XORD Systems LLC

Protect the people
who raised us.

Granny_Kate is a lightweight Windows guardian that watches for scams, deepfakes, and remote‑access hijacking in real time — then kills the threat before any damage is done.

Granny_Kate Claymore hardware device
$64B
Annual Fraud Losses
54M+
US Seniors at Risk
3 sec
Voice Clone Time
24/7
Fraud Factory Shifts

Hardware-Enforced Protection™

Elder fraud is a $64 billion industry run by transnational syndicates with AI, deepfakes, and trafficked labor. Software scales the attack. Granny_Kate's Claymore breaks the chain at the hardware level.

Lifetime Access — $49.99

All 8 detection layers. Runs locally — zero data leaves the machine. Free updates for life.
One-time payment. No subscriptions. No upsells. Ever.

⚡ Instant Download Access • ✅ Lifetime License
✅ 30-Day Money-Back Guarantee

Try Granny_Kate Free

Seven days. Zero obligations. Zero data collected. Download the demo, launch it, fire the test triggers. Watch each detection layer catch its target in real time.

✓ No installation — portable .exe  ·  ✓ Zero persistence
✓ No network calls  ·  ✓ No telemetry  ·  ✓ Advisory-only
Windows SmartScreen: If Windows flags the file as "Unknown Publisher," click More info → Run anyway. Standard for unsigned pre‑release software.
The Threat Is Industrial

This isn't a kid in a hoodie. It's a factory.

Transnational syndicates operate from fortified compounds in Myanmar, Laos, and Cambodia — running shifts with trafficked labor, AI‑generated deepfakes, and military‑grade obfuscation. They don't outsmart your parents. They panic them.

The Amygdala Hijack

"Your grandson is in jail." One phone call floods the brain with cortisol, shuts down the prefrontal cortex, and bypasses decades of wisdom. The scammer doesn't need to be smart — just fast.

Voice & Video Deepfakes

Three seconds of scraped audio clones a loved one's voice with emotional inflection. Real‑time face‑swapping defeats video calls. "Call them back to verify" no longer works.

The Phantom Operator

Scammers talk victims into opening QuickAssist or AnyDesk — pre‑installed and whitelisted by Defender. Then they black out the screen and execute wire transfers while the victim waits.

Eight Detection Layers

How Granny_Kate Works

Runs silently on any Windows machine. Eight watchers scan for threats in real time. When one fires, the response is immediate.

01

Typosquatting Detection

Catches fake URLs the moment they hit the clipboard — paypa1.com, arnazon.com — before the browser opens them.

02

Suspicious URL Analysis

Flags dangerous TLDs (.xyz, .tk, .buzz) combined with phishing keywords like "verify" and "secure-login."

03

Crypto Address Swap Guard

Monitors clipboard for BTC, ETH, and TRX address patterns — the signature of clipboard‑hijacking malware.

04

Tech Support Scam Killer

Scans window titles for fake "Security Alert" patterns and scam phone numbers. Kills the popup before panic sets in.

05

Dangerous Download Watchdog

Monitors Downloads for executables disguised as documents — invoice.pdf.exe, update.scr — alerts within 3 seconds.

06

Remote Access Tool Scanner

Detects when QuickAssist, AnyDesk, or TeamViewer launches — the tools scammers use to take over and drain accounts.

07

Registry Persistence Watch

Catches malware installing itself into Windows startup to maintain access after the victim hangs up.

08

Scheduled Task Monitor

Detects suspicious scheduled tasks created by malware to phone home or re‑establish control.

Live Detection Engine

  • Clipboard watcher — 2s interval
  • URL pattern analysis — Levenshtein
  • Crypto address regex — BTC/ETH/TRX
  • Window title scanner — 2s interval
  • Downloads folder monitor — 3s sweep
  • Process name scanner — RAT signatures
  • Registry Run key watcher
  • Scheduled task auditor
⟶ A Forensic Analysis of Industrialized Elder Fraud The Gray Zone Kill Chain — Neuro-Hacking and Weaponizing Cognitive Decline ⟶ XORD Intelligence: Project Granny_Kate Validation Published research and threat analysis

Patent Filed

System and Method for Hardware‑Enforced Process Termination via Bidirectional Peripheral Telemetry. USPTO.

Zero Data Collection

No telemetry, no analytics, no cloud. Everything runs on the local machine and stays there.

Advisory Only

Every detection is surfaced to the user. Every response requires an explicit click. No silent actions.