Verifying Source Code

Proves a document is identical to the original using cryptographic hash comparison.

No blockchain expertise required.

The Problem With Verifying Source Code

Code is easy to copy but hard to attribute. Open-source licenses are routinely violated, proprietary code gets leaked, and patent applications need proof of when the invention was developed.

Altered documents in disputes, fraud cases, or compliance audits can have devastating consequences.

For software developers, startups, open-source maintainers, this is not a theoretical risk — it is a daily reality. A startup develops a novel algorithm. A larger competitor releases a suspiciously similar feature six months later. Timestamped source code proves the startup had the algorithm first.

How TimeProof Solves This

When you timestamp source code with TimeProof, TimeProof uses client-side file hashing (SHA-256). That 64-character value is the unique fingerprint for the exact version you selected, and if even one byte changes, the hash changes too. Your file never leaves your device.

TimeProof proves file existence by anchoring file hashes to the Polygon blockchain. The blockchain records the hash, timestamp, and transaction ID permanently, so anyone can verify the record independently on Polygonscan without relying on editable metadata or a vendor-controlled database.

For software developers, startups, open-source maintainers, that means proves a document is identical to the original using cryptographic hash comparison. timestamping source code (as a ZIP or individual files) creates a verifiable creation timeline that can support patent applications, trade secret claims, and licensing disputes.

Specific to Source Code

Timestamping source code (as a ZIP or individual files) creates a verifiable creation timeline that can support patent applications, trade secret claims, and licensing disputes. Common file formats include JS, TS, PY, JAVA, C, CPP, RS, GO, ZIP, and TimeProof handles all of them. Whether you are using VS Code, IntelliJ, Xcode, GitHub, the workflow is the same.

The Metadata Problem

Many people assume file metadata is sufficient proof. It is not.

Git commit timestamps are self-reported and can be rewritten with git rebase or git commit —amend —date. They are not independent proof.

A blockchain timestamp is independent of your file’s metadata. It is stored on the public Polygon blockchain, which no one controls. Even if every byte of metadata is stripped, your timestamp remains permanent and verifiable.

Step-by-Step: Verifying Your Source Code

Anchor the reference version before it circulates so any later copy can be compared against the original hash. Best used when a file becomes the reference original or enters sensitive review. Common files in this workflow include signed originals, released exports, and archived master files. Typical reviewers or counterparties include auditors, investigators, and counterparties.

  1. Select the original version you may later need to defend as complete and unaltered.
  2. Timestamp that exact file before copies are distributed, filed, or archived.
  3. Use the certificate and Polygonscan link as the reference record when comparing later copies.
  4. Timestamp any legitimately amended version as a new official reference instead of overwriting the original proof.

Step 1: Select your file. Open TimeProof and drag your file onto the upload area. TimeProof accepts JS, TS, PY, JAVA, C, CPP, RS, GO, ZIP and every other file format. The SHA-256 hash is computed entirely in your browser — your file never leaves your computer.

Step 2: Choose your timestamp type. Use scheduled timestamps for 1 credit per file, or use verified instant timestamps for 2 credits per file when immediate anchoring matters. Both produce permanent, identical proof.

Step 3: Confirm and anchor. Click the timestamp button. TimeProof computes the SHA-256 hash locally, sends it to the Polygon blockchain smart contract, and returns your proof. You pay zero gas fees — TimeProof covers all blockchain costs.

Step 4: Download your proof. You receive a PDF certificate and a direct link to the blockchain transaction on Polygonscan. Verified instant timestamps add a verified identity badge, and Legal-Grade adds the Courtroom-Ready PDF, JSON metadata, JWS identity attestation, and Complete Evidence ZIP.

Step 5: Add Legal-Grade if needed. Legal-Grade is a verified per-batch upgrade. Starter and Pro charge 50 credits for up to 25 files, then +2 credits per file after 25. Business charges 25 credits for up to 25 files, then +1 credit per file after 25. Enterprise includes Legal-Grade. It adds the Courtroom-Ready PDF, JSON metadata, JWS identity attestation, and Complete Evidence ZIP.

What You Receive

Every TimeProof timestamp for source code includes:

  1. PDF certificate - a readable proof document for the exact source code you timestamped, ready to keep with the project or share when timing becomes disputed.
  2. Polygonscan link - direct public verification of the on-chain hash, timestamp, and transaction.

Verified instant timestamps also include: 3. Verified identity badge - the certificate shows the timestamp was created by a verified account, which is useful when delivery timing, authorship, or submitter identity may later matter.

With the Legal-Grade upgrade, you also receive the core evidence-package components documented by TimeProof: PDF, JSON, JWS identity attestation, and a ZIP bundle.

  1. Courtroom-Ready PDF - a presentation-ready evidence certificate for disputes around verify it has not been tampered with, payment, originality, or formal review.
  2. JSON Metadata - machine-readable timestamp data for technical teams, audit trails, or structured evidence review.
  3. Identity Attestation (JWS) - a signed proof that ties the timestamp to a verified identity and can be verified through /.well-known/jwks.json.
  4. Complete Evidence ZIP - one bundle containing the Courtroom-Ready PDF, JSON Metadata, Identity Attestation (JWS), and supporting proof materials so counsel, clients, or reviewers can inspect the complete record in one place.

