Panel Discussion Data Sovereignty India AI Impact Summit

20 Feb 2026 16:00h - 17:00h

Panel Discussion Data Sovereignty India AI Impact Summit

Session at a glanceSummary, keypoints, and speakers overview

Summary

The panel discussed what digital sovereignty means for AI, focusing on who sets the rules and where data and compute are located [5-7]. Sunil argued that sovereignty does not require total isolation; instead it involves deciding which parts of the technology stack must be controlled locally and which can be collaborative [21-23]. He emphasized that core compute infrastructure and model training should reside within national borders to serve language-specific needs, noting that a domestically built model can satisfy about 95 % of India’s use cases without needing frontier-scale systems [25-28][34-38][39-42].


Sunil illustrated this with the migration of India’s Pashini language platform from a hyperscale cloud to Yotta’s local data centre, and the open-sourcing of a critical NVIDIA component to keep it under Indian control [136-142][148-154]. Nasubo highlighted that many African countries lack compute capacity (≈1 % of global) but possess rich data and local use cases, so they pursue partnerships while also developing offline-capable solutions for regions with limited connectivity [57-63][166-174][176-179]. Seima stressed that sovereignty is about strategic control rather than full ownership, calling for visibility into supply-chain structures, guardrails to protect digital assets, and trust-engineered designs that are transparent and auditable [77-84][88-98][100-107][109-118].


The moderator summed up that sovereignty requires a balance between building domestic AI compute and engaging trusted global partners, noting that no nation can do everything alone [48-53][130-134]. All speakers agreed that government must provide clear policies and sovereign guardrails while fostering public-private collaboration to ensure security, continuous verification, and industry innovation [184-191][198-205]. They also concurred that the ultimate goal of sovereign AI is to address real-world problems for the most underserved citizens, such as language diversity in India or specific health data for African women [31][60][220-223].


Seima added that treating digital infrastructure as a national asset and providing long-term policy stability encourages private investment in large-scale AI factories [185-196][200-204]. Overall, the panel presented a roadmap where sovereignty is achieved by controlling critical layers, establishing trust frameworks, and aligning market, government, and society to deliver AI solutions that are both secure and locally relevant, ensuring AI benefits the “last person in the line” [215-218][221-223].


Keypoints


Major discussion points


Sovereignty is fundamentally about who sets the rules and controls the digital infrastructure, not about total isolation.


The moderator frames the core question as “who gets to make the rules?” and notes that sovereignty is usually discussed in terms of data location [5-7]. Sunil stresses that sovereignty means “we do not allow a single country or a single company to define our digital destiny” and that compute must be “within your country, … where your data is getting processed” [25-27][34-36].


Local (sovereign) compute and storage are essential, but they can incorporate foreign technologies within a ring-fenced environment to avoid lock-in.


Sunil argues that “compute infrastructure … has to be within your country” while also acknowledging the need for collaboration [25-27][34-42]. He illustrates this with the Yotta example: the AI platform was moved from a hyperscale cloud to a locally-controlled data centre, using NVIDIA, Microsoft and Amazon tech inside a “ring-fenced” wall where no third-party can log in [135-154].


Designing AI for local contexts and building trust are critical; this includes using native language data, respecting supply-chain transparency, and establishing clear governance.


Nasubo highlights that Africa’s advantage is “data and use cases” and stresses designing for lived realities such as breast-cancer diagnostics for African women [57-64]. Seema adds that sovereignty requires “visibility into ownership structures” and “policies, guardrails … to ensure … not compromised externally,” emphasizing transparency, traceability, and engineered trust [78-86][104-110].


Strategic partnerships, not dependence, are the pragmatic path forward.


Seima notes the rise of “air-gapped, ring-fence environments” and the need for “global partnerships” while keeping strategic ownership [91-98][118-120]. Sunil’s story about open-sourcing a critical NVIDIA component shows how a partnership can be reshaped into sovereign control [139-154].


For low-resource regions, offline capability and community-driven innovation are necessary to achieve sovereign AI.


Nasubo points out that only ~50 % of Africa has reliable connectivity and that “offline access” is a key design goal, with local innovators using compute provided by Kala [166-173][176-179]. The moderator links this to India’s Aadhaar offline verification as a precedent for the Global South [180-182].


Overall purpose / goal of the discussion


The panel was convened to move the concept of “data sovereignty” from a slogan to concrete practice in the AI era. Participants shared how governments, industry, and civil society can jointly define rule-making, secure local compute and data, design culturally-relevant AI, and establish trusted partnerships so that every country-especially those with limited resources-can reap AI benefits without surrendering strategic control.


Overall tone and its evolution


The conversation began with a definitional, analytical tone, focusing on what sovereignty means and why it matters. It then shifted to a pragmatic, solution-oriented tone, with detailed examples of infrastructure, open-source workarounds, and governance frameworks. By the end, the tone became optimistic and inclusive, emphasizing collaboration, trust, and the moral imperative to serve “the last person in the line.” Throughout, the speakers remained collaborative and constructive, moving from abstract framing to actionable, real-world strategies.


Speakers

Speaker 1 – Moderator/host (appears to be the event moderator) [S11]


Sunil – Panelist (no specific role or title mentioned) [S2]


Nasubo – Panelist (no specific role or title mentioned) [S1]


Seema – Chief Executive Officer, L&T Vioma [S8][S9]


Speaker 5 – Panelist (no specific role or title mentioned) [S5]


Additional speakers:


(none identified beyond the listed speakers)


Full session reportComprehensive analysis and detailed insights

1. Opening & framing (Speaker 1) – The moderator opened the session by defining digital sovereignty as “who gets to make the rules” and noting that the debate usually centres on the location of data and compute [5-12]. He then asked Sunil whether a “sovereign yet connected” model was realistic [8-12].


2. Sunil’s view – Sunil rejected the idea that sovereignty means total isolation, explaining that it is often confused with a “do-everything-ourselves” mindset but in practice requires recognising inter-dependencies across the global technology stack [13-27]. He argued that a country must retain control over the strategically essential parts of the stack-compute infrastructure where data is processed, stored and models are trained-while collaborating on the rest [25-27][34-42]. Using India’s linguistic diversity, he highlighted the need for native-language voice AI that can handle regional slang and deliver real-time responses, a capability achievable with domestically hosted models of 20-100 billion parameters rather than frontier trillion-parameter systems [28-42].


To illustrate operationalisation, Sunil described migrating the national AI language platform Pashini from a hyperscale public cloud to Yotta’s locally-controlled data centre [135-142]. After the migration the team built roughly 30-40 different technology components and deployed them on virtual machines inside the data centre[143-150]. The only remaining foreign dependency was the NVIDIA NVCF library, which was open-sourced and brought in-house, eliminating the external reliance [151-154]. He concluded that the best foreign technologies-NVIDIA, Microsoft, Amazon-can be used provided they run inside a sovereign, access-controlled (ring-fenced) compute stack [144-152][144-154].


3. Design layer (Speaker 1 → Nasubo) – The moderator asked Nasubo to discuss design for local realities. Nasubo noted that Africa possesses only about 1 % of global compute capacity [57-58] but has rich data and concrete use-cases. He cited the development of breast-cancer diagnostic models that reflect the specific tissue composition of African women [58-64]. Because roughly half of Africa’s population lacks reliable internet, he argued that offline-capable AI is essential; Kala is therefore building compute resources that can operate without constant connectivity and offering them to innovators at the AI Village [165-174][170-179]. He stressed that sovereignty must be pursued through partnerships that provide compute while allowing African stakeholders to define the rules, rather than accepting externally dictated solutions [166-176].


4. Critical systems (Speaker 1 → Seima) – The moderator shifted to critical systems and invited Seima. Seima asserted that sovereignty is about strategic control and visibility rather than outright ownership of every component [77-85]. She called for clear policies and guard-rails that treat digital infrastructure as a national asset, ensuring transparent supply-chain structures that cannot be compromised by external geopolitical leverage [88-98][121-128]. She introduced an air-gapped, ring-fenced sovereign-infrastructure model within commercial infrastructure [100-107]. Trust, she argued, must be engineered and continuously verified; designs should be transparent, traceable and auditable, and partnerships with global vendors must be built on mutually-established trust rather than dependence [109-118][122-124]. Seima also highlighted the need for a public-private partnership model in which the government provides stable, long-term policy guard-rails while industry focuses on innovation, scale and time-to-value [184-196][200-204], and she stressed continuous verification rather than point-in-time checks[198-205].


5. Moderator synthesis – The moderator summarised that sovereign compute is both desirable and feasible [48-49] and that sovereignty also involves who decides how systems are designed [52-53]. He reiterated the consensus that sovereignty requires a balance between domestic control and trusted global collaboration [130-134] and that co-accountability among market (bazaar), government and civil society (samaj) is essential for implementing sovereign AI[214-218]. Continuous security verification was identified as a key governance practice [198-205].


6. Consolidated trust-partnership insight – Across the panel, speakers agreed that foreign hardware and software can be leveraged safely when deployed inside sovereign, ring-fenced environments[144-154][100-107][109-118], providing the pragmatic path forward while avoiding lock-in.


7. Actionable takeaways


Anchor sovereignty in rule-making authority and control of critical compute and data[25-27][48-49].


Leverage foreign technologies inside sovereign, ring-fenced environments[144-154].


Design AI around indigenous data, multilingual needs and offline capability where connectivity is sparse[28-31][165-174].


Engineer trust through transparent, auditable supply chains and continuous verification[100-107][109-118][198-205].


Establish stable government guard-rails and public-private partnerships for long-term AI infrastructure investment[184-196][200-204].


Treat digital infrastructure as a national asset to ensure consistent security, oversight and accountability[201-208].


8. Moral framing – The moderator quoted Gandhi’s call to consider “the last person in the line” and stressed that AI, even in a technocratic age, must serve the most underserved citizens [221-223].


9. Session close (Speaker 5) – Speaker 5 thanked the participants and asked the audience to wait for the next session [220-222].


Session transcriptComplete transcript of the session
Speaker 1

been used almost as much as AI in this session, the last three days, it’s been sovereignty. So I think it’s good that we get 24 minutes and 47 seconds to discuss what sovereignty is about. So I’ll jump straight in. We’ve got a great panel. And I think the key question of sovereignty is a question of who gets to make the rules. And the way in which sovereignty has been discussed is in terms of where data is stored. So we have a variety of viewpoints here, and I look to get some opening remarks from each of you. So Sunil, I’ll start with you. You’re running some very large and very impressive data centers in India. One term that we’ve often heard is sovereign yet connected.

