16 Oct
2014
16 Oct
'14
3:55 a.m.
coderman <coderman@gmail.com> writes:
it is more private because you are separating domains of communication. the less trustworthy smartphone is used as a network link (cell or other uplink) and not trusted with the content of the encrypted communications it carries.
That bites both ways. If I can get control of your Android device (which, given the exploit-like-it's-the-1990s state of security of the whole ecosystem shouldn't be that hard) then I've MITM'd your net connection, while doing the same for your router/access point is likely to be a lot harder. Peter.