identity authentication identity management access control privacy logic bombs encryption identity authentication alarm cctv blog security identity verification internet security identity 2.0 man-in-the-middle attack land attack openid live business criminal background check