So we want to be sovereign but connected. Is that realistic?

Sunil

No, as you said, there are different ideas, different theories, different narratives going on in sovereign. Everybody has their own take on sovereignty. And so many times, sovereignty is also confused with we will do everything ourselves. We’ll start looking inwards, we’ll isolate ourselves from the rest of the world and everything is done by us also. I think let’s understand any and every technology stack, AI is now the latest one, you will always have interconnectedness, interdependencies across the world. Somebody will be good at making chips, somebody will be making raw material for the chips like gases and maybe rare earths, somebody will be making models, somebody will have great data sets, somebody will be very good in making applications, agentic AI.

You will have, and of course capital flows, somebody will have lots of capital and somebody will be waiting for that capital and somebody will have talent. We all know where India is good at and where any other country is good at. So, sovereignty for sure does not mean we become isolated and just try to do everything ourselves. It is a matter of what is the thing we need to control and what is the thing where we need to collaborate. For sure, it definitely means that as a country, we do not allow a single country or a single company to define our digital destiny for future. Answering your second question, there are certain things which are fundamental.

Compute infrastructure, I strongly believe, has to be within your country, has to be within your control. That is where your data is getting processed, that is where data is getting stored, that is where your models are being made. Your needs as a country, forget control, your needs as a country are unique. You want to create a voice -based AI because majority of population may not be comfortable speaking in English or writing in English, but they’ll be very, very comfortable talking in their own native language. We all are very comfortable talking in native language. We have a mix of Hindi, English, Malayalam, Kannada, whatever native languages, and we mix up with English. So if we are able to talk to a device in my own native language with my own slang, and the device does all the processing and gives me my answer in real time in my own language, my slang, that is where the real benefit, that is where population scale benefits comes in.

Maybe the model builders of any other country may have a different viewpoint of how they want to adopt AI at a global level. So frontier models are good for those use cases, but for India use cases, possibly I need the focus to go on my use cases which can benefit masses at a larger scale. So both from control point of view that nobody else should tomorrow just switch off my access to digital infrastructure, also from the point of view that my priorities for my citizens can be different, I would rather like to have sovereign compute, right? And some of the models which are taken care of, let’s say, as Minister I think said in the last three, four days, in Devas also, that 95 % of the use cases which India requires can possibly be handled.

So I think that’s the goal. by having models which are 20 billion to let’s say 100 billion parameters. You don’t need to necessarily go for frontier models, trillions of parameters. So we build our compute here. We store our data here. We allow controlled data flow outside. We build the models which are satisfying 95 % of my need. That is what I need to do. But what we can do, and I give you our own example as Yotta. While on one side I’m building…

Speaker 1

So Sunil, we’ll just come back to that. We’ll just get everybody else in and then we’ll speak about your examples. I’m just mindful of time. So I think the takeaway is that as far as the infrastructure layer is concerned, as in sovereignty in compute is not only desirable but perhaps possible. And as far as control is concerned, and we should try to have control, but I’ll take that to you, Nasubu. Let’s look at the design layer. I mean, Sunil gave what the infrastructure is about. Sovereignty is also about who makes the rules in terms of how things are designed. And what Sunil said, we work for a very large country like India where there are lots of buildings.

There are lots of builders. But how does it translate to the rest of the world? Maybe some experiences from Kala as well.

Nasubo

Excellent, thank you very much for this when you look at or when you think about let’s say Africa sometimes it’s we are disadvantaged in that we don’t have compute when you look at the computing capacity it’s like at 1 % so already we are at disadvantage before we even leap forward and get ahead but the one thing we have is we have data, we have use cases so when it comes to use cases how are we able to design for our lived realities because we as he said that the language the different things that we are looking at for example when you look at when you look at the local needs, what are the things that we want that we can adopt for example if I look at the use case of health if you look at the at how People in other sectors have been looking at health, for example.

We’ve done a lot of work on designing for our needs in terms of breast cancer. We were able to get data sets from our lived context, knowing that when you look at the composition of the breast tissue for African women, it’s different. So those are the use cases that we need to look at. Because we can be confident and say that, yes, we don’t have compute, but we have the use cases, and that’s the important bit that we need to put into place. That in as much as we are disadvantaged, we have use cases, we have the people who are able to build. That’s the one component that we never talk about. We always talk about, you know, we are getting the data there, someone else is defining the rules.

But we can define the rules by building the tools that actually work for the people in our context and being confident that, you know, once it works for our context, that people are going to use.

Speaker 1

That’s right. I think that’s a really powerful statement. because at the end of the day, it’s only local people who have skin in the game who will build for local problems. And I think that’s where actually the opportunity also lies. So I think that’s a very critical intervention. And I’ll take that to you, Seema. So we’ve discussed the infrastructure layer, the design layer. And I think it would be good to get a holistic perspective as far as critical systems and sovereignty in critical systems is concerned, especially because, as Sunil was saying, that while we can certainly try to build, compute, and store it locally, locally, it’s, again, a pipe dream to think that any country can do everything itself.

So there are, of course, questions of supply chains, trusted supply chains, who’s supplying what, and how that control is going to be exercised. So maybe a little bit from your experiences as to what sovereignty means for you, building a large data center, many large data centers now in India, but the rest of the world as well.

Seema

So first of all, thank you. I’ll just keep it. I’ve answered this in two parts, and real quickly. So. So. critical question at the critical moment I think it’s very important it’s like an important question for this decade what first question is can you be connected and sovereign yes, I don’t see a problem at all of being sovereign and connected I think over there what is important to understand is basically the strategic control that you need needs to be sovereign and it remains sovereign, I think that’s the definition more on sovereign so you don’t need to really build everything yourself so if you want me to just elaborate around the three what does really government look from its services, so it’s like public services, critical citizen data, financial networks AI systems, unlimited amount, so we’re not talking of outsourcing right over here what we’re talking of is basically critical national infrastructure, I think it’s very important to define not in general but in specific right, what it means so let’s look at three things one one is ownership.

Is ownership very important across all the components in the supply chain and in the critical infrastructure for government? Not really. Not really. I think we need to define the extent to which you want to have ownership. Second is visibility into ownership structures. And third, I think for most important for all countries, whatever, developed, underdeveloped, developing, whatever it might be. I think it’s important for all of us to treat like our digital assets like any other precious asset. And therefore, you have to have policies, guardrails that ensure whatever you have in a sovereign or semi -sovereign infrastructure is not compromised externally and you have a degree of assurance. Where you don’t have geopolitical leverage. I think that is important.

That defines sovereignty to a great extent. So what does it mean for industry? Industry, we have seen some some really good models come up, right? So there is like sovereign infrastructure model. I’ve seen some real good air -gapped, some kind of ring fence environments within the commercial infrastructure, which has been very interesting. And of course, the public -private, which still remains. What does it all mean? It means no national… We are not trying… The goal is not to nationalize. I think the goal is assurance, which is most important. That’s number one. That’s your strategic ownership question. The second is operational efficiency. I think over here, yes, degree of sovereignty does matter. It goes well beyond a few definitions of infrastructure that we have.

I think what is important here is to ensure the extent of operational control, look at efficiencies of operational control, the components within operational control that can be sovereign. And I think that’s what we’re trying to do. is to ensure the extent of operational control, and to operate So what does it mean for industry? We need to build things that are transparent, traceable, and also observable. I think that is the code to your design. That is sovereign design. Then you decide how you want to implement it. So the second thing, what does it mean? It means trust. So trust is not paper -based. Trust can only be engineered, and it needs to be verified, in my opinion.

Okay, I’m quickly coming to the third question. I think you had so many things. Supply chain trust, absolutely. Today, if you look at data sovereignty, it goes well beyond data, digital data. It goes into hardware, chipsets, network components, AI provenance, a whole lot of stuff. So in this case, I think industry needs to basically, you can’t isolate yourself. I do not believe in that. You need to forge very good technology global partnerships. It is important. Again, another degree of trust. The second thing is, of course, you can have some guardrails around it by the government, and you can govern that. I think what is most important in this case is to build some sovereign capacity.

By domestic, which is because in the age of AI, I strongly believe that the sovereign AI compute infrastructure has become a global leverage. So it is important, right? So these are my take. And basically, what I also believe in this is national digital infrastructure for any countries, like a national infrastructure, which could be like a power grid port. or a telecom. So you treat it with that level of whatever you need to do for it. Secondly, a very good guardrails from the government to safeguard sovereignty and govern it. Industry should focus on innovation and not worry too much, whatever you can, not try to own everything, because it slows down your transition and your aspiration of growth.

And this

Speaker 1

That’s great. And I think one underlying point that you made across these three is of trust, because at the end of the day, you can’t build everything yourself. Sovereign nations don’t do things themselves, even in a non -AI analog world, so it’s not that you’re going to do everything yourself. But sovereignty is only partly what we say, but more importantly, I think is what we do. And so I want to take that to each of you in terms of what you are doing in your own domains, in your own companies, and where that line, that what am I going to do? myself, what am I going to do with somebody else and if so how will I ensure that this person is trusted and I have control.

So Sunil you were saying about Yotta and what you do briefly so that we can get the others in.

Sunil

Yeah sure. So I’ll just go by the actual example which we have sort of done in the last two years or so. Last week we inaugurated and made open to the world that India’s AI language platform which I think every government entity is using, Pashini, we actually migrated that from a hyperscale cloud operator to our cloud. It’s a combination of a whole lot of general compute services and AI and GPUs and all on which all those language models are working which are giving real -time translation services. Now their purpose considering that it is a digital public infrastructure they were very very clear that at no point of time we want to be dependent on the platform service of a hyperscale operator because that makes it make stickiness that you cannot come out of that platform.

Whether it is a hyperscale platform or for that matter Yotta’s platform they don’t want to remain dependent on only one entity. They want it to be independent. They wanted a choice. we ended up not only giving them the physical infrastructure which was obviously local in my data center but we ended up creating almost I can say 30 or 40 different technologies we developed put it on their virtual machines in their environment in my data center and brought them into their control they were not using PaaS anymore. At the last when everything was going live we suddenly realized there is one component NVCF which is a NVIDIA’s software tool which was still running on NVIDIA’s platform somewhere in US and it was not running in India and then they said even though it is all fine NVIDIA is my biggest technology supplier giving me GPU software, everything but they said no this cannot go this software component is very critical for this whole structure but it has to come within your control into my environment so what we have done after that after everything was done was also to and NVIDIA agreed to open source that part of the software brought the software into our environment and now it is available and it is running within my control this example is telling.

