About Allthenticate
Based on decades of academic research and relevant hacking experience, Allthenticate was created to fix fundamental deficiencies with the Internet and create a more secure tomorrow.
Security with usability and privacy at the core
The vision for Allthenticate was inspired by research from CMU and UNC, and matured at MIT Lincoln Laboratory and UCSB after extensive research. With a simple goal to "fix the trust relationship on the Internet," our founder along with numerous exceptional colleagues successfully created a decentralized architecture that could not only fix the Internet, but enable a better future for our society as a whole — one where words like password manager, phishing, and credential theft are a thing of the past.
Security
Research started only after breaking every existing mechanism: access control, passwords, MFA logins, etc. Indeed, a methodical checklist was used when designing the patented architecture, which mitigates entire classes of known vulnerabilities.
Usability
Johnny's inability to encrypt is our strife. All of our products our built with usability as a top criteria. Indeed, we strive to make fun security products. Unlock your door like Harry Potter and watch your computers and websites magically login.
"Aberto!"
Privacy
Nobody likes being deceived and taken advantage of. Allthenticate will never sell your data or track you. In fact, our core technology is explicitly designed to make user tracking impossible and no PII is every collected. You can learn more about our stance on not becoming evil here.
All-in-one
One of the major insights was that every access mechanism in an organization ultimately boils down to the same authentication problem. Whether it be a door, a website, a server, or a computer, all of these interactions can be satisfied with the exact same, secure technology.
About Allthenticate
Based on decades of academic research and relevant hacking experience, Allthenticate was created to fix fundamental deficiencies with the Internet and create a more secure tomorrow.
Security with usability and privacy at the core
The vision for Allthenticate was inspired by research from CMU and UNC, and matured at MIT Lincoln Laboratory and UCSB after extensive research. With a simple goal to "fix the trust relationship on the Internet," our founder along with numerous exceptional colleagues successfully created a decentralized architecture that could not only fix the Internet, but enable a better future for our society as a whole — one where words like password manager, phishing, and credential theft are a thing of the past.
Security
Research started only after breaking every existing mechanism: access control, passwords, MFA logins, etc. Indeed, a methodical checklist was used when designing the patented architecture, which mitigates entire classes of known vulnerabilities.
Usability
Johnny's inability to encrypt is our strife. All of our products our built with usability as a top criteria. Indeed, we strive to make fun security products. Unlock your door like Harry Potter and watch your computers and websites magically login.
"Aberto!"
Privacy
Nobody likes being deceived and taken advantage of. Allthenticate will never sell your data or track you. In fact, our core technology is explicitly designed to make user tracking impossible and no PII is every collected. You can learn more about our stance on not becoming evil here.
All-in-one
One of the major insights was that every access mechanism in an organization ultimately boils down to the same authentication problem. Whether it be a door, a website, a server, or a computer, all of these interactions can be satisfied with the exact same, secure technology.
About Allthenticate
Based on decades of academic research and relevant hacking experience, Allthenticate was created to fix fundamental deficiencies with the Internet and create a more secure tomorrow.
Security with usability and privacy at the core
The vision for Allthenticate was inspired by research from CMU and UNC, and matured at MIT Lincoln Laboratory and UCSB after extensive research. With a simple goal to "fix the trust relationship on the Internet," our founder along with numerous exceptional colleagues successfully created a decentralized architecture that could not only fix the Internet, but enable a better future for our society as a whole — one where words like password manager, phishing, and credential theft are a thing of the past.
Security
Research started only after breaking every existing mechanism: access control, passwords, MFA logins, etc. Indeed, a methodical checklist was used when designing the patented architecture, which mitigates entire classes of known vulnerabilities.
Usability
Johnny's inability to encrypt is our strife. All of our products our built with usability as a top criteria. Indeed, we strive to make fun security products. Unlock your door like Harry Potter and watch your computers and websites magically login.
"Aberto!"
Privacy
Nobody likes being deceived and taken advantage of. Allthenticate will never sell your data or track you. In fact, our core technology is explicitly designed to make user tracking impossible and no PII is every collected. You can learn more about our stance on not becoming evil here.
