live bugging computer security tempest network security lemans bug sweep microsoft .net authentication gto bugs land attack internet security identity authentication debugging man-in-the-middle attack authentication security logic bombs encryption computer identity 2.0