You had the idea first — but can you prove it?
You developed a concept, product, interface, or original service. You shared it with partners, investors, or contractors. A few months later, a competitor releases something strangely similar. Or worse: they claim they had the idea first. Without prior timestamped proof, demonstrating your priority becomes a difficult and expensive battle. Testimonies from friends aren't enough. Internal emails can be disputed. Only an independent technical proof carries weight.
Responding to idea theft: your concrete options
- Document the similarities between your product and the competitor's with dated screenshots.
- Gather all existing priority evidence: emails, files, presentations, Git commits.
- Consult an intellectual property lawyer before any public action.
- Don't attack publicly on social media before having a clear legal strategy.
- If necessary, file a trademark, patent, or design with the relevant authority.
ProofStamper cannot resolve an ongoing dispute — it protects for the future. For an active dispute, consult an intellectual property lawyer.
An internal email or Git commit can be disputed
Classic digital evidence all has weaknesses — emails can be backdated, Git commits can be modified, testimonies are subjective. A well-advised competitor will systematically challenge these elements. Only a timestamp from an independent trusted third-party authority, using the open RFC 3161 standard, produces technically unassailable and independently verifiable proof.
Next time, certify every key stage of your creation
I'm finalizing a concept, mockup, prototype, or strategic document.
I generate a timestamped proof of the file before any external sharing.
I can prove this version existed at this date, prior to any disclosure.
The file never leaves my device. Only the SHA-256 fingerprint is transmitted.
Certify every milestone, not just the final version
The more you timestamp early and often, the stronger and more irrefutable your creation timeline becomes.
- Initial brief
- Mockups & wireframes
- Working prototype
- Investor pitch deck
- Beta version
- Public launch
Which protection to prove idea priority?
Four approaches compared.
| Criterion | IP Office filing | Patent | Soleau envelope | ProofStamper |
|---|---|---|---|---|
| Cost | €190–250 | €3,000–10,000 | €15 | Free |
| Delay | Weeks | 12–24 months | Weeks | 30 seconds |
| Accepted formats | Limited | Text description | Paper / PDF (7 pages) | All |
| Confidentiality | Mandatory publication | Published after 18 months | Confidential | Total (nothing leaves the device) |
| Verifiable online | No | No | No | Yes ✓ |
| Complements legal filings | Yes | Yes | Yes | Yes ✓ |
3 steps to certify each key stage
- Drop your file: Concept, mockup, prototype, pitch deck… any format.
- Automatic local certification: SHA-256 hash computed in browser + RFC 3161 timestamp via FreeTSA.
- Download your Proof Pack: PDF certificate + .tsr token. Archive it with your original file.
Frequently asked questions
- Can an idea be legally protected without a patent?
- Law doesn't protect ideas as such, but it protects their concrete expression (text, mockup, code, design). A timestamped proof of priority demonstrates that this expression existed at a given date, before the competitor's.
- Does ProofStamper replace an IP office filing?
- No. ProofStamper is complementary. It provides immediate, free technical proof of priority, usable from the earliest creation stages. For complete legal protection (trademark, patent, design), an official filing is still recommended.
- Is my file sent to your servers?
- No, never. All processing happens locally in your browser. Only the cryptographic fingerprint (SHA-256) — a unique identifier that cannot reconstruct your file — is transmitted for timestamping.
- Would this proof be admissible in court?
- The RFC 3161 certificate constitutes technical proof of priority. Combined with a sworn statement, it represents a solid element for establishing a file's existence date in a dispute.
- Can I timestamp a confidential pitch deck safely?
- Absolutely. The file never leaves your device. Only the cryptographic fingerprint (SHA-256 hash) is transmitted. Nobody — not ProofStamper, not the timestamp server — can access your document's content.