Solving Mobile Security: Peer-tested Strategies That Work