Tech »  Data sovereignty creates an illusion of security: the real battle is software integrity