Kenya digital credit
CBK says verify ID and selfie. Fraudsters use many real IDs and one emulator. Keverd sees the device behind every loan application — so your compliance work actually prevents fraud, not only files it.
What checks alone suggest
50 approved
KYC passed on every application
What Keverd surfaces
45 from 5 devices
Recycled hardware — block in real time
The gap
Kenya’s direction on borrower verification and true identity is clear — but document checks do not stop device farms, emulators, or coordinated velocity by themselves.
| What supervisors expect | What fraudsters do | What you actually need |
|---|---|---|
| ID verification | Buy many real ID photos on Telegram | Verify the device submitting the ID |
| Live selfie | Deepfake or looped video on an emulator | Verify a real phone, not an emulator |
| Record keeping | Pass checks, disappear with the loan | Prevent fraud, not only document it |
The painful pattern: you meet the checklist, they still walk away with principal, and post-hoc reports do not recover disbursements.
Architecture
Sit between the borrower and your decision engine — device verdict first, then KYC, scoring, and payout.
BORROWER OPENS APP / WHATSAPP / USSD
│
▼
┌─────────────────────────┐
│ KEVERD DEVICE CHECK │ ← ~200ms
│ • Fingerprint │
│ • Emulator / VM │
│ • Behavioral signals │
│ • Cross-account link │
│ • Geo consistency │
└─────────────────────────┘
│
┌────────┴────────┐
▼ ▼
GREEN RED
(approve) (block)
YELLOW (never reaches
(step-up) KYC / score)
│
▼
KYC / CREDIT SCORING
│
▼
DISBURSEMENTProduct
| Capability | What it does | Your outcome |
|---|---|---|
| Loan application hook | Runs before KYC, not after | Fraudsters blocked before per-check KYC fees |
| Emulator detection | Genymotion, LDPlayer, BlueStacks, VMs | One laptop posing as many phones — caught |
| Device recycling | Same hardware behind many “different” users | Ghost rings exposed at account creation |
| Velocity monitoring | Burst applications from few devices | Bots flagged before disbursement |
| Behavioral biometrics | Touch, typing cadence, motion sensors | Human vs automation separated |
| M-Pesa binding | Device context tied to payout number | Tighter last-mile against SIM-swap |
| CBK audit export | Timestamped CSV/PDF of device decisions | Inspection-ready prevention logs |
Integration
Meet your stack where it already lives: core banking connectors, mobile SDK, or a single web snippet.
| Your platform | How Keverd connects | Time to live (typical) |
|---|---|---|
| Lendisys | Pre-built connector, API key + webhook | ≈2 hours |
| Musoni | Pre-built connector, plugin install | ≈2 hours |
| Jisort / Kwara / TurnKey Lender | Standard REST API + docs | 4–8 hours |
| Custom native app | ~50KB SDK, Android / iOS | ≈2 hours |
| Web / PWA | Single JavaScript snippet | ≈30 minutes |
| WhatsApp Business | Verification link + webhook callback | ≈1 hour |
| USSD (*123#) | SMS link handoff → browser check | ≈1 hour |
Day 1
Integration
Day 2
Signal & tuning
Day 3
First high-risk block
Proof
“We process about two thousand applications weekly. KYC was green across the board. After Keverd, a large share of ‘new users’ mapped to a handful of recycled devices. One farm hammered dozens of applications before lunch — we never saw it without the device layer.”
94%
Reduction in device-farm approvals (example program)
KSh 1.2M+
Suspicious disbursements blocked in 30 days (example)
Low friction
Clean devices pass without extra steps
Pricing
Illustrative Kenya-market packaging — confirm volume and SLA with the team.
| Tier | Monthly (from) | Application checks | Best for |
|---|---|---|---|
| Starter | KSh 15,000 | 5,000 checks / mo | New DCPs, under 1,000 monthly loans |
| Growth | KSh 45,000 | 25,000 checks / mo | Scaling DCPs, 1K–5K monthly loans |
| Enterprise | KSh 120,000 | 100,000+ checks + SLA | Large DCPs, multi-product stacks |
Custom: pay-per-check from ~KSh 3 / application for highly seasonal books — ask on the audit call.
Process
| Step | What happens | Your time |
|---|---|---|
| 1. Request audit | Form + anonymized logs or shadow test | 2 minutes |
| 2. We analyze | Device exposure report | Zero |
| 3. Review findings | Short call, your real gaps | 15 minutes |
| 4. Start validation | Integration + 14-day live test | ~2 hours dev |
| 5. See results | Dashboard: live fraud blocks | Day 1 |
| 6. Go live or walk away | Convert — or cancel free | Your call |
Risk reversal: if we cannot surface actionable device-layer fraud signal by Day 7 of validation, we walk away — no invoice, no drama. Terms confirmed in writing with qualified pilots.
FAQ
Hundreds of licensed DCPs operate under active supervision — while fraud tooling gets cheaper. The only question is whether your device layer is ahead of the next ring.
Product sheet PDF: request on the call — we will send a branded one-pager.
Opens your email client with details prefilled. You can also book a demo.
Limited audit slots each month — first come, first served. Expect a short technical walkthrough, not a hard pitch.