Tech
Considerations for ensuring a minimum viable digital sovereign cloud | Computer Weekly
Server manufacturers have been working in recent years to adapt their datacentre products to meet the growing demand for artificial intelligence (AI). While major public cloud providers have the resources and scale to handle AI workloads, there is renewed interest in private clouds and on-premise AI. This shift is partly due to the realisation that public large language models (LLMs) are not well-suited for specific enterprise needs. Additionally, geopolitical uncertainties have raised concerns about relying solely on hyperscale cloud providers, prompting businesses to prioritise digital sovereignty and seek greater control over their IT infrastructure.
Lenovo, for instance, positions digital sovereignty in the context of customer requirements and AI deployment strategies. During its latest quarterly earnings call, Lenovo chairman Yuanqing Yang said: “User priorities are shifting towards personalisation and the private domain. This is accompanied by growing emphasis on efficiency, response speed, security, privacy and sustainability.”
The company answers the question of digital sovereignty through its hybrid AI advantage programme, which integrates AI hardware with AI-powered services and AI infrastructure to provide digital sovereignty and address customer privacy requirements.
Meanwhile, during HPE’s fiscal 2025 fourth-quarter earnings call, CEO and president Antonio Neri said: “Sovereign and enterprise bookings now account for more than 60% of the cumulative orders since Q1 of fiscal year 2023, demonstrating our strategy to prioritise profitable AI infrastructure build-out opportunities.”
The company recently introduced its first AMD Helios AI rack-scale architecture integrated with HPE Juniper networking, which it claims is designed to accelerate AI training and inferencing for sovereign clouds.
Similarly, Dell is ramping up efforts to place sovereign cloud capabilities, as Dell vice-chairman Jeffrey Clark explained during the company’s third-quarter 2026 earnings call. “Our salesforce is winning new opportunities across the neocloud customer base, sovereign customer base and enterprise customer base,” he said in response to a question about the factors contributing to incremental AI revenue of $5bn, which was referenced during the earnings call.
Given the trend among server manufacturers to offer digital sovereign capabilities, digital sovereignty is highly likely to be an area of focus for the tech sector in 2026 when targeting customer opportunities.
No regs for digital sovereignty
When looking at what is and what is not digital sovereignty, the authors of analyst Forrester’s Demystifying full digital sovereignty report note that there is no single regulation for digital sovereignty worldwide, which means it is not a compliance issue.
Instead, Forrester analysts Dario Maisto, Pascal Matzke, Lauren Nelson, Lorenzo Annicchiarico and Rachel Birrellone describe digital sovereignty as a risk mitigation exercise, where technology firms and IT service providers subject to foreign jurisdictions may affect an organisation’s ability to keep operations running. Rather than being considered a compliance issue, the Forrester analysts regard digital sovereignty as a request for proposal (RFP) when procuring new IT products and services.
Although it involves access to the organisation’s data, in terms of data residency, Forrester does not recommend treating digital sovereignty as a privacy and data protection issue.
In the report, the Forrester analysts note that data sovereignty concerns the ownership of data. “When you put your data in the infrastructure of a third-party subject to a foreign jurisdiction, such as the US hyperscalers’ datacentres in Europe, you may end up losing access to it,” they warn.
As an example, they note that while Microsoft’s sovereign public cloud ensures that customer data remains within Europe and only European nationals will be responsible for operations, this does not protect Microsoft customers from the risk of the US government “pulling the kill switch”.
Forrester recommends that organisations correctly frame the data sovereignty issue as a first step in gaining stable, long-lasting sovereign control of their data.
A balanced approach to in-country technology capacity
Power International Holding, which has headquarters in Qatar, is using Nutanix’s sovereign cloud capabilities and has adopted a private cloud to ensure sovereignty over its own data and AI models.
The company has been using Nutanix to tackle a proliferation of shadow AI projects when application development teams use external software-as-a-service (SaaS)-based LLMs without centralised controls, as CIO Jasim Rahman explains: “We selected Nutanix to do classical HCI (hyper-converged infrastructure) file management, but it has also allowed us to deploy our own models within the Nutanix AI stack, and this now powers a lot of our use cases in healthcare, IT, HR and facilities management.”
Nutanix Enterprise AI functions as a private cloud, allowing Power International Holding to create and use its own AI models, as well as fine-tune open source ones. It ensures data stays within the country where the company operates, maintaining data residency.
