Writprint
Forensic Authorship Attribution

Identify the writer
behind any document.

When you have writing samples from a finite set of suspected authors, Writprint identifies which one wrote the anonymous text — and shows you the stylistic evidence that points the way.

Built for academic integrity offices, workplace investigators, and anyone who needs to know who put the words on the page.

Method
I.

Bring your suspects.

Paste between two and ten writing samples — emails, essays, Slack messages — from people you have authorization to investigate. Two hundred words apiece is a useful floor.

II.

Submit the document.

Paste the anonymous text in question. The sharper the contrast between candidate styles, the sharper the result.

III.

Read the report.

A ranked attribution with calibrated probabilities, the specific stylistic features that point each way, and clear caveats where the evidence is thin.

Case Files
A-001

Academic integrity

Determine whether a submitted essay matches a student's known body of writing — class assignments, prior submissions, in-class samples — when ghostwriting or contract cheating is suspected.

B-002

Workplace investigations

Identify the author of an anonymous harassment email, leaked memo, or whistleblower note when the candidate set is bounded by access — direct reports, members of a Slack channel, attendees of a meeting.

C-003

Internal leak detection

Trace anonymous statements made to the press, on Glassdoor, or on internal forums back to a known set of staff with material knowledge.

Lineage
“In 2013, a forensic linguist identified J. K. Rowling as the author of The Cuckoo's Calling, published under a pseudonym, using the same statistical signatures that distinguish one writer's prose from another's.”
— Patrick Juola, Scientific American, 2013

Writprint applies the forensic stylometry techniques computational linguists have used in landmark attribution cases for forty years, augmented with state-of-the-art language models tuned for short-sample accuracy. The result is investigative — not evidentiary — and is intended to be read alongside, never in place of, human judgment.

Privacy

Your case stays your case.

Submitted text is never used for model training and is held only in your private workspace, behind row-level access controls. We do not share with third parties beyond the model provider required to perform the analysis. You can delete an investigation at any time.

Begin

Bring us a case.

We are taking on five design partners this month. Free pilot, real cases, direct line to the founder.