authentication identity verification man-in-the-middle attack 2-factor authentication internet security security 3-factor authentication logic bombs encryption microsoft .net authentication 2 factor live criminal background check identity 2.0 identity authentication land attack