Academic integrity
Determine whether a submitted essay matches a student's known body of writing — class assignments, prior submissions, in-class samples — when ghostwriting or contract cheating is suspected.
When you have writing samples from a finite set of suspected authors, Writprint identifies which one wrote the anonymous text — and shows you the stylistic evidence that points the way.
Built for academic integrity offices, workplace investigators, and anyone who needs to know who put the words on the page.
Paste between two and ten writing samples — emails, essays, Slack messages — from people you have authorization to investigate. Two hundred words apiece is a useful floor.
Paste the anonymous text in question. The sharper the contrast between candidate styles, the sharper the result.
A ranked attribution with calibrated probabilities, the specific stylistic features that point each way, and clear caveats where the evidence is thin.
Determine whether a submitted essay matches a student's known body of writing — class assignments, prior submissions, in-class samples — when ghostwriting or contract cheating is suspected.
Identify the author of an anonymous harassment email, leaked memo, or whistleblower note when the candidate set is bounded by access — direct reports, members of a Slack channel, attendees of a meeting.
Trace anonymous statements made to the press, on Glassdoor, or on internal forums back to a known set of staff with material knowledge.
“In 2013, a forensic linguist identified J. K. Rowling as the author of The Cuckoo's Calling, published under a pseudonym, using the same statistical signatures that distinguish one writer's prose from another's.”
Writprint applies the forensic stylometry techniques computational linguists have used in landmark attribution cases for forty years, augmented with state-of-the-art language models tuned for short-sample accuracy. The result is investigative — not evidentiary — and is intended to be read alongside, never in place of, human judgment.
Submitted text is never used for model training and is held only in your private workspace, behind row-level access controls. We do not share with third parties beyond the model provider required to perform the analysis. You can delete an investigation at any time.
We are taking on five design partners this month. Free pilot, real cases, direct line to the founder.