Request a Briefing
Sovereign AI Infrastructure

AI that never leaves your perimeter.

A Mind is an AI agent that runs as a daemon on your hardware. Your data never leaves your perimeter. Built on Matrix — the protocol running in production at the Bundeswehr, the French government, and NATO.

Protocol
Matrix
NATO-adopted
Encryption
E2EE
End-to-end
Deployment
On-Premise
Air-gapped capable
Source
Open
Auditable
Trusted By

Built on a protocol governments already trust

Matrix is the open standard for sovereign, end-to-end encrypted communication. Adopted by NATO, deployed at the Bundeswehr and across the French government. Nervur builds AI infrastructure on this foundation.

Defense

NATO

Matrix adopted as the standard for sovereign military communication across alliance members. Interoperable, federated, end-to-end encrypted.

Military

Bundeswehr

Germany's armed forces run Matrix for internal communication. 100,000+ users on sovereign infrastructure. Federated across installations.

Government

French Government

France built Tchap on Matrix for all government employees. 600,000+ users. Sovereign by design, operated on government infrastructure.

Compliance

Built for regulatory reality

Nervur's architecture satisfies the most demanding compliance frameworks in Europe — not through policy documents, but through how the system is built.

Privacy

GDPR

Data never leaves your infrastructure. No cross-border transfers. No third-party processors. Data sovereignty by architecture, not by contractual promise.

Cybersecurity

NIS2

Critical infrastructure operators need supply chain control. Nervur runs on your network with no external dependencies at runtime. You control every component.

Financial

DORA

Digital operational resilience for financial entities. On-premise deployment eliminates third-party ICT concentration risk. Full operational sovereignty.

Cloud Security

BSI C5

German Federal Office for Information Security cloud computing compliance. On-premise architecture keeps all processing within your perimeter.

Encryption

End-to-End Encrypted

All communication encrypted with keys that never leave your perimeter. No key escrow. No backdoors. Cryptographic guarantees, not compliance theatre.

Auditability

Open Source

Full source code available for security audit. No black boxes. Your security team verifies every line before deployment.

Sectors

Where sovereign AI is not optional

In these sectors, data leaving your perimeter is not a risk to manage — it is a failure to prevent.

Defense

Military & Intelligence

Minds that process classified information on air-gapped networks. Federation between allied installations when authorized. Zero external data exposure.

Government

Public Administration

Citizen data stays within government infrastructure. Minds assist with document processing, case management, and inter-agency coordination. GDPR-compliant by architecture.

Finance

Banking & Insurance

A bank deploys 40 Minds — one per department. Client data and proprietary models processed entirely on-premise. DORA-compliant. No third-party ICT risk.

Healthcare

Hospitals & Research

Patient data and clinical workflows processed within hospital networks. Minds assist with diagnostics and documentation without exposing PHI.

Energy

Critical Infrastructure

NIS2-critical operators need AI that runs within their operational technology networks. No internet dependency at runtime. Air-gapped capable.

Legal

Legal & Regulatory Bodies

Legal analysis and document review where attorney-client privilege and regulatory confidentiality are non-negotiable. Minds run where the documents live.

Architecture

Deployed on your infrastructure

Your Mind runs within your perimeter. The hub provides secure, federated connectivity. Your data never crosses a boundary you do not control.

External
Federation
Allied institutions, approved partners
Controlled
Your Infrastructure
hub
On-premise Matrix homeserver. Your control.
Internal
Sovereign
Mind
AI daemon. Your data. Your network. Air-gapped capable.
Deployment

How it works

Step 1

Deploy the hub on your infrastructure

A Matrix homeserver runs on your network. You control federation policy: fully isolated, selected partners, or open.

Step 2

Install Minds where the data lives

Minds run as daemon processes on your machines. They access your data locally. They connect to the hub for coordination. They never send data externally.

Step 3

Access through the gate

A browser interface for your teams to interact with Minds. Deployed on your infrastructure. No external service dependency.

Step 4

Federate when ready

Connect to allied institutions through Matrix federation. Controlled, encrypted, auditable. Share what you choose. Keep what you must.

Architectural guarantees
  • All data processing happens on your infrastructure
  • Encryption keys never leave your perimeter
  • No runtime dependency on external services
  • Open source, auditable, verifiable
  • Built on the protocol adopted by NATO and sovereign governments
Verification

Cryptographic root of trust

Every hub traces its authority back to the licensor hub. Verification is offline — no network call needed.

licensor hub
nervur.org
Signs hub licenses
your hub
your-domain.com
Signs Mind licenses
your Mind
@mind:your-domain.com
Verified. Sovereign. Yours.
Licensor hub public key — ed25519
MCowBQYDK2VwAyEAVzZt6jbmRUc3qPGvkB2jT0xKpNwbjGhkyVGFYELP2Cw=
Hardcoded in every Mind. Never fetched from the network.

Ready to deploy sovereign AI?

Schedule a briefing with our team. We walk through your requirements, compliance needs, and deployment architecture.

On-Premise Air-Gapped Capable NATO-Grade Protocol