-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathindex.html
More file actions
487 lines (410 loc) · 20.5 KB
/
index.html
File metadata and controls
487 lines (410 loc) · 20.5 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="UTF-8">
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<title>Prior-IP Proof Tool - Protect Your Intellectual Property</title>
<style>
* {
margin: 0;
padding: 0;
box-sizing: border-box;
}
body {
font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Oxygen, Ubuntu, Cantarell, sans-serif;
line-height: 1.6;
color: #333;
background: linear-gradient(135deg, #667eea 0%, #764ba2 100%);
padding: 20px;
}
.container {
max-width: 1000px;
margin: 0 auto;
background: white;
border-radius: 12px;
box-shadow: 0 20px 60px rgba(0,0,0,0.3);
overflow: hidden;
}
header {
background: linear-gradient(135deg, #667eea 0%, #764ba2 100%);
color: white;
padding: 60px 40px;
text-align: center;
}
h1 {
font-size: 2.5em;
margin-bottom: 15px;
font-weight: 700;
}
.subtitle {
font-size: 1.2em;
opacity: 0.95;
font-weight: 300;
}
.content {
padding: 40px;
}
h2 {
color: #667eea;
font-size: 1.8em;
margin: 40px 0 20px 0;
padding-bottom: 10px;
border-bottom: 3px solid #667eea;
}
h3 {
color: #764ba2;
font-size: 1.3em;
margin: 30px 0 15px 0;
}
p {
margin-bottom: 15px;
font-size: 1.05em;
}
.highlight-box {
background: linear-gradient(135deg, #f5f7fa 0%, #e8ecf3 100%);
border-left: 5px solid #667eea;
padding: 25px;
margin: 25px 0;
border-radius: 8px;
}
.warning-box {
background: #fff3cd;
border-left: 5px solid #ffc107;
padding: 20px;
margin: 25px 0;
border-radius: 8px;
}
.success-box {
background: #d4edda;
border-left: 5px solid #28a745;
padding: 20px;
margin: 25px 0;
border-radius: 8px;
}
code {
background: #2d3748;
color: #68d391;
padding: 3px 8px;
border-radius: 4px;
font-family: 'Monaco', 'Courier New', monospace;
font-size: 0.9em;
}
pre {
background: #2d3748;
color: #e2e8f0;
padding: 20px;
border-radius: 8px;
overflow-x: auto;
margin: 20px 0;
line-height: 1.5;
}
pre code {
background: none;
padding: 0;
color: inherit;
}
ul, ol {
margin-left: 25px;
margin-bottom: 20px;
}
li {
margin-bottom: 12px;
font-size: 1.05em;
}
.step-number {
display: inline-block;
background: #667eea;
color: white;
width: 30px;
height: 30px;
border-radius: 50%;
text-align: center;
line-height: 30px;
margin-right: 10px;
font-weight: bold;
}
.feature-grid {
display: grid;
grid-template-columns: repeat(auto-fit, minmax(250px, 1fr));
gap: 20px;
margin: 30px 0;
}
.feature-card {
background: #f8f9fa;
padding: 25px;
border-radius: 8px;
border: 2px solid #e9ecef;
transition: all 0.3s ease;
}
.feature-card:hover {
border-color: #667eea;
transform: translateY(-5px);
box-shadow: 0 10px 20px rgba(102, 126, 234, 0.1);
}
.feature-card h4 {
color: #667eea;
margin-bottom: 10px;
font-size: 1.2em;
}
.emoji {
font-size: 2em;
display: block;
margin-bottom: 15px;
}
.folder-structure {
background: #f8f9fa;
padding: 20px;
border-radius: 8px;
font-family: 'Monaco', 'Courier New', monospace;
margin: 20px 0;
}
.folder-item {
margin: 8px 0;
padding-left: 20px;
}
.folder-item::before {
content: "📁 ";
margin-right: 5px;
}
.file-item {
margin: 5px 0 5px 40px;
color: #555;
}
.file-item::before {
content: "📄 ";
margin-right: 5px;
}
footer {
background: #2d3748;
color: white;
text-align: center;
padding: 30px;
font-size: 0.9em;
}
.cta-button {
display: inline-block;
background: #667eea;
color: white;
padding: 15px 30px;
border-radius: 8px;
text-decoration: none;
font-weight: 600;
margin-top: 20px;
transition: all 0.3s ease;
}
.cta-button:hover {
background: #764ba2;
transform: translateY(-2px);
box-shadow: 0 5px 15px rgba(102, 126, 234, 0.3);
}
</style>
</head>
<body>
<div class="container">
<header>
<h1>🔐 Prior-IP Proof Tool</h1>
<p class="subtitle">Cryptographically Prove Your Intellectual Property Ownership Before Entering Agreements</p>
</header>
<div class="content">
<h2>Why Use This Tool?</h2>