He says the company has a multi-layered approach to digital sovereignty, which includes in-country control over compute infrastructure and the development of AI models and platforms tailored to local needs “Our full-stack sovereignty has multiple stacks. We’re taking a very balanced approach to this, with both western and eastern clusters,” he says.
While Power International Holding is a private company, it participates in nation-building efforts, supporting the Qatar government to develop sovereign AI capabilities. Rahman says this makes it a key partner in advancing Qatar’s digital sovereignty and innovation goals.
“Governments need compute capacity to build models that are tuned for their country, culture, and language,” he adds.
For Rahman, digital sovereignty means ensuring that the compute infrastructure, models, platforms and physical AI remain within the country.
“Governments need a lot of compute capacity to build their AI models,” he says. “The risk is not just data residency. It’s data plus the models. Nobody can see what’s inside the model. It’s like a black box. So we’ve got to be able to intervene to make sure these models are tuned for the country, the culture and the languages spoken in that country.”
Rahman notes that the underlying graphics processing unit (GPU) infrastructure needed for AI requires a balanced approach to digital sovereignty. “In Qatar and the other countries we operate in, we’re taking a very balanced approach to GPU infrastructure. Not many countries produce chips. We are dependent on the west, the Americas and the east.”
This approach means Power International Holding takes into account the specifics of the countries in which it operates. Some of them are leaning west, while some lean east. The underlying stack is the GPU infrastructure. “We’re going to be providing a platform of GPU infrastructure that will allow these countries to have their own digital embassies within this GPU infrastructure. They can operate within that infrastructure independently as sovereign clouds,” says Rahman.
He defines digital embassies as secure, sovereign cloud environments hosted within Qatar’s GPU infrastructure. They are designed to serve as disaster recovery and continuity hubs for other countries and enable countries to store critical data and systems outside their borders, ensuring resilience in case of emergencies such as wars or natural disasters.
Qatar has diplomatic relationships with other nations, such as Rwanda, which facilitates establishing digital embassies for disaster recovery and continuity planning for these countries. “Rwanda wants to have a country business continuity plan outside of Rwanda. That’s where Qatar would come in,” says Rahman.
Minimum requirements
While there have been many discussions around on-premise and private clouds being built to enable digital sovereignty, that does not necessarily mean moving workloads and data out of hyperscale IT infrastructure.
Forrester advises IT and business leaders to determine the minimum level of digital sovereignty needed to meet their business goals. This should be practical and capable of supporting the organisation’s workload requirements. A digital sovereignty plan should focus on delivering useful outcomes, rather than just meeting compliance or avoiding risk, as these alone do not benefit the business.
As Rahman highlights, such a strategy must also consider the countries where the business operates and their geopolitical context. This means IT infrastructure may need to be deployed in a different country from where the business is based. For example, as noted in Forrester’s Demystifying full digital sovereignty report, Estonia’s data embassy is located in Luxembourg to protect its critical data and information.
Tech
US Special Forces Soldier Arrested for Polymarket Bets on Maduro Raid
The Department of Justice announced Thursday that it arrested Gannon Ken Van Dyke, an enlisted member of the US Army’s special forces, for allegedly using “classified, nonpublic” information about the capture of Venezuelan president Nicolás Maduro to notch more than $400,000 in profits on Polymarket trades. A grand jury indicted him on five counts, including multiple violations of the Commodity Exchange Act.
Van Dyke is the first person to be charged with insider trading on a prediction market in the United States. Lawmakers have been voicing concerns for months about the high likelihood that politicians and public servants could use nonpublic information to profit from trades on leading industry platforms like Polymarket and Kalshi, which have exploded in popularity over the past year.
The arrest comes just weeks after Department of Justice prosecutors met with Polymarket about potential insider tradition violations. In February, Israeli authorities arrested two citizens, an army reservist and a civilian, for allegedly leaking classified information by making wagers on Polymarket related to military operations. Kalshi, Polymarket’s primary rival in the United States, recently fined three politicians for breaking its insider trading rules, but it did not flag the violations for further enforcement to the Commodity Futures Trading Commission (CFTC), the federal agency that oversees prediction markets.
