What matters now.
Sovereignty is no longer just where data is stored. It is who can observe computation, govern access, alter workloads, inspect logs and compel infrastructure.
Confidential computing and attestation provide mechanisms for evaluating where and how code is running before releasing sensitive data or secrets.
The realistic posture is layered: TEEs reduce some risks, but they do not remove software vulnerabilities, side channels, governance mistakes or bad key management.