Browsing: How Can You Secure Your Mobile Application Against Man-In-The-Middle Attacks?