All-in-one
One of the major insights was that every access mechanism in an organization ultimately boils down to the same authentication problem. Whether it be a door, a website, a server, or a computer, all of these interactions can be satisfied with the exact same, secure technology.
Word from our founder
As a young researcher, I wanted an easy-to-use way to login to everything that wouldn't compromise user privacy or put society at risk of large-scale attacks.
Smartphones seemed like the ideal candidate for Single Device Authentication; yet, many daunting research questions remained open: "What if the phone get's hacked/stolen?" "What about physical attacks against the device?" "How do we scale this to millions, or infinite accounts?" "How we design a scalable system without a single point of failure?"
This research led me into the depths of cryptography, hardware architecture, glitching attacks, and cybersecurity; culminating in 1.75 PhDs, numerous publications, and a lot of very smart friends. I ultimately emerged with 100% confidence that this dream of authentication nirvana is entirely possible — maybe even inevitable.
As the shepherd of this technology and this dream, I have only one question left, "Is the world ready for Allthentication?"
Dr. Chad Spensky
Founder & CEO
Word from our founder
As a young researcher, I wanted an easy-to-use way to login to everything that wouldn't compromise user privacy or put society at risk of large-scale attacks.
Smartphones seemed like the ideal candidate for Single Device Authentication; yet, many daunting research questions remained open: "What if the phone get's hacked/stolen?" "What about physical attacks against the device?" "How do we scale this to millions, or infinite accounts?" "How we design a scalable system without a single point of failure?"
This research led me into the depths of cryptography, hardware architecture, glitching attacks, and cybersecurity; culminating in 1.75 PhDs, numerous publications, and a lot of very smart friends. I ultimately emerged with 100% confidence that this dream of authentication nirvana is entirely possible — maybe even inevitable.
As the shepherd of this technology and this dream, I have only one question left, "Is the world ready for Allthentication?"
Dr. Chad Spensky
Founder & CEO
Word from our founder
As a young researcher, I wanted an easy-to-use way to login to everything that wouldn't compromise user privacy or put society at risk of large-scale attacks.
Smartphones seemed like the ideal candidate for Single Device Authentication; yet, many daunting research questions remained open: "What if the phone get's hacked/stolen?" "What about physical attacks against the device?" "How do we scale this to millions, or infinite accounts?" "How we design a scalable system without a single point of failure?"
This research led me into the depths of cryptography, hardware architecture, glitching attacks, and cybersecurity; culminating in 1.75 PhDs, numerous publications, and a lot of very smart friends. I ultimately emerged with 100% confidence that this dream of authentication nirvana is entirely possible — maybe even inevitable.
As the shepherd of this technology and this dream, I have only one question left, "Is the world ready for Allthentication?"
Dr. Chad Spensky
Founder & CEO
A Dream
A Dream
As a young Ph.D. student at UNC, dreaming up big ideas that could change the world was par for the course. The idea: using smartphones for Single Device Authentication. Mind you, the iPhone 3S was just released, no one was bringing smartphones to work, and the idea of everyone having one seemed preposterous. Yet, academics are supposed to solve future problems, not current ones, so the dream lived on.
A Team
A Team
Chad ultimately dropped out of graduate school over this idea, an insatiable brain itch that just wouldn't go away, but plagued with the question, "What if the phone gets hacked?" He joined MIT Lincoln Laboratory and kept pitching the idea. A team of elite researchers with expertise in cryptography, hardware security, and protocol designed helped construct the patented decentralized framework that you are using today. Indeed, the team ultimately expanded their scope from a password and PKI improvement to fix every authentication shortcoming in our society, not just the digital, Internet-based ones.
Allthenticate, Inc.
Allthenticate, Inc.
Ultimately the MIT team disbanded to follow individual career goals, and Chad continued to carry the torch during his (2nd) Ph.D. in the Seclab at UCSB. While the architecture was sound, there were numerous open questions regarding implementation and more sophisticated hardware attacks against the security mechanisms. During his Ph.D., Chad would publish numerous papers buttoning up these open questions while actively building the product in his free time — installing it on his house, truck, office, and computers. Just before graduation, Chad and co-founder Rita Mounir joined forces to win the UCSB New Venture Competition, incorporate the company, and finally bring this research project to the world as Allthenticate, Inc.