After Van Dyke’s arrest was made public, Polymarket posted a statement to social media noting that it had “identified a user trading on classified government information” and “referred the matter to the DOJ & cooperated with their investigation.” The company declined to comment further.
According to court documents, Van Dyke has been an active duty US soldier since September 2008 and rose to the level of master sergeant in 2023. At the time of the alleged trading activity, he was stationed at Fort Bragg in Fayetteville, North Carolina, and assigned to the Army’s Special Operations Command Western Hemisphere Operations.
“I have been crystal clear that anyone who engages in fraud, manipulation, or insider trading in any of our markets will face the full force of the law,” CFTC chair Michael Selig said in a statement. “The defendant was entrusted with confidential information about US operations and yet took action that endangered US national security and put the lives of American service members in harm’s way.”
The complaint alleges that Van Dyke was involved in the planning and execution of Maduro’s arrest and that he was aware that he wasn’t authorized to share nonpublic information about US military operations. The complaint says that Van Dyke signed a nondisclosure agreement that forbade him from revealing sensitive or classified government information “by writing, word, conduct, or otherwise.” The complaint also alleges Van Dyke saved a screenshot to his Google account “displaying the results of an artificial intelligence query” outlining how the US Special Forces maintains many classified files including “operational details that are not available to the public.”
On December 26, Van Dyke allegedly opened an account on Polymarket and took out around $35,000 from his bank account before transferring it to a cryptocurrency exchange.
The following day, Van Dyke allegedly made his first Venezuela-related trade on Polymarket, putting a little less than $100 on a “YES” contract that US forces would be in Venezuela by January 31, 2026. Prosecutors accuse him of ultimately making 13 Venezuela-related transactions on the platform, seven of those—totaling hundreds of thousands of shares—on a “YES” contract for “Maduro out by … January 31, 2026.” In other words, Van Dyke allegedly stood to make an enormous profit if the Venezuelan leader wound up out of power by the end of the month.
Tech
Newly Deciphered Sabotage Malware May Have Targeted Iran’s Nuclear Program—and Predates Stuxnet
Instead, Kamluk saw that it was a self-spreading piece of code with very different intentions. Using what was referred to within the code as “wormlet” functionality, Fast16 is designed to copy itself to other computers on the network via Windows’ network share feature. It checks for a list of security applications, and if none are present, installs the Fast16.sys kernel driver on the target machine.
That kernel driver then reads the code of applications as they’re loaded into the computer’s memory, monitoring for a long list of specific patterns—“rules” that allow it to identify when a target application is running. When it detects the target software, it carries out its apparent goal: silently altering the calculations the software is running to imperceptibly corrupt its results.
“This actually had a very significant payload inside, and pretty much everybody who looked at it before had missed it,” says Costin Raiu, a researcher at security consultancy TLP:Black who previously led the team that included Kamluk and Guerrero-Saade at Russian security firm Kaspersky, which did early work analyzing Stuxnet and related malware. “This is designed to be a long-term, very subtle sabotage which probably would be very, very difficult to notice.”
Searching for software that met the criteria of Fast16’s “rules” for an intended sabotage target, Kamluk and Guerrero-Saade found their three candidates: the MOHID, PKPM, and LS-DYNA software. As for the “wormlet” feature, they believe that the spreading mechanism was designed so that when a victim double-checks their calculation or simulation results with a different computer in the same lab, that machine, too, will confirm the erroneous result, making the deception all the more difficult to discover or understand.
In terms of other cybersabotage operations, only Stuxnet is remotely in the same class as Fast16, Guerrero-Saade argues. The complexity and sophistication of the malware, too, place it in Stuxnet’s realm of high-priority, high-resource state-sponsored hacking. “There are few scenarios where you go through this kind of development effort for a covert operation,” Guerrero-Saade says. “Somebody bent a paradigm in order to slow down or damage or throw off a process that they considered to be of critical importance.”
The Iran Hypothesis
All of that fits the hypothesis that Fast16 might, like Stuxnet, have been aimed at disrupting Iran’s ambitions of building a nuclear weapon. TLP:Black’s Raiu argues that, beyond a mere possibility, targeting Iran represents the most likely explanation—a “medium-high confidence” theory that Fast16 was “designed as a cyber strike package” that targeted Iran’s AMAD nuclear project, a plan by the regime of Ayatollah Khameini to obtain nuclear weapons in the early 2000s.
