Episode 324

March 23, 2026

00:20:16

324: ZSWIM8–CUL3 clamp on AGO2–miR-7 reveals mechanism of targeted microRNA degradation

Hosted by

Gustavo B Barra
324: ZSWIM8–CUL3 clamp on AGO2–miR-7 reveals mechanism of targeted microRNA degradation
Base by Base
324: ZSWIM8–CUL3 clamp on AGO2–miR-7 reveals mechanism of targeted microRNA degradation

Mar 23 2026 | 00:20:16

/

Show Notes

Farnung J et al., Nature - Cryo-EM and biochemical reconstitution reveal how the ZSWIM8–CUL3 E3 ligase recognizes human AGO2–miRNA–trigger complexes to polyubiquitylate AGO and drive targeted microRNA degradation. Key terms: ZSWIM8, AGO2, target-directed miRNA degradation, cryo-EM structure, E3 ubiquitin ligase.

Study Highlights:
Using purified human proteins and cellular assays, the authors combined cryo-EM (3.1 Å), in vitro ubiquitylation, co-immunoprecipitation and sRNA-seq to dissect TDMD. Cryo-EM shows a dimeric ZSWIM8 that forms an asymmetric clamp around AGO2–miR-7–CYRANO, engaging the MID, N and PAZ domains and embracing trigger RNA flanks. Biochemical reconstitution demonstrates that ZSWIM8–CUL3 together with ARIH1 polyubiquitylates surface lysines of AGO only when the miRNA is paired to a trigger that vacates the PAZ pocket and imposes a specific RNA trajectory. Functionally, these multivalent RNA–RNA, RNA–protein and protein–protein interactions establish a two-RNA-factor authentication mechanism that explains TDMD selectivity and indicates ZSWIM8 can destabilize extensively trimmed miRNAs.

Conclusion:
ZSWIM8–CUL3 recognizes a trigger-induced AGO–miRNA conformation via multivalent interactions—including sensing a vacated PAZ pocket and flanking trigger RNA—to direct ARIH1-dependent polyubiquitylation of AGO and execute TDMD.

Music:
Enjoy the music based on this article at the end of the episode.

Article title:
The E3 ubiquitin ligase mechanism specifying targeted microRNA degradation

First author:
Farnung J

Journal:
Nature

DOI:
10.1038/s41586-026-10232-0

Reference:
Farnung J., Slobodyanyuk E., Wang P.Y., Blodgett L.W., Lin D.H., von Gronau S., Schulman B.A. & Bartel D.P. The E3 ubiquitin ligase mechanism specifying targeted microRNA degradation. Nature (2026). https://doi.org/10.1038/s41586-026-10232-0

License:
This episode is based on an open-access article published under the Creative Commons Attribution 4.0 International License (CC BY 4.0) - https://creativecommons.org/licenses/by/4.0/

Support:
Base by Base – Stripe donations: https://donate.stripe.com/7sY4gz71B2sN3RWac5gEg00

Official website https://basebybase.com

On PaperCast Base by Base you’ll discover the latest in genomics, functional genomics, structural genomics, and proteomics.

Episode link: https://basebybase.com/episodes/zswim8-cul3-tdmd-structure

QC:
This episode was checked against the original article PDF and publication metadata for the episode release published on 2026-03-23.

QC Scope:
- article metadata and core scientific claims from the narration
- excludes analogies, intro/outro, and music
- transcript coverage: Audited the transcript portions describing TDMD mechanism, ZSWIM8–CUL3 E3 ligase architecture, AGO2–miRNA–trigger complex recognition, CYRANO/HSUR1 triggers, RNA flanking regions and RBEs, PAZ-pocket vacancy, dimeric clamp, and broader biological implications.
- transcript topics: TDMD overview and cellular context; ZSWIM8–CUL3 E3 ligase architecture and dimer clamp; AGO2–miRNA–trigger complex recognition by ZSWIM8; Trigger RNAs (CYRANO, HSUR1) and pairing architecture; RNA flanking regions and RBEs in ZSWIM8 binding; PAZ pocket vacancy and RNA trajectory

QC Summary:
- factual score: 10/10
- metadata score: 10/10
- supported core claims: 8
- claims flagged for review: 0
- metadata checks passed: 6
- metadata issues found: 0

Metadata Audited:
- article_doi
- article_title
- article_journal
- license
- episode_title
- episode_number
- season

