authentication 2-factor authentication identity security identity 2.0 3-factor authentication logic bombs man-in-the-middle attack criminal background check identity verification internet security identity authentication 2-factor blog live land attack encryption openid