I’m just in same breath, I’m telling you same thing. I’m using the best of the foreign technologies. I’m using Nvidia’s technologies. I’m using, of course, open source technologies. I’m using Microsoft technology. We have great partnership with Azure. I’m using Amazon’s technologies. But I’m not using these technologies in the public cloud. I’m using their technology stack within my ring -fenced walls, within my GPU and CPU compute infrastructure. The access control of these technologies firmly lies with me. No third party is able to log into my system and control or dictate what will be running and what will not be running. And that, I think, is the real balance, that you use the best technologies. These guys have spent hundreds of years, put billions of dollars in creating great technologies.

We must benefit from that. But you use these technologies within your environment, within your control.

Speaker 1

That’s right. So I think partnership and not dependence. What I’m interested in, Nasubo, and I’ll come to you on this, is what you’re doing at Kala. Because what Sunil is saying may work, say. In a setting like India, where… tell NVIDIA perhaps that some part can be stored on something locally. But I’m thinking of Malawi, I’m thinking of Lesotho or Eswatini, I’m thinking of smaller Southern African countries, which also will want to use AI for solving local problems. And so what does it look like from your perspective, having done so much work in Southern Africa?

Nasubo

When you look at, let’s just first ground what Africa has, right? How are we going to use compute that also allows for offline? That is one of the use cases we are looking at, because in as much as digital connectivity is everywhere in Africa, it’s up to like 50%. So how do we also ensure that people are able to use? So one of the ways that we do this is, one, we are working with global partners to give us compute, but at the same time we also want to buy compute, for ourselves, because the… conversations that he’s talking about in the rules, creating the rules and the structure can only be done once you also understand what is happening.

So at Kala, we are also offering compute to different innovators. And if you go to our stand in Hall 14, you are able to interact with different African innovators from the AI village who are building AI innovations. And part of those innovations are innovations that allow for offline access. That is the one thing that we need to be cognizant of. We need to understand how we need to work practically. That’s something that Kala is actively building, actively championing for. So that when we’re having even conversations with government, we are going to them and saying, yes, compute is something that we may not have. But if you approach, let’s say, big tech and you’re talking about offering compute, offering us…

being sovereign, this is what it means. So we are also having conversations with different African governments to talk about what we are learning, what people are building, and now having once they have their understanding now we can continue ensuring that our use cases are well represented. Because if we just take things that are dictated to us without having like a perspective it means that we are building for exclusion. And for us we want to ensure that all voices are well represented, including the people who are offline, who want to use AI for solving use cases in our sectors.

Speaker 1

That’s right, and I think this is resonating greatly with the fact that you’re building for offline, because when we were doing Aadhaar in India and the legal framework for Aadhaar, which underlies all our DPIs, one of the key game changers was for moving from online authentication to offline verification, because we realized that that was a big need. So this is where the global south, I think, needs to learn from . each other because these problems are somewhere similar. Last word perhaps to you Seema on this in terms of your actual experiences in ensuring that you have control over whatever is within your ring fence but what’s outside is something that you trust and you think will further the goal of sovereignty and sovereign AI as you mentioned.

Something from your practical experiences.

Seema

Let me just give you what most of us are doing and why it is pertinent and it’s important. We are building currently we are building for demand so it’s like a gigawatt AI factories huge amount of compute huge amount of data centers it has to be done responsibly in all ways and a lot of money. I think what’s important is how does this work between the government and the enterprise. I think that is the recipe for success. So there are three, four things which I have a take. One, of course, is basically the policies need to evolve along with the infrastructure. They are not based at the same. So that, I think, is important. The second thing is government must lay the sovereign guardrails.

It’s all spoken about, but you don’t have them. So it’s very difficult. Third, I think what is also important in every country to help the industry to build that capacity is also give, you know, not only have a long -term stability of your policy, but also look at commitment so that private enterprises, private industry is confident of building that huge capacity for you. I think that’s very, very key. And last but not the least is definitely look at security and regulatory, not at point -in -time checks, but move it to a continuous verification process. But this… This will ensure your sovereignty is implementable. You can also, you know, kind of enforce it. and get the best results out of it in terms of outcome.

My closing remarks. One, of course, I did speak about before in terms of how you treat this asset. You’ve got to treat it like any other national asset. Second is government needs to extend that hand in becoming an absolute sovereign partner or a public -private partner to the industry. And third is industry needs to really focus on innovation, innovation, scale, time to value, time to market. I think that’s where your soul energy should go. And last but not the least, this is a core accountability for every country. It can’t be one over the other, right? And that will ensure you safeguard your national interest and also do scale and progress without compromising your transformation times and things like that.

So you’re not left behind. See, AI is a journey where we don’t want any country to be left behind. One, lack of… resources, lack of definitions, security, sovereignty, access. I think we need to have that. I really like the theme. It says welfare for all and happiness of all and that should really be the case if it is so very transforming in nature.

Speaker 1

That’s right and I think if we were to quickly wrap up with some takeaways because we see that the purpose of this session was that data sovereignty shouldn’t be just theoretical, a slogan. It has to work in practice and what I took away from the three of you who are actually walking the talk on data sovereignty is A, in terms of the role of the market is essentially to build sovereign AI in whichever country you may be in and build it yourself, store locally and ensure that you have trusted partners when you are partnering with someone because it’s obviously futile to try to even think about doing anything yourself. As far as governments are concerned, again, this is a, I like the word you used, co -accountability, this is a partnership.

And I think government has to build guardrails, but hand in hand with both the bazaar and the samaj, that’s the society and the market. And as far as the samaj is concerned, the society, and Kala mentioned that about, at the end of the day, we mustn’t forget that what we are trying to do is solve real problems for real people. So like she mentioned that the breast tissue in an African woman is different in somewhere else, that’s the person whom we are trying to serve. And I think that that is what is imperative for all of us to do. And I think it’s appropriate to end with what Gandhiji said, that we must think about the last person in the line.

And I think when we are talking about AI, just because we are in a kind of modern technocratic age, we shouldn’t forget that it’s that last person, the man or woman in the queue. The man. The most unfortunate who we must think about. because at the end of the day that is for whom AI is built and that is for whom we are talking about sovereignty so we leave it there thank you very much ladies and gentlemen and thank you to my panelists for a wonderful session thank you

Speaker 5

please could you all please wait for a second I’ll just hand over your memory I request everyone to please settle down we will be bringing the next session very soon thank you

Related ResourcesKnowledge base sources related to the discussion topics (19)
Factual NotesClaims verified against the Diplo knowledge base (5)
Confirmedhigh

“The moderator opened the session by defining digital sovereignty as “who gets to make the rules” and noting that the debate usually centres on the location of data and compute.”

The knowledge base records the moderator Arghya Sengupta framing the central question as “who gets to make the rules” rather than where data is stored, confirming the report’s description.

Confirmedhigh

“Sunil described migrating the national AI language platform Pashini from a hyperscale public cloud to Yotta’s locally‑controlled data centre.”

Sunil Gupta is reported to have migrated the Bhashini language platform from a public cloud to a sovereign data centre, which aligns with the report’s description of moving a national AI language platform to a locally-controlled facility [S84].

Confirmedmedium

“Sunil argued that sovereignty does not require total isolation but control over strategically essential compute infrastructure.”

The discussion notes that sovereignty in compute is desirable and possible, reflecting Sunil’s view that control, not isolation, is the goal [S21].

Additional Contextmedium

“India’s linguistic diversity creates a need for native‑language voice AI capable of handling regional slang and real‑time responses.”

Other sources highlight India’s multilingual landscape and the importance of voice-first, multilingual AI for health and broader applications, supporting the claim about linguistic diversity driving AI needs [S81] and [S83].

Additional Contextlow

“Using foreign technologies like NVIDIA, Microsoft, Amazon is acceptable if they run inside a sovereign, ring‑fenced compute stack.”

The edge-cloud discussion emphasizes distributing compute and keeping critical workloads within sovereign infrastructure, providing context for using foreign tech inside a ring-fenced stack [S86].

