
Our founder and CEO provides a history of access control attacks and explains how Allthenticate can eliminate most of them in one fell swoop. If you want to learn more about physical security bypass, our friends at the Physical Security Village gave a great DEFCON talk.
Exploit Techniques



Man-in-the-Middle (MitM)
Wires between the reader and controller are susceptible to physical implants that can steal and replay employee credentials
Exploit tools
Card Cloning
Cards with no or broken encryption schemes can be trivially cloned by walking nearby and employee and wirelessly reading their badge
Exploit tools
Physical Bypass
Mechanical means like using smoke trip the motion sensor, a wire to hit the exit button, or a lockpick can be used to bypass the system entirely. We recommend checking out the courses at Red Team Alliance if you're interested in learning more
Exploit tools










Allthenticate eliminates the risk of Access Control Exploits.
Before writing a line of code, we analyzed and actively exploited all of the aforementioned vulnerabilities and specifically designed our patented architecture to be resistant to all of them.
Reader on the inside of the office
Our ALL-IN reader/controller is installed on the secure side of the building as a single unit, leaving no reader or wires exposed to a Man-in-the-Middle (MitM) attack.
Secure by Design
Your private keys are stored in the Secure Element (SE) on the phone — the same technology in DoD-grade smartcards. Bluetooth connections reduce friction while maintaining best-in-class security. Additionally, TrustZone and biometrics are leveraged to prevent relay attacks, software exploits, physical tampering, and device theft.