Trends
Who holds the Internet’s address book? Why digital sovereignty may be a mirage
Analysis of digital sovereignty debates and why control of internet identifiers does not equal power over the network.

Headline
Analysis of digital sovereignty debates and why control of internet identifiers does not equal power over the network.
Context
• Debate over digital sovereignty risks misunderstanding the nature of global internet infrastructure and fragmenting connectivity. • Experts question whether attempts to control regional internet policy through centralised mechanisms could harm openness and cooperation. The global internet runs largely because of a set of technical systems that assign identifiers to computers and networks, known as IP addresses. At the core of this numbering system are the five Regional Internet Registries (RIRs), neutral entities that record who holds which ranges of addresses so that networks can communicate reliably across borders. In Africa, that registry is AFRINIC.
Evidence
Pending intelligence enrichment.
Analysis
A recent commentary framed the RIR’s role as akin to “an address book” rather than a governing authority. This metaphor captures a fundamental feature of internet governance: the internet functions through coordination, not top-down control. That distinction matters in current debates about digital sovereignty — the idea that a state or region can exert complete authority over digital infrastructure and data flows within its sphere. In policy discourse, digital sovereignty has become a buzzword linked to national security, economic autonomy and regulatory control. Scholars note that digital sovereignty can cut both ways: while it may empower governments to protect citizens’ rights online, it can also extend state power into areas that restrict openness and innovation. The question of sovereignty stretches beyond policy rhetoric into how the internet’s architecture actually works. The RIR model is built on multistakeholder cooperation — technical operators, civil society, governments and private companies all contribute to decisions about identifiers and resources. This system was designed to prevent any single actor from imposing control over the entire network, which is inherently decentralised by design.
Key Points
- The address book that isn’t power
- Sovereignty versus connectivity: a hard balance
Actions
Pending intelligence enrichment.





