Resources Learn how to stay safe on the internet using Oath. The Oath Manifesto Blog Need Help? ✉️ Email Us 💬 Join our Discord Frequently Asked Questions How do we keep users safe? Is my personal data safe? Are oaths legally binding? How does dispute resolution work? Why should I use Oath alongside payment protection? Why was Oath started? How does Oath make money? How to submit bugs / feature requests? With unique identity verification and legal protection.‣ Yes. It is against our policy to sell data. And all personal data is encrypted in-use, at-rest, and in-transit. ‣ Yes. See ‣ or ‣ ‣ Payment protection services like PayPal or Venmo G&S give you a refund after you’ve been scammed. Oath protects you before you send money or items with identity verification and a legally binding agreement. Plus, we’ll help you navigate the legal process in serving fair consequences to any scammers. Combining payment protection with Oath means you’re protected proactively and reactively. To build a safer internet by focusing on people over profits.‣ By selling discounted shipping labels at a small markup. 💬 Join our Discord How dispute resolution works How to identify scams How we protect your data How Oath keeps you safe How to fix broken ID Scanning Changing the game image.gif Fighting fraud online is a lot like playing whack-a-mole. No matter how many times you catch a scammer, they’ll pop right back up and do it again with a new account / identity. Oath changes the game played from whack-a-mole to an egg hunt. image.png In an egg hunt, after each egg is found, the supply steadily shrinks until nothing is left. On Oath, when we catch a scammer, we crack them like an egg, and they’re gone forever. That makes us the most effective fraud fighters on the web. Unique identity image.png We change the game by ensuring each user on Oath belongs to a unique identity. The backbone is a Face + ID verification system that takes a high-resolution 3D picture of your face. Using the same concept we use to open our phones every day, we can ensure that each person only ever has 1 Oath account and that each account is secure and protected from theft. This is what Oath is all about: mutual verification that people are who they say they are, building trust, and real consequences for fraud. Scammers beware. Oaths and disputes Screenshot 2026-01-18 at 11.38.20 AM.png Built on top of unique verified identity, Oath is a legal court for the web. Before buying or selling with someone, you create an “oath” which is a legally binding agreement that is signed by both parties. If either party reports the exchange and files a dispute, our professional moderators will gather the required evidence and make a resolution decision. This process is transparent and public for everyone to see. Once a resolution has been made, users must comply with it to continue using Oath. If users do not comply, Oath will aid the victim in pursuing legal action, forwarding information to authorities, and ensuring consequences for fraud. Understand the full process in ‣ Dispute resolution is our process of resolving any arguments or reports that arise from an oath. We take this process seriously, fighting for justice to make things right. Here’s an overview of the process: User reports oath and pays moderation fee Moderators collect and review evidence Moderators provide resolution based on protocol, fee refunded to winner Users comply with resolution Non-compliant users are banned from platform and forwarded to pertinent authorities Reporting an oath Screenshot 2026-01-24 at 4.11.21 PM.png Every oath has actions you can take on it. These actions are accessible with the 3-dot “More” button in the top right of the header. Screenshot 2026-01-24 at 4.11.29 PM.png Once you’re in the actions modal, you can click report. At Oath, we handle your personal data like it is our own - with extreme care and safety. We also know that it is a liability, because although encryption reduces risk, no system is 100% impenetrable. Therefore, we collect less of it, protect it with encryption, and make it useless to attackers in the worst case scenario (a database leak). To prevent data leaks, we’ve studied and learned from the biggest breaches on the internet. And we’ve learned 3 things: Plan ahead of time with policies and systems Secure access to only people who need it Constantly monitor and evolve security Our policies and systems This is the foundation of our security ethos. We are never going to sell your data to anyone. Although this is a profitable business venture for many tech companies, we believe it is an invasion of privacy and individual liberties. You have complete and explicit control over any personal data shared. Want it deleted, use your GDPR rights. See more: ‣ Multiple layers of encryption: Encryption is the process of obfuscating information to make it unreadable by others unless you have a key to decrypt (read) it. We encrypt your data, and hide the key. In transit: HT