Factual Items Audited:
- TDMD is mediated by ZSWIM8–CUL3 E3 ligase polyubiquitylating AGO2–miRNA in the presence of a trigger RNA
- ZSWIM8 preferentially binds AGO–miRNA–trigger ternaries over AGO–miRNA–seed-only complexes
- ZSWIM8 operates as a dimer that clamps around the AGO2–miR-7–CYRANO complex
- Trigger RNA-induced conformational changes expose an unoccupied PAZ pocket that is recognized by ZSWIM8
- RNA flanking regions and RBEs contribute to ZSWIM8 recognition and binding efficiency
- Two-RNA-factor authentication model: miRNA as password, trigger RNA as phone ping

QC result: Pass.

Chapters

  • (00:00:12) - The Papercast
  • (00:00:28) - A single molecular assassin
  • (00:01:34) - The cell's ubiquitin murder
  • (00:06:47) - How the CL3 box manipulates the ZS1 protein
  • (00:11:36) - The ZSMATE hitman
View Full Transcript

Episode Transcript

[00:00:12] Speaker A: On bright screens in a sleepless laugh, A tiny strand won't let go. It finds its match. [00:00:20] Speaker B: Welcome to Base by Bass, the papercast that brings genomics to you wherever you are. Thanks for listening and don't forget to follow and rate us in your podcast. Appreciate. [00:00:28] Speaker C: Yeah, it's great to be here for another deep dive. [00:00:30] Speaker B: So I want you to imagine a microscopic hitman. Right. Operating inside the, like, incredibly crowded and chaotic environment of your cells. [00:00:41] Speaker C: Right. Which is no small feat. [00:00:42] Speaker B: Exactly. And its assignment is. Well, it's basically impossible. This hitman has to find and eliminate one specific target hidden among, like, 100,000 perfectly disguised decoys. [00:00:56] Speaker C: And the stakes there are just astronomically high. [00:00:58] Speaker B: Yeah, because if it makes a mistake, if it, you know, accidentally takes out the decoys, the whole cellular regulatory network just collapses. [00:01:05] Speaker C: Yeah, development halts and the organism dies. It's that serious. [00:01:08] Speaker B: But somehow this molecular assassin finds the exact right target every single time. [00:01:14] Speaker C: Which is wild, because for the longest time, the inner workings of this mechanism were just a complete structural mystery. I mean, we knew the assassination was [00:01:20] Speaker B: happening, but we didn't know how it was pulling it off. [00:01:23] Speaker C: Right. We had no idea what the hitman actually looked like or how it told the target, apart from 100,000 identical decoys. [00:01:31] Speaker B: And that brings us to the core of what we're talking about today. Today we celebrate the work of Farnung Slobojanyuk and their collaborative team, who have really advanced our understanding of cellular waste disposal and these complex, ubiquitous legacies. [00:01:47] Speaker C: Yeah. Their March 2026 paper in Nature is honestly a landmark moment. They essentially managed to freeze this, like, really transient molecular assassination in time, which [00:01:57] Speaker B: is so hard to do. [00:01:58] Speaker C: It is. And by doing that, they captured its structure and revealed a totally new paradigm for how cells figure out what to destroy and, you know, what to protect. [00:02:06] Speaker B: Right. It's basically a biological two factor authentication system. [00:02:09] Speaker C: Exactly. [00:02:10] Speaker B: So before we meet the hitman, we need to understand the target. Right. We're looking at tdmd, or Target Directed Microrna Degradation. [00:02:16] Speaker C: Yeah. And to get that, you have to remember what micrornas do. They act as sort of like volume dials for your genetic expression. They pair up with messenger RN to turn certain proteins down. [00:02:27] Speaker B: But they don't just float around naked in the cell. They have a bodyguard. [00:02:30] Speaker C: Right. They are encased inside this massive protein called Argonaut. Specifically ago to think of it as a. Well, as a vault. [00:02:38] Speaker B: A vault that's also A bodyguard. [00:02:40] Speaker C: Yeah, exactly. It provides the actual silencing function, but just as importantly, it physically shields that delicate Microrna from, you know, roaming nucleuses that would otherwise just shred it in seconds. [00:02:52] Speaker B: So as long as microrna is anchored inside ago 2, it's totally protected. [00:02:56] Speaker C: Right, and in a normal cell, that ago2 microrna complex might safely interact with, like, 100,000 normal target sites. Just doing its everyday regulatory work. [00:03:07] Speaker B: But this is where the math gets weird, right? Because out of those 100,000 normal targets, there might only be 100 of these special trigger RNAs, right? [00:03:15] Speaker