FreeSign

Compare · Adobe Acrobat Sign

The Adobe Sign alternative that never uploads your PDF

If you're already inside the Adobe ecosystem — Reader, Acrobat Pro, Creative Cloud — Acrobat Sign feels like the default. It's a good product. It's also a product where every PDF you sign lives in Adobe Document Cloud. For documents you'd rather not deposit with Adobe, FreeSign is a structurally different option: same PAdES-B-T cryptography, zero document upload.

The structural difference

Adobe Acrobat Sign is the e-signature workflow product layered on top of Adobe's Document Cloud. Per Adobe's published security overview, signed documents are stored on Adobe-operated infrastructure with AES-256 encryption at rest and TLS in transit, SOC 2 / ISO 27001 / HIPAA-eligible plans, with retention configurable by the account owner. Adobe's whole point is to be a managed document service: it routes, stores, audits, integrates with Acrobat Reader's sign-in-place flow, and feeds into the broader Document Cloud product line (Liquid Mode, AI Assistant, etc.). The document goes to Adobe; Adobe handles it; you collect the result.

FreeSign is a cryptographic signing primitive with a workflow shell around it. The PDF is hashed locally in your browser. A per-user X.509 leaf certificate is issued for that one ceremony from an HSM-backed CA. The CMS PKCS#7 seal is appended to the PDF as an incremental update, and the signed-region hash receives an independent OpenTimestamps proof. FreeSign's Worker sees the OTP-verified email, the OTP challenge, the SHA-256 hash, the public half of your browser ceremony key, the audit hash chain, and a standard request fingerprint (connecting IP, any X-Forwarded-For chain, user-agent, Cloudflare colo/ASN/TLS metadata) on every event. We don't see the PDF.

Both products produce a legally valid PAdES-B-T electronic signature. The cryptographic substrate is interchangeable. The difference is what the vendor holds — and what happens when the vendor stops existing or changes its terms.

Side-by-side

Capability FreeSign Adobe Acrobat Sign
Document is uploaded to the vendorNo — only a SHA-256 hashYes, required
Vendor stores the signed PDFNo — we have nothing to storeYes — Adobe Document CloudRetention configurable; storage is the default.
Vendor account requiredNo — email + 6-digit OTP onlyThe OTP-verified email IS an identity binding — you still need a real inbox.Yes for senders; Adobe ID for full feature set
Free plan with unlimited signingYes — free today, no cardNo paid tier exists yet.No — paid; verify current pricing on Adobe's pagePer Adobe Sign pricing.
Document content processed by AI featuresNot possible — we don't have the documentAdobe's AI user guidelines state document content is processed by Acrobat AI Assistant for the feature to function and is not used to train Adobe's foundational LLMs except where explicitly opted in (e.g. feedback submission); behavior is account-configurableRead Adobe's docs directly — the specifics change.
Standards conformancePAdES-B-T (CMS PKCS#7, RFC 3161 timestamp)PAdES-B-T / PAdES-B-LT (configurable)
RFC 3161 trusted timestampDigiCert AATL TSAAdobe-operated TSA / partner TSAs
Independent timestamp proofOpenTimestamps embedded in CMS + downloadable .ots proofNot offered
Per-user X.509 leaf certIssued for every signer, embedded in PDFAvailable with Acrobat Sign Solutions and via partner Trust Service Providers
Browser ceremony key generated on your deviceNon-extractable WebCrypto ECDSA P-256 for intent/session evidenceLocal-cert workflows possible (Windows Cert Store, smartcard, USB token); cloud-signed default uses Adobe / TSP-held keys
CA private key in FIPS 140-2 Level 3 HSMGoogle Cloud KMS HSM-protected key (HSM protection level)Level 3 is for the HSM hardware; software-protected KMS keys are Level 1, so the deployment must use the HSM tier specifically.Adobe operates AATL-listed HSMs
AATL-listed CA (Adobe green check)No — FreeSign CAFAQ explains why the yellow ⚠️ is a UX wart, not a verdict.Yes — their own root is on the list they curate
eIDAS Article 26 evidenceDesigned around Article 26 evidence; not QESYes, with product- and region-specific options
eIDAS QES (Article 25(2))No — on roadmapYes — via partner QTSPs (paid add-on)
ESIGN / UETAYesYes
Verifies in Adobe ReaderYes — with yellow trust warning by defaultAfter the leaf cert's wall-clock expiry (default 10 years), Reader can flip to “Signer's certificate is invalid”; the underlying CMS signature still verifies cryptographically and the RFC 3161 + OpenTimestamps proof still attest the original moment.Yes — with green checkAdobe maintains AATL, so unsurprisingly Adobe's own signatures show green there.
Verifies in openssl cms -verifyYesYes
Verifies in pyHankoYes — coverage: ENTIRE_FILEYes
Verification works if vendor disappearsYes — trust anchors external (cert in file, DigiCert TSA, OpenTimestamps proof)AATL chain remains valid for the cert lifetime; hosted audit URLs and Document Cloud retention end
In-Reader signing UX (sign without leaving Reader)Browser-only signing surfaceYes — native in Acrobat Reader / Pro
Native integration with Creative Cloud, InDesign, SharepointREST + MCP API onlyYes — flagship product
Verifiable with third-party open-source toolsYes — openssl, pyHanko, ots CLIOutput is standards-based; verification flow is theirs
Self-hostableNo — closed source, hosted onlyNo
Comparison reflects vendor-published documentation. Adobe Acrobat Sign features and pricing change frequently — verify against the linked pages before final decisions.

