Sovereign Stack - compliance and settlement infrastructure your government owns, not rents.
Nation-states, central banks, sovereign wealth funds, and financial free zones need compliance and settlement infrastructure they own - not rent from a US or UK vendor. Sovereign Stack is JIL's turnkey-deployable platform for exactly this. Runs on your sovereign infrastructure. Signs with your hardware security module. Produces court-admissible records under your law. Perpetual licence with source-code escrow. Post-quantum bound from day one (NIST FIPS 204). Not SaaS. Not subscription. Owned.
Sovereign states rent their compliance infrastructure. They shouldn't.
Every large country's financial system depends on compliance tooling built in the United States, United Kingdom, or Israel - Chainalysis, TRM Labs, Palantir, LexisNexis, Elliptic. Each of those vendors sells SaaS. None offer a sovereign-deployable, source-available, perpetually-licensed configuration. Every jurisdiction - from the largest G7 nation to the smallest financial centre - is renting critical infrastructure from foreign suppliers over whom they have no recourse in a crisis.
JIL Sovereign was architected from the ground up to solve exactly this. Sovereignty is not a configuration option; it is the premise.
Principals who cannot accept a SaaS answer.
Central Banks
Running CBDC pilots, wholesale settlement rails, cross-border corridor programmes. Need native-language regulator portals, domestic HSM root-of-trust, and integration with national payment systems.
Financial Free Zones
ADGM, DIFC, QFC, GIFT City, Astana IFC, Casablanca Finance City. Regulators building tokenised-asset frameworks need a deployable compliance substrate their licensees share.
Sovereign Wealth Funds
Mubadala, ADIA, PIF, QIA, KIA, Temasek, GIC. Custody programmes for tokenised bonds, digital assets, and cross-jurisdictional reserves need attestation-grade infrastructure under sovereign control.
Ministries of Finance / Economy
National digital-economy programmes (Vision 2030, Centennial 2031, Vision 2040, D33, Viksit Bharat 2047). Sovereign-grade compliance is infrastructure; it belongs on the national balance sheet, not as a rented subscription.
Financial Intelligence Units
FIUs and Financial Crime Authorities whose current SAR/CTR pipelines depend on quarterly filings from regulated entities. Real-time cryptographically-verifiable visibility replaces paper.
BIS Innovation Hub Participants
Central banks in BIS Agora, Nexus, Ensemble, and Guardian programs need a compliance primitive that interoperates cross-border without surrendering sovereign control of any single jurisdiction's data.
A complete sovereign-grade stack, not a point tool.
| Component | What it does |
|---|---|
| Sovereign Settlement Layer (L1) | Fourteen-of-twenty BFT validator cluster operated by your chosen parties. Your central bank, commercial banks, and regulator entities as validators. |
| Compliance Attestation Engine | Under-two-second pre-settlement verdicts across 111 regulatory checks covering sanctions, AML/CTF, UBO, Travel Rule, and jurisdiction-specific rules. |
| Regulator Attestation Network (RAN) | Per-agency regulator portals with real-time cryptographically-verifiable visibility. Replaces quarterly paper filings. |
| CourtChain - Sealed Records | Every settlement produces a civil-admissible sealed record accepted under your law and the Apostille Convention in 43 countries. |
| Post-Quantum Binding | NIST FIPS 204 ML-DSA-65 signatures. Records remain forgery-resistant through the entire 15+ year civil-evidentiary horizon and beyond Q-Day. |
| Sovereign Custody (MPC) | Multi-party-computation custody for tokenised assets, CBDC reserves, and sovereign wealth treasury. Non-custodial by design - your keys never leave your HSM. |
| Cross-Sovereign Interoperability | Your deployment's attestations are cryptographically verifiable by any other JIL-deployed sovereign, without surrendering control to a shared operator. Peer-to-peer verification. BIS Agora compatible. |
| Localisation | Native-language regulator portals, locale-specific date/currency formatting, jurisdiction-parameterised check catalogue. |
| Hardware Security Modules | Thales Luna or Utimaco HSMs anchored in your central bank and a designated second site. Signing keys never leave national borders. |
| Training Programme | 40-90 of your engineers trained across validator operations, attestation engineering, regulator-portal administration, MPC custody, and security. By Year 2 end, your deployment runs on your staff. |
Built to operate, not demonstrated in a lab.
JIL's reference mainnet already runs in production across ten validator jurisdictions on three continents. The platform your deployment runs on is the same platform running today.
Three configurations. Full pricing confirmed under NDA.
Principal-level dialogues are where dollar figures are shared. The structure is public; the per-country envelope is not.
Pilot / Single-jurisdiction
- 10-validator cluster
- Single-regulator RAN portal
- CourtChain under your law
- MPC custody (optional)
- 30-50 engineers trained
- Source code escrow
- Perpetual licence
Mid-sovereign / Dual-track
- 20-validator cluster, dual-instance
- Multiple regulator portals (central bank + financial authorities + FIU)
- CourtChain + Apostille-recognised records
- MPC sovereign custody
- 60-90 engineers trained
- Corridor bridge add-ons (trade partners)
- Source code escrow + perpetual licence
Major Financial Centre
- 20+ validator cluster, multi-site
- Full regulator portal suite
- BIS Agora / Nexus integration
- Multi-corridor bridges
- Sovereign Commons participation
- Strategic partnership optionality (SWF participation)
- All Tier 2 capabilities
Ownership you can audit and exit without our cooperation.
Your hardware, your data, your jurisdiction
All data and cryptographic keys remain on your sovereign infrastructure. JIL personnel have audit-only access via your-approved observability channel. No administrative access without explicit per-incident sign-off.
Your law, your courts
All deployment contracts governed by your chosen jurisdiction. Dispute resolution in your courts or an agreed international venue. JIL does not reserve extraterritorial rights over your deployment.
Source code escrow + perpetual licence
Source code held by a Tier-1 escrow agent (Iron Mountain, NCC Group, or your-approved alternative). Release triggers: JIL dissolution, material uncured breach, or 30-day SLA failure. Your deployed version runs forever even if we cease operations.
Post-quantum from day one
Every signature is hybrid: classical Ed25519 + post-quantum ML-DSA-65 (NIST FIPS 204). Records produced today remain cryptographically valid after Q-Day. Customers deploying with us in 2026 are protected through 2045 and beyond.
Trained national engineers
Deployment includes a structured training programme. Your national engineers are the operators; JIL is the licensor and third-tier support. No lock-in via support dependency.
Regional re-licensing rights
Your deployment's configured instance can be offered, under your brand, to neighbouring jurisdictions on sovereign-to-sovereign terms. JIL retains rights to core IP; you retain rights to the regional trust relationship.
One country opens the door; a region benefits.
JIL deployments are designed to federate. A sovereign that deploys first becomes the anchor of a regional Compliance Commons - an interoperable cluster of sovereign instances where each state's attestations are cryptographically verifiable by neighbouring states without any party surrendering control. The Gulf Cooperation Council is the first Commons cluster under active planning. ASEAN and African Union clusters follow.
Commons membership is opt-in per sovereign. The technical standards are open; the trust roots are sovereign. Your participation does not require participation from anyone else.
Begin a principal-level conversation.
Sovereign deployments do not proceed through procurement cold-outreach. They begin with a principal conversation - a sixty-minute call between a sovereign principal and JIL's founder. No procurement, no financial commitment at Stage 1. We will understand whether the fit is real; you will understand whether the sovereignty claims hold up to technical diligence.