<p>When entering business agreements, partnerships, or collaborations, protecting your prior intellectual property (IP) is crucial. This tool provides <strong>cryptographic proof</strong> that you possessed specific IP on a specific date—before any collaboration began.</p>
<div class="highlight-box">
<h3>The Problem</h3>
<p>Imagine you're about to work with a company, and you're bringing valuable code, designs, or ideas to the table. Later, disputes might arise about:</p>
<ul>
<li>What IP did you already own before the partnership?</li>
<li>What was created during the collaboration?</li>
<li>Who owns what if things go wrong?</li>
</ul>
<p><strong>Without proof, these disputes can cost millions in legal fees and lost opportunities.</strong></p>
</div>
<div class="success-box">
<h3>The Solution</h3>
<p>This tool creates an <strong>irrefutable timestamp and cryptographic proof</strong> that you possessed specific files or folders on a specific date. It works like this:</p>
<ol>
<li>You package your confidential IP (code, documents, designs, etc.)</li>
<li>The tool generates a unique "fingerprint" (SHA-256 hash) of your files</li>
<li>This fingerprint is digitally signed with your private key</li>
<li>You share the hash and signature with all parties—but NOT the actual files</li>
<li>If a dispute arises later, you can prove you had those exact files on that date</li>
</ol>
<p><strong>This is the same method used by Google, OpenAI, and major tech companies in multi-billion dollar deals.</strong></p>
</div>
<h2>How It Protects You</h2>
<div class="feature-grid">
<div class="feature-card">
<span class="emoji">⏰</span>
<h4>Timestamped Proof</h4>
<p>Creates verifiable evidence that you possessed specific IP on a specific date—before negotiations even began.</p>
</div>
<div class="feature-card">
<span class="emoji">🔒</span>
<h4>Zero Trust Required</h4>
<p>You don't need to trust the other party. The cryptographic signature is mathematically verifiable by anyone.</p>
</div>
<div class="feature-card">
<span class="emoji">🤐</span>
<h4>Keeps Secrets Secret</h4>
<p>You share only a hash—not your actual IP. Your confidential files stay private unless there's a dispute.</p>
</div>
<div class="feature-card">
<span class="emoji">⚖️</span>
<h4>Court-Ready</h4>
<p>Cryptographic signatures are admissible in court and nearly impossible to forge or dispute.</p>
</div>
<div class="feature-card">
<span class="emoji">🚀</span>
<h4>Fast & Simple</h4>
<p>Takes less than 60 seconds to generate complete proof. No technical expertise required.</p>
</div>
<div class="feature-card">
<span class="emoji">📋</span>
<h4>Organized Output</h4>
<p>Automatically creates folders with clear instructions for what to send to whom.</p>
</div>
</div>
<h2>Installation (macOS)</h2>
<div class="success-box">
<h3>📥 Download Script</h3>
<p style="margin-bottom: 20px;"><strong>Direct download:</strong></p>
<a href="https://raw.githubusercontent.com/vantasnerdan/prior-ip/master/prove-prior-ip.sh" class="cta-button" download>Download prove-prior-ip.sh</a>
<p style="margin-top: 20px;"><strong>Or view on GitHub:</strong> <a href="https://github.com/vantasnerdan/prior-ip" style="color: #667eea; font-weight: 600;">github.com/vantasnerdan/prior-ip</a></p>
</div>
<div class="highlight-box">
<h3><span class="step-number">1</span> Install Homebrew (if not already installed)</h3>
<p>Open Terminal and run:</p>
<pre><code>/bin/bash -c "$(curl -fsSL https://raw.githubusercontent.com/Homebrew/install/HEAD/install.sh)"</code></pre>
</div>
<div class="highlight-box">
<h3><span class="step-number">2</span> Install GnuPG</h3>
<p>GnuPG (GPG) is the cryptographic tool that creates digital signatures:</p>
<pre><code>brew install gnupg</code></pre>
</div>
<div class="highlight-box">
<h3><span class="step-number">3</span> Download the Script</h3>
<p>Download using the button above, or use curl:</p>
