Creator protection guide

How to Protect Your Creative Work

A practical guide for photographers, musicians, writers, designers, and anyone producing original work. How to prove you made it first — before plagiarism, before AI training, before disputes.

The problem

Creative work leaks fast. A photograph gets scraped off your portfolio and used to train an image model. A track you sent to one label ends up in someone else's release. A chapter from your unpublished manuscript appears in someone else's book. When disputes like this happen, the fight is usually about one question: who had this first?

The traditional answer is Copyright Office registration. It works — but it takes six months and a fee per work. Most creators don't register every piece. And registration proves the date the Copyright Office received the work, not the date you created it.

The cryptographic alternative is a blockchain-anchored timestamp. Compute a SHA-256 hash of your file locally (the file itself stays on your machine), anchor that hash to a public blockchain, and you have mathematically verifiable proof that the specific file existed at a specific time. Anyone — a court, an AI company, an opposing attorney — can verify it independently without trusting you or the service that anchored it.

Your options, compared

US Copyright Office registration

Required for statutory damages. ~6 months, $65 per work (eCO), some discounts for batches. Proves receipt date, not creation date. Best for: important works you plan to litigate over.

"Poor man's copyright"

Mail yourself a sealed envelope. Does not work — the US Copyright Office has explicitly said so. The postmark binds to the envelope, not the contents.

C2PA / Content Credentials

Cryptographically signed metadata embedded in the file at creation (Adobe, Google, Meta back the standard). Strong for establishing device + edit history. Weak spot: most platforms (Instagram, X/Twitter, most news sites) strip metadata on upload — the credentials disappear.

Blockchain-anchored timestamp

SHA-256 of the file anchored to a public ledger. Proves when the specific bytes existed. Survives file modification (altered file has different hash — original is still provably on-chain). Cheap, fast, works for any file type. What ProofAnchor does.

By creator type

Photographers

Anchor each RAW or JPG as it lands in your tether folder. Portfolio disputes, AI training lawsuits, and stock-site takedowns all hinge on proving you shot the image first.

Related: photographer tutorials on the blog.

Musicians and producers

Anchor demos before sending to labels, collaborators, or distribution platforms. Disputed production credits and leaked-demo scenarios both resolve faster when you have a hash on-chain predating the leak.

Writers

Timestamp your manuscript before submitting to agents, editors, or contests. If your work or your ideas appear in someone else's published work later, the on-chain hash predates their submission.

Designers and illustrators

Anchor design files before client review. Scope-creep and unauthorized-use disputes both benefit from independent proof of what existed on what date.

How it works with ProofAnchor

  1. Select the file locally. Your file never uploads.
  2. ProofAnchor computes the SHA-256 hash in your browser.
  3. The hash is anchored to the Polygon blockchain in a single transaction.
  4. You get a public verification URL (proofanchor.com/verify/<id>) usable forever.
  5. Anyone can verify the hash against the on-chain record independently — via the public URL, or offline using the free verify-proof Python package.

Related reading

Start protecting your work

Anchor your first file in under a minute. Your file stays on your machine; only the hash goes on-chain.

Get started