Skip to content

EU Sovereignty Charter

MoE Sovereign is built on the conviction that critical AI infrastructure in Europe must be operable without dependency on US-controlled cloud platforms or proprietary AI services. This page is the explicit positioning statement — used in operator briefings, procurement processes, and public communication.


1. The three layers of sovereignty

Sovereignty is not a single property but a layered claim. MoE Sovereign secures all three:

Layer What it means How MoE Sovereign delivers
Data sovereignty Operator data never leaves jurisdictions or systems the operator controls All inference local; SearXNG private search; no telemetry to external services; air-gap deployment supported
Model sovereignty The LLMs themselves run on operator hardware, with weights inspectable and replaceable Ollama-hosted open-weight models (Mistral, Llama, Qwen, Mathstral); 15 expert templates; no API key dependency on US LLM providers
Infrastructure sovereignty The runtime, networking, and dependencies are operator-controllable Apache-2.0 codebase; Docker / Kubernetes / LXC deployment paths; only OSI-compatible OS dependencies (see license_compliance.md)

2. Why this matters now

Three concrete drivers in 2024–2026:

  1. Hessendata-Urteil 2023 (BVerfG) — German Federal Constitutional Court ruled that the Palantir-based "Hessendata" policing platform violates fundamental rights as deployed. The judgment created an acute regulatory need for sovereign alternatives across the EU.
  2. EU AI Act (Regulation 2024/1689) — In force since 01.08.2024; high-risk system obligations apply from 02.08.2026. Operators of AI in regulated sectors must document risk class, training data provenance, and audit trails — much easier on a transparent stack.
  3. NIS2 transposition — National laws transposing NIS2 (DE: NIS2UmsuCG, draft 2024) require risk management, incident reporting, and supply-chain accountability for essential and important entities. Closed US-Cloud stacks complicate compliance; sovereign stacks simplify it.

The combined effect: between 2025 and 2027, every EU-based operator of AI infrastructure in regulated sectors needs a documented strategy for (a) data residency, (b) model transparency, (c) supply-chain auditability. MoE Sovereign provides all three by construction.


Operators deploying MoE Sovereign for EU-sovereign workloads should prefer one of the following EU-based providers. All offer bare-metal or GPU instances within EU legal jurisdiction:

Germany

  • Hetzner Online (Falkenstein, Nuremberg, Helsinki/EU) — GPU servers from GTX 1080 to RTX 4000 SFF; most cost-effective GPU bare-metal in the EU
  • IONOS (Karlsruhe, Berlin, Frankfurt) — Enterprise Cloud + Bare-Metal; BSI-C5-certified; GAIA-X initiative partner
  • STACKIT (Berlin, Frankfurt) — Schwarz Group; German federal cloud provider status; C5-certified
  • Open Telekom Cloud (OTC) — Deutsche Telekom; OpenStack-based; C5- and ISO-27001-certified
  • plusserver (Cologne, Hamburg, Berlin) — GDPR Cloud Initiative member

France

  • OVHcloud (Roubaix, Strasbourg, Gravelines) — largest EU cloud provider; SecNumCloud-certified; GPU instances available
  • Scaleway (Paris, Amsterdam, Warsaw) — GPU H100/H200 instances, ARM clusters, bare-metal

Other EU

  • Exoscale (Switzerland/EU) — Swiss Cloud; strong GDPR positioning
  • UpCloud (Helsinki) — Finnish provider; full EU legal jurisdiction
  • Hostinger Cloud (Lithuania) — EU jurisdiction; cost-effective VPS option
  • AWS, Azure, GCP — subject to US CLOUD Act; no complete data-residency guarantee even in EU regions
  • AWS Outposts and Azure Local — local compute, but control plane remains US-controlled
  • Cloudflare as reverse proxy for sensitive data — same CLOUD Act caveat

For air-gap deployments (e.g. government agencies, KritIS-classified environments) on-premises hardware is recommended in addition — MoE Sovereign is explicitly designed for this (INSTALL_*=false for external services, no outbound connections at idle).


