Skip to content

Technical Architecture

The OMXUS Technical Architecture is a four-layer system designed for 30 million users, resilience against any single point of failure, and independence from centralized infrastructure.

+---------------------------------------------------------------------+
| LAYER 1: BITCOIN ANCHOR |
| Permanent. Immutable. "This happened." |
+---------------------------------------------------------------------+
^
+---------------------------------------------------------------------+
| LAYER 2: HUMAN EXISTENCE RECORD |
| Identity. One per human. Stored on IPFS. |
+---------------------------------------------------------------------+
^
+---------------------------------------------------------------------+
| LAYER 3: MESH NETWORK |
| Yggdrasil + QUIC + LoRa. Works offline. |
+---------------------------------------------------------------------+
^
+---------------------------------------------------------------------+
| PHYSICAL: NFC RING |
| $9. No battery. Tap to do everything. |
+---------------------------------------------------------------------+

Permanent, immutable record of critical events. “This happened.”

  • RGB Protocol — Smart contracts on Bitcoin’s UTXO model
  • Periodic checkpoints — Aggregated records anchored to blockchain
  • Merkle trees — Efficient verification of any record
  • No separate blockchain — Uses Bitcoin’s security
  • Identity attestations (vouching records)
  • Vote tallies (not individual votes)
  • Epoch boundaries
  • Major governance decisions

One identity per human. Sybil-resistant. Self-sovereign.

  • DID (Decentralized Identifier) — W3C standard
  • IPFS storage — Content-addressed, distributed
  • Three-voucher attestation — In-person verification
  • Proof Capsule — Personal backup of identity proof

Each HER contains:

  • DID and public key
  • Voucher signatures (3 required)
  • Timestamp of creation
  • Hash links to checkpoint chain

Communication independent of centralized infrastructure.

  • Encrypted IPv6 mesh overlay
  • Cryptographic addressing
  • Routes through any available path
  • Self-healing around failures
  • Modern transport protocol
  • Low latency
  • Connection migration
  • Multiplexed streams
  • Long-range radio (kilometers)
  • Low bandwidth, high reliability
  • Works without infrastructure
  • Battery-efficient
  • Global communication without any infrastructure
  • Last resort fallback
  • Community-operated stations
  • Physical transport of data
  • Works when all else fails
  • QR codes, USB drives, printed books

Physical anchor of identity. Tap to act.

SpecValue
InterfaceISO 14443-A/B NFC at 13.56 MHz
Secure elementEAL5+ certification
StoragePrimary DID key pair + recovery shards
Water resistanceIPX8
MaterialsMedical-grade titanium or ceramic
PowerNone (inductively powered during NFC)
Cost$9 at scale
  • Sign votes
  • Activate emergencies
  • Verify identity
  • Vouch for others
  • Complete contracts

  1. User sees proposal in app
  2. User makes choice
  3. Ring signs vote
  4. Vote propagates via mesh
  5. Aggregated to regional tallies
  6. Tallies anchored to Bitcoin
  1. User taps ring (emergency pattern)
  2. Alert broadcasts via mesh
  3. Nearby devices receive immediately
  4. Responders acknowledge
  5. Location shared (only during emergency)
  6. Response logged
  1. New user meets 3 vouchers
  2. Each voucher signs attestation
  3. Attestations bundled
  4. HER created on IPFS
  5. Eventually checkpointed to Bitcoin

Australia (30M)
|
+-- States (8)
|
+-- Regions (~100)
|
+-- Districts (~1,000)
|
+-- Neighborhoods (~10,000)
|
+-- Blocks (~100,000)
  • Block votes aggregate to neighborhood
  • Neighborhood to district
  • District to region
  • Region to state
  • State to national
  • Each level signs the aggregation
  • No central server
  • Each node handles local traffic
  • Aggregation happens at edges
  • Only tallies propagate up

  • No master server
  • No admin accounts
  • No kill switch
  • No central database
  • Ed25519 signatures (ring)
  • BLS aggregation (votes)
  • AES-256 encryption (data)
  • SHA-256 hashing (integrity)
  • Multiple network paths
  • Multiple storage locations
  • Multiple verification methods
  • Multiple fallback systems

  • Vouching chains
  • Vote tallies (not individual votes)
  • Contract completions
  • Reputation scores
  • Individual votes (encrypted, revealed only in aggregate)
  • Location (except during emergencies)
  • Personal data (encrypted, user-controlled)
  • Communication content