C: The ratio is completely skewed. [00:03:17] Speaker B: And when ago two binds to one of these triggers, the whole logic reverses. The bodyguard doesn't silence the target. The target marks the bodyguard for death. [00:03:25] Speaker C: Exactly. An E3 ubiquitin ligase called ZSYM8 swoops in, tags the argonaut protein with polyubiquidin chains, and sends the whole complex to the proteasome to be destroyed. [00:03:38] Speaker B: So ZZ8 is our hitman. [00:03:40] Speaker C: Yes, but the central paradox here is that 100,100 ratio, right? [00:03:45] Speaker B: If ZSwimate is constantly patrolling around the cell, why doesn't it misfire? [00:03:49] Speaker C: Exactly. If it accidentally recognized the normal target interactions and destroyed those argonaut proteins by mistake, it would literally wipe out the cell's entire microrna regulatory network. [00:04:00] Speaker B: Which would be catastrophic. And looking at the diagrams of these trigger RNAs in the paper, specifically one called Cyrano, it doesn't even look that different from a normal target at first glance. [00:04:10] Speaker C: It really doesn't. [00:04:11] Speaker B: So what is ZSYM8 actually seeing? How does it know to attack? [00:04:14] Speaker C: Well, to isolate that exact variable, the researchers had to strip away all the messy noise of a living cell. They recreated the crime scene in vitro. [00:04:22] Speaker B: Like in a test tube. [00:04:23] Speaker C: Exactly. They isolated highly purified versions of all the parts the Argonaut 2 protein loaded with a specific microrna called MIR7, the massive ziswamate ligase complex and the Cyrano trigger RNA. Okay, and when they combined them in the lab, Z sumat executed the HIT four flawlessly. It rapidly ubiquitinated Argonaut. [00:04:44] Speaker B: But the real smoking gun was the mutant Cyrano experiment, right? [00:04:47] Speaker C: Yes, that was the critical step, because [00:04:49] Speaker B: a normal target usually only pairs with a really tiny section of the microrna, like a few nucleotides called the seed region. [00:04:56] Speaker C: Right, Just the seed. But a trigger RNA like Cyrano does something unusual. It pairs with the seed, loops around, and then pairs extensively with the tail end. The three prime region of the microorganism. [00:05:07] Speaker B: Ah, so it grabs both ends. [00:05:09] Speaker C: Exactly. So the researchers engineered a mutant version of Cyrano where they just removed that extensive three prime pairing. [00:05:15] Speaker B: They turned it back into a normal decoy target. [00:05:17] Speaker C: Exactly. And when they introduced this mutant complex to the ZeusWim8 ligase, the ubiquitination completely stopped. The hitman just ignored it. [00:05:25] Speaker B: Wow. So that implies the specificity isn't about scanning a simple sequence. Like if mutating the tail end of the RNA stops the protein degradation. Z W. Schwim must be reading the actual physical geometry of the interaction. [00:05:37] Speaker C: Right? ZS Women 8 doesn't recognize Argonaut on its own. It doesn't recognize the microrna or the trigger RNA independently. It only recognizes the fully assembled ternary complex. [00:05:48] Speaker B: All three pieces locked together. [00:05:49] Speaker C: Yeah, locked together in a very specific conformation. [00:05:52] Speaker B: Okay. Knowing that it needs the fully paired complex is one thing, but actually seeing how a protein physically senses that pairing is wild. And that's where they use cryo em, right? [00:06:02] Speaker C: Yes. And they captured this assassination complex at a resolution of 3.1 Angstroms. [00:06:07] Speaker B: Which is insane. I mean, freezing a transient degradation complex before it gets, you know, shredded is notoriously hard anyway. [00:06:13] Speaker C: Oh, absolutely. And at 3.1 angstroms, you are literally observing the individual side chains of the amino acids. [00:06:21] Speaker B: So what did that 3D snapshot show them? [00:06:23] Speaker C: It revealed that Ziaswam8 operates as a massive dimer. Basically a pair of identical proteins that form this huge structural clamp. [00:06:30] Speaker B: Okay, a clamp. [00:06:31] Speaker C: But the real revelation is what happens to Argonaut. You know how usually the cell's waste disposal systems look for a simple linear protein tag? [00:06:40] Speaker B: Right. A D Grun. Yeah, like a molecular barcode exposed on the surf. [00:06:43] Speaker C: Exactly. But ZS1A doesn't use a barcode scanner. It recognizes vast conformational shape shifting across the entire complex. [00:06:52] Speaker B: Wait, really? It feels the whole shape change? [00:06:54] Speaker C: Yes. When that Cyrano trigger