THIS IS NOT A REAL BANK

You have just experienced a simulated banking environment. The "Aequitas Global" website you just interacted with is 100% fictional, created to demonstrate exactly how easily users can be deceived online.

This simulation is part of the Gatekeeper Cyber Security Solution.

Return to the Fake Bank
Team at computers

Contact Us

🟒 Whatsapp | call: +47 99647892

🌐 http://taransvar.no

πŸ“ Fedha, Embakasi, Nairobi

About company

Taransvar is a Norwegian Non-Governmental Organization with a registered branch in Kenya (Taransvar CBO). We're dedicated to improving mental well-being through neuroscience, specifically by understanding neuroplasticity.

This research shows that mental challenges are essentially destructive "skills" that can be replaced by focusing on and developing better ones. By creating meaningful cybersecurity jobs, we provide precisely that – a constructive focus and a path to mental well-being.

Cyber Security Data

Understanding the Threat

Cybersecurity is about protecting you, our customers, because cyber attackers don't care who they target. Unless we take decisive action, cybercrime will continue its alarming growth. It's a problem that already costs hundreds of billions of US dollars annually.

We can eradicate cybercrime globally, and we're starting this initiative from Kenya. This groundbreaking effort will create thousands of vital jobs here, offering a path to meaningful employment and skill development.

πŸ’» Hacker (PC A)
↓ Attacked Blocked
πŸ–₯️ Your Computer (PC B)
↓ Instantly Reports To
πŸ“‘ Hacker's ISP

ISP tags hacker traffic as harmful.
Hacker blocked from attacking PC C.

Our Game-Changing Solution

When a hacker attacks your computer, your firewall normally stops them. But then, they just try again from a different online address, with no real punishment. Everyone ends up needing their own expensive security.

Taransvar changes this. When a hacker (PC A) attacks your computer (PC B) and your firewall stops them, your computer instantly tells the hacker's Internet Provider (ISP). If that hacker then tries to attack someone else (PC C), their ISP will tag their internet traffic as possibly harmful. This means their computer can't be used to attack anyone connected to our system.

πŸ›‘οΈ

Protected Network

The result

Hackers lose their tools after their first failed attempt. They'll learn to stay away from "easy targets"β€”which will be almost everyone. This plan, if used worldwide, can solve the massive cybercrime problem costing billions.

Plus, regular companies won't need super expensive firewalls because hackers won't bother trying to attack them; we'll give them basic protection and go after the attackers directly.