External Sources (92)
S1
Panel Discussion Data Sovereignty India AI Impact Summit — – Nasubo Ongoma- Arghya Sengupta – Sunil Gupta- Nasubo Ongoma
S2
Keynote-Vishal Sikka — -Sunil: Role/Title: Not specified; Area of expertise: Not mentioned (referenced in relation to Airtel)
S3
https://dig.watch/event/india-ai-impact-summit-2026/global-enterprises-show-how-to-scale-responsible-ai — One last round, okay? Again, I’ll start with Sunil. Should we have mandatory watermarking in all the media text and all …
S4
Sovereign AI for India – Building Indigenous Capabilities for National and Global Impact — Great. Thank you. I think we have had a lot of good nuggets from everyone. I think we’ll continue this conversation afte…
S5
Knowledge Café: Youth building the digital future – WSIS+20 Review and Beyond 2025 — – **Speaker 5** – Role/expertise not specified Speaker 5: Sure. So what we talked about as a group is we discussed this…
S7
Agenda item 5: discussions on substantive issues contained inparagraph 1 of General Assembly resolution 75/240 (continued) – session 5 — The Chair’s instrumental role in facilitating consensus-centric discussions has been recognised with gratitude by South …
S8
Keynote by Mathias Cormann OECD Secretary-General India AI Impact — -Moderator- Role: Event moderator (specific title/expertise not mentioned) -Seema Ambasta- Chief Executive Officer, L&T…
S9
https://dig.watch/event/india-ai-impact-summit-2026/keynote-by-mathias-cormann-oecd-secretary-general-india-ai-impact — Thank you so much, Secretary General of OECD. These remarks, we’re very grateful for your remarks. For the next panel on…
S10
Panel Discussion Data Sovereignty India AI Impact Summit — Seema Ambastha provided a framework for understanding sovereignty through strategic control, operational efficiency, and…
S11
Keynote-Martin Schroeter — -Speaker 1: Role/Title: Not specified, Area of expertise: Not specified (appears to be an event moderator or host introd…
S12
Responsible AI for Children Safe Playful and Empowering Learning — -Speaker 1: Role/title not specified – appears to be a student or child participant in educational videos/demonstrations…
S13
Building Trusted AI at Scale Cities Startups & Digital Sovereignty – Keynote Vijay Shekar Sharma Paytm — -Speaker 1: Role/Title: Not mentioned, Area of expertise: Not mentioned (appears to be an event host or moderator introd…
S14
WS #43 States and Digital Sovereignty: Infrastructural Challenges — Balancing Sovereignty and Cooperation Ekaterine Imedadze: Yes, sir. Very challenging questions, let me put it this way….
S15
Leaders’ Plenary | Global Vision for AI Impact and Governance Morning Session Part 1 — This is a reality we cannot ignore. But the key question is this. Will this concentration of power become a permanent st…
S16
Digital sovereignty in Brazil: for what and for whom? | IGF 2023 Launch / Award Event #187 — Audience:Thank you very much, Ana. I think in regards to the second questions from Raul, if that’s going to be a patchwo…
S17
Host Country Open Stage — This paradoxical statement challenges the typical understanding of digital sovereignty as protectionist or isolationist….
S18
AI: Lifting All Boats / DAVOS 2025 — Ring-fenced data solutions can help address data sovereignty concerns
S19
How to ensure cultural and linguistic diversity in the digital and AI worlds? — Hannah Taieb:Real diversity is very important indeed, and it all depends on the models and business models. Algorithms a…
S20
Day 0 Event #270 Everything in the Cloud How to Remain Digital Autonomous — Argentina adopted multi-cloud architecture approach, prioritizing local providers alongside big ones, guaranteeing porta…
S21
https://dig.watch/event/india-ai-impact-summit-2026/panel-discussion-data-sovereignty-india-ai-impact-summit — I’m just in same breath, I’m telling you same thing. I’m using the best of the foreign technologies. I’m using Nvidia’s …
S22
From KW to GW Scaling the Infrastructure of the Global AI Economy — NVIDIA’s contribution to India’s AI ecosystem includes sharing reference designs for AI factories, open-sourcing control…
S23
Scaling Trusted AI_ How France and India Are Building Industrial & Innovation Bridges — Sovereignty doesn’t mean isolation – need cooperation, open science and shared global ethics
S24
WS #462 Bridging the Compute Divide a Global Alliance for AI — Beyond physical infrastructure, Jason Slater emphasized that compute deserts are characterized not only by lack of conne…
S25
How Small AI Solutions Are Creating Big Social Change — African languages. And we just released a data set of 21 now, 27 voice languages, given that Africa has 2 ,000 or so lan…
S26
Empowering Workers in the Age of AI — Current AI models suffer from significant bias because they are trained primarily on data from developed countries and h…
S27
What is it about AI that we need to regulate? — Addressing the Tension Between Digital Sovereignty and Global Internet InteroperabilityThe tension between digital sover…
S28
Panel Discussion AI in Digital Public Infrastructure (DPI) India AI Impact Summit — His discussion of sovereignty defined it not as technological isolation but as maintaining national capability and contr…
S29
WS #180 Protecting Internet data flows in trade policy initiatives — Audience: Hello, I hope you can hear me. My name is Mark Taylor. I’m a senior project manager at the Council of Europe…
S30
Global AI Policy Framework: International Cooperation and Historical Perspectives — The concept includes practical elements such as cloud and data standards that guarantee interoperability and reversibili…
S31
AI Meets Cybersecurity Trust Governance & Global Security — “AI governance now faces very similar tensions.”[27]”AI may shape the balance of power, but it is the governance or AI t…
S32
Artificial intelligence (AI) – UN Security Council — In conclusion, the discussions highlighted the importance of fostering transparency and accountability in AI systems. En…
S33
AI as critical infrastructure for continuity in public services — “If you think about linguistic diversity that is there in many of the communities, in many of the countries of this worl…
S34
Harnessing Collective AI for India’s Social and Economic Development — Artificial intelligence | Human rights and the ethical dimensions of the information society | Data governance Professo…
S35
Workshop 2: The Interplay Between Digital Sovereignty and Development — The workshop highlighted that digital sovereignty cannot be achieved through technical or regulatory measures alone but …
S36
Building a Digital Society, from Vision to Implementation — Gary Patterson: Yes. Thanks. Thanks, Chris. So, as we said before, the small nations like Jamaica face these severe cons…
S37
WS #241 Balancing Acts 2.0: Can Encryption and Safety Co-Exist? — These key comments fundamentally shaped the discussion by establishing it as a collaborative problem-solving exercise ra…
S38
Day 0 Event #236 EU Rules on Disinformation Who Are Friends or Foes — However, Shultz offered a pragmatic path forward through recent bipartisan success in banning non-consensual deepfake po…
S39
Discussion Report: Sovereign AI in Defence and National Security — Faisal advocates for a strategic approach where countries focus their limited sovereign resources on the most critical c…
S40
Panel Discussion Data Sovereignty India AI Impact Summit — Both speakers agree that sovereignty should involve strategic partnerships and collaboration rather than complete self-r…
S41
Host Country Open Stage — This paradoxical statement challenges the typical understanding of digital sovereignty as protectionist or isolationist….
S42
Main Topic 3: Europe at the Crossroads: Digital and Cyber Strategy 2030 — Decision-making and governance of digital sovereignty initiatives must be socially driven and transparent to ensure that…
S43
Open Forum #64 Local AI Policy Pathways for Sustainable Digital Economies — The framework advocated for worker-centric AI development that complements rather than replaces human labour, addressing…
S44
European Tech Sovereignty: Feasibility, Challenges, and Strategic Pathways Forward — -Operational sovereignty: Ensuring continuity under external pressure Virkkunen articulated sovereignty as “having choi…
S45
From KW to GW Scaling the Infrastructure of the Global AI Economy — NVIDIA’s contribution to India’s AI ecosystem includes sharing reference designs for AI factories, open-sourcing control…
S46
Al and Global Challenges: Ethical Development and Responsible Deployment — Alfredo Ronchi:Most interesting presentation from the standpoint of China. Thanks a lot for this date. And now we will t…
S47
AI in 2026: Learning to live with powerful systems — Purpose-built models designed for specific domainsbegin to play a more prominent role. In healthcare, education, public …
S48
S49
How to ensure cultural and linguistic diversity in the digital and AI worlds? — Audience:So, if I understood correctly, you plan to feed the chat GPT? or the AI engine with local content, local cultur…
S50
Waves of infrastructure Open Systems Open Source Open Cloud — “what we’re doing in Proximal Cloud”[76]. “The word Proximal brings compute closer to your data”[77]. “The word Proximal…
S51
Advancing Scientific AI with Safety Ethics and Responsibility — And so the fragmentation risk is actually not a technical risk, I would argue, because it’s not just a technical risk, b…
S52
Panel #3: « Gouverner les données : entre souveraineté, éthique et sécurité à l’ère de l’interconnexion » — Emmanuelle Ganne Ça fait beaucoup à couvrir. Quand on parle d’économie des données, peut-être que je vais mettre l’accen…
S53
Multi-stakeholder Discussion on issues about Generative AI — Luciano Mazza de Andrade:Sorry I was off. Thank you very much, Yoshi. Well, I think our colleagues and previous speakers…
S54
India outlines plan to widen AI access — India’s government has set out plans todemocratiseAI infrastructure nationwide. The strategy focuses on expanding access…
S55
Powering AI _ Global Leaders Session _ AI Impact Summit India Part 2 — Data sovereignty policies requiring local data storage are essential to drive domestic data center investment and capita…
S56
AI as critical infrastructure for continuity in public services — Data sovereignty requires control over jurisdiction, keys, and infrastructure beyond just local data storage
S57
https://dig.watch/event/india-ai-impact-summit-2026/building-trusted-ai-at-scale-cities-startups-digital-sovereignty-keynote-ebba-busch-deputy-prime-minister-sweden — If AI is to become electable in our democracies, policymakers must find a way to translate complexity into tangible bene…
S58
Contents — Beyond the direct and indirect support that government can provide for the development of UK quantum tech businesses, is…
S59
What is it about AI that we need to regulate? — TheOpen Forum on Local AI Policy Pathwaysemphasized the importance of building indigenous technological capabilities. An…
S60
Host Country Open Stage — – Christian Sorby Larsen Silva contends that digital sovereignty means ensuring platforms and tools reflect national va…
S61
Panel Discussion Data Sovereignty India AI Impact Summit — Data sovereignty means controlling who makes the rules and maintaining strategic control, not isolating from global part…
S62
What is it about AI that we need to regulate? — Addressing the Tension Between Digital Sovereignty and Global Internet InteroperabilityThe tension between digital sover…
S63
Keynote-Jeet Adani — Industrial corridors will integrate energy and compute planning. Storage and grid stability will become national priorit…
S64
WS #180 Protecting Internet data flows in trade policy initiatives — Sabhanaz Rashid Diya: Thank you, Ramin, and it’s very good to be here with a number of experts, both on-site and online…
S65
Cross-Border Data Flows: Harmonizing trust through interoperability mechanisms (DCO) — Some nations do not permit healthcare data to be expatriated. There is a need for local storage and analysis mechanism.
S66
Harnessing Collective AI for India’s Social and Economic Development — Artificial intelligence | Human rights and the ethical dimensions of the information society | Data governance Professo…
S67
AI as critical infrastructure for continuity in public services — Trust building must occur at multiple levels simultaneously. While global frameworks provide necessary foundations, trus…
S68
Workshop 6: Perception of AI Tools in Business Operations: Building Trustworthy and Rights-Respecting Technologies — Trust building requires transparency, explainability, and stakeholder involvement
S69
Toward Collective Action_ Roundtable on Safe & Trusted AI — -What Africans want from AI systems: Panelists emphasized the need for empowerment and agency rather than dependency, eq…
S70
Open Forum #70 the Future of DPI Unpacking the Open Source AI Model — Building trust with regulators requires sustained periods of respectful, honest, transparent relationships and knowledge…
S71
Workshop 2: The Interplay Between Digital Sovereignty and Development — The workshop highlighted that digital sovereignty cannot be achieved through technical or regulatory measures alone but …
S72
Building a Digital Society, from Vision to Implementation — ## Strategic Partnerships as Critical Success Factors Gary Patterson: Yes. Thanks. Thanks, Chris. So, as we said before…
S73
Comprehensive Discussion Report: Governance Frameworks for Reducing Digital Divides in African and Francophone Contexts — The conversation’s evolution from technical infrastructure concerns to questions of sovereignty, value creation, and equ…
S74
Closing Session  — Minister Tijani’s comment solidified the proactive framework as the summit’s core achievement and elevated the discussio…