<pre><code>curl -O https://raw.githubusercontent.com/vantasnerdan/prior-ip/master/prove-prior-ip.sh</code></pre>
</div>
<div class="highlight-box">
<h3><span class="step-number">4</span> Make it Executable</h3>
<p>In Terminal, navigate to the script's location and run:</p>
<pre><code>chmod +x prove-prior-ip.sh</code></pre>
</div>
<h2>How to Use</h2>
<h3>Basic Usage</h3>
<p>Run the script with the path to your IP (file or folder):</p>
<pre><code>./prove-prior-ip.sh --file ~/Documents/my-secret-project</code></pre>
<h3>What Happens</h3>
<ol>
<li><strong>GPG Key Generation:</strong> If you don't have a GPG key, the script automatically creates a strong 4096-bit RSA key pair (takes ~10-20 seconds)</li>
<li><strong>IP Packaging:</strong> Your files are compressed into a secure .tar.gz archive</li>
<li><strong>Hash Generation:</strong> A SHA-256 hash (unique fingerprint) is computed</li>
<li><strong>Digital Signature:</strong> The hash is signed with your private key</li>
<li><strong>Public Key Export:</strong> Your public key is exported for verification</li>
<li><strong>Organized Output:</strong> Three folders are created with clear instructions</li>
</ol>
<h3>Output Structure</h3>
<div class="folder-structure">
<div class="folder-item">prior-ip-proof-2025-11-25_YourName/</div>
<div class="folder-item" style="padding-left: 40px;">1_send_to_counterparty_and_lawyers/</div>
<div class="file-item" style="margin-left: 60px;">hash.txt</div>
<div class="file-item" style="margin-left: 60px;">hash.txt.asc</div>
<div class="file-item" style="margin-left: 60px;">public-key.asc</div>
<div class="folder-item" style="padding-left: 40px;">2_KEEP_PRIVATE_OFFLINE/</div>
<div class="file-item" style="margin-left: 60px;">original-my-secret-project.tar.gz</div>
<div class="file-item" style="margin-left: 60px;">README_KEEP_SAFE.txt</div>
<div class="folder-item" style="padding-left: 40px;">3_send_to_YOUR_lawyer_for_vault_storage/</div>
<div class="file-item" style="margin-left: 60px;">[Copy of folder 2]</div>
<div class="file-item" style="margin-left: 60px;">README_FOR_LAWYER.txt</div>
</div>
<h3>What to Do Next</h3>
<div class="warning-box">
<h4>🚨 Critical Steps</h4>
<ol>
<li><strong>Send to All Parties:</strong> Email the three files in folder <code>1_send_to_counterparty_and_lawyers/</code> to:
<ul>
<li>Your business counterparty</li>
<li>Your lawyer</li>
<li>Their lawyer</li>
</ul>
</li>
<li><strong>Backup Originals:</strong> Store folder <code>2_KEEP_PRIVATE_OFFLINE/</code> in multiple secure locations:
<ul>
<li>Encrypted USB drive</li>
<li>Bank safe deposit box</li>
<li>Encrypted cloud storage (optional)</li>
</ul>
</li>
<li><strong>Optional - Lawyer Vault:</strong> Send folder <code>3_send_to_YOUR_lawyer_for_vault_storage/</code> to your lawyer for professional vault storage</li>
</ol>
</div>
<h2>Real-World Example</h2>
<div class="highlight-box">
<h3>Scenario: Software Developer Entering Partnership</h3>
<p><strong>Situation:</strong> Sarah is a developer with a machine learning algorithm. She's about to partner with a company to commercialize it, but wants to ensure they can't later claim they developed the core algorithm.</p>
<p><strong>Action:</strong> Before the first meeting, Sarah runs:</p>
<pre><code>./prove-prior-ip.sh --file ~/Projects/ml-algorithm</code></pre>
<p><strong>Result:</strong> Sarah sends the hash and signature to the company and both lawyers. The actual code stays private.</p>
<p><strong>Outcome:</strong> Six months later, there's a dispute. Sarah reveals her original files, proves the hash matches, and demonstrates she had the algorithm before the partnership began. Case closed.</p>
<p><strong>Cost of tool:</strong> Free. <strong>Cost without it:</strong> Potentially millions in legal fees and lost IP rights.</p>
</div>
<h2>Technical Details</h2>
<h3>How It Works</h3>
<ul>
