Skip to main content

Koyo raises $4.9M in equity and debt to use open banking to offer loans to people with ‘thin’ credit files

Koyo, a fintech startup using open banking to offer loans to people with “thin” credit files and currently poorly served by the market, has closed $4.9 million in funding.

The round — a mixture of debt and equity funding — is led by Forward Partners, with participation from Seedcamp. Other investors include Christian Faes (founder and CEO of LendInvest), and Charlie Delingpole (founder and CEO of ComplyAdvantage).

Founded in late 2018 by ex-Frontline Ventures VC Thomas Olszewski, and launching later this year, Koyo is attempting to tackle the problem whereby people without much of a credit history, such as migrants or those who have never taken credit or aren’t the main bill payer, aren’t able to secure a loan.

And even if they are, the financial products they’ll typically get access to often charge excessive fees and have an extremely high interest rate.

By using open banking data to better assess risk based on a person’s up-to-date transaction history, the company thinks it can offer something a lot more competitive.

“If someone is new to the country or otherwise has a thin credit file it can be difficult for that person to access credit,” says Olszewski. “For example, if you’ve been in the country for a year or two and you’d like to get a personal loan, the types of loans that would be offered to you would be payday loans (1,000%+ APRs) or longer term loans in the 50-99% APR range that may require a guarantor”.

The reason is because these types of customer have little or no information in their credit file, and the vast majority of lenders rely on the three main bureaus (Equifax, Experian, Transunion) to make a credit decision.

“We estimate 15-20% of the population are not captured by bureau data,” explains Olszewski. “Koyo is unique in that we require all customers to connect their current account to our platform using open banking, and we make a lending decision based on the transactions in that customers account, rather than just looking at the credit score. So, if we see the customer has regular income, has a reasonable expenditure relative to the size of their income, that customer may be eligible for a loan from us”.

With regards to competitors, Olszewski says that if you have a thin credit file (or have no file at all) and are unable to get a loan from a bank, there are providers such as Amigo Loans, and 118 Money or Sunny. However, he claims that Koyo will usually work out 50-90% cheaper on an APR basis.

“We expect our representative APR to be in the c35% range. While this may be expensive to people who have access to high street bank loans, it is a really exciting proposition for this market segment,” he adds. In addition, Koyo won’t charge late fees, early repayment fees, loan originations fees “or fees of any sort other than interest”.

Meanwhile, I’m told that Koyo is currently a “nimble” team of just 6, with 4 people in the management team. Along with Olszewski, they are CTO Guy Evans (former CTO of LendInvest), Head of Risk Kevin Allen (former CRO of Ratesetter) and Head of Marketing Peter Kent.



from TechCrunch https://ift.tt/31Y8jAA

Comments

Popular posts from this blog

How To Play Doom – And More – On An NES

Doom was a breakthrough game for its time, and became so popular that now it’s essentially the “Banana For Scale” of hardware hacking. Doom has been ported to countless devices, most of which have enough processing ability to run the game natively. Recently, this lineup of Doom-compatible devices expanded to include the NES even though the system definitely doesn’t have enough capability to run it without special help. And if you want your own Doom NES cartridge, this video will show you how to build it . We featured the original build from [TheRasteri] a while back which goes into details about how it’s possible to run such a resource-intensive game on a comparatively weak system. You just have to enter the cheat code “RASPI”. After all the heavy lifting is done, it’s time to put it into a realistic-looking cartridge. To get everything to fit in the donor cartridge, first the ICs in the cartridge were removed (except the lockout IC) and replaced with custom ROM chips. Some modifica...

Try NopSCADlib for your Next OpenSCAD Project

Most readers of this site are familiar by now with the OpenSCAD 3D modeling software, where you can write code to create 3D models. You may have even used OpenSCAD to output some STL files for your 3D printer. But for years now, [nophead] has been pushing OpenSCAD further than most, creating some complex utility and parts libraries to help with modeling, and a suite of Python scripts that generate printable STLs, laser-ready DXFs, bills of material, and human-readable assembly instructions complete with PNG imagery of exploded-view sub-assemblies. Recently [nophead] tidied all of this OpenSCAD infrastructure up and released it on GitHub as NopSCADlib . You can find out more by browsing through the example projects and README file in the repository, and by reading the announcement blog post on the HydraRaptor blog . Some functionality highlights include: a large parts library full of motors, buttons, smooth rod, et cetera many utility functions to help with chamfers, fillets, precis...

The Newbie’s Guide To JTAG

Do you even snarf? If not, it might be because you haven’t mastered the basics of JTAG and learned how to dump, or snarf, the firmware of an embedded device. This JTAG primer will get you up to snuff on snarfing, and help you build your reverse engineering skills. Whatever your motivation for diving into reverse engineering devices with microcontrollers, JTAG skills are a must, and [Sergio Prado]’s guide will get you going. He starts with a description and brief history of the Joint Test Action Group interface, from its humble beginnings as a PCB testing standard to the de facto standard for testing, debugging, and flashing firmware onto devices. He covers how to locate the JTAG pads – even when they’ve been purposely obfuscated – including the use of brute-force tools like the JTAGulator . Once you’ve got a connection, his tutorial helps you find the firmware in flash memory and snarf it up to a file for inspection, modification, or whatever else you have planned. We always apprec...