Why Use This Tool?
When entering business agreements, partnerships, or collaborations, protecting your prior intellectual property (IP) is crucial. This tool provides cryptographic proof that you possessed specific IP on a specific date—before any collaboration began.
The Problem
Imagine you're about to work with a company, and you're bringing valuable code, designs, or ideas to the table. Later, disputes might arise about:
- What IP did you already own before the partnership?
- What was created during the collaboration?
- Who owns what if things go wrong?
Without proof, these disputes can cost millions in legal fees and lost opportunities.
The Solution
This tool creates an irrefutable timestamp and cryptographic proof that you possessed specific files or folders on a specific date. It works like this:
- You package your confidential IP (code, documents, designs, etc.)
- The tool generates a unique "fingerprint" (SHA-256 hash) of your files
- This fingerprint is digitally signed with your private key
- You share the hash and signature with all parties—but NOT the actual files
- If a dispute arises later, you can prove you had those exact files on that date
This is the same method used by Google, OpenAI, and major tech companies in multi-billion dollar deals.
How It Protects You
Timestamped Proof
Creates verifiable evidence that you possessed specific IP on a specific date—before negotiations even began.
Zero Trust Required
You don't need to trust the other party. The cryptographic signature is mathematically verifiable by anyone.
Keeps Secrets Secret
You share only a hash—not your actual IP. Your confidential files stay private unless there's a dispute.
Court-Ready
Cryptographic signatures are admissible in court and nearly impossible to forge or dispute.
Fast & Simple
Takes less than 60 seconds to generate complete proof. No technical expertise required.
Organized Output
Automatically creates folders with clear instructions for what to send to whom.
Installation (macOS)
📥 Download Script
Direct download:
Download prove-prior-ip.shOr view on GitHub: github.com/vantasnerdan/prior-ip
1 Install Homebrew (if not already installed)
Open Terminal and run:
/bin/bash -c "$(curl -fsSL https://raw.githubusercontent.com/Homebrew/install/HEAD/install.sh)"
2 Install GnuPG
GnuPG (GPG) is the cryptographic tool that creates digital signatures:
brew install gnupg
3 Download the Script
Download using the button above, or use curl:
curl -O https://raw.githubusercontent.com/vantasnerdan/prior-ip/master/prove-prior-ip.sh
4 Make it Executable
In Terminal, navigate to the script's location and run:
chmod +x prove-prior-ip.sh
How to Use
Basic Usage
Run the script with the path to your IP (file or folder):
./prove-prior-ip.sh --file ~/Documents/my-secret-project
What Happens
- GPG Key Generation: If you don't have a GPG key, the script automatically creates a strong 4096-bit RSA key pair (takes ~10-20 seconds)
- IP Packaging: Your files are compressed into a secure .tar.gz archive
- Hash Generation: A SHA-256 hash (unique fingerprint) is computed
- Digital Signature: The hash is signed with your private key
- Public Key Export: Your public key is exported for verification
- Organized Output: Three folders are created with clear instructions
Output Structure
What to Do Next
🚨 Critical Steps
- Send to All Parties: Email the three files in folder
1_send_to_counterparty_and_lawyers/to:- Your business counterparty
- Your lawyer
- Their lawyer
- Backup Originals: Store folder
2_KEEP_PRIVATE_OFFLINE/in multiple secure locations:- Encrypted USB drive
- Bank safe deposit box
- Encrypted cloud storage (optional)
- Optional - Lawyer Vault: Send folder
3_send_to_YOUR_lawyer_for_vault_storage/to your lawyer for professional vault storage
Real-World Example
Scenario: Software Developer Entering Partnership
Situation: Sarah is a developer with a machine learning algorithm. She's about to partner with a company to commercialize it, but wants to ensure they can't later claim they developed the core algorithm.
Action: Before the first meeting, Sarah runs:
./prove-prior-ip.sh --file ~/Projects/ml-algorithm
Result: Sarah sends the hash and signature to the company and both lawyers. The actual code stays private.
Outcome: Six months later, there's a dispute. Sarah reveals her original files, proves the hash matches, and demonstrates she had the algorithm before the partnership began. Case closed.
Cost of tool: Free. Cost without it: Potentially millions in legal fees and lost IP rights.
Technical Details
How It Works
- SHA-256 Hashing: Creates a unique 64-character fingerprint of your files. Any tiny change produces a completely different hash.
- RSA-4096 Signatures: Uses military-grade encryption (same as banking systems) to sign the hash.
- GPG Standard: Industry-standard tool used worldwide for secure communications and signatures.
- Timestamping: Filenames and metadata include the creation date for additional proof.
Security Guarantees
- ❌ Cannot be forged: Private key never leaves your computer
- ❌ Cannot be backdated: Third parties receive the proof immediately
- ❌ Cannot be modified: Any change to files produces a different hash
- ✅ Mathematically verifiable: Anyone can verify with your public key
- ✅ Court admissible: Recognized by legal systems worldwide
Frequently Asked Questions
Do I need to trust the other party?
No! That's the beauty of cryptography. The math doesn't lie, and the signature can't be faked.
What if I lose my private key?
Your proof is still valid—you already sent the signature to all parties on record. However, you won't be able to create new signatures. Back up your GPG keys!
Can they see my confidential files?
Absolutely not. They only receive a hash (fingerprint) and signature. Your actual files stay in folder 2_KEEP_PRIVATE_OFFLINE/.
When do I reveal the actual files?
Only if there's a dispute or legal proceeding. At that point, you reveal the original files, and everyone can verify the hash matches what you sent earlier.
How long does this protection last?
Forever. As long as the emails/records exist showing you sent the hash on a specific date, your proof is valid.
Is this legally binding?
Yes. Digital signatures are legally recognized in most countries under laws like the U.S. ESIGN Act and EU eIDAS Regulation.
When to Use This Tool
- ✅ Before entering joint ventures or partnerships
- ✅ Prior to sharing technical details in negotiations
- ✅ When collaborating with external contractors
- ✅ Before fundraising meetings where you'll share IP
- ✅ When joining a company but keeping some personal projects
- ✅ During acquisition talks to protect your innovations
- ✅ Any time you want bulletproof proof of IP ownership
💡 Pro Tip
Run this tool before any substantive discussions about your IP. The earlier you establish proof, the stronger your legal position.
Support & Source Code
This tool is open source and free to use. The script is fully auditable—every line of code is visible and can be reviewed by security experts.
🔗 GitHub Repository: github.com/vantasnerdan/prior-ip
📥 Direct Download: prove-prior-ip.sh
Version: 1.3 (GPG 2.5.x compatible)
License: MIT (free for personal and commercial use)
Compatible with: macOS (Homebrew + GPG)