Privacy: who can see the PDF?

Adobe Acrobat Sign. Documents you send through Acrobat Sign are uploaded to and stored on Adobe Document Cloud. Per Adobe's published security overview, encryption at rest (AES-256), TLS in transit, SOC 2 Type II, and ISO 27001 / 27017 / 27018 are in scope; Adobe's Document Cloud business products hold FedRAMP authorizations (Moderate / Tailored, depending on offering — check Adobe's compliance list for the current scope per product). The architectural baseline is that Adobe holds the document. Adobe also publishes AI user guidelines describing what document content is and is not used for. The trust model is: you accept that Adobe holds the document, configure retention and AI participation appropriately, and rely on Adobe's compliance posture and policy enforcement.

FreeSign. FreeSign cannot read your PDF because we don't have it. The Worker receives a SHA-256 of the document and a 32-byte digest of the signature ByteRange — that's it. There is no compliance configuration to get wrong, no AI opt-out to remember, no retention policy to set, because there is no document on our side. The MCP discovery contract (documentUpload: false) is enforced by a public-contract test, so the property can't drift accidentally.

If you're in a regulatory regime that requires the vendor to hold the document for inspection or e-discovery purposes, FreeSign is structurally unsuitable. For most confidential-document use cases — NDAs, term sheets, board resolutions, IP assignments — that requirement doesn't apply, and not uploading the PDF is the correct default.

Verification: what tools accept the signature?

Both Acrobat Sign and FreeSign produce PAdES-B-T signatures. The cryptographic substrate is the same. The differences:

Pricing: how does free actually work?

FreeSign is free today, with no account and no card. Cloudflare Workers + WebCrypto + OpenTimestamps calendars + DigiCert's free TSA tier means the per-signature cost is essentially zero. The HSM CA signature on each leaf certificate costs a fraction of a cent (~$0.000003 per asymmetricSign call). A paid Pro tier is on the roadmap but doesn't exist yet; if it ships, the existing free product won't be retroactively gated behind it.

Adobe's published Acrobat Sign plans are user-seat-based. Acrobat Standard with limited Sign features is ~$12.99/user/month; Acrobat Pro is ~$19.99/user/month; Acrobat Sign Solutions (enterprise) is custom-priced. QES (Article 25(2)) requires partner QTSP add-ons. Free trial available.

When Acrobat Sign is the right choice

When FreeSign is the right choice

How to migrate a one-off NDA flow to FreeSign

  1. Open the NDA PDF on your machine. Drop it into free-sign.com. The SHA-256 is computed in your browser.
  2. Enter your email and full legal name, tick consent. Receive a 6-digit OTP. Type it in.
  3. The browser captures the ceremony locally, the server witnesses, the seal is assembled, and the OpenTimestamps proof is submitted.
  4. Download the signed PDF — the evidence JSON is embedded inside it (in the signature's CMS), so there is one file to keep.
  5. Open the signed PDF in Adobe Reader. Reader will show yellow ⚠️ — that's the AATL trust warning, not a verdict on document integrity. Click “Signature Panel”: Document has not been modified, Signed by <your name>, Signature is valid. Note: after the leaf cert's expiry (default 10 years), Reader may show a different message even though the underlying CMS, the DigiCert RFC 3161 timestamp, and the OpenTimestamps proof still attest the original moment cryptographically — the colour Reader paints isn't the cryptographic answer.
  6. Optional: verify outside Adobe with openssl cms -verify, pyhanko sign validate, and ots verify.

FAQ for switchers

If Adobe Reader shows yellow, is my signature broken?

No. The yellow icon means “Adobe's curated AATL trust list doesn't include FreeSign's CA” — it is not a document-integrity failure. The cryptographic checks show the document has not changed, the evidence links it to the signing ceremony, and the timestamp proof shows when that evidence existed. The full explanation is in the FAQ.

Can I still sign inside Acrobat Reader?

Not today. FreeSign is browser-based. If in-Reader signing UX is non-negotiable, Acrobat Sign is the better tool. If it's a nice-to-have, the browser flow is ~60 seconds end-to-end.

What about Adobe AI features on documents?

Adobe AI Assistant and Liquid Mode process document content from Document Cloud. FreeSign has nothing to feed an AI — we don't have your document. If a strict “our docs must not be in any AI pipeline” rule is in your compliance, FreeSign is structurally aligned with that.

Will Reader stop me from filing a FreeSign-signed document?

No. The yellow icon is informational. Document workflows and counterparties read the actual signature, not the colour of Adobe's badge. If a specific filing process requires AATL-trusted signatures (some regulated filings do), that's a hard constraint and FreeSign isn't the right tool for those.

Try FreeSign without giving up Adobe

You can keep using Acrobat for everything else. Use FreeSign for the documents you'd rather not deposit with Adobe. One PDF, no account, under a minute.

Sign a PDF now →