Scaling the Verifiable Digital Product Passport

Scaling the Verifiable Digital Product Passport

👉 The Digital Product Passport (DPP) is a digital sheet that provides information on a product’s origin, composition, repair and disassembly options, and how individual components can be recycled. It enables stakeholders throughout the value chain (producers, importers, distributors, repairers, recyclers, consumers, etc.) to share and access this data more easily.

👉 Attaching a Digital Product Passport to goods is made mandatory by law for all products in the combined context of reducing climate externalities (as governed by the European “Ecodesign for Sustainable Products Regulation” (ESPR)) and to demonstrate fulfillment of CSR requirements.

👉 Purely informational DPPs first apply to product items considered as equivalent. The initial objectives of such digital product passports are to:
· Kick-start the transition to sustainable consumer products towards a more circular economy.
· Enable companies to share product data to facilitate reparability, reuse and recycling.
· Inform consumers about the environmental impact of products and give them the means to adapt their purchasing behavior.
· Meet regulatory requirements on product eco-design.

👉 More advanced operational objectives are to provide per unit traceability, applied to traceable reuse, recycle, destruction, second market change of ownership, anti counterfeiting, anti grey market to name a few. However this requires to uniquely and permanently identify any single item in a product line or even occurring as a component to a bigger system.

🤔 Finding the proper ways to globally achieve and scale such per unit auditable and secure traceability is a challenge. Specifically no blockchain solution can scale to the volumes of the worldwide retail market!

🚀 The article shows how the KeeeX technology can be leveraged to address the Verifiable Digital Product Passport at Scale in all its flavors, from generic product-based customer information to per item serialized codes allowing for the traceability of maintenance, recycling, decommissioning and proof of ownership to enable a second market.

KeeeX has a working experience of Electronic Transferable Records and the Digital Product Passport (since the Bonjour Le Bon and the MeRS project is 2019). Our commitment to ubiquitous and free permanent verifiability of proofs is unique to the market, as well as our commitment for climate, as we compensate all our greenhouse emissions.

KeeeX shares its new Multihash algorithm !

KeeeX shares its new Multihash algorithm !

🚀 KeeeX shares its new KXMash Multihash algorithm with the community!

Some documents or files need to be preserved for arbitrarily long durations. For example pay slips and diplomas, BIM (digital model of a building), or NFTs.

Fortunately, the usual algorithms for calculating cryptographic hashes are resistant to quantum computing. Nevertheless, the search for more efficient algorithms is ongoing. The future failure of a popular algorithm like SHA2 could make it possible to substitute one NFT or diploma for another in an undetectable way. How then can we protect assets for very long periods with today’s algorithms? 🤔

KeeeX tries to deliver the best in data protection to our customers, and we have historically dealt with this with “classic” combinations of algorithms requiring user control. There were drawbacks. 😒

To address the challenges of massive dematerialization and Web3, we wanted to offer a natively more robust keeexing algorithm, and enable our customers to multiply the protection of their files through simple parameterization.

🎉 KeeeX is pleased to share with the community the KXMash (pronounced keeexmash) family of algorithms, enabling hash functions to be combined according to a model that combines the effects of parallelism and cascade into a unified calculation. The process is also resistant to algorithm substitution attempts.

KXMash takes as a parameter a list of hash functions (H1,…Hn), applying them all to the entire dataset (as in parallel mode), AND adding the result of each step to the input of all subsequent steps. This parameter obeys the syntax “Hn<…<H1”. The first of the string is the last in the cascade and defines the length of the output. The “Hn<…<H1” parameter is added at the head of the data to be protected.

Let’s imagine you want:
👉 secure a file for longer durations than today’s best algorithms allow: use kxmash’s default mode, which is “SHA3-256<SHA2-256”
👉 produce a 32-byte hash, but include a 64-byte hash in the calculation, without using truncation: use “SHA3-256<SHA2-512”, for example.
👉 issue NFTs for indeterminate durations: combine three different algorithm families over a length of 512 bytes: “SHA3-512<SHA2-512<SWIFFT-512” (In its usage KeeeX only uses the algorithms available in OpenSSL, but KXMash is not limited)

KXMash is the result of an innovation being deployed in version 2 of our metadata language and tools. The pdf will tell you more.

