Bypassing the Password, Part 2: Trusted Identities