OpenInfra General Manager talks sovereignty, governments deploying tech 'kill switches'
- Reference: 1775557633
- News link: https://www.theregister.co.uk/2026/04/07/thierry_carrez_on_sovereignty_interview/
- Source link:
Even though Kubecon might almost be called AIcon, judging by the sheer number of announcements and vendors plugging the technology, there was also plenty of interest in sovereignty, despite the Kubecon organizers relegating Day 0 discussions to a hard-to-find room away from the rest of the conference.
Still, at least it was there, and there were a few nods to the subject during the second day's keynotes. A vendor at the conference explained that the topic had been a late addition, but one whose importance is set to grow.
[1]
Carrez opened the Day 0 sovereignty sessions, and we spoke to him about sovereignty and, in his words, "How much of a threat is it to have a kill switch on your critical infrastructure?"
[2]
Thierry Carrez
Carrez calls this "the survival problem," and it forms part of his definition of sovereignty – digital, data, AI, and so on. He says, "A lot of people are just talking about digital sovereignty as like a catchphrase for a bunch of things.
"The way I look at it is what are we meaning? It's all about building a resilience against something, right? But what are we exactly talking about? What are the scenarios we are actually trying to address?"
[3]
[4]
There is the sovereignty that enterprises should already have, which, according to Carrez, "is mostly around which laws apply to wherever your data is stored, wherever it's processed, and who can access it."
Then there is sovereignty in the supply chain. Not just software, but also the hardware that everything runs on.
[5]
And then there is what is necessitated by the possibility of that "kill switch."
For many, a kill switch that allows a vendor or its government to shut down critical infrastructure is a hypothetical threat. Carrez acknowledges this, saying, "It's something we need to build resilience against."
"I think," he says, "that the threat is going to be leveraged more in negotiations … just like 'Agree to this, or something bad might happen to your critical infrastructure.'
[6]
It's important to note that by "negotiations," Carrez means discussions at the geopolitical level and the leverage the threat, hypothetical or not, can yield.
"Some governments already have the capability to force their companies to not collaborate with overseas organizations … It's more the potential of the threat that we need to address than necessarily surviving the action."
A longer-term problem is hardware. "It's all about having alternatives," explains Carrez, "The leverage is there if there is only one provider, and sometimes just having the ability to switch from one to another is enough.
"And so one way to build resilience against US chip vendors suddenly no longer shipping to the EU is maybe we should be exploring China-based chip vendors and see if we can use them, or build some domestic, local, regional capacity to build those chips.
"It's not that we don't have the knowledge on how to make them. It's just like it was more convenient to use Taiwan and others to build them."
Carrez, however, is pragmatic and accepts that regulation is needed to prevent enterprises from sticking with what they know. "Regulation," he says, "is going to be key because you will have to accept some difference.
"I'm not necessarily saying it's a downgrade, but it's going to be sufficiently different to have a cost in switching. And so, if that cost is not covered, companies are going to continue using what they're what they've always been using, and the vulnerability will still be there. "For certain types of workloads, there is going to have to be some mandate from at Europe level or national level that, like, it's not reasonable to run your nuclear plant maintenance systems on Amazon, you know?"
Sticking with software, Carrez also cautions against opting for an open source single vendor product: "It's vulnerable to acquisition," he said, "and so you still keep that vulnerability because you put all your eggs into one basket."
[7]France buys nuclear supercomputing spinoff Bull from Atos for €404M
[8]Digital euro goes full sovereignty mode, US cloud giants not on guest list
[9]Europe's cloud minnows tell Brussels to stop big tech 'sovereignty-washing'
[10]'Death sentence': EU cloud lobby takes Broadcom to Brussels over VMware partner purge
"So I think open source combined with open-governed ecosystems like the CNCF here, or OpenInfra, guarantees you some independence against a single actor."
And the timescales? "It's going to take a while," Carrez acknowledges, "but they [the users] should start.
"They should at least audit their level of reliability. Where are they running? Where are their workloads running? Which ones are critical, which ones they can't really afford to be taken hostage in some kind of geopolitical negotiation, and start moving that, thanks to some public cloud that's built here.
"And yes, it's going to have a cost, like, if they are completely tied into one of the big hyperscaler eco-systems, it's going to be costly, but they need to know their vulnerability today, and don't wait for regulation to force them to look at it.
"They should be already looking at it." ®
Get our [11]Tech Resources
[1] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_onprem/publicsector&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=2&c=2adUqIKaLl5RxoewnsCvGLQAAANE&t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0
[2] https://regmedia.co.uk/2026/04/01/thierry_carrez.jpg
[3] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_onprem/publicsector&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44adUqIKaLl5RxoewnsCvGLQAAANE&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0
[4] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_onprem/publicsector&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33adUqIKaLl5RxoewnsCvGLQAAANE&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0
[5] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_onprem/publicsector&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44adUqIKaLl5RxoewnsCvGLQAAANE&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0
[6] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_onprem/publicsector&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33adUqIKaLl5RxoewnsCvGLQAAANE&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0
[7] https://www.theregister.com/2026/04/01/france_bull_purchase/
[8] https://www.theregister.com/2026/03/26/digital_euro_sovereignty/
[9] https://www.theregister.com/2026/03/18/cispe_sovereignty_washing/
[10] https://www.theregister.com/2026/03/19/cispe_eu_complaint_vmware_vcsp_closure/
[11] https://whitepapers.theregister.com/
And all of the infrastructure bits run on 48VDC. Can you guess why?
Another Puzzled Old Person Here.........................
Before the internet became pervasive, companies paid people like AT&T to connect their sites using a "private" T1 network.
In this world, AT&T would be INSANE to offer clients a service with "kill switches".
You could connect to T1 locally......and pay AT&T to backhaul to another POP so that you had a network backup.
This sounds like a reasonable way of doing business.
........until we get EVERYONE using the internet.....because it is cheap..........and probably has "kill switches" located in Washington DC!!!
Oh.....and then there's "the cloud"......................
Where Google (or M$ or ORACLE or Amazon) can "kill" your cloud any time they like!!
So......tell me that the old ways were not the best ways!!!
Re: Another Puzzled Old Person Here.........................
Those ways are not quite as different as you describe. I don't think there are internet kill switches in Washington, but if there are, why wouldn't they have had them on private lines? Did they suddenly become interested in the ability to take things down in 1995? That's especially true because a kill switch on the internet or big chunks of it would cause a lot more damage than individual ones on private lines, so if they wanted the ability to target individual things rather than black out communications altogether, the private lines were the easier things to mess with.
The old ways are the best ways if you need to and are in a position to operate your systems as if you're going to face deliberate attack trying to take you down and you need to survive that. If that's your situation, then you do want private buildings with your servers and a private line connecting them on private land you own and patrol with private security guards and anti-aircraft weapons. Since almost nobody non-military has all those things, you would make do with the subset you can have. For many others, they don't expect that a government's going to aim to take them out and, if they are, they won't withstand it. If my country's government wants my employer's network to go down, they don't need to try to break the internet or strong-arm the cloud providers when they could march some police into the office and order us to turn things off, so hardening our infrastructure to withstand something we don't expect and can't survive is not a logical argument for doing so.
I'm sorry, but if you're naive enough to think governments/TLAs don't already have kill switches implemented at the basic level, call me. I have a bridge to sell.
BTW, everything runs on electricity, there's nothing easier thant cutting the cord.