5 SIMPLE STATEMENTS ABOUT SMARTPHONE VULNERABILITY ASSESSMENT EXPLAINED