S75
WS #241 Balancing Acts 2.0: Can Encryption and Safety Co-Exist? — These key comments fundamentally shaped the discussion by establishing it as a collaborative problem-solving exercise ra…
S76
From KW to GW Scaling the Infrastructure of the Global AI Economy — NVIDIA’s contribution to India’s AI ecosystem includes sharing reference designs for AI factories, open-sourcing control…
S77
Local, Everywhere: The blueprint for a Humanitarian AI transformation — In addition, most humanitarian use cases, such as decision support, scenario planning, knowledge search, language assist…
S78
Sovereign AI for India – Building Indigenous Capabilities for National and Global Impact — Collaboration. A collaboration, honestly, is not just a transactional process. It begins here, right? The will to unders…
S79
Network Session: Digital Sovereignty and Global Cooperation | IGF 2023 Networking Session #170 — Audience:Yeah, Alexandre Savnin, Zafri University. So, I was the first person who was saying that there is a tension bec…
S80
Artificial General Intelligence and the Future of Responsible Governance — Mr. Simonas Satunas offered a compelling metaphor, comparing the situation to a 19th-century prophet predicting travel f…
S81
Need and Impact of Full Stack Sovereign AI by CoRover BharatGPT — Amish points out that most global AI models operate in English, making Indian‑language capability crucial for the countr…
S82
Building Trusted AI at Scale Cities Startups & Digital Sovereignty – Keynote Vivek Raghavan Sarvam AI — And it’s a core technology that a country like India must understand. from the foundational level. Otherwise, we will be…
S83
AI for Bharat’s Health_ Addressing a Billion Clinical Realities — Voice technology and multilingual capabilities were highlighted as crucial horizontal solutions for healthcare AI in Ind…
S84
https://dig.watch/event/india-ai-impact-summit-2026/indias-ai-future-sovereign-infrastructure-and-innovation-at-scale — Hello, good afternoon. Good afternoon. Good afternoon. My name is Sunil Gupta. I am co -founder and CEO of IOTA. So we r…
S85
Building Scalable AI Through Global South Partnerships — And we make government accountable for a lot of it. Just as we’re accountable for the technical side. The other really k…
S86
https://dig.watch/event/india-ai-impact-summit-2026/heterogeneous-compute-for-democratizing-access-to-ai — That’s the edge cloud. And as you go deeper from there onwards, then you have the data centers. It then mitigates the ov…
S87
Microsoft at 50 – A journey through code, cloud, and AI — Microsoft, the American tech giant, wasfounded50 years ago, on 4 April 1975, by Harvard dropout Bill Gates and his child…
S88
ITU-T X-SERIES RECOMMENDATIONS — Migrating to the cloud often implies moving large amounts of data and major configuration changes (e.g., network address…
S89
Accelerating an Inclusive Energy Transition | IGF 2023 Open Forum #133 — Neil Yorke-Smith:Well, hello. Good afternoon, everybody. Or good morning from the Netherlands. It’s nice to be here and …
S90
To share or not to share: the dilemma of open source vs. proprietary Large Language Models — Bilel Jamoussi:Since you mentioned Meta, I’ll go to Melinda and ask you about Meta has made significant contributions to…
S91
Next Steps for Digital Worlds — In conclusion, the Metaverse and virtual reality offer exciting possibilities for connectivity and advancements in vario…
S92
https://dig.watch/event/india-ai-impact-summit-2026/from-kw-to-gw-scaling-the-infrastructure-of-the-global-ai-economy — And the last piece, which is the application, right? I’m sure you would have visited the booth downstairs on the Hall 5….
Speakers Analysis
Detailed breakdown of each speaker’s arguments and positions
S
Speaker 1
2 arguments190 words per minute1213 words381 seconds
Argument 1
Sovereignty is about who makes the rules and controls digital destiny, not total self‑sufficiency
EXPLANATION
Speaker 1 frames sovereignty as the authority to set the rules governing digital systems rather than a goal of complete self‑reliance. Control over the digital destiny of a nation is emphasized over merely owning every component.
EVIDENCE
Speaker 1 states that “the key question of sovereignty is a question of who gets to make the rules” and later adds that “as far as control is concerned, we should try to have control” indicating that rule-making and control, not total self-sufficiency, define sovereignty [5][48-49].
EXTERNAL EVIDENCE (KNOWLEDGE BASE)
The India AI Impact Summit panel frames sovereignty as rule-making and control rather than full self-reliance [S1], and other analyses stress the need to balance sovereignty with cooperation rather than isolation [S14][S23].
MAJOR DISCUSSION POINT
Definition and Scope of Sovereignty
AGREED WITH
Sunil, Seima
Argument 2
Co‑accountability among market, government, and society is needed to implement sovereignty in practice
EXPLANATION
Speaker 1 argues that effective sovereignty requires shared responsibility among the private sector, the state, and civil society. The focus is on collaborative action rather than unilateral control.
EVIDENCE
Speaker 1 says “the underlying point … sovereignty is only partly what we say, but more importantly, I think is what we do… co-accountability” and later summarises the session by stressing the need for market, government and society to work together [130-133][214-218].
EXTERNAL EVIDENCE (KNOWLEDGE BASE)
Co-accountability is highlighted in the summit discussion as essential for practical sovereignty [S1], and multiple sources underline the importance of collaborative governance and guardrails [S14][S17][S23].
MAJOR DISCUSSION POINT
Governance
AGREED WITH
Seima, Sunil
S
Sunil
5 arguments183 words per minute1158 words379 seconds
Argument 1
Sovereignty is often confused with isolation; true sovereignty balances control with collaboration
EXPLANATION
Sunil points out that many equate sovereignty with complete self‑isolation, but real sovereignty means deciding what to control and what to collaborate on. Isolation is therefore a misconception.
EVIDENCE
Sunil notes “sovereignty is also confused with we will do everything ourselves… sovereignty for sure does not mean we become isolated” and stresses the need for collaboration across technology stacks [15-22].
EXTERNAL EVIDENCE (KNOWLEDGE BASE)
Commentary on digital sovereignty repeatedly notes that true sovereignty requires strategic collaboration and not isolation [S14][S15][S17][S23].
MAJOR DISCUSSION POINT
Definition and Scope of Sovereignty
AGREED WITH
Speaker 1, Seima
Argument 2
Compute infrastructure must reside within national borders to ensure control and support native‑language services
EXPLANATION
Sunil argues that core compute resources—where data is processed, stored and models are trained—must be physically located inside the country to guarantee sovereign control and to enable services in local languages and slang.
EVIDENCE
He explains that “compute infrastructure … has to be within your country… that is where your data is getting processed… that is where your models are being made” and links this to delivering voice-based AI in native languages [25-31].
EXTERNAL EVIDENCE (KNOWLEDGE BASE)
Sunil’s own remarks stress domestic compute for control and local language AI [S1], and ring-fenced, locally-hosted solutions are advocated as a way to guarantee sovereignty [S18][S22][S20].
MAJOR DISCUSSION POINT
Infrastructure Layer – Sovereign Compute and Data Storage
AGREED WITH
Speaker 1, Seima
DISAGREED WITH
Seima
Argument 3
Foreign technologies can be run inside a locally controlled, ring‑fenced data centre to maintain sovereignty
EXPLANATION
Sunil demonstrates that while foreign tools (e.g., NVIDIA, Microsoft, Amazon) are used, they are deployed inside a domestically owned, air‑gapped environment, preserving sovereign control over the stack.
EVIDENCE
He describes how NVIDIA’s software was open-sourced and moved into the Indian data centre, and how “we are using … technologies within my ring-fenced walls, within my GPU and CPU compute infrastructure” with full access control [142-152].
EXTERNAL EVIDENCE (KNOWLEDGE BASE)
The panel notes that foreign tools can be deployed inside air-gapped, ring-fenced environments to preserve sovereign control [S1][S18][S21][S22].
MAJOR DISCUSSION POINT
Infrastructure Layer – Sovereign Compute and Data Storage
Argument 4
Language diversity requires sovereign models tailored to native languages and slang
EXPLANATION
Sunil stresses that India’s multilingual population necessitates AI models that understand and generate responses in local languages and colloquial expressions, which can only be achieved with sovereign, locally trained models.
EVIDENCE
He cites the need for “voice-based AI … in their own native language with my own slang” and notes India’s mix of Hindi, English, Malayalam, Kannada etc. as the driver for such models [28-31].
EXTERNAL EVIDENCE (KNOWLEDGE BASE)
Ensuring linguistic diversity through sovereign data sets and models is highlighted as a priority for culturally relevant AI [S19][S26][S25].
MAJOR DISCUSSION POINT
Design Layer – Local Relevance, Use Cases, and Offline Capability
AGREED WITH
Nasubo, Seima
Argument 5
Use best foreign technologies while keeping access control locally to avoid dependence on a single provider
EXPLANATION
Sunil argues that leveraging world‑class hardware and software is acceptable provided the deployment remains under national control, preventing lock‑in to any single vendor.
EVIDENCE
He lists using NVIDIA, Microsoft, Amazon, and Azure technologies “within my ring-fenced walls” and stresses that “no third party is able to log into my system and control” the environment [144-154].
EXTERNAL EVIDENCE (KNOWLEDGE BASE)
Sunil emphasizes leveraging world-class hardware and software within a controlled domestic environment, echoing multi-cloud strategies that mix local and global providers while preserving autonomy [S1][S21][S20][S22].
MAJOR DISCUSSION POINT
Trust, Supply Chain, and Partnership vs. Dependence
AGREED WITH
Nasubo, Seima
N
Nasubo
5 arguments168 words per minute679 words241 seconds
Argument 1
Sovereignty cannot be achieved by complete isolation; trusted partnerships are essential
EXPLANATION
Nasubo contends that while Africa lacks compute capacity, it can still achieve sovereignty by forming trusted partnerships and leveraging its rich data and use‑case knowledge. Isolation is not a viable path.
EVIDENCE
He notes “we are disadvantaged … we don’t have compute … but we have data and use cases” and stresses the need to “define the rules … with trusted partnerships” [57-65][168-176].
EXTERNAL EVIDENCE (KNOWLEDGE BASE)
Multiple sources argue that sovereignty must coexist with trusted international partnerships rather than isolation [S14][S17][S23][S24][S25].
MAJOR DISCUSSION POINT
Definition and Scope of Sovereignty
AGREED WITH
Sunil, Seima
Argument 2
Limited local compute is a disadvantage, but data and use cases can drive design; some compute capacity is still needed
EXPLANATION
Nasubo points out that Africa’s compute share is roughly 1 % of global capacity, yet abundant data and sector‑specific use cases can guide AI design, while advocating for incremental local compute acquisition.
EVIDENCE
He states “compute capacity is like at 1 % … we are at disadvantage … but we have data, we have use cases” and later mentions building models for health, breast cancer, etc. [57-58][59-62].
EXTERNAL EVIDENCE (KNOWLEDGE BASE)
Analyses of compute deserts note that data and domain expertise can guide AI design while advocating incremental local compute acquisition and partnerships for capacity [S24][S25][S22].
MAJOR DISCUSSION POINT
Infrastructure Layer – Sovereign Compute and Data Storage
Argument 3
AI models must reflect local data and context (e.g., breast tissue differences in African women) to be effective
EXPLANATION
Nasubo illustrates that AI for health must be trained on region‑specific data, such as the distinct breast‑tissue composition of African women, to ensure accuracy and relevance.
EVIDENCE
He describes work on “breast cancer … data sets from our lived context … composition of the breast tissue for African women, it’s different” [58-60].
EXTERNAL EVIDENCE (KNOWLEDGE BASE)
The bias of models trained on non-local data and the need for region-specific datasets are documented as essential for accurate AI in health and other domains [S26][S19][S25].
MAJOR DISCUSSION POINT
Design Layer – Local Relevance, Use Cases, and Offline Capability
AGREED WITH
Sunil, Seima
Argument 4
Offline access is crucial where connectivity is low; solutions must function without constant internet
EXPLANATION
Nasubo emphasizes that many African regions have only about 50 % connectivity, so AI solutions must be capable of offline operation to reach the underserved population.
EVIDENCE
He notes “digital connectivity is everywhere in Africa, it’s up to like 50 % … we need offline access” and cites building innovations that allow for offline use at the AI village stand [165-168][170-173].
EXTERNAL EVIDENCE (KNOWLEDGE BASE)
Compute-desert studies highlight limited connectivity as a barrier, underscoring the importance of offline-capable AI solutions for underserved regions [S24].
MAJOR DISCUSSION POINT
Design Layer – Local Relevance, Use Cases, and Offline Capability
Argument 5
Collaboration with global partners can provide compute while maintaining sovereign control
EXPLANATION
Nasubo explains that African innovators can obtain compute from global providers while simultaneously investing in locally owned hardware, ensuring that sovereignty is preserved through shared understanding of rules and structures.
EVIDENCE
He says “we are working with global partners to give us compute … we also want to buy compute for ourselves … this is what sovereignty means” and describes offering compute to innovators at Kala’s stand [168-176].