extensively pairs with the three prime end of the microrna, it acts like a physical lever. The thermodynamic force of those base pairs snapping together literally contorts the massive Argonaut Pro protein. [00:07:09] Speaker B: Oh, wow. [00:07:10] Speaker C: It forces it to flex into this highly specific strained posture. [00:07:14] Speaker B: So the trigger RNA doesn't just bind, it fundamentally warps the shape of the vault. [00:07:18] Speaker C: Exactly. [00:07:19] Speaker B: It is literally a Two Factor authentication system. The microrna is the password, the trigger RNA is the phone ping. And only when both perfectly locked together does the vault contort into the shape that allows ZS1 to strike. [00:07:30] Speaker C: That's a perfect way to put it. It's verifying the structural geometry. And the clio EM structure Shows us how it performs that verification. The Hitman has these distinct RNA binding elements, or RBEs. [00:07:42] Speaker B: RBEs? Okay. [00:07:43] Speaker C: Yeah. These structural arms reach out and make direct contact with the paired trigger rna. [00:07:48] Speaker B: Wait, if it's contacting the RNA directly, is it reading the genetic code of the trigger? Because there are different types of trigger RNAs in the cell, right? Not just Ciarno. [00:07:57] Speaker C: Good question. No, the RBEs are not reading the sequence. They're actually interacting with the negatively charged phosphate backbone of the rna. [00:08:05] Speaker B: Oh, so it's just feeling the charge. [00:08:07] Speaker C: Right. The binding is driven by electrostatics and the physical width of the fully paired RNA duplex. [00:08:13] Speaker B: That is so cool. [00:08:14] Speaker C: It really is. Ziaswamade is physically feeling for the presence of that thick paired RNA helix while simultaneously clamping down on the contorted argonaute protein. [00:08:24] Speaker B: So if either one is missing, like if the RNA duplex isn't there or the argonaute protein isn't flexed. The clamp just won't engage. [00:08:31] Speaker C: Exactly. It needs both. [00:08:32] Speaker B: And that dual verification totally explains the paradox we Talked about earlier. ZS1A can float through a sea of 100,000 normal argonaut complexes and just ignore them because the normal targets don't have the thermodynamic strength to warp argonaut into the kill posture. [00:08:50] Speaker C: Right. It's a brilliant piece of engineering. But here's the crazy part. According to the established textbook rules, ZS1H shouldn't even exist. [00:08:59] Speaker B: Wait, what? Why not? [00:09:00] Speaker C: Well, it breaks the rules for how these latises are assembled. We're talking about the Cullen Ringliges family. They're usually highly modular. You know. Mix and match system. Exactly. You have a core scaffold protein, in this case UL3, and it swaps out different adapter proteins to target different things. But decades of biology have shown that CL3 only partners with adapters that have a very specific structural motif called a BTB domain. [00:09:25] Speaker B: Like an exclusive lock and key Mechanism. [00:09:28] Speaker C: Right, but zs18 does not have a BTB domain. It belongs to a completely different family called BC box proteins. [00:09:34] Speaker B: Oh, I see where this is going. [00:09:36] Speaker C: Yeah. Structurally, a BC box adapter should only interface with CLL2 or CLL5 scaffolds. The physical interfaces are fundamentally different. [00:09:46] Speaker B: It's like trying to force a USB C cable into an old auxiliary headphone jack. The shapes just don't align at all. [00:09:52] Speaker C: Exactly. It should be physically impossible. Yet Farnung and Slobodianyuk structure proves that ZLLK is firmly anchored to CLL3. [00:10:00] Speaker B: How. How is it bypassing that barrier? [00:10:03] Speaker C: Evolution hacked the system. ZLA developed a completely novel, unpredicted structural motif that they dubbed the CL3 box. [00:10:11] Speaker B: The CL3 box? [00:10:12] Speaker C: Yeah. It's this extended sequence of amino acids that folds into a unique shape, allowing it to perfectly grip the CL3 scaffold, even without the traditional BTV domain. [00:10:22] Speaker B: That is amazing. And the paper details something even more, like, aggressive about this connection. Right. It doesn't just find a back door, it actively sabotages its normal partners. [00:10:31] Speaker C: Oh, yeah, it's ruthless. The researchers found that the architecture of this novel CLL3 box creates what's called a steric clash with CLL2. [00:10:38] Speaker B: So steric clash just means two physical objects can't occupy the same space. [00:10:42] Speaker C: Right. ZS1.8's structure has evolved