voteaussie

Australia already runs elections without ID.
We just made it digital.

One identity. Verified by people, not governments. Free to use.

Get Verified

This isn't new. We already do it.

Australia has run compulsory voting since 1924 without checking ID. 97% turnout. One of the most trusted electoral systems in the world.

Australian Elections

  1. 1.Walk into a polling place
  2. 2.Say your name and address
  3. 3.They cross you off a paper list
  4. 4.You vote

No ID. No photo check. No biometrics. If you cheat, you become a "checked voter" and need ID from then on.

OMXUS

  1. 1.Meet three people who are verified
  2. 2.They tap their phone or NFC ring
  3. 3.GPS confirms you're in the same place
  4. 4.You exist on the network. Permanently.

Cryptographically signed. Anchored to Bitcoin. If you cheat, your vouchers are accountable.

The system is broken. And they know it.

Australian politicians pass laws designed to look strong, not to work. Meanwhile, the laws that would actually protect people already exist.

The Online Safety Act doesn't protect anyone

As noted by Gillian Dempsey, barrister and board member of the Electronic Frontiers Australia (EFA), the e-Safety Commissioner's social media restrictions on under-16s under the Online Safety Rules 2025 were never designed to work:

  • 1.The restrictions don't prevent access — they fine platforms when children bypass their systems. No system is impervious to the ingenuity of most children.
  • 2.If harm befalls a child who bypassed the system, they feel stigmatised and are even less likely to report bullying or extortion.
  • 3.The restrictions are gender-biased — protecting girls on social media while ignoring boys, who are statistically more likely to send explicit images over gaming platforms thinking they're contacting girls.
  • 4.Face-to-face bullying, fake emails, text messages, and group harassment survive without any real policing.
  • 5.Parents and caregivers have a false sense of security because the e-Safety Commissioner claimed it would make children "safer."
  • 6.The age of 16 is arbitrary. People over 16 suffer from bullying, predatory algorithms, and extortion just as frequently — statistically more so.
  • 7.There is no recompense for victims. Fines go to the government. Victims and parents may believe no criminal or civil remedies are available to them.

As Dempsey argues: it was the result of political lobbying, not proper legal reasoning — designed to be a show of strength without any requirement of having an effect.

We already have the law. It's called the Australian Consumer Law.

The Australian Consumer Law (ACL) under the Competition and Consumer Act 2010 already makes it illegal for any person or corporation in trade or commerce to engage in conduct that is misleading or deceptive, or likely to mislead or deceive (Section 18).

Predatory algorithms that drive users towards self-harm, radicalisation, or addiction are textbook misleading conduct in trade or commerce. The ACCC already has the power to act — against social media, gaming platforms, search engines, or any online service.

The ACL has been enforcing consumer protection since 1974 (originally the Trade Practices Act). It applies to all Australians of all ages, not just under-16s on a handful of selected platforms.

Politicians prefer announcements over enforcement. We already have the laws. We just need the infrastructure to make them matter.

What you get

Your token isn't just identity. It's infrastructure.

Live now

Identity Verification

Three people vouch for you in person. Cryptographically signed. Soulbound to you forever. No government, no corporation.

Revenue Share

70% of all verification fees go back to token holders. Every time a developer verifies a human, you earn.

Safety Alerts

Triple-tap for help. Every verified human nearby responds in 60 seconds. Logged permanently on Bitcoin.

Coming soon

Free Search

A search engine that doesn't track you. No ads. No profiling.

How? Your browsing builds the index collectively. You're the crawler. Instead of Google selling your data, you own it.

Free AI

Chat with AI. No subscription. No data harvesting.

How? Runs on open-source models. Self-hosted or cheap API providers. Your prompts stay yours.

Free Calls

Phone calls and SMS. No carrier. No contract.

How? VoIP over the mesh network. Your call metadata maps the social graph, but the content stays private.

70% of all revenue goes back to token holders.

Every time a developer verifies a human through OMXUS, you earn. Not the company. You.

Verified Humans
Mesh Nodes
Bitcoin Epoch
Safety Alerts

Safety in 60 seconds

No hold music. No "we'll send someone." Real people, nearby, immediately.

1

Triple-tap your phone or ring

Silent alert. No fumbling with apps. Three taps and it's sent.

2

Every verified human nearby gets the alert

The mesh broadcasts your location to everyone within range. Not a call centre. Not a database lookup. Direct to people near you.

3

Logged forever on Bitcoin

Every alert, every response, every resolution. Anchored permanently. No one can delete it. No one can pretend it didn't happen.

Replace CAPTCHAs with one API call

$0.001 per verification. Real humans, not bots. Your users tap their phone instead of clicking fire hydrants.

How? Two endpoints. Create a challenge, verify the signature. Works with any language that can make HTTP requests. 70% of the fee goes to token holders.

const res = await fetch('/api/v1/verify', {
  method: 'POST',
  headers: {
    'Authorization': 'Bearer omxus_...',
    'Content-Type': 'application/json'
  },
  body: JSON.stringify({
    token_id: userId,
    challenge: challenge,
    signature: sig
  })
});

const { verified, trust_score } = await res.json();

The network runs on mesh

Every device is a router. No ISP required. Your identity works offline.

How? Yggdrasil for global overlay routing. Nebula for encrypted tunnels. BATMAN for local wireless mesh. Your phone, laptop, NFC ring — they all participate. IPv6 addresses derived from your public key. No NAT, no middleman.

Yggdrasil

Global overlay. Every node gets a unique IPv6 address from its public key.

Nebula

Encrypted tunnels. Nodes find each other and punch through NAT automatically.

BATMAN

Local wireless mesh. Layer 2. Your neighbours' devices route for each other.

Get verified

No wallet needed. No crypto knowledge required. Just people.

1

Download the app

Available on iOS, Android, or any device with a browser.

2

Find 3 people

Anyone already verified. Friends, family, colleagues, neighbours.

3

Meet up, tap, done

Tap phones or NFC rings. GPS confirms proximity. You're verified.