One American company holds 34 contracts across the British state. European governments are leaving, and your customers are starting to notice.
Published on 22 May 2026
A teenager builds a cyberdeck in their shed with no big tech, cloud services, and no chip backdoor. They buy an Orange Pi, wire up a keyboard and monitor and bolt the whole thing into a case that looks like something out of a 1984 science fiction novel. Then they take it to a coffee shop and sit there, working, completely offline.
The strange thing is that they are not a hacker or conspiracy theorist. In fact, on closer inspection, they might be the sanest voice in the room.
That teenager has understood something most businesses are only now catching up to. When the infrastructure you depend on belongs to someone else, you don't really own it. And this is not a niche concern from privacy activists or hobbyists. It is a structural question about who controls your data, your tools, and your competitive intelligence, one that is rapidly moving from the fringes into procurement conversations at businesses like yours.
What follows is a look at why data sovereignty stopped being a philosophical debate and became a business risk. From Palantir's quiet expansion across the British state to the accelerometer in your pocket that tracks you without permission, the evidence suggests the teenager in the shed was early, not extreme. For founders running businesses in the UK, the question is whether you are ahead of this or behind it when your next enterprise prospect asks where their data lives.
In February 2026, MPs debated in Parliament something that should have made the front pages. The subject was Palantir, the American data analytics company, founded with CIA backing, that now holds at least 34 contracts across 10 UK government departments.
The total documented spend exceeds £900m across the following:
The strategy has a name in sales circles: "land and expand".
Palantir started with a small Covid contract in 2020, then the NHS platform, and after that, the MoD deal. Each contract makes the next one easier to justify because the data is already inside, the integrations are already built, and switching costs compound with every passing quarter.
Four former MoD officials were hired by Palantir before the record defence contract was signed, and Peter Mandelson's firm represented Palantir while he served as UK Ambassador to Washington. The Green Party called for the NHS contract to be terminated, Labour MP Clive Lewis called it "a scandal" (Hansard, 2026-02-10).
Whether or not you share those MPs' politics (this is not a political piece), the structural point stands. The UK state now has £900m of its citizens' most sensitive data, including health records, defence intelligence, policing infrastructure, sitting inside systems it does not own, built by a company whose primary obligation is to its shareholders and whose founding investor was the US intelligence community.
And Palantir is not the only example of this. In France, during regulatory proceedings, Microsoft's own legal director admitted under oath that he could not guarantee French citizen data would not be transferred to the US authorities. This was not an ill-advised junior employee acting alone; it was a senior Microsoft employee giving a routine legal disclosure of where things actually stand. The jurisdiction follows the headquarters, regardless of where the servers are physically located (Civo, 2025).
You might be starting to recognise this pattern, and it is probably running in your own tech stack. If you have been thinking about the compliance deadlines that are quietly approaching, the Palantir story is the state-level version of the same risk sitting in your vendor list.
This is not the last Palantir story; it is not new. The US government's instinct to control the infrastructure and data has been playing out for 30 years.
In 1993, the NSA proposed the Clipper Chip: a mandatory backdoor in all secure communications hardware, with a "Law Enforcement Access Field" that would let intelligence agencies decrypt any message. The industry and the public overwhelmingly rejected it. Luckily for everyone, a fatal flaw was discovered in the encryption mechanism, and by 1996, it was gone.
The Snowden revelations in 2013 documented how the NSA's Special Access Operations unit physically intercepted network equipment in transit to install chip backdoors. From the leak, we learned that covert US intelligence activity was underway to target hardware before it reached customers, targeting routers, servers, and network switches.
Also in 2025, the Chip Security Act was proposed in the US Congress. This proposed legislation required geolocation-tracking capabilities to be built into advanced semiconductors. Framed officially as an anti-China export control measure, critics also point out that it achieves the same outcome as the Clipper Chip via a different route (Center for Cybersecurity Policy and Law, 2025).
CALEA, the US law that actually governs this area, explicitly prohibits mandating hardware backdoors. But covert methods fill the gap left by the law, as the Snowden documents showed back in 2013.