Why Blockchain vs Other Methods

TimeProof uses Polygon because software developers, startups, open-source maintainers need proof that is fast to create, inexpensive to repeat, and easy for third parties to verify.

TimeProof proves file existence by anchoring file hashes to the Polygon blockchain. This gives reviewers a public record they can inspect independently on Polygonscan.

Real-World Scenario

A team needs to show that a file in circulation matches the original reference copy rather than a later edited or tampered version. The files at issue are often signed originals, released exports, and archived master copies. Typical reviewers or counterparties include auditors, counsel, and investigators.

A startup develops a novel algorithm. A larger competitor releases a suspiciously similar feature six months later. Timestamped source code proves the startup had the algorithm first.

A reviewer suspects post-signature changes, a dispute raises tampering allegations, or copied files no longer match the official record. The original timestamped hash becomes the reference point, so later comparisons can show whether the file still matches the known-good original.

These comparisons help you measure this proof path against common alternatives that solve part of the problem but not the full timing-and-integrity chain.

Use these related pages to go deeper on the legal, verification, or pricing context behind this workflow.

Pricing

TimeProof uses one unified credit balance, so you can verify source code as part of normal work instead of waiting for a dispute.

One-time packs start at $15 for 100 credits. Verified monthly plans start at $19/month and include identity verification for instant timestamps and Legal-Grade.

Timestamp a ZIP of your repository at each major milestone using 1 scheduled credit, or 2 credits for verified instant proof. Use scheduled timestamps for routine protection, verified instant timestamps when timing must be immediate, and Legal-Grade when the record may be challenged formally.

For source code, the cost is based on the number of files you anchor, not the file size. Scheduled timestamps use 1 credit per file, while verified instant timestamps use 2 credits per file.

Privacy

Your source code never leaves your computer. TimeProof uses client-side file hashing (SHA-256). Only the 64-character hash string is sent for anchoring. Because SHA-256 is one-way, it is not possible to reconstruct the original file from the hash. That lets software developers, startups, open-source maintainers protect client work, unpublished material, and high-value source files without exposing the underlying content.

1

Select your file

Open TimeProof and drag your source code file onto the upload area. Common formats include JS, TS, PY, JAVA, C, CPP, RS, GO, ZIP. Your file never leaves your computer.

2

Choose your timestamp type

Use scheduled timestamps for 1 credit per file, or use verified instant timestamps for 2 credits per file when speed matters. Both create permanent blockchain proof.

3

Create the timestamp record

Click to timestamp. TimeProof computes the SHA-256 hash locally and submits it to the Polygon blockchain. You pay zero gas fees.

4

Download your proof

Receive a PDF certificate and Polygonscan transaction link, with verified identity and Legal-Grade evidence options when needed.

5

Optionally upgrade to Legal-Grade

Add the verified Legal-Grade upgrade when you need the Courtroom-Ready PDF, JSON metadata, JWS identity attestation, and Complete Evidence ZIP.

What You Receive

Every Timestamp Includes:

📄

PDF Certificate

Readable proof showing the file hash, timestamp, and blockchain reference.

🔗

Polygonscan Link

Direct public verification of the on-chain anchor.

Verified Instant Timestamps Also Include:

Verified Identity Badge — Verified instant timestamps add an identity attestation badge to the certificate so reviewers can see the anchor came from a verified account.

Legal-Grade Upgrade Adds:

⚖️

Courtroom-Ready PDF

Presentation-ready evidence certificate for counsel, auditors, or formal review.

📋

JSON Metadata

Machine-readable timestamp data for technical or programmatic verification.

🔐

Identity Attestation (JWS)

Cryptographically signed proof that verifies through the public JWKS endpoint.

🗂️

Complete Evidence ZIP

Single download containing the core evidence package and bundled supporting proof materials.

The Complete Evidence ZIP bundles supporting proof materials such as the Merkle proof, verification guide, and checksums so third parties can review the package without contacting TimeProof.

Ready to protect your files?

Timestamp any file on the blockchain in seconds. Prove when it existed, prove it hasn't changed.

Try it — drop a file to see its unique SHA-256 fingerprint:

Drop a file here to see its SHA-256 hash

100% local — your file never leaves your browser

No blockchain expertise required.

Frequently Asked Questions

Does this prevent tampering or just detect it?
It does not stop someone from editing a copy, but it gives you a fixed reference record. That lets you prove whether a later file still matches the original or has changed.
How do I verify a later copy against the original?
Hash the later file and compare it against the timestamped original. If the SHA-256 hash matches, the file is identical. If it differs, the file has changed.
What if I make legitimate edits after the original timestamp?
Timestamp the updated file as a new official version. Keep the earlier timestamp as the record of the original and the newer timestamp as the record of the amended version.
Why is this stronger than checking metadata?
Metadata can be edited, stripped, or changed during copying. The cryptographic hash compares the file contents themselves, not just the surrounding file properties.

Related Pages

Protect your work in seconds.

Timestamp any file on the blockchain. No blockchain expertise required.

Built on Polygon SHA-256 Industry Standard Gasless — We Cover All Fees Legal-Grade™ Available