AI that never leaves your perimeter.
A Mind is an AI agent that runs as a daemon on your hardware. Your data never leaves your perimeter. Built on Matrix — the protocol running in production at the Bundeswehr, the French government, and NATO.
Built on a protocol governments already trust
Matrix is the open standard for sovereign, end-to-end encrypted communication. Adopted by NATO, deployed at the Bundeswehr and across the French government. Nervur builds AI infrastructure on this foundation.
NATO
Matrix adopted as the standard for sovereign military communication across alliance members. Interoperable, federated, end-to-end encrypted.
Bundeswehr
Germany's armed forces run Matrix for internal communication. 100,000+ users on sovereign infrastructure. Federated across installations.
French Government
France built Tchap on Matrix for all government employees. 600,000+ users. Sovereign by design, operated on government infrastructure.
Built for regulatory reality
Nervur's architecture satisfies the most demanding compliance frameworks in Europe — not through policy documents, but through how the system is built.
GDPR
Data never leaves your infrastructure. No cross-border transfers. No third-party processors. Data sovereignty by architecture, not by contractual promise.
NIS2
Critical infrastructure operators need supply chain control. Nervur runs on your network with no external dependencies at runtime. You control every component.
DORA
Digital operational resilience for financial entities. On-premise deployment eliminates third-party ICT concentration risk. Full operational sovereignty.
BSI C5
German Federal Office for Information Security cloud computing compliance. On-premise architecture keeps all processing within your perimeter.
End-to-End Encrypted
All communication encrypted with keys that never leave your perimeter. No key escrow. No backdoors. Cryptographic guarantees, not compliance theatre.
Open Source
Full source code available for security audit. No black boxes. Your security team verifies every line before deployment.
Where sovereign AI is not optional
In these sectors, data leaving your perimeter is not a risk to manage — it is a failure to prevent.
Military & Intelligence
Minds that process classified information on air-gapped networks. Federation between allied installations when authorized. Zero external data exposure.
Public Administration
Citizen data stays within government infrastructure. Minds assist with document processing, case management, and inter-agency coordination. GDPR-compliant by architecture.
Banking & Insurance
A bank deploys 40 Minds — one per department. Client data and proprietary models processed entirely on-premise. DORA-compliant. No third-party ICT risk.
Hospitals & Research
Patient data and clinical workflows processed within hospital networks. Minds assist with diagnostics and documentation without exposing PHI.
Critical Infrastructure
NIS2-critical operators need AI that runs within their operational technology networks. No internet dependency at runtime. Air-gapped capable.
Legal & Regulatory Bodies
Legal analysis and document review where attorney-client privilege and regulatory confidentiality are non-negotiable. Minds run where the documents live.
Deployed on your infrastructure
Your Mind runs within your perimeter. The hub provides secure, federated connectivity. Your data never crosses a boundary you do not control.
How it works
Deploy the hub on your infrastructure
A Matrix homeserver runs on your network. You control federation policy: fully isolated, selected partners, or open.
Install Minds where the data lives
Minds run as daemon processes on your machines. They access your data locally. They connect to the hub for coordination. They never send data externally.
Access through the gate
A browser interface for your teams to interact with Minds. Deployed on your infrastructure. No external service dependency.
Federate when ready
Connect to allied institutions through Matrix federation. Controlled, encrypted, auditable. Share what you choose. Keep what you must.
- ✓ All data processing happens on your infrastructure
- ✓ Encryption keys never leave your perimeter
- ✓ No runtime dependency on external services
- ✓ Open source, auditable, verifiable
- ✓ Built on the protocol adopted by NATO and sovereign governments
Cryptographic root of trust
Every hub traces its authority back to the licensor hub. Verification is offline — no network call needed.
MCowBQYDK2VwAyEAVzZt6jbmRUc3qPGvkB2jT0xKpNwbjGhkyVGFYELP2Cw= Ready to deploy sovereign AI?
Schedule a briefing with our team. We walk through your requirements, compliance needs, and deployment architecture.