The instinct never died. Each decade produced a new version of the same idea.
So maybe our Gen Z Cyberdeck builder is not as paranoid as they initially seem.
The cyberdeck trend gets attention for the Neuromancer (1984) aesthetic. But the builders are not just making something that looks cool. Some of the most technically motivated among them are responding to something specific: a class of attack vectors documented in peer-reviewed research. These require no special access, no malware, and no user error. They exploit hardware sensors that most smartphone owners do not know their device has.
Your phone's accelerometer records motion, and every accelerometer chip has tiny manufacturing imperfections: calibration errors created during production, specific to that individual device. Those imperfections create a unique signature in how the sensor measures across its 3 axes. The signature it generates is stable and permanent, and it persists after a hard factory reset.
Any website you visit can query your accelerometer via JavaScript in a mobile browser without requesting any permission. As a user, you would not receive any prompts or notifications. The calibration error signature is sufficient to uniquely identify your device among tens of thousands of others (Bojinov et al., arXiv 2014).
Even if you changed your VPN, cookies, or browser, that fingerprint would not change. The manufacturing imperfection of each accelerometer unit is like an indelible marker, allowing each device to still be identified.
Geolocation research takes this even further. Each road and rail line has unique physical signatures: specific bumps, gradients, curves, acceleration and deceleration patterns. A phone's accelerometer records these as a motion trace that can be matched against a known route map. ETH Zurich's ACComplice research demonstrated location inference to within 200 metres, even with all location services disabled, with no initial location information, and no GPS active.
London Underground researchers built an accelerometer map of the entire Tube network. Each line has a unique vibration signature of the journey between stations. This, combined with magnetometer data, which measures direction relative to true north, and barometer data, which records altitude and air pressure, means that the system can determine the mode of transport, the specific route, and the precise location, using only sensors that require no user permission (MDPI, 2019).
The big takeaway is that even though GPS requires your explicit permission, accelerometers do not and querying them goes largely undetected by users. This type of surveillance also occurs in the gap that the law has not yet caught up with.
This is primarily a smartphone issue, and does not relate to cyberdecks in the main. The single-board computers most builders use do not include accelerometers by default. But the concern they are responding to is real, academically validated, and well documented.
The cyberdeck trend is a manifestation of something much larger, involving organisations and nation-states.
The 2026 State of Open Source Report (OpenLogic, March 2026) found that avoiding vendor lock-in has surged 22 percentage points year-on-year. It is now cited by 55% of organisations as the primary reason for choosing open source, up from 33% 12 months earlier. In Europe and the UK, nearly two-thirds name it as their primary motivator. Survey write-ins increasingly include "data sovereignty" and "digital autonomy" as specific terms: language that was not appearing in prior years' data at all.
Some governments are already taking control of their own data. In 2025, Denmark started switching from Microsoft to open-source software. Germany's Schleswig-Holstein region went even further and became the first in Europe to use only Linux and LibreOffice in public offices.
The UK government, by contrast, is deepening its dependency on US-controlled infrastructure, while two allied European governments are systematically dismantling theirs. This is not just a values argument; it is about risk exposure that regulators will eventually have to consider for the UK, too, logically on the same timeline they set for GDPR. UK businesses that have been slow to make strategic technology decisions may find that the regulatory pressure arrives before they are prepared for it.
The open source software market is growing at 16.5% compound annual growth rate, from $48bn in 2025 to a projected $95bn by 2030 (Research and Markets, 2026). That growth is being driven, at least in part, by organisations doing the maths on what happens if a key vendor gets acquired, repriced, or sanctioned.
Signal had 85 million monthly active users in 2026. Up 67% year-on-year. They had five major download spikes in 2025, each triggered by a competitor privacy scandal. Then a sixth following the Signalgate incident involving Trump administration officials (TechCrunch, 2025).