Upgrading Enterprise Security
Upgrading Enterprise Security
Today, the dream is a reality for businesses — a single app that stores credentials for each employee and uses that credential for everything in the workplace. All of the integrations are built out, the user experience is optimized, and we even developed custom hardware to augment existing access control solutions (the existing stuff was either too insecure or not robust enough). One business at a time, we are slowly upgrading the world's infrastructure.
Decentralized Nirvana
Decentralized Nirvana
The dream was always to do this at Internet scale and fix critical, widespread vulnerabilities. That is still the plan. Once we have helped secure all of the critical businesses, we will start focusing our attention on consumers as well. A single app to unlock your car, buy lunch, authenticate to your smart home, and even vote the for the next president. In fact, you will be able use the same app that you already have installed on your phone for work. 😉
A Dream
As a young Ph.D. student at UNC, dreaming up big ideas that could change the world was par for the course. The idea: using smartphones for Single Device Authentication. Mind you, the iPhone 3S was just released, no one was bringing smartphones to work, and the idea of everyone having one seemed preposterous. Yet, academics are supposed to solve future problems, not current ones, so the dream lived on.
A Team
Chad ultimately dropped out of graduate school over this idea, an insatiable brain itch that just wouldn't go away, but plagued with the question, "What if the phone gets hacked?" He joined MIT Lincoln Laboratory and kept pitching the idea. A team of elite researchers with expertise in cryptography, hardware security, and protocol designed helped construct the patented decentralized framework that you are using today. Indeed, the team ultimately expanded their scope from a password and PKI improvement to fix every authentication shortcoming in our society, not just the digital, Internet-based ones.
Allthenticate, Inc.
Ultimately the MIT team disbanded to follow individual career goals, and Chad continued to carry the torch during his (2nd) Ph.D. in the Seclab at UCSB. While the architecture was sound, there were numerous open questions regarding implementation and more sophisticated hardware attacks against the security mechanisms. During his Ph.D., Chad would publish numerous papers buttoning up these open questions while actively building the product in his free time — installing it on his house, truck, office, and computers. Just before graduation, Chad and co-founder Rita Mounir joined forces to win the UCSB New Venture Competition, incorporate the company, and finally bring this research project to the world as Allthenticate, Inc.
Upgrading Enterprise Security
Today, the dream is a reality for businesses — a single app that stores credentials for each employee and uses that credential for everything in the workplace. All of the integrations are built out, the user experience is optimized, and we have even developed custom hardware to augment existing access control solutions (the existing stuff was either too insecure or not robust enough). One business at a time, we are slowly upgrading the world's infrastructure.
Decentralized Nirvana
The dream was always to do this at Internet scale and fix critical, widespread vulnerabilities. That is still the plan. Once we have helped secure all of the critical businesses, we will start focusing our attention on consumers as well. A single app to unlock your car, buy lunch, authenticate to your smart home, and even vote the for the next president. In fact, you will be able use the same app that you already have installed on your phone for work. 😉
The Allthenticate Team
The brilliant minds behind Allthenticate
The Allthenticate Team
The brilliant minds behind Allthenticate
The Allthenticate Team
The brilliant minds behind Allthenticate
We’re hiring!
We're always looking for other smart and motivated people to join the team
We're always looking for other smart and motivated people to join the team
DevOps & IT Wizard
Fulltime
Fulltime
Houston, TX
Houston, TX
Cloud Infrastructure, Linux Admin, CI, Automation
Cloud Infrastructure, Linux Admin, CI, Automation
See job details
See job details
Rockstar Engineering Intern
Fulltime
Fulltime
Houston, TX
Houston, TX
Programming, Debugging, Learning, Changing the World
Programming, Debugging, Learning, Changing the World
See job details
See job details
808 Travis St, Houston TX 77002
(281) 971-0773
808 Travis St, Houston TX 77002
(281) 971-0773