Toxic Tech Dependency:
Why Germany’s Digital Sovereignty Has Become a Security Issue Digital sovereignty is no …

In the European digital debate, Open Source is often seen as synonymous with digital sovereignty. The reasoning is understandable: if the source code is open, anyone can review, modify, and operate it independently. This seems to automatically reduce dependencies on individual vendors.
However, this equation is too simplistic.
Open Source can be an important building block for sovereign IT. But Open Source alone guarantees neither control nor independence. There is a significant gap between freely available code and truly sovereign operation.
This gap is becoming increasingly apparent, especially in the cloud era.
Open Source initially describes a type of license. The source code is publicly accessible and can be used, modified, and distributed under certain conditions. This openness creates transparency and fosters innovation. Many of the most important technologies in modern IT emerge in this environment.
However, the openness of the code does not mean that a company also has operational control over its systems.
A software project can be fully Open Source and still be embedded in an operational model that creates high dependency. If central updates, infrastructure, identity services, telemetry, or management interfaces are controlled by a single provider, a platform dependency effectively arises—regardless of the license under which the code was released.
The crucial question is not just: Is the code open?
The crucial question is: Who controls the operation?
Many of the most successful Open Source projects of recent years follow a similar pattern. The core of the software is freely available. However, commercial platform offerings that provide operation, scaling, management, and integrations develop around this core.
For many companies, this is initially attractive. The entry barrier is low, the functionality is extensive, and the platform promises easy operation. But this is often where a new form of dependency begins.
Once applications are deeply integrated into these platform ecosystems, switching becomes difficult. APIs, operational tools, telemetry, CI/CD integrations, or proprietary extensions ensure that the actual Open Source core can hardly be operated in isolation.
The code remains open—the platform remains closed.
This tension is particularly evident in the cloud sector. A large part of modern cloud infrastructure is based on Open Source. Container technologies, observability stacks, databases, or messaging systems originate from open projects.
However, many companies do not use these technologies directly. Instead, they rely on managed services built on these projects. The operation is outsourced, and the platform takes over scaling, updates, and integration.
This is understandable. Operating complex systems requires experience and resources.
At the same time, control over central infrastructure components shifts back to platform operators. If databases, messaging systems, or observability tools are used exclusively through proprietary cloud services, a lock-in occurs—even if the underlying software is Open Source.
The openness of the code does not automatically prevent this dependency.
Digital sovereignty only arises when organizations not only have access to the source code but also possess the ability to operate their systems independently.
This involves more than a repository on GitHub. The structures around operation are crucial: infrastructure, automation, monitoring, security processes, identity management, and data management.
True independence only emerges when these layers run under controllable conditions. This is why cloud-native operational models play such an important role in the sovereignty debate.
Containerized applications, Infrastructure as Code, declarative configurations, and open interfaces create the conditions for systems not to remain tied to a single provider. Technologies like Kubernetes have become widespread precisely because they enable a unified operational environment across different infrastructures.
Open Source becomes the foundation here—but only portable operation turns it into a sovereign architecture.
In many discussions, digital sovereignty is primarily defined by software. This overlooks that the actual dependency often arises in the infrastructure.
Who operates the platform?
Under which legal framework does it run?
Who controls the network, storage, key material, and identity services?
These questions determine whether an architecture is sovereign or not.
An Open Source application fully embedded in a proprietary cloud platform remains structurally dependent. Conversely, a system operated on European infrastructure with open standards can be relatively sovereign even if not every component is fully Open Source.
Sovereignty is therefore less a question of licensing than a question of control over the operational environment.
This is precisely where the role of European infrastructure is becoming increasingly important. If companies build their systems with open technologies but operate them exclusively on platforms controlled outside the European legal framework, a structural imbalance arises.
Access to code does not replace control over data and operation.
This is why European infrastructure providers are moving more into the focus of the sovereignty debate. Providers like Hetzner, IONOS, OVHcloud, Scaleway, or STACKIT offer environments where modern cloud-native platforms can be operated without being fully embedded in the ecosystems of global hyperscalers.
Hetzner in particular plays a central role in many architectural considerations. The combination of the European legal framework, clear infrastructure architecture, and a comparatively open operational model makes the provider a pragmatic foundation for many workloads of sovereign platforms.
However, it is also true here: infrastructure alone does not solve the problem. Only in conjunction with open operational standards does a truly portable environment emerge.
Digital sovereignty always comes with responsibility. Those who want to be more independent must be willing to take more control over their own operations.
This does not mean having to operate everything oneself. Managed services, platform providers, and infrastructure partners remain important building blocks of modern IT. However, it is crucial that these partnerships do not lead to structural dead ends.
Architectures must be designed to remain transparent, migratable, and not entirely dependent on individual platform mechanisms.
This is precisely where the difference between technology use and technology competence becomes apparent.
Open Source remains a central component of modern IT. Without open projects, many of today’s technologies would not be conceivable. But Open Source is not a guaranteed path to digital sovereignty.
Sovereignty only arises where open software, controllable infrastructure, and portable operational models come together.
Those who only focus on license freedom overlook the real architectural question.
However, those who think of infrastructure, operation, and standards together can truly make Open Source a tool of independence.
In a time of growing platform dependencies, this is not an ideological project.
It is a strategic necessity.
Why Germany’s Digital Sovereignty Has Become a Security Issue Digital sovereignty is no …
🧠 Editorial If you’ve noticed: The Weekly Backlog looks a bit different. Now even more …
🧠 Editorial This week marks a shift. Away from the question of whether digital dependencies are …