<li><strong>SHA-256 Hashing:</strong> Creates a unique 64-character fingerprint of your files. Any tiny change produces a completely different hash.</li>
<li><strong>RSA-4096 Signatures:</strong> Uses military-grade encryption (same as banking systems) to sign the hash.</li>
<li><strong>GPG Standard:</strong> Industry-standard tool used worldwide for secure communications and signatures.</li>
<li><strong>Timestamping:</strong> Filenames and metadata include the creation date for additional proof.</li>
</ul>
<h3>Security Guarantees</h3>
<ul>
<li>❌ <strong>Cannot be forged:</strong> Private key never leaves your computer</li>
<li>❌ <strong>Cannot be backdated:</strong> Third parties receive the proof immediately</li>
<li>❌ <strong>Cannot be modified:</strong> Any change to files produces a different hash</li>
<li>✅ <strong>Mathematically verifiable:</strong> Anyone can verify with your public key</li>
<li>✅ <strong>Court admissible:</strong> Recognized by legal systems worldwide</li>
</ul>
<h2>Frequently Asked Questions</h2>
<h3>Do I need to trust the other party?</h3>
<p>No! That's the beauty of cryptography. The math doesn't lie, and the signature can't be faked.</p>
<h3>What if I lose my private key?</h3>
<p>Your proof is still valid—you already sent the signature to all parties on record. However, you won't be able to create new signatures. Back up your GPG keys!</p>
<h3>Can they see my confidential files?</h3>
<p>Absolutely not. They only receive a hash (fingerprint) and signature. Your actual files stay in folder <code>2_KEEP_PRIVATE_OFFLINE/</code>.</p>
<h3>When do I reveal the actual files?</h3>
<p>Only if there's a dispute or legal proceeding. At that point, you reveal the original files, and everyone can verify the hash matches what you sent earlier.</p>
<h3>How long does this protection last?</h3>
<p>Forever. As long as the emails/records exist showing you sent the hash on a specific date, your proof is valid.</p>
<h3>Is this legally binding?</h3>
<p>Yes. Digital signatures are legally recognized in most countries under laws like the U.S. ESIGN Act and EU eIDAS Regulation.</p>
<h2>When to Use This Tool</h2>
<ul>
<li>✅ Before entering joint ventures or partnerships</li>
<li>✅ Prior to sharing technical details in negotiations</li>
<li>✅ When collaborating with external contractors</li>
<li>✅ Before fundraising meetings where you'll share IP</li>
<li>✅ When joining a company but keeping some personal projects</li>
<li>✅ During acquisition talks to protect your innovations</li>
<li>✅ Any time you want bulletproof proof of IP ownership</li>
</ul>
<div class="success-box">
<h3>💡 Pro Tip</h3>
<p>Run this tool <strong>before</strong> any substantive discussions about your IP. The earlier you establish proof, the stronger your legal position.</p>
</div>
<h2>Support & Source Code</h2>
<p>This tool is open source and free to use. The script is fully auditable—every line of code is visible and can be reviewed by security experts.</p>
<div class="highlight-box">
<p><strong>🔗 GitHub Repository:</strong> <a href="https://github.com/vantasnerdan/prior-ip" style="color: #667eea; font-weight: 600;">github.com/vantasnerdan/prior-ip</a></p>
<p><strong>📥 Direct Download:</strong> <a href="https://raw.githubusercontent.com/vantasnerdan/prior-ip/master/prove-prior-ip.sh" style="color: #667eea; font-weight: 600;">prove-prior-ip.sh</a></p>
</div>
<p><strong>Version:</strong> 1.3 (GPG 2.5.x compatible)</p>
<p><strong>License:</strong> MIT (free for personal and commercial use)</p>
<p><strong>Compatible with:</strong> macOS (Homebrew + GPG)</p>
</div>
<footer>
<p><strong>Disclaimer:</strong> This tool provides technical evidence of IP ownership. It is not legal advice. Consult with an attorney for your specific situation.</p>
<p style="margin-top: 15px; opacity: 0.8;">Built with cryptographic best practices. Inspired by industry standards from leading tech companies.</p>
</footer>
</div>
</body>
</html>