Solving Data sovereignty through Interconnection Data sovereignty is often treated like a legal checkbox, but the real control lies in the network design.