NORAEarly Access

Front Matter · Chapter 7

Reading paths {.unnumbered}

Reading paths

The book is one spine; you have many entrances. Pick the path closest to the role you read in. Each path is a recommended minimum — once you finish, the rest of the book is open to you.

Sidebar legend (Overture explains each): ◆ Going Deeper · ▼ Why It Matters · ☉ In the Wild · ✻ Try This · § For the Record.

Path A — The Builder

For software engineers, students, and architects. This is the longest path. You read everything; you do every lab.

OrderReadSidebarsLab
1Overtureall
2Ch 1 Crisisall
3Ch 2 Falsifiabilityall
4Ch 3 FRE primerall
5Ch 4 Canonall
6Ch 5 HashingallLab 5
7Ch 6 SignaturesallLab 6
8Ch 7 CanonicalizationallLab 7 ★
9Ch 8 SchemasallLab 8
10Chs 9–12allLabs 9–12
11Chs 13–20allLabs as drafted
12Chs 21–26allLabs 23, 25, 26
13Chs 27–30allCapstone ★★
14Appendices A–Freference as needed

★ Lab 7 is the textbook's flagship exercise — a six-problem progressive set that walks you from naïve canonicalization to a working parser-mismatch attack against a "secure" attestation system. It exists because the field does not yet have a Cryptopals-equivalent for RFC 8785; you will help fill that gap.

★★ The capstone — Chapters 27–30 — is a 10-week project. It is the assessment everything before it has been preparing you for.

Path B — The Receiver

For lawyers, judges, regulators, auditors, opposing counsel. You will not write code. You will read attestations as exhibits and ask the right questions of the engineer who built the system you are reviewing.

OrderReadSidebarsSkip
1Overtureall
2Ch 1 Crisis▼ ☉ §
3Ch 2 Falsifiability▼ ☉ §
4Ch 3 FRE primerall
5Ch 4 Canon▼ ☉ § (skip ◆)math derivations
6Ch 5 Hashing (At a glance + body, no Lab)▼ ☉ §
7Ch 12 Adversarial validation▼ ☉ §
8Ch 16 Procedural primitivesall
9Ch 19 Five challengesall
10Ch 20 Four attestation kindsall
11Ch 25 Reference verifierall
12Ch 26 Admissibility Auditorall
13Appendix C Legal primerall
14Appendix B Worked attestationall

The Admissibility Auditor (Chapter 26) is the chapter you will refer to most often. It maps every Canon field to the admissibility question (authentication, best evidence, hearsay, reliability, disclosure) it helps the proponent address. Bring it to the bench.

Path C — The Investigator

For journalists, academic researchers, NGO monitors, oversight officers working with private archives that conventional tools cannot index reliably. You will probably build a small Meridian.

OrderReadSidebarsLab
1Overtureall
2Ch 1 Crisisall
3Ch 4 Canonall
4Ch 5 HashingallLab 5
5Ch 9 EmbeddingsallLab 9
6Ch 10 Hybrid retrievalallLab 10
7Ch 11 LLM extractionallLab 11
8Ch 12 Adversarial validationall(review)
9Ch 14 Postgres substrateallLab 14
10Ch 15 Idempotent ingestionallLab 15
11Ch 16 Procedural primitives▼ ☉ §
12Ch 20 Four attestation kindsallLab 20
13Ch 25 Reference verifierall(review)
14Ch 27 Capstoneas your projectscoped capstone

A short Investigator's capstone in Chapter 27 trims the 10-week plan to roughly four weeks — you are unlikely to need the full five-challenge harness, but the ingestion + retrieval + signed-search artifact will materially change how your investigation's records can be cited.

Path D — The Policymaker

For legislators, AI-governance staff, standards bodies, courthouse technologists. You read for the shape of the debate — what is settled, what is contested, what a near-future legal regime should require.

OrderReadSidebars
1Overtureall
2Ch 1 Crisisall
3Ch 2 Falsifiability▼ ☉ §
4Ch 3 FRE primerall
5Ch 4 Canon▼ ☉ §
6Ch 12 Adversarial validation▼ ☉ § (skim ◆)
7Ch 26 Admissibility Auditorall
8Ch 28 Customization patternsall
9Ch 30 Operationalizationall
10Appendix C Legal primerall
11Appendix E Comparative architecturesall
12Appendix F Divergences from specall

The chapters you will cite most: Ch 4 (the standard a regulation might require conformance with); Ch 26 (the deterministic check a court order might mandate); Appendix E (the existing standards you might map a new regulation onto — Sigstore, SLSA, C2PA, W3C VC, JAdES).

Path E — The Affected

For the person whose evidence the system handles. The pro-se litigant. The estate beneficiary. The subject of an investigation. You read for what your counsel should be asking, and for whether the record before you is trustworthy.

OrderReadNotes
1OvertureThe story is, in detail, fictional and composite. Yours may rhyme.
2Ch 1 CrisisThe fifteen-minutes problem named.
3Ch 2 Falsifiability (▼ ☉ § sidebars; skim body)The discipline named.
4Ch 3 FRE primer (read carefully)What admissibility doctrine asks. Not legal advice.
5Ch 4 Canon (▼ ☉ § sidebars)What an attestation is.
6Ch 26 Admissibility AuditorWhat questions to ask.
7Appendix C Legal primerWhere to look up the rules.
8Appendix B Worked attestationA real artifact, walked.

A separate guide — front/06_for_pro_se_readers.md (forthcoming) — gives you a one-page checklist of questions to ask about any machine-generated exhibit produced by an opposing party. The book is not legal advice. It is a vocabulary that may help your counsel ask better questions.

Path F — The Curious Reader

For the popular reader who picked up the book without an institutional role — perhaps after a review, perhaps after a friend's recommendation. You are owed an honest answer to "what is this book for?"

The shortest honest path:

  1. Overture.
  2. Ch 1 Crisis.
  3. Ch 4 Canon, At a glance + ▼ ☉ § sidebars only.
  4. Ch 12 Adversarial validation, At a glance + ▼ ☉ § sidebars only.
  5. Ch 27 Capstone, opening pages.

Approximately 90 minutes of reading. You will not learn the cryptography, but you will know the argument, the stakes, and the shape of the discipline. If at the end you want more, your next chapter is Ch 2.


Interpreting the sidebars

If you are not a Builder, pay particular attention to:

  • Why It Matters. The stakes box. The thing the chapter is in service of. Read these even if you skim everything else in the chapter.
  • In the Wild. A real case or news story. These are the chapter's receipts.
  • § For the Record. Primary-source quotation. RFC, statute, rule, or case excerpt. The book honors the discipline of citing primary sources rather than commentary; you can copy these directly into a brief or a memo without wondering whether they were paraphrased.

If you are a Builder, also pay attention to:

  • Going Deeper. Technical depth. Where the chapter's substance lives for you.
  • Try This. A small exercise. Anyone can do them; Builders should do them with code. The point is intuition, not proof.

Switching paths

Nothing locks you to a path. A Receiver who finds themselves curious about the math can pick up Path A's chapters in any order; a Builder who suddenly needs the legal frame can drop into Appendix C cold. The book is structured so each chapter is self-contained enough that the cost of opening it is small, even if its full appreciation depends on the rest of the book.

The point of the paths is not gatekeeping. It is reducing the cost of the first reading to the lowest possible level for the broadest possible audience.