physical protrusions that would literally collide with the CLL2 scaffold, forcefully pushing it away. [00:10:50] Speaker B: So it engineered itself to exclusively bind to CL3 by making it physically impossible to bind to anything else. [00:10:57] Speaker C: Exactly. And the internal architecture of the Zeoswa mate dimer itself is just as wild. The paper describes this D domain that forms an intermolecular knot. [00:11:08] Speaker B: Yeah, I saw that. Why on earth does a protein complex need to tie itself into a knot? [00:11:13] Speaker C: It comes down to structural stability. Remember, ZS1.8 is a massive dimer tasked with clamping down on a contorted, shifting argonaut complex. [00:11:21] Speaker B: Right. You have to hold on tight. [00:11:23] Speaker C: Yeah. So the D domain features helices from both halves of the ZS1 8 pair that wrap around each other. Imagine taking two thick nautical ropes and twisting them together until the tension causes them to buckle and lock into a really rigid core. [00:11:35] Speaker B: Oh, wow. [00:11:36] Speaker C: That intermolecular knot provides the immense structural rigidity it needs to function as a unified clamp. [00:11:41] Speaker B: And extending from that knot is a structure they termed the swim belts. Right. [00:11:44] Speaker C: Yeah, the swim belt. It acts exactly as the name implies. It's an extended polypeptide chain that wraps around the entire assembly, sort of securing the different functional domains and strapping down the tail end of the COL3 scaffold. [00:11:58] Speaker B: It's basically wearing a seat belt. [00:12:00] Speaker C: Pretty much. It radically expands our understanding of how ubiquitin legises assemble. We are looking at a bespoke, heavily customized piece of machinery assembled from hijacked modular parts. [00:12:12] Speaker B: That's a fascinating display of molecular physics. Yeah, but let's ground this for a second. We've zoomed way into the 3.1 Angstrom level, looking at knots and steric clashes. What Are the macro level biological stakes here? Why does this hitman matter to us? [00:12:27] Speaker C: Well, the stakes are basically the survival of the organism. When developmental biologists knock out the ZSY main gene in mammalian models, or even in fruit flies, the result is embryonic lethality. [00:12:38] Speaker B: The organism just can't develop at all. [00:12:40] Speaker C: No, it fails entirely. [00:12:41] Speaker B: And that's because without the hitman clearing out these specific microrna complexes, those genetic volume dials we talked about just get stuck. [00:12:49] Speaker C: Exactly. The cell relies on ZSMATE to rapidly degrade over 50 different highly regulated micrornas. If the ligas is missing, those microrna's just accumulate. [00:13:00] Speaker B: So they keep suppressing their target zones long after they should have been turned off. [00:13:03] Speaker C: Right. The cell loses its ability to dynamically respond to developmental signals and the whole biological cascade collapses. [00:13:10] Speaker B: Man. And you know, whenever nature builds a regulatory mechanism this potent, evolutionary competitors figure out how to weaponize it. I mean, the literature shows that certain viruses have actually decoded this two factor authentication system and use it against us. [00:13:25] Speaker C: They absolutely do. Herpesviruses are the classic example here. Specifically herpesvirus cymeri. These viruses don't just evade our cellular defenses, they actively orchestrate their destruction. [00:13:36] Speaker B: How do they do that? [00:13:37] Speaker C: Well, when the virus infects a host cell, it transcribes its own highly customized artificial trigger RNAs. [00:13:42] Speaker B: Oh, wow. It floods the zone with counterfeit second factors. [00:13:45] Speaker C: That's exactly it. It produces these viral RNAs with perfect three complementarity to the host's defensive micrornas. [00:13:53] Speaker B: So the host's argonaut of proteins bind to the viral rna. [00:13:57] Speaker C: Yep. The extensive pairing forces the complex into that strained contortion we talked about. [00:14:02] Speaker B: And then the host's own Zeoswim8Ligas swoops in and destroys the host's defenses. [00:14:07] Speaker C: Exactly. The virus uses our own waste disposal hitman to clear the room for it. [00:14:12] Speaker B: That is literal molecular judo. It's using our regulatory weight against ourselves. But if viruses have learned to exploit this structural loophole, human engineers must be dealing with it too. Right? Especially in the field of RNA therapeutics. [00:14:27] Speaker C: Oh, definitely the entire field of CIRNAE, which is using synthetic short