EXTERNAL EVIDENCE (KNOWLEDGE BASE)
Partnership models that combine external compute resources with domestic governance are presented as a path to sovereignty [S22][S23][S14].
MAJOR DISCUSSION POINT
Trust, Supply Chain, and Partnership vs. Dependence
S
Seema
8 arguments148 words per minute1247 words503 seconds
Argument 1
Sovereignty means strategic ownership, visibility, and assurance rather than full ownership of every component
EXPLANATION
Seima argues that sovereignty is achieved through clear ownership structures, visibility into those structures, and robust assurance mechanisms, not by owning every piece of hardware or software outright.
EVIDENCE
She outlines three pillars – “ownership”, “visibility into ownership structures”, and “treat digital assets like any other precious asset with policies and guardrails” [78-85].
EXTERNAL EVIDENCE (KNOWLEDGE BASE)
The discussion on strategic ownership and visibility aligns with broader views that sovereignty is about assurance and control, not total nationalization [S14][S23][S1].
MAJOR DISCUSSION POINT
Definition and Scope of Sovereignty
AGREED WITH
Speaker 1, Sunil, Seima
Argument 2
Critical national infrastructure should be treated as precious assets with policies ensuring security and guardrails
EXPLANATION
Seima stresses that critical digital infrastructure must be protected like traditional national assets, requiring policies, guardrails, and air‑gapped environments to prevent external compromise.
EVIDENCE
She references “sovereign infrastructure model”, “air-gapped, ring-fence environments”, and the need for “policies, guardrails … not compromised externally” [84-92].
EXTERNAL EVIDENCE (KNOWLEDGE BASE)
Treating digital infrastructure as a precious asset with guardrails is advocated in several sources addressing infrastructure challenges and security policies [S14][S15][S18][S20].
MAJOR DISCUSSION POINT
Infrastructure Layer – Sovereign Compute and Data Storage
AGREED WITH
Sunil, Speaker 1, Seima
Argument 3
Policies must evolve with infrastructure to enable designs that serve local needs
EXPLANATION
Seima notes that policy frameworks need to keep pace with rapid infrastructure development so that designs can be responsive to local requirements and emerging technologies.
EVIDENCE
She states “policies need to evolve along with the infrastructure” and highlights the importance of continuous policy-technology alignment [188-191].
EXTERNAL EVIDENCE (KNOWLEDGE BASE)
The need for adaptive policy frameworks that keep pace with rapid infrastructure development is emphasized in sovereignty analyses [S14][S20][S23].
MAJOR DISCUSSION POINT
Design Layer – Local Relevance, Use Cases, and Offline Capability
AGREED WITH
Sunil, Nasubo, Seima
Argument 4
Trust must be engineered and verified; global partnerships are needed but must operate within sovereign boundaries
EXPLANATION
Seima argues that trust cannot rely on paperwork; it must be built into systems and verified, while global collaborations should respect sovereign limits and be governed by clear guardrails.
EVIDENCE
She says “trust is not paper-based … trust can only be engineered, and it needs to be verified” and later adds that “you need to forge very good technology global partnerships … with guardrails” [109-112][118-120].
EXTERNAL EVIDENCE (KNOWLEDGE BASE)
Engineering trust into systems and governing partnerships with clear guardrails is highlighted as essential for sovereign AI ecosystems [S23][S18][S22].
MAJOR DISCUSSION POINT
Trust, Supply Chain, and Partnership vs. Dependence
Argument 5
Supply‑chain transparency and trusted hardware/components are vital for sovereignty
EXPLANATION
Seima highlights that sovereignty extends beyond data to include hardware, chipsets, network gear, and AI provenance, all of which must be sourced through transparent, trusted supply chains.
EVIDENCE
She notes “today, data sovereignty goes well beyond data … it goes into hardware, chipsets, network components, AI provenance … supply-chain trust” [113-116].
EXTERNAL EVIDENCE (KNOWLEDGE BASE)
Supply-chain transparency, including trusted hardware and chipsets, is identified as a core component of digital sovereignty challenges [S14].
MAJOR DISCUSSION POINT
Trust, Supply Chain, and Partnership vs. Dependence
AGREED WITH
Sunil, Nasubo, Seima
Argument 6
Government must set sovereign guardrails, ensure policy stability, and share co‑accountability with industry and society
EXPLANATION
Seima calls for stable, long‑term policies and clear guardrails from governments, coupled with a partnership model where industry and civil society share responsibility for sovereign outcomes.
EVIDENCE
She mentions “policies need to evolve”, “government must lay the sovereign guardrails”, “long-term stability of policy”, and “co-accountability” in her closing remarks [188-196][200-207].
EXTERNAL EVIDENCE (KNOWLEDGE BASE)
Co-accountability and stable, long-term policy guardrails are repeatedly called for in discussions of sovereign governance [S1][S14][S23].
MAJOR DISCUSSION POINT
Governance
AGREED WITH
Speaker 1, Seima, Sunil
Argument 7
Governments should not nationalize everything but must ensure strategic control and assurance
EXPLANATION
Seima clarifies that the aim is not to own every component but to achieve assurance through strategic control, avoiding full nationalization while protecting national interests.
EVIDENCE
She states “the goal is not to nationalize … the goal is assurance … that’s your strategic ownership question” [94-98].
EXTERNAL EVIDENCE (KNOWLEDGE BASE)
Analyses stress that sovereignty requires strategic control rather than full nationalization, supporting a balanced approach to ownership [S23][S14].
MAJOR DISCUSSION POINT
Governance
Argument 8
Continuous verification and security oversight are required rather than point‑in‑time checks
EXPLANATION
Seima advocates for ongoing security and regulatory monitoring instead of occasional audits, ensuring that sovereign digital assets remain protected over time.
EVIDENCE
She calls for “continuous verification process” rather than “point-in-time checks” to keep sovereignty implementable [197-199].
MAJOR DISCUSSION POINT
Governance
Agreements
Agreement Points
Sovereignty is defined by the ability to set rules and maintain control rather than achieving total self‑sufficiency.
Speakers: Speaker 1, Sunil, Seima
Sovereignty is about who makes the rules and controls digital destiny, not total self‑sufficiency Sovereignty is often confused with isolation; true sovereignty balances control with collaboration Sovereignty means strategic ownership, visibility, and assurance rather than full ownership of every component
All three speakers stress that sovereignty means having the authority to decide how digital systems are governed and to keep critical parts under national control, while rejecting the notion that a country must build everything itself [5][48-49][15-22][78-85].
POLICY CONTEXT (KNOWLEDGE BASE)
This view echoes the consensus at the India AI Impact Summit that sovereignty means strategic control while leveraging global expertise rather than full self-reliance [S40] and aligns with the nuanced definition emphasizing collaboration and interoperability [S41] as well as European tech-sovereignty framing of operational autonomy [S44].
Effective sovereignty requires co‑accountability and partnership among market, government and civil society.
Speakers: Speaker 1, Seima, Sunil
Co‑accountability among market, government, and society is needed to implement sovereignty in practice Government must set sovereign guardrails, ensure policy stability, and share co‑accountability with industry and society Use best foreign technologies while keeping access control locally to avoid dependence on a single provider
Speaker 1 frames sovereignty as a shared responsibility, Seima calls for guard-rails and joint accountability, and Sunil highlights the need for partnership rather than dependence, showing a common view that multi-stakeholder collaboration is essential [130-133][214-218][144-154].
POLICY CONTEXT (KNOWLEDGE BASE)
Multi-stakeholder governance is highlighted in the EU Digital Strategy calling for socially driven, transparent accountability mechanisms [S42] and reinforced by calls for democratic cooperation in AI infrastructure [S57]; the India summit also stressed partnership across sectors [S40].
AI systems must be tailored to local languages, cultures and data contexts to be effective.
Speakers: Sunil, Nasubo, Seima
Language diversity requires sovereign models tailored to native languages and slang AI models must reflect local data and context (e.g., breast tissue differences in African women) to be effective Policies must evolve with infrastructure to enable designs that serve local needs
Sunil stresses multilingual AI, Nasubo gives a health-care example of region-specific data, and Seima notes that policy must keep pace with locally relevant designs, indicating consensus on the need for culturally and linguistically appropriate AI [28-31][58-60][188-191].
POLICY CONTEXT (KNOWLEDGE BASE)
Discussions on cultural and linguistic diversity stress feeding AI with local content and models [S49]; policy-harmonisation work stresses adapting AI policies to local needs [S48]; domain-specific purpose-built models are promoted as more practical and easier to govern [S47]; offline, simple-interface solutions further underline localisation [S43].
Sovereignty can be achieved through trusted global partnerships and transparent supply‑chains rather than full isolation.
Speakers: Sunil, Nasubo, Seima
Use best foreign technologies while keeping access control locally to avoid dependence on a single provider Sovereignty cannot be achieved by complete isolation; trusted partnerships are essential Supply‑chain transparency and trusted hardware/components are vital for sovereignty
All three speakers agree that leveraging foreign technology is acceptable if it is deployed within a sovereign-controlled environment and that transparent, trusted supply chains and partnerships are necessary to maintain sovereignty [144-154][57-65][113-116].
POLICY CONTEXT (KNOWLEDGE BASE)
Both speakers at the India AI Impact Summit argued for strategic partnerships over isolationist self-reliance [S40]; European tech-sovereignty literature frames sovereignty as choice in partnerships, not forced dependencies [S44]; broader democratic consensus notes no nation can build resilient AI alone [S57].
Domestic compute and data storage are essential for sovereign control of AI services.
Speakers: Sunil, Speaker 1, Seima
Compute infrastructure must reside within national borders to ensure control and support native‑language services Infrastructure layer – sovereignty in compute is not only desirable but possibly possible Critical national infrastructure should be treated as precious assets with policies ensuring security and guardrails
Sunil argues that core compute must stay inside the country, Speaker 1 affirms that sovereign compute is feasible and desirable, and Seima stresses that critical digital infrastructure needs protective policies, showing a shared view on the importance of domestic compute and storage [25-27][34-41][48-49][84-92].
POLICY CONTEXT (KNOWLEDGE BASE)
Indian policy mandates local data storage to drive domestic data-center investment [S55] and broader AI-as-critical-infrastructure guidance stresses jurisdictional and key control beyond mere storage [S56]; the Proximal Cloud concept emphasizes bringing compute close to data for national sovereignty [S50]; NVIDIA’s open-sourced control-plane for local inferencing illustrates partnership-enabled domestic compute [S45].
Similar Viewpoints
Both highlight that isolation is a misconception and that sovereignty must be pursued through selective control combined with trusted external partnerships [15-22][57-65].
Speakers: Sunil, Nasubo
Sovereignty is often confused with isolation; true sovereignty balances control with collaboration Sovereignty cannot be achieved by complete isolation; trusted partnerships are essential
Both stress that foreign technology can be used safely only when it is placed inside a sovereign‑controlled, trust‑engineered environment [144-154][109-112][118-120].
Speakers: Sunil, Seima
Use best foreign technologies while keeping access control locally to avoid dependence on a single provider Trust must be engineered and verified; global partnerships are needed but must operate within sovereign boundaries
Both recognize that practical sovereignty must address real‑world constraints—shared responsibility and the need for offline capability—to reach underserved populations [130-133][180-181][165-168][170-173].
Speakers: Speaker 1, Nasubo
Co‑accountability among market, government, and society is needed to implement sovereignty in practice Offline access is crucial where connectivity is low; solutions must function without constant internet
Unexpected Consensus
Offline capability as a core requirement for sovereign AI solutions
Speakers: Speaker 1, Nasubo
Offline verification was a key lesson from Aadhaar implementation Offline access is crucial where connectivity is low; solutions must function without constant internet
While most speakers focused on control, partnership or language, only Speaker 1 and Nasubo explicitly linked sovereignty to the need for offline functionality, revealing an unexpected convergence on this technical requirement [180-181][165-168][170-173].
POLICY CONTEXT (KNOWLEDGE BASE)
The Open Forum on Local AI Policy Pathways highlighted offline solutions for communities lacking reliable internet [S43]; smaller, purpose-built models are noted for easier governance and potential offline deployment [S47].
Overall Assessment

