Home SecurityOS Security Data sovereignty proof: How to verify controls like ‘Project Texas’