The response from established vendors has been to repackage rather than change. Cloud providers are striking surface-level partnerships with European firms to claim local data governance, while the underlying infrastructure and legal jurisdiction remain US-controlled. The Civo research calls this "sovereignty washing", the same as greenwashing, applied to data. It is worth remembering the phrase, as you will soon encounter it in your own vendor conversations.
The statistics from WhistleOut paint a similar picture for the consumer mindset. 92% of Americans express concern about their personal data being collected. And 81% believe the risks from data collection outweigh the benefits. Crucially, 62% have concluded that it is impossible to go through daily life without companies collecting their data (WhistleOut, 2026).
These figures suggest that consumers are highly aware of what is happening to their data, and it goes beyond mere apathy; they have resigned themselves to the fact that companies will collect and exploit it. Most of them are waiting for someone or a service to make it easier to regain their sovereignty.
The cyberdeck builders and Signal switchers represent roughly 10-15% who have crossed from concern into action. The 69% who have abandoned a purchase due to data concerns (eMarketer, 2026) are already acting on this in the market, even if they cannot explain why. The other 85% know something is wrong but feel too trapped to do anything about it.
If no one in your market is standing up clearly and saying: we know where your data lives, we do not sell it, you own it, that represents an opportunity. With the architecture to back it up, it can be a real moat and a genuine point of differentiation that is hard for competitors to copy.
The business situation in the UK is starting to echo what we see in the US consumer side.
A survey of 1,006 UK IT decision-makers by cloud provider Civo (April 2025) found that 84% are concerned geopolitical developments could threaten their data access; 68% say they will only use AI services where they have complete certainty over data ownership; and just 35% have full visibility into where their data is actually stored, processed, and governed.
These are not niche concerns from privacy activists. They are people running technology decisions at businesses like yours, and they have already started asking the question. The 62% who feel resigned are not resigned because they do not care about sovereignty; it is because no one has made an alternative available and made switching easy.
Data sovereignty is already a procurement question in regulated sectors. It will be a standard SME procurement question within 2 to 3 years. The likely timeline mirrors GDPR: enterprise first, then compliance pressure filtering down to SMEs as procurement governance takes hold.
Assuming that timeline, the Gen Z cyberdeck builder could be the CTO making the decision. So we should expect this new generation to be asking:
Most founders cannot answer that question for their own stack, let alone on behalf of their customers. They have their data spread across CRMs, AI platforms, analytics tools, and cloud service providers with limited visibility. The "land and expand" strategy Palantir ran is evident in your business across your whole vendor list.
I have been working through this in my own infrastructure. The knowledge system I use to run Polything, the one that stores client context, session history, and accumulated research, runs locally, on my own machine, indexed by a server I control. It did not take a team to build, just a concerted afternoon of effort with Claude Code. I am now able to own where competitive intelligence lives. And when clients ask, I do not have to say "in someone else's terms of service."
Not every business has to go that far, but knowing where your data is, which vendors have legal access to it, and what your exit looks like if one of them gets acquired or repriced is strategically important. Thinking about how you integrate AI into your business is no longer just a productivity question; it is a sovereignty question. And it is probably a business conversation worth having before someone forces it on you.
Probably better to be prepared and ahead of it when your next enterprise prospect asks.
The teenager in the shed was early, not extreme. Every actor we have covered arrived at the same conclusion, whether they were:
Data sovereignty stopped being a values question some time ago. It is now becoming a procurement question with a GDPR-shaped timeline. Most founders who got ahead of GDPR are glad they did. The ones who waited until it arrived at their door spent the next 18 months explaining why they were not ready.
The teenager sitting in that coffee shop, working offline, was not the outlier in this story. They were actually the ones at the head of the adoption curve.
Explore more insights and strategies to elevate your marketing approach.
65% of marketing tasks are now AI-automatable. The 35% that survives - judgment, relationships, creative direction - is where every growth decision lives.
Over $2 trillion wiped from SaaS valuations. Per-seat pricing is collapsing as AI replaces the humans who held those seats. Here's what founders should do next.
Your value proposition is stuck at level 1. Learn how the Bain Value Pyramid and emotional benefits help you escape price wars and command premium fees.