Link to article:….pdf



KeeeX Deploys Bitcoin BIP32 Self Sovereign Identity

KeeeX Deploys Bitcoin BIP32 Self Sovereign Identity

For the first time ever, BIP32 hierarchical deterministic wallets can be used to self define, publish, and revoke a cryptographic identity. This identity can be used to generate one time signatures for every item signed, hence achieving unprecedented signature security.

How it works

The identity is defined as the public master key of any node in a bip32 tree. This pub key can be shared, published at will, for instance on social networks.

Every signature can be traced to the corresponding public master key without ever exposing the corresponding private master key.

A demo

To test, you may download our demo file, then verify it on, and hopefully search the web for the master identity used: xpub6BBj7rHc3YY3v3Xxj4B7UHSuM6bQJSPugj3BRY7yaHEZg8HDSEkoBfWJqbbXCB9ECjcJp3vV1CzrPmMdeLCGRLRTsvu5suE5UbbrYHg9D4p

You can play with BIP32 here.

Further reading

And view the BIP32 specifications there.

KeeeX launches a Bug Bounty program to crack our encrypted container

KeeeX launches a Bug Bounty program to crack our encrypted container

We are publishing a bug bounty challenge to crack our encrypted container, thanks to

We are extremely proud to accompany the launch of their new bug bounty platform.

Note that KeeeX offers ultimate confidentiality by encrypting using totally anonymized containers (that neither disclose any hint of who are the sender and receivers nor of what is the data), that may further be exchanged using your own cloud or disk.

KeeeX Now Supports FIDO U2F authentication

KeeeX Now Supports FIDO U2F authentication

As of  version 2.3.0 released end of January 2016, the amazing value of KeeeX if now further protected with universal 2 factor FIDO (the FIDO standard is promoted by the Fido Alliance). This means that you can use any FIDO device (as e.g. Neowave’s Keydo, Yubico’s key…) to protect your KeeeX account.

Further protecting your KeeeX account means protecting an amazing range of your unique serverless collaboration : messaging, chats, ECM (document and content management, versions, classification…), processes, search, integrity.

The Future of Data : Immutable and Connected, like a Blockchain

The Future of Data : Immutable and Connected, like a Blockchain

Two innovations that illustrate applications of immutable and connected data tend to widely disseminate in our lives. Can we complement or improve on this and what do we learn?

One is Git. Git is the most widely used version control system. The emphasis of Git on data integrity builds upon an underlying scheme called “content addressable storage” and Merkle trees.


How Social Certificates may help build Decentralized Trust

These slides were presented at the World e-Id and Cybersecurity conference in Marseille (xuheg)

KeeeX lets users define their own identity settings using a social certificates: people who know you ensure that you are the one you pretend, in the absence of a certificate authority.

Social certificates can be renewed, published, revoked at any time, at no cost.

KeeeX won an award at World Smart Week in the category e-Id and Cybersecurity.

KeeeX is a unique no infrastructure, #nosaas solution.

KeeeX now encrypts and sends in 1 click, according to per user settings

KeeeX now encrypts and sends in 1 click, according to per user settings

KeeeX beta Lydig 1.7 is online! Now, your files and documents are by default automatically sent via weblinks via a partnership with Jaguar Network, or can be copied to your favorite cloud sync or shared folders.

And they are instantly received, and automatically moved next to their previous version if any.

They are also ultimately protected from prying eyes by automatic client side AES 256 encryption, and automatic receiver side decryption. No stress, no risk in the confidentiality of your industrial of intellectual property.

You pick a shared secret with a collaborator. KeeeX recalls it, as long as you need.