A competitor copied your idea or product — what to do?

It's one of the most frustrating situations for an entrepreneur. Here's how to respond concretely today, and how to prove your priority next time.

You had the idea first — but can you prove it?

You developed a concept, product, interface, or original service. You shared it with partners, investors, or contractors. A few months later, a competitor releases something strangely similar. Or worse: they claim they had the idea first. Without prior timestamped proof, demonstrating your priority becomes a difficult and expensive battle. Testimonies from friends aren't enough. Internal emails can be disputed. Only an independent technical proof carries weight.

Responding to idea theft: your concrete options

  • Document the similarities between your product and the competitor's with dated screenshots.
  • Gather all existing priority evidence: emails, files, presentations, Git commits.
  • Consult an intellectual property lawyer before any public action.
  • Don't attack publicly on social media before having a clear legal strategy.
  • If necessary, file a trademark, patent, or design with the relevant authority.

ProofStamper cannot resolve an ongoing dispute — it protects for the future. For an active dispute, consult an intellectual property lawyer.

An internal email or Git commit can be disputed

Classic digital evidence all has weaknesses — emails can be backdated, Git commits can be modified, testimonies are subjective. A well-advised competitor will systematically challenge these elements. Only a timestamp from an independent trusted third-party authority, using the open RFC 3161 standard, produces technically unassailable and independently verifiable proof.

Next time, certify every key stage of your creation

I'm finalizing a concept, mockup, prototype, or strategic document.

I generate a timestamped proof of the file before any external sharing.

I can prove this version existed at this date, prior to any disclosure.

The file never leaves my device. Only the SHA-256 fingerprint is transmitted.

Certify every milestone, not just the final version

The more you timestamp early and often, the stronger and more irrefutable your creation timeline becomes.

  • Initial brief
  • Mockups & wireframes
  • Working prototype
  • Investor pitch deck
  • Beta version
  • Public launch

Which protection to prove idea priority?

Four approaches compared.

CriterionIP Office filingPatentSoleau envelopeProofStamper
Cost€190–250€3,000–10,000€15Free
DelayWeeks12–24 monthsWeeks30 seconds
Accepted formatsLimitedText descriptionPaper / PDF (7 pages)All
ConfidentialityMandatory publicationPublished after 18 monthsConfidentialTotal (nothing leaves the device)
Verifiable onlineNoNoNoYes ✓
Complements legal filingsYesYesYesYes ✓

3 steps to certify each key stage

  1. Drop your file: Concept, mockup, prototype, pitch deck… any format.
  2. Automatic local certification: SHA-256 hash computed in browser + RFC 3161 timestamp via FreeTSA.
  3. Download your Proof Pack: PDF certificate + .tsr token. Archive it with your original file.

Frequently asked questions

Can an idea be legally protected without a patent?
Law doesn't protect ideas as such, but it protects their concrete expression (text, mockup, code, design). A timestamped proof of priority demonstrates that this expression existed at a given date, before the competitor's.
Does ProofStamper replace an IP office filing?
No. ProofStamper is complementary. It provides immediate, free technical proof of priority, usable from the earliest creation stages. For complete legal protection (trademark, patent, design), an official filing is still recommended.
Is my file sent to your servers?
No, never. All processing happens locally in your browser. Only the cryptographic fingerprint (SHA-256) — a unique identifier that cannot reconstruct your file — is transmitted for timestamping.
Would this proof be admissible in court?
The RFC 3161 certificate constitutes technical proof of priority. Combined with a sworn statement, it represents a solid element for establishing a file's existence date in a dispute.
Can I timestamp a confidential pitch deck safely?
Absolutely. The file never leaves your device. Only the cryptographic fingerprint (SHA-256 hash) is transmitted. Nobody — not ProofStamper, not the timestamp server — can access your document's content.