The panel shows strong consensus that digital sovereignty is about rule‑making and control, not full self‑sufficiency; it must be realized through collaborative governance, locally hosted compute, culturally relevant AI, and trusted partnerships with transparent supply chains. All speakers align on these pillars, indicating a shared vision for policy and implementation.

High consensus across all speakers, suggesting that future initiatives should prioritize domestic compute infrastructure, co‑accountability frameworks, local data/model development, and engineered trust mechanisms to achieve practical sovereignty.

Differences
Different Viewpoints
Degree of ownership and physical control required for sovereign compute
Speakers: Sunil, Seima
Compute infrastructure must reside within national borders to ensure control and support native‑language services Governance should not aim to nationalise every component; strategic ownership and assurance are sufficient
Sunil argues that the compute stack – where data is processed, stored and models are trained – has to be physically located inside the country to guarantee sovereign control and to enable voice-based AI in native languages [25-27]. Seima counters that sovereignty does not require owning every hardware or software element, but rather achieving strategic control and assurance through policies and guard-rails, without full nationalisation [94-98].
POLICY CONTEXT (KNOWLEDGE BASE)
The Proximal Cloud model defines sovereignty as physical proximity and control of compute resources to the nation or region [S50]; European tech-sovereignty discussions stress operational sovereignty and the right to choose partnership structures, implying varying ownership levels [S44]; NVIDIA’s provision of local inferencing control planes further illustrates technical ownership options [S45].
Feasibility of achieving sovereign compute in low‑resource regions
Speakers: Nasubo, Sunil
Limited local compute is a disadvantage; sovereignty must rely on trusted partnerships while gradually acquiring compute capacity Sovereign compute can be built domestically, as demonstrated by large Indian data‑centre deployments
Nasubo points out that Africa’s share of global compute is about 1 % and that the continent is disadvantaged, so sovereignty must be pursued through partnerships and incremental local acquisition rather than full self-sufficiency [57-58][165-168]. Sunil presents the Indian experience where compute, storage and model training are established locally, enabling sovereign AI services [38-42][135-142].
POLICY CONTEXT (KNOWLEDGE BASE)
India’s AI access plan aims to expand compute capacity beyond major hubs, addressing low-resource constraints [S54]; offline, low-bandwidth solutions for underserved populations demonstrate practical feasibility [S43]; reference designs for AI factories are shared to enable local build-out in resource-constrained settings [S45].
Extent to which nationalisation versus partnership should be pursued for critical digital infrastructure
Speakers: Seima, Sunil
The goal is not to nationalise everything but to ensure strategic control and assurance through policies and guard‑rails Sovereign AI can be achieved by using the best foreign technologies inside a domestically controlled, ring‑fenced environment
Seima stresses that the aim is not to own every component but to secure strategic ownership and assurance, avoiding full nationalisation [94-98]. Sunil, while acknowledging the use of foreign technologies, emphasizes that they must be deployed inside a ring-fenced, locally controlled data centre to maintain sovereignty, suggesting a more ownership-centric approach to infrastructure [142-152].
POLICY CONTEXT (KNOWLEDGE BASE)
The India summit’s emphasis on strategic collaboration over full nationalisation [S40] and the Host Country Open Stage’s call for interoperability alongside control [S41] provide a policy backdrop; European perspectives stress partnership choice rather than forced dependence [S44]; global cooperation arguments reinforce the partnership route [S57].
Unexpected Differences
Necessity of substantial local compute for AI model development versus reliance on data and use‑case expertise
Speakers: Nasubo, Sunil
Sovereignty can be pursued with minimal local compute if rich data and use‑cases are available Sovereign AI requires domestic compute infrastructure to process data and train models
Nasubo suggests that even with only 1 % of global compute, Africa can advance AI sovereignty by leveraging its data and use-cases, implying that large local compute is not a prerequisite [57-58][165-168]. Sunil, however, asserts that core compute infrastructure must be located within the country to ensure control and to build models for national needs, indicating that substantial domestic compute is essential [25-27][38-42]. This contrast between data-centric versus compute-centric pathways was not anticipated given the overall consensus on partnership.
POLICY CONTEXT (KNOWLEDGE BASE)
AI 2026 forecasts suggest purpose-built, smaller models can achieve performance without massive local compute, relying on domain data and expertise [S47]; policy-harmonisation literature notes that adapting policies to local data needs can offset compute gaps [S48]; calls for indigenous capability building acknowledge both compute and data dimensions [S59]; NVIDIA’s local inferencing tech reduces the need for large-scale compute clusters [S45].
Overall Assessment

The panel largely agrees that digital sovereignty hinges on rule‑making, trusted partnerships and locally relevant AI. The main points of contention revolve around how much physical ownership and domestic compute are required versus how much strategic control and external collaboration suffice, and whether low‑compute regions can achieve sovereignty primarily through data and partnerships. These disagreements highlight the need for nuanced policy frameworks that balance domestic infrastructure investment with open, secure global partnerships.

Moderate – while there is broad consensus on the principles of sovereignty, the speakers diverge on implementation specifics (ownership vs strategic control, extent of local compute, and the role of nationalisation). The implications are that policy makers must craft flexible strategies that accommodate differing national capacities and avoid a one‑size‑fits‑all approach.

