Sovereign Engineering
Sovereign Engineering is both a philosophy of technology development and a specific program based in Funchal, Madeira, founded by Pablo Fernandez and Gigi. The term refers to the practice of building software systems whose freedom guarantees are structural properties of the architecture rather than policy promises made by operators.
Origins
The intellectual roots of sovereign engineering trace to the cypherpunk movement of the early 1990s. Eric Hughes’ A Cypherpunk’s Manifesto (1993) articulated the core obligation: “Cypherpunks write code. We know that someone has to write software to defend privacy, and since we can’t get privacy unless we all do, we’re going to write it.” This framing — that civil liberties in a digital age require engineering, not just advocacy — is the direct ancestor of sovereign engineering as a discipline.
The movement built on decades of cryptographic research by figures like David Chaum, whose work on blind signatures and digital cash in the 1980s demonstrated that privacy-preserving systems were technically possible. What the cypherpunks added was urgency: the internet was scaling faster than its freedom infrastructure, and the window to embed sovereignty into the architecture was closing.
Bitcoin (2008) represented the first large-scale sovereign system — a financial network where no single entity could freeze accounts, reverse transactions, or inflate the supply. Nostr (2020) extended the same architectural pattern to communication: a protocol where identity is a keypair, messages are cryptographically signed, and no relay operator can permanently silence a user.
The Program
The Sovereign Engineering program operates as a cohort-based residency in Funchal, Madeira. It is explicitly not a startup accelerator. There are no pitch decks, no equity stakes, no demo days aimed at investors. The selection criteria prioritize engineering ability and alignment with the sovereignty thesis over business viability.
Each cohort (designated SEC-00, SEC-01, SEC-02, etc.) runs for approximately four weeks. Participants — typically 15 to 25 developers — work on projects related to Bitcoin, Nostr, and freedom technology more broadly. The program provides housing, workspace, and a structured environment for focused building.
Gigi, writing about SEC-01, described the experience:
“What makes it special isn’t the talks or the mentorship — it’s the density. You put 20 developers who care about the same things in the same building for a month and things happen that couldn’t happen over a Telegram group.”
The program has run multiple cohorts since its inception, producing projects across several domains including relay infrastructure, key management, Lightning Network tooling, decentralized identity, and protocol development.
Notable projects
Projects that emerged from or were significantly developed during Sovereign Engineering cohorts include work on NIP (Nostr Implementation Possibilities) specifications, relay implementations, Bitcoin wallet infrastructure, and developer tooling for the Nostr ecosystem. The program’s output is measured not in startups launched but in infrastructure shipped — libraries, protocols, and tools that other developers build on.
Philosophy
Sovereign engineering rests on a specific technical claim: that the difference between a free system and an unfree one is not who operates it but how it is architected. A centralized service run by benevolent operators is not sovereign; a decentralized protocol run by adversarial participants can be.
The key architectural properties that distinguish sovereign systems:
-
Key-based identity. Users are identified by cryptographic keypairs they generate and control, not by accounts on someone else’s server. No administrator can revoke, suspend, or impersonate an identity.
-
Protocol, not platform. The system is defined by a specification that anyone can implement, not by a codebase that one company controls. Email is a protocol; Gmail is a platform. The distinction determines who holds structural power.
-
Censorship resistance through redundancy. Content availability does not depend on any single operator’s willingness to host it. In Nostr, a user’s posts can exist on any number of relays; removing them from one does not remove them from the network.
-
Self-custodied value transfer. Economic activity within the system does not require permission from financial intermediaries. Bitcoin and Lightning enable payments that no third party can block.
These are not political positions but engineering specifications. A system either has these properties or it does not, regardless of its operators’ stated intentions.
Contrast with “digital sovereignty”
The term “sovereign” in sovereign engineering should not be confused with its usage in European Union policy, where “digital sovereignty” refers to the capacity of states to regulate technology within their jurisdictions. The EU’s Digital Markets Act, Digital Services Act, and GDPR framework represent a vision of sovereignty where governments assert control over digital infrastructure on behalf of their populations.
Sovereign engineering inverts this entirely. The sovereign entity is the individual user, not the state. The two frameworks are not merely different but structurally incompatible: a system that gives individuals cryptographic control over their own data and communications necessarily limits the state’s ability to surveil, censor, or compel disclosure.
This tension is not theoretical. Canada’s invocation of the Emergencies Act in February 2022, which directed banks to freeze accounts of protest donors without court orders, demonstrated the vulnerability of systems where sovereignty resides in institutions rather than in architecture. A Bitcoin wallet holding the same funds would have been unaffected — not because of a legal exemption, but because of how the system works.
Unsolved problems
Sovereign engineering’s proponents generally acknowledge several hard problems that remain unsolved:
-
Key management. If identity is a keypair, losing the private key means losing the identity permanently. There is no “forgot password” flow. Solutions like NIP-46 (remote signing) and social key recovery reduce the risk but do not eliminate it. For mainstream adoption, key management must become invisible to users — a UX problem that no project has fully solved.
-
Discovery without centralization. Finding content and users on a decentralized network tends to re-centralize around popular aggregators. Search engines, trending feeds, and recommendation algorithms create de facto chokepoints even in architecturally decentralized systems.
-
Economic sustainability. Running relay infrastructure, developing open-source protocol implementations, and maintaining freedom technology requires sustained funding. The program itself operates on donations and grants. Whether this model scales beyond the current community remains an open question.
-
Content moderation. Censorship resistance means that no single entity can remove content. This is the point, but it is also a problem: illegal content, harassment, and spam require mitigation strategies that do not reintroduce the centralized control the architecture was designed to prevent. Current approaches rely on client-side filtering and relay-level policies, but no consensus exists on how to handle adversarial content at scale.
See also
- Nostr
- Bitcoin
- Cypherpunk
- Self-sovereign identity
- Freedom technology
- NIP (Nostr Implementation Possibilities)
Comments
Public conversation about this article.
No comments yet.
Article metadata
About this entry
Event Id
Raw event
Other authors
No one else has published this topic yet.