Tag authenticated vs. unauthenticated exploits