Partial Agreements
All speakers concur that sovereignty cannot be achieved in isolation; they agree on the need for partnerships, trust and shared responsibility, but differ on the balance between domestic control and external reliance. Speaker 1 frames sovereignty as rule‑making and co‑accountability [130-133][214-218]; Sunil stresses using foreign tech inside domestic rings‑fence [144-152]; Nasubo highlights partnerships to obtain compute while building local capacity [168-176]; Seima calls for engineered trust and global partnerships with guard‑rails [109-112][118-120].
Speakers: Speaker 1, Sunil, Nasubo, Seima
Sovereignty requires co‑accountability among market, government and society Trusted partnerships and global collaborations are essential while maintaining sovereign control
Both agree that AI solutions must be tailored to local linguistic and contextual realities. Sunil emphasizes native‑language voice AI for India’s multilingual population [28-31]. Nasubo illustrates the need for region‑specific health data, such as breast‑tissue differences in African women, to build accurate models [58-60]. They differ on the primary driver (language diversity vs health data) but share the goal of locally relevant AI.
Speakers: Sunil, Nasubo
Local language and context‑specific AI models are essential for impact Design must reflect local data and contexts (e.g., health use cases) to be effective
Takeaways
Key takeaways
Sovereignty is about who sets the rules and controls the digital destiny, not about total self‑sufficiency; it requires a balance between control and collaboration. Compute and data storage should reside within national borders to ensure strategic control and to support native‑language, real‑time AI services. Foreign technologies (e.g., NVIDIA, Azure, AWS) can be used, but must be deployed inside a locally controlled, ring‑fenced environment to avoid dependence on a single external provider. AI models must be designed around local data, contexts, and use‑cases (e.g., language diversity, specific medical data) and should include offline capability where connectivity is limited. Trust is a core pillar: it must be engineered, verified, and supported by transparent, traceable supply‑chains and hardware components. Governance requires clear, stable policies, sovereign guardrails, and a co‑accountability model among government, industry, and society. Treat digital infrastructure as a national asset, applying the same security, oversight, and continuous verification standards as other critical assets.
Resolutions and action items
Governments should develop and publish sovereign guardrails and policies that evolve alongside AI infrastructure. Industry should adopt a public‑private partnership approach, building sovereign compute capacity while leveraging best‑of‑breed foreign technologies within locally controlled data centres. Implement continuous security and regulatory verification processes rather than one‑off checks. Encourage the creation of regional compute hubs (e.g., in Africa) that can provide both online and offline AI services for local innovators. Promote open‑source or open‑sourced components (as demonstrated by NVIDIA) to bring critical software under local control.
Unresolved issues
Specific mechanisms for verifying and certifying trust in global supply‑chain components remain undefined. How low‑resource countries will acquire sufficient compute capacity without excessive reliance on external providers was not concretely addressed. Details of policy frameworks, ownership thresholds, and enforcement mechanisms were discussed conceptually but not finalized. Funding models and long‑term financial commitments required for building sovereign AI infrastructure were not resolved.
Suggested compromises
Use foreign hardware and software within domestically owned, ring‑fenced data centres to retain control while benefiting from advanced technology. Adopt a hybrid model of sovereignty: retain strategic control over compute and data, but collaborate with global partners for capacity and expertise. Treat digital assets as national assets with guardrails, without fully nationalising every component, allowing private sector innovation to thrive.
Thought Provoking Comments
Sovereignty does not mean we become isolated and do everything ourselves; it’s about controlling what we need and collaborating where appropriate. Compute infrastructure must be within the country to process and store data, but we can still use foreign technology within our own ring‑fenced environment.
Redefines sovereignty from a protectionist stance to a nuanced balance of control and collaboration, introducing the concrete criterion of ‘sovereign compute’ as essential for national digital destiny.
Set the foundational framework for the discussion, prompting other panelists to address both infrastructure and design layers. It shifted the conversation from abstract notions of sovereignty to concrete technical requirements.
Speaker: Sunil
Even though Africa has only about 1 % of global compute capacity, we have abundant data and specific use‑cases. By building tools that reflect our lived context—like breast‑cancer models for African women—we can define the rules ourselves despite limited compute.
Challenges the assumption that lack of compute precludes sovereignty, emphasizing data, local expertise, and contextual relevance as the true drivers of autonomous AI development.
Introduced a new perspective that sovereignty can be achieved through localized data and problem‑focused models, prompting the group to consider design and application layers over sheer hardware ownership.
Speaker: Nasubo
Sovereignty is not about owning every component of the supply chain; it’s about strategic control, visibility, and trust. We need guardrails and policies that treat digital assets like precious national assets, ensuring assurance without full nationalization.
Clarifies sovereignty as strategic control and trust rather than outright ownership, adding nuance about governance, visibility, and the role of public‑private partnerships.
Shifted the dialogue toward governance mechanisms and trust frameworks, leading participants to discuss policy evolution, continuous verification, and the balance between industry innovation and state oversight.
Speaker: Seema
We migrated the national AI language platform Pashini from a hyperscale cloud to our own data centre, and even open‑sourced a critical NVIDIA component so it runs entirely within our control. We use the best foreign tech, but inside a ring‑fenced environment we control.
Provides a concrete, real‑world example of achieving sovereign AI through strategic partnerships, open‑source adaptation, and infrastructure control, illustrating the earlier abstract concepts.
Validated the earlier theoretical points with a practical case study, reinforcing the feasibility of the ‘use best tech, keep control’ model and prompting agreement from other speakers on partnership over dependence.
Speaker: Sunil
In Africa, connectivity is only about 50 %, so we must design compute solutions that work offline. We’re building platforms that allow innovators to run AI locally without constant internet, ensuring inclusion of offline users.
Introduces the critical operational challenge of limited connectivity, expanding the sovereignty discussion to include offline capability and accessibility for underserved populations.
Redirected the conversation toward implementation challenges in low‑connectivity environments, leading to references to offline verification in Aadhaar and highlighting the need for adaptable infrastructure.
Speaker: Nasubo
Policies must evolve alongside infrastructure; we need continuous verification rather than point‑in‑time checks, and the government must provide stable, long‑term guardrails while industry focuses on innovation and scale.
Highlights the dynamic nature of governance for sovereign AI, stressing the importance of adaptive policy, ongoing security validation, and the symbiotic role of government and industry.
Cemented the earlier governance discussion, prompting the moderator’s summary about co‑accountability and reinforcing the call for a partnership model between state and market.
Speaker: Seema
Overall Assessment

The discussion was shaped by a series of pivotal insights that moved it from a vague slogan of ‘data sovereignty’ to a concrete, multi‑layered framework. Sunil’s opening definition anchored the debate in the necessity of sovereign compute, while Nasubo’s emphasis on local data and use‑cases reframed sovereignty as a function of contextual relevance rather than raw hardware. Seema added depth by distinguishing strategic control and trust from outright ownership, introducing governance mechanisms. Sunil’s real‑world migration example demonstrated how these principles can be operationalized, and Nasubo’s focus on offline capability highlighted practical challenges in low‑connectivity regions. Finally, Seima’s call for evolving policies and continuous verification tied the technical and design considerations back to sustainable governance. Collectively, these comments redirected the conversation toward actionable strategies—balancing partnership with control, leveraging global technology within national boundaries, and ensuring inclusive, trustworthy AI deployment.

Follow-up Questions
Is it realistic for a nation to be both sovereign in its AI infrastructure and remain connected to global ecosystems?
Understanding the balance between maintaining control over critical AI resources while leveraging global collaboration is essential for policy and technical design.
Speaker: Speaker 1 (to Sunil)
How can countries with limited compute capacity, such as many African nations, design AI solutions that function offline or with intermittent connectivity?
Addressing low‑connectivity environments is crucial to ensure AI benefits reach populations without reliable internet access.
Speaker: Speaker 1 (to Nasubo)
What policies and guardrails need to evolve in tandem with AI infrastructure to safeguard sovereignty?
Dynamic regulatory frameworks are required to keep pace with rapid AI development and protect national digital assets.
Speaker: Seema
How should ownership, visibility, and trust be defined and enforced across the supply chain of critical digital infrastructure?
Clear definitions of ownership and transparent supply‑chain visibility are needed to prevent external geopolitical leverage and ensure security.
Speaker: Seema
What mechanisms can enable continuous verification of security and regulatory compliance rather than point‑in‑time checks?
Ongoing monitoring is vital to maintain the integrity of sovereign AI systems over time.
Speaker: Seema
What is the optimal size and architecture of AI models (e.g., 20‑100 billion parameters) to satisfy the majority (≈95 %) of national use cases without resorting to trillion‑parameter frontier models?
Identifying cost‑effective model scales can guide investment decisions and reduce dependence on massive external models.
Speaker: Sunil
How can critical software components (e.g., NVIDIA’s NVCF) be open‑sourced or otherwise brought under local control to eliminate foreign lock‑in?
Localizing essential software ensures operational sovereignty and reduces reliance on external vendors.
Speaker: Sunil
How can nations build trusted global partnerships while preserving sovereign control over AI infrastructure?
Balancing collaboration with external tech providers against the need for autonomous control is a key strategic challenge.
Speaker: Seema
What approaches are needed to develop AI systems that accurately handle native languages, regional slang, and multilingual contexts at population scale?
Effective local‑language AI is essential for inclusive adoption in linguistically diverse societies.
Speaker: Sunil
How can third‑party technologies be integrated into a ring‑fenced environment while guaranteeing they remain trustworthy and cannot be accessed or controlled externally?
Ensuring that imported technologies operate securely within sovereign boundaries is critical for data protection.
Speaker: Sunil
What should a national digital infrastructure (analogous to power grids or telecom networks) look like for AI, and what guardrails are needed to protect it?
Conceptualizing AI infrastructure as a core national asset helps shape investment, governance, and security strategies.
Speaker: Seema
How can AI development processes ensure inclusion of offline or marginalized populations, preventing exclusion in model design and deployment?
Inclusive design guarantees that AI solutions serve all citizens, not just those with reliable connectivity.
Speaker: Nasubo
What public‑private partnership models can provide long‑term policy stability and financial commitment to encourage private industry to build sovereign AI capacity?
Stable, incentivizing frameworks are needed to attract private investment in large‑scale AI infrastructure.
Speaker: Seema
How can operational efficiency be achieved while maintaining the desired degree of sovereignty over AI systems?
Finding the right balance between efficient operation and sovereign control is essential for sustainable AI deployment.
Speaker: Seema
How can AI governance rules be co‑created with society (samaj) and the market (bazaar) to ensure broad accountability and relevance?
Inclusive rule‑making promotes legitimacy, aligns AI development with public interest, and strengthens sovereign oversight.
Speaker: Speaker 1

Disclaimer: This is not an official session record. DiploAI generates these resources from audiovisual recordings, and they are presented as-is, including potential errors. Due to logistical challenges, such as discrepancies in audio/video or transcripts, names may be misspelled. We strive for accuracy to the best of our ability.