Lots of bad advice in this thread. First off, WiFi can be traced extremely accurately, and the police trace WiFi all the time. Even your local police are extremely likely to have WiFi tracing equipment, it is standard procedure in CP cases these days, to make sure they don't raid an innocent neighbor. Second off, yes Pine is correct that Iceman used WiFi and was traced. Lots of people use WiFi, incorrectly thinking it is somehow magically impossible to trace, and then are traced by the police. There are all kinds of different devices for pinpointing a device transmitting a WiFi signal, but all you really need is a laptop with a sensitive wireless antenna, because the closer you get to the broadcasting device the stronger the signal will appear to be. Using a directional antenna from high elevation might make it harder for the attacker, but they can still see your signal strength from the access point, take a few measurements and have a damn good guess of where you are. In short, using wireless anything is not enough for anonymity. Sure it is better than nothing, and can be layered with Tor, and this is definitely better than using Tor from your home internet, but the WiFi is the weakest link. It only provides protection if you stop using the access point before the police come and try to find you. Additionally, I don't know where all these "Using Apple products makes you completely invincible, internet from iphone is totally anonymous, imessage is totally impossible to intercept, filevault is not buggy broken shit, blah blah blah" rumors are coming from, but they are total bullshit and actually kind of humorous considering Apples history of broken security software, for example their flawed FDE. Internet on your phone has to work in, essentially, the same way as internet on anything else. You still are routing packets from your phone to a service provider. You still have an IP address associated with the packets arriving at the destination site. Maybe they have something like NAT and all phones share the same IP address. I just find it extremely unlikely that apple does not keep logs of which devices are doing what, even assuming that they all share the same IP address in the first place. Obviously they need to keep track of who has bandwidth available for usage still, etc, so the phones probably have some sort of a MAC associated with them.