interfering RNAs as drugs to silence disease causing genes. Hinges on the stability of the drug in the human body. Right, and early generations of these RNA therapies degraded far too quickly to be effective. [00:14:43] Speaker B: Because they were accidentally triggering their own assassination. [00:14:46] Speaker C: Exactly. They were mimicking the triggers. But by understanding the precise geometry required to activate ZSMate, pharmacologists can now intentionally design synthetic therapeutic RNAs to avoid it. [00:14:57] Speaker B: Oh, that's brilliant. So they just tweak the shape. [00:14:59] Speaker C: Yeah. By engineering mismatches or modifying the structural flexibility at the three prime end, they ensure the synthetic drug cannot force argonaut into that locked two factor state. [00:15:10] Speaker B: So the hitman remains completely blind to the medicine. [00:15:13] Speaker C: Right. And that allows these critical therapies to remain active in the patient's cells for months instead of just days. [00:15:20] Speaker B: That is incredible. And it all comes back to that 3.1 Angstrom structure. Far Nung and Slobajanyuk haven't just provided a static picture. They've mapped the exact physical coordinates of how RNA to RNA base pairing can transmit mechanical force across a massive protein complex to induce targeted degradation. [00:15:38] Speaker C: Yeah, it bridges the fields of RNA regulation and protein degradation in an entirely unprecedented way. Truly, we're basically observing the translation of a transient genetic interaction into a permanent structural execution. [00:15:50] Speaker B: Which leaves us with a really fascinating thread to pull on as we wrap up this deep dive. You know, we've seen how this mechanism operates, and we've seen how viruses exploit it to destroy our cellular defenses. But the specificity of Zsmate, this massive protein complex lying in wait, sensing not just a sequence, but the physical shape of a foreign RNA interaction, it feels almost immunological. [00:16:14] Speaker C: It really does. [00:16:15] Speaker B: Right. Like if ZS1.8 acts as a shape recognizing hitman for RNA protein complexes, could this system be an evolutionary remnant of an ancient intracellular immune system? [00:16:26] Speaker C: That is a very compelling thought. [00:16:28] Speaker B: And if that's the case, what other shape sensing molecular hitmen are currently lying dormant in our cells, just waiting for a structural trigger we haven't even discovered yet? [00:16:36] Speaker C: The architecture of ZS1A definitely suggests that cellular ubiquitin legacies are capable of far more complex surveillance than we ever hypothesized. I mean, the search for other dormant sensors is going to completely redefine structural biology. [00:16:49] Speaker B: The microscopic city inside you is a lot more dangerous and a lot more sophisticated than we ever knew. [00:16:54] Speaker C: Absolutely. [00:16:54] Speaker B: This episode was based on an open Access article under the CCBY 4.0 license. You can find a direct link to the paper and the license in our episode description. If you enjoyed this, follow or subscribe in your podcast app and leave a five star rating. If you'd like to support our work, use the donation link in the description. Now stay with us for an original track created especially for this episode and inspired by the article you've just heard about. Thanks for listening and join us next time as we explore more science. Bass by bass. [00:17:35] Speaker A: On Bright screens in a sleepless laugh A tiny strand won't let go it finds its match it holds its ground like a secret code in slow motion and every silence starts to glow when the pocket's left open that's the tail a lot clicks clean you can almost hear two RNAs like a double check no false alarms, no random wreck Just the right shape drawing in Clamp the signal, cut the noise Tag it, turn it make the choice if the fairing's true if the path the lines marks go down and measure lies Plant the sign signal cut the noise Precision sings in the cell rejoices. A tree holding tight what time would fade? A trigger pulls the thread just so Bends the root where bases lay in the target can't hide away On a target can't hide away not every piece is captured in the frame Some edges drift, Some partners stay unnamed but the core is clear A guided hand a stepwise tag across the sand until the old message can't remain Clamp the signal, cut the noise tag it, turn it make the choice if the paratroy if the pocket lines marks go down and measure Bind the signal Cut the noise from match to mark the same systems poison what was bound is now revoir.

Other Episodes