“This is another dimension of cyberattacks, another way to to wage this cyberwar against Iran’s nuclear program,” Raiu says.
In fact, Guerrero-Saade and Kamluk point to a paper published by the Institute for Science and International Security, which collected public evidence of Iranian scientists carrying out research that could contribute to the development of a nuclear weapon. In several of those documented cases, the scientists’ research used the LS-DYNA software that Guerrero-Saade and Kamluk found to have been a potential Fast16 target.
Tech
Rednote Draws a Line Between China and the World
Some Rednote users have reported that their accounts were automatically converted from the Chinese to the international version of the website recently. One American user, who asked to remain anonymous to avoid being punished by the platform, shared a screenshot with WIRED showing that when he logged into the platform in April, a banner appeared that read “Your account is a rednote account. We have automatically redirected you to rednote.com.”
The user says he registered his account with a Chinese phone number years ago, but suspects his account was converted because of using a non-Chinese IP address. “I have never posted from China. It’s always been in the United States. Obviously, in one glance, they can see this is an American posting in English,” he says.
Looming Split
After TikTok sidestepped a US shutdown by selling a majority stake in its American business, most of the “refugees” who had fled to Rednote went back to the video app or to other platforms. Those who stayed often did so because they value reading about and talking directly with Chinese people living in China. They now worry that a corporate split could destroy what had been one of the strongest bridges between the Chinese internet and the wider world.
Jerry Liu, a Vancouver-based TikTok influencer known for sharing funny content about Rednote itself, said in a November video that he was told by staff at the company’s Shanghai office that international users should expect to see less Chinese content and more North American content in the future. “I feel frustrated. I think it’s just gonna be less fun,” he said in the video.
Rednote had tried the TikTok localization playbook before—it launched a slew of regionally focused apps roughly three years ago with names like Uniik, Spark, Catalog, Takib, habU, and S’More that each catered to specific countries outside China, but they failed to catch on. The effort could have been a lesson for the company about the value of its massive Chinese content ecosystem to people in other countries, but as is often the case, regulatory and political considerations appear to have taken priority.
“I don’t want to see Americans talking about Coachella. I did that on Instagram, I didn’t join Xiaohongshu to see Instagram,” says the American user who was recently redirected to Rednote.
Security Concerns
As Rednote goes global, the company is no doubt looking to Chinese predecessors like WeChat and TikTok for ideas about how to navigate the minefield of content moderation and data privacy. So far, its approach looks to more closely resemble that of WeChat.
For over a decade, WeChat has sorted users based largely on one criterion: whether they used a Chinese or a foreign number to sign up. That has allowed users to cross Tencent’s digital border by unlinking and relinking their WeChat accounts to different mobile numbers.
Jeffrey Knockel, an assistant professor of computer science at Bowdoin College, found that Tencent censors content on WeChat and Weixin differently, even though the two platforms are integrated with one another and users can communicate across them. He says Chinese users are subject to a real-time keyword-matching filter to censor politically sensitive speech, but “if you registered for WeChat using a Canadian or an American phone number, your messages aren’t necessarily under that kind of censorship.”
Knockel says WeChat’s blended content moderation approach may have made some people wary about using the app. “Users are generally distrustful of the platform. They don’t know if they’re being watched and censored,” he says. As Rednote moves in a similar direction, it will be worth watching whether international audiences end up having similar misgivings.
This is an edition of Zeyi Yang and Louise Matsakis’ Made in China newsletter. Read previous newsletters here.
-
Fashion1 week agoFrance’s LVMH Q1 revenue falls 6%, shows resilience amid Iran war
-
Entertainment1 week agoIs Claude down? Here’s why users are seeing errors
-
Tech1 week agoThe Deepfake Nudes Crisis in Schools Is Much Worse Than You Thought
-
Sports1 week agoPSL 11: Peshawar Zalmi win toss, opt to field first against Quetta Gladiators
-
Business1 week agoStandard Life buys rival in £2b deal to create savings giant
-
Tech1 week agoCYBERUK ’26: UK lagging on legal protections for cyber pros | Computer Weekly
-
Business1 week agoPepsiCo earnings beat estimates as North American food business improves
-
Fashion1 week agoRaymond unveils luxury Chairman’s Collection Store in Mumbai
