authentication identity authentication security internet security live identity verification man-in-the-middle attack microsoft .net authentication criminal background check identity 2.0 logic bombs encryption land attack