Debunking our approach to digital sovereignty