It's advised to use the latest maintained release from the list of maintained releases.
Please note that this content is under development and is not ready for implementation. This status message will be updated as content development progresses.
Durable Storage
Overview
A common and important question raised by UNTP implementers and policymakers is:
"What happens to a Digital Product Passport or conformity credential when the issuing organisation goes out of business?"
This page provides guidance on how UNTP credential publishers can select storage approaches that ensure their credentials remain accessible, tamper-evident, and verifiable for the full required lifetime of those credentials — independent of any individual organisation or service provider.
This guidance is relevant to all actors who publish UNTP credentials including issuers of:
- Digital Product Passports (DPP)
- Digital Conformity Credentials (DCC)
- Digital Traceability Events (DTE)
- Digital Facility Records (DFR)
- Digital Identity Anchors (DIA)
The Problem: Credential Longevity vs. Organisational Mortality
UNTP credentials are designed to carry sustainability, traceability, and conformity claims that must remain verifiable for the lifetime of a product, facility, or business — which may be decades. However, the organisations that issue those credentials (manufacturers, certifiers, conformity assessment bodies) are subject to the normal lifecycle of businesses: they may restructure, be acquired, become insolvent, or simply cease operations.
Similarly, commercial storage or hosting services used by those organisations may be discontinued, acquired, or changed.
The challenge this creates has three distinct dimensions:
- Availability: Will the credential still be retrievable at its URL after the issuer is gone?
- Integrity: Can a verifier be confident the content at a given URL has not been silently altered or replaced?
- Economic sustainability: Who pays for storage to continue when the original publisher no longer exists?
A naive approach — hosting credentials on the issuer's own web server or even a standard cloud provider — fails on all three counts once the issuer stops paying their bills. Even blockchain-based or decentralised storage networks are not immune: networks can lose critical mass of participants, be abandoned by their developer communities, or become economically unviable if token incentives collapse. No technical solution can guarantee infinite longevity, but the approaches described below are designed to maximise durability by distributing both the storage responsibility and the economic incentive to serve data across many independent actors.
Why a Protocol-Based Approach Is Preferred
UNTP is a fundamentally decentralised architecture. It deliberately avoids any requirement for a central data repository. This design principle applies equally to credential storage.
Rather than recommending a centralised national or international backup register — which would be costly to build, politically contentious to govern, and fragile as a single point of failure — UNTP recommends a protocol-based approach to durable storage.
A compliant durable storage approach SHOULD satisfy all three of the following properties:
- Post-issuer availability: The credential continues to be served even after the original publisher has ceased operations.
- Post-provider availability: The credential continues to be served even if the specific storage service provider also ceases operations.
- Tamper-evident integrity: It is not possible to silently replace or alter a credential at its storage address without detection.
Existing open protocols already satisfy these properties. The following sections describe them and provide practical implementation guidance.
Content-Addressable Storage: The Key Concept
The foundation of durable, tamper-evident storage is content-addressability. In a content-addressable system:
- The address (identifier/URL) of a credential is derived directly from a cryptographic hash of its content.
- This means a given address always and only refers to one specific document. Any change to the document — even a single character — produces a completely different address.
- Because the address is the hash of the content, any party serving the content can be verified independently, without trusting the server itself.
This approach is fundamentally different from conventional web hosting, where a URL like https://company.example/dpp/product-123.json is just a pointer controlled by the domain owner, who can change or delete the content at will without any external party detecting the substitution.
Content-addressable storage underpins both of the primary protocols recommended below.