coderman <[email protected]> writes: >it is more private because you are separating domains of communication. the >less trustworthy smartphone is used as a network link (cell or other uplink) >and not trusted with the content of the encrypted communications it carries.
That bites both ways. If I can get control of your Android device (which, given the exploit-like-it's-the-1990s state of security of the whole ecosystem shouldn't be that hard) then I've MITM'd your net connection, while doing the same for your router/access point is likely to be a lot harder. Peter.
