Example use cases

Similar 3D print

Mark created a 3D printable coffee cup some time ago but never put it up on his blog. One day he found out a similar cup by another designer had gone viral on the Internet. Luckily he had used Filesign.net to timestamp his cup when he made it. Now he can post his design on his blog without worrying that someone accuses him of copying the new design.

Photo evidence

Bob went to see an apartment he was interested in renting. He took lots of photos of it and decided to rent it. He went home and used Filesign.net to sign and date the photos. He also zipped the photos and put them in a safe place. Years later when he moved out of the apartment the landlord claimed Bob had damaged the sink. Bob was able to show the landlord the photos he had taken on the day he first went to see the apartment and how the sink was in the same condition back then. The complaint was baseless as Bob was able to prove the photo was dated and signed by Filesign.net on that day.

3D print dispute

Stacy created a 3D printable vase and uploaded the .stl file to a 3D website (A) and made it available for downloading. Later she found out the same file had cropped up on another 3D website (B). Luckily she had timestamped her .stl file and screenshots and renderings of the vase using Filesign.net earlier. She also got handshake codes from the code page and pasted them into the screenshots. The site B pulled down the vase after Stacy demonstrated her case to them.

Scientific research data

James is a research scientist in the field of biomedicine. One day he made an important finding. He layed out the research data into a PDF and processed it with Filesign.net and also saved the PDF to a DVD. He continued with his research which still takes years to complete. A year later when reading a scientific journal and finds similar findings presented by another researcher. If the need arises James can prove he made the same findings independently from the other researcher before the article was published.


Emily is a recording artist. She uses Filesign.net for timestamping her tracks and ideas just in case. Plagiarism accusations can happen and it is good to have a independent proof of original creation and prior art.

Graphic design

Anna is a cartoonist and a graphic designer. She just created a new character for her new series. To protect it she made a JPG with the character portrayed from different angles together with her own name and email and date and handshake code. Anna then used Filesign.net to timestamp it. After this she uploaded the same JPG to her own website together with the cryptographic signature.

Security camera footage

The owner of a store has installed a security camera system that records daily files to a hard drive. He uses Filesign.net to timestamp the files. One day there was a theft. The lawyer of the suspect contested the visible timecode which is overlayed on the footage. Since the footage had already been timestamped by Filesign.net the store ownder was able to show the court that the video had not been doctored afterwards.


Bill had an idea for a movie. He wrote it down in a text file and also made a PDF of it. He used Filesign.net to put a timestamp on his movie idea just in case.


Hank saw an amazing incident outside and took a photo of it. He immediately dated the photo using his phone on Filesign.net. He then posted the photo on Twitter where it went viral. Sites like Twitter modify the image by resizing it. Hank also dated the image which Twitter shows on the timeline and a screenshot of the original post.


Ben works in IT. He is now working on a project and he needs to deliver files to his client by a deadline. He uses Filesign.net to timestamp the deliverables before the deadline to make sure he gets paid.

File types

You can hand in any kind of a file. Size should not matter as the hashing is done locally in your browser. Some browsers may however have a size limit of their own.

You can process images, text files, PDFs, ZIPs, screenshots, spreadsheets, CAD files, HTML, PHP, code, music, videos, email boxes, enrypted files, ISOs, GPG keys, PGP keys, certificates, databases, etc.