What you're feeling is legitimate
You published a photo on your portfolio, Instagram, or a client's site. Days or weeks later, you find it being used by a brand, media outlet, blog, or another account — without credit, permission, or compensation. This is a direct violation of your copyright, which exists automatically from creation. But you still need to prove you're the original author and that your version predates the infringer's.
Responding to photo theft: your concrete options
- Take a dated screenshot of the unauthorized use before anything else.
- Gather your priority evidence: original RAW files, EXIF metadata, publication date.
- Contact the infringer in writing, requesting immediate removal or compensation.
- Report the content on the relevant platform (Instagram, Facebook, Google Images…).
- If refused or for commercial use, consult a lawyer specializing in intellectual property.
ProofStamper cannot resolve an ongoing dispute — it protects for the future. For an active dispute involving commercial use, consult an intellectual property lawyer.
EXIF data can be deleted or falsified in seconds
EXIF metadata embedded in a photo file is not legally robust proof — it can be erased by any editing software or during upload to a social network. An infringer can easily claim the EXIF was manipulated. Only a fingerprint timestamped by an independent trusted third-party authority is technically unassailable.
Next time, certify your original before publishing
I just finished a shoot or edit.
I generate a timestamped proof of my original RAW or JPG file before any publication.
I can prove this file existed at this date, prior to any third-party use.
The photo never leaves my device. Only the SHA-256 fingerprint is transmitted.
3 steps before each publication
- Drop your original file: RAW, JPG, TIFF, PSD… all photo formats accepted.
- Automatic local certification: SHA-256 hash computed in the browser + RFC 3161 timestamp via FreeTSA.
- Download your Proof Pack: Readable PDF certificate + archivable .tsr token. Keep it safely with your original.
Which proof of priority for your photos?
Comparison of the most common protection methods.
| Criterion | EXIF | Watermark | Social media date | ProofStamper |
|---|---|---|---|---|
| Falsifiable | Yes | Removable | Not verifiable | No (RFC 3161) |
| Removable | Yes (edit/upload) | Yes (crop) | N/A | No |
| Cost | Free | Free | Free | Free |
| Delay | Automatic | Manual | Automatic | 30 seconds |
| Third-party verifiable | No | No | No | Yes |
| Technically recognized | No | No | No | Yes (RFC 3161) |
Frequently asked questions
- Does my copyright exist automatically without registration?
- Yes, in most countries that signed the Berne Convention, copyright exists from the moment of creation, without any formality. However, in case of dispute, you need to prove the priority of your version — that's where timestamped proof becomes essential.
- Isn't EXIF metadata enough as proof?
- No. EXIF data can be deleted during upload to a social network, or modified with any editing software. It doesn't constitute independent, third-party verifiable proof.
- Is my photo sent to your servers?
- No, never. All processing happens locally in your browser. Only the cryptographic fingerprint (SHA-256) — a unique identifier that cannot reconstruct your image — is transmitted for timestamping.
- Would this proof be admissible in court?
- The RFC 3161 certificate constitutes technical proof of priority. Combined with a bailiff's report, it's strong evidence to establish the existence date of a file.
- Can I timestamp photos in batch before publication?
- Yes, with the Pro plan you can certify up to 50 files simultaneously. Ideal before publishing a series on your portfolio or social media.