Several years ago, I assisted a client who was going through a contentious divorce. Of particular concern to my client was that he had entrusted his then wife with passwords for many of his online accounts, and she was not ready to hand them over. Her phone number had also been used for two-factor authentication on several of these same …