4. The four-license layer guarantee

For every component in our stack we guarantee:

  1. Source code is publicly available (no obfuscated binaries)
  2. License is OSI-approved (no BSL, no SSPL, no CCL, no ELv2 — see license_compliance.md for the full blocklist)
  3. The runtime is operable without external network calls for the core inference path; explicit opt-in for federation and web search
  4. No telemetry beacons — neither in containers we ship nor in their default configurations

Operators can verify this with scripts/audit-licenses.sh (license hygiene) and docs/PRIVACY.md (data flow inventory).

4a. Object storage — EU-origin by default

The stack uses Garage as the S3-compatible object storage backend. Garage is developed by Deuxfleurs, a French non-profit association, under AGPL-3.0. It is:

  • EU-origin: authored and maintained entirely within the EU
  • Rust-based: memory-safe, no garbage-collector pauses
  • MinIO drop-in: identical S3 API; lakeFS, MinIO clients, and boto3 work without modification

MinIO is EOL as of 2026-04-25 (upstream archived). All deployments must migrate to Garage. See license_compliance.md § 4 for the formal blocklist entry.

Compliance upgrade path (KritIS / Government / Banking): Operators requiring S3 Object Lock (WORM), SSE-KMS, or multi-site replication should deploy Ceph RadosGW (LGPL-2.1) instead of Garage. The application layer (lakeFS, moe-codex API) switches transparently — only endpoint and credentials change. See license_compliance.md § 4a for the tier selection table.


5. Comparison to closed alternatives

Scope of this comparison: The table below addresses sovereignty and regulatory compliance properties only — data jurisdiction, auditability, and vendor dependency. It does not compare feature breadth, product maturity, or enterprise support, where Palantir Technologies — with thousands of engineers and decades of development — remains far ahead of any open-source project. See the Palantir Comparison page for an architectural assessment.

Concern MoE Sovereign Palantir Foundry/AIP US-Cloud LLM APIs
Data leaves EU jurisdiction ❌ never (operator choice) 🟡 depends on contract ✅ always
Subject to US CLOUD Act ❌ no (when on EU host) ✅ yes ✅ yes
Model weight inspection ✅ open weights, public licence ❌ proprietary ❌ proprietary
Source code auditable ✅ Apache 2.0, public ❌ no ❌ no
Air-gap deployment ✅ documented 🟡 contract option ❌ not possible
BSI-C5-certified EU host available ✅ Hetzner / IONOS / STACKIT / OVH 🟡 possible, but vendor lock-in ❌ not without dedicated hosting
Vendor lock-in risk ❌ none (Apache 2.0, fork-able) ✅ high ✅ high
Per-token operator cost €0 (own hardware) metered + licence metered

6. Repository topology — what runs where

The MoE Sovereign family follows a deliberate split that reflects how operators actually adopt sovereign AI:

Repo Role Who deploys it
moe-sovereign Core: API gateway, multi-model routing, caching, GraphRAG basis, 15 expert specialists Everyone running sovereign LLM infrastructure
moe-libris Federation hub: knowledge-bundle exchange between sovereign instances Consortia / federated research networks
moe-codex Foundry-inspired data platform: catalog, approval workflow, lineage, versioning, investigation, drift detection — architecturally related to Palantir-class platforms, not a current drop-in replacement Compliance-driven deployments (authorities, KritIS, pharma audit, banks)

The core (moe-sovereign) is the broad-market product. moe-codex is opt-in — only deployed where Foundry-/Gotham-equivalent functionality is genuinely needed. This split is intentional: 95 % of operators want a sovereign LLM gateway; only the regulated minority needs the full data-platform stack.

See docs/system/license_compliance.md for tool selection per repo and moe-codex/docs/system/palantir_comparison.md (when present) for the detailed feature-by-feature mapping.


7. Maintenance contract

This page is the canonical EU sovereignty statement.

Update triggers:

  • New EU regulation enters force that affects sovereignty positioning (e.g. NIS2 transposition in individual member states) → update section 2.
  • New EU-jurisdiction-compliant hosting provider meets our criteria → add row in section 3.
  • Component drops out of OSI-compatibility → reflect in section 4 and license_compliance.md.
  • Repo topology changes → update section 6.

The Comparison table in section 5 may not be tweaked into marketing puffery — every row must remain factually defensible under § 6 German UWG.