention)
- **BT85** — cohort P-vs-S splice differential (S100A6 hit, 1.001× global)
- **BT86** — full-atlas comprehensive (15,658 ≥2× junctions; chr17:40M, chrM, chr14 hot zones)
- **BT87** — wobble as RNA-inventory privacy mechanism
- **BT88** — hidden-vs-broadcast operational map (proliferation + trafficking-rewiring hidden; SASP broadcast)
- **BT89** — protein layer is selected for surveillance because RNA fails (5 reasons); same architecture is privacy AND verification
- **BT90** — biology IS a CS problem; weird structures ARE engineering solutions

The framework is sound at the splicing layer (one of 6+ layers). **TheHats is where we measure the other layers** and assemble the per-cell privacy-stack profile that operationalizes the recycler hypothesis.

## What "the code" means

The cell's source code is distributed across multiple layers. Each layer carries information that adversaries can or cannot read:

| Layer | What's encoded | Read by | Hidden from |
|---|---|---|---|
| **DNA** | Archival genome | The cell itself | Almost everyone (intracellular) |
| **Pre-mRNA** | Full transcript with introns | Spliceosome | External observers (intracellular, transient) |
| **Mature mRNA** | Spliced isoform choice | Ribosome, miRNAs | External observers (intracellular) |
| **Codon usage** | Translation kinetics | Host tRNA pool | Pathogens (per-tissue specificity) |
| **RNA modifications** | Self-marker watermark | Modifier-aware readers | Naive RNA polymerases |
| **Protein primary sequence** | AA chain | Ribosome output | Lossy projection of mRNA |
| **IDRs in protein** | Composition without structure | Phase-separation partners | Structural inspectors |
| **Folded protein** | 3D structure | Receptors, MHC | Pathogens that lack chaperones |
| **PTMs (phospho, glyco, etc.)** | Modification pattern | Specific binders | Pathogens lacking modifiers |
| **Glycan code** | 200+ sugars / linkages | Lectins, blood-typing | Pathogens with wrong glycan kit |
| **Surface presentation** | MHC-bound peptides | T cells | (broadcast layer) |
| **Secreted factors** | Paracrine signals | Receptor-bearing cells | (broadcast layer) |
| **Exosome cargo** | Encrypted RNA packets | Receptor-matched receivers | Adversaries lacking receptor |

**TheHats reads at every layer.** Not all layers are equally measurable today; the project plans the measurements feasibly.

## The "hats" metaphor

Each layer of the encoding stack is a hat the cell can wear. Different observers see different hats. The same underlying cell shows:

- **Liver hat** to liver-tropic viruses (codon usage matches liver tRNA pool)
- **Blood-type-A hat** to a transfusion (glycan code matches A antigen)
- **HLA-A*02:01 hat** to T cells (MHC presents peptides on this allele)
- **Senescent hat** to phagocytes (PLSCR4-driven phosphatidylserine externalization)
- **Quiet differentiated cell hat** to immune surveillance (BT88: proliferation + trafficking-rewiring hidden)
- **SASP hat** to neutrophils (CXCL8 secretion)

**These are not contradictions — they are layered identities.** The cell is all of them simultaneously. Different observers, with different reading equipment, see different subsets. Adversaries see only the broadcast hats; authorized receivers see private hats; the cell itself knows the full stack.

## Project structure

Per vault standard (CLAUDE.md):

| File | Purpose |
|---|---|
| `README.md` | This file. Project mission. |
| `WORLDLINE.md` | Narrative log of breakthroughs, jobs, decisions. Picks up the BT90 thread from MarathonLament. |
| `BOUNTY_BOARD.md` | Open work, prioritized. The measurement plan for the privacy stack. |
| `FORM.md` | Operational map. The encoding architecture as a layered system, with each layer's measurement method. |

Optional / on-demand:
- `BOOK.md` — citations index (we'll cite Krause et al. for trafficking, vaccine-Ψ papers for RNA-mod-as-watermark, Crick 1966 for wobble, etc.)
- `HALO_*.md` — specific concept entries (one per major insight)

## Relationship to other projects

- **`20_Project_MarathonLament`** — conceptual framework + cohort empirics (parent project; BT83-BT90)
- **`27_Project_WingsAboveMorning`** — atlas DB and STAFF aligner pipeline (the data we read at the splicing layer)
- **`28_Project_RedFromTheGrave`** — coupling tensor + operator audit (the layer-coupling measurement framework)
- **`10_Project_DiscordIntoSymphony`** — h5ad scRNA repository (the source data)
- **`project_recycler_hypothesis.md` (memory file)** — the evolutionary motivation; cancer cells = compromised privacy stacks → legible to fungal recyclers

## What success looks like

A measurable, computable **privacy-stack depth score per cell type** that:

1. Distinguishes healthy cells (deep stacks) from cancer cells (shallow stacks) on TCGA tumor-vs-normal pairs.
2. Distinguishes proliferative-state from senescent-state cells in our cohort BAMs.
3. Predicts which cancers respond to checkpoint-inhibitor immunotherapy (cancers with shallower privacy stacks should be MORE legible to the immune system once checkpoints are released).
4. Predicts viral host-range from codon-usage matching strength.
5. Reveals whether the privacy stack has any HARD UPPER BOUND (entropy ceiling) below which cells cannot afford to operate.

Each of these is a real, testable, public-data-available claim. **TheHats is the project where the framework becomes measurable rather than philosophical.**

## Out of scope

- Wet-lab validation. We're a computational project; experimental confirmation goes to other groups.
- Drug design. We're characterizing the architecture, not engineering against it.
- The recycler hypothesis as a complete evolutionary story. We're testing one of its implications (cancer = shallow stack); we're not relitigating the whole hypothesis.
- Single-cell-resolution per-cell privacy stack. We can do per-cell-TYPE (cluster-averaged) initially. Per-cell may come later if the framework holds at the cluster level.
