Proceedings of the second symposium on Usable privacy and security