I provide a service that is the safest fastest and most convenient way to use SR on your mobile. I stand by my service and would be happy to discuss how it works and compares to some other solutions for that as well as the ramifications of each or any. I also professionally develop Andriod and iOS apps.It makes people uneasy, but people want to do this, (get on SR from their mobile.) Tell yer kid he can't smoke weed and he'll just sneak around in shadier situations to make it happen, am I right? Let's discuss the trade-offs of different policies in different situations so more people have thought out more scenarios. I think that is how to protect the community.Am I going to tell you there are no risks to take into consideration? Certainly not. Security and convenience are inherently at odds with eachother. Security is obviously more important to most of us here. Sure we'd all feel much safer if everyone only logged in from their mother-in-law's basement, browsed only with an OpenBSD+TRESOR system, and stood up to interrogation techniques like Jack Bauer. You guys can get mad when n00bs ask about their iThings but do you think that discourages them and thus you are safer? Maybe that one guy gives up on the idea out of fear thanks to your warning but you haven't really taught him anything and the curious and enamored are going to keep coming asking for it.Most of us have a suspicion and distrust of most large establishments. Apple is a popular target of paranoid contempt. Rightly so? Sure. But what about Microsoft? Symantec? Trend Micro? The list is practically endless All of them are in positions to violate so many n00bs and therefore us. The reason SR is great is that the model holds up well in the case of partial breach. Of course this place is already crawling with LE. We must remain cognizant and diligent. There are digital networking risks and physical risks to using a portable unencrypted device with a proprietary operating system.Your iPhone is tracking your location. That is all. Apple does not send anything about your browsing activity off device except of course the traffic itself. AT&T cannot eavesdrop on anything you send to a secure site. The government and plenty of others in positions to abuse power could, if they set up an authorized man-in-the middle attack. They have to be on to you and set that up in advance and not just call AT&T after-the-fact. That is because of the flawed SSL CA model and you can alleviate that by checking certificate fingerprints manually against a copy you received from a side-channel.Tor does not rely on SSL at all. There are no CA's to betray your trust but that is the simple reason for the gobbeldygook.onion names. (it IS the fingerprint.) You can never set your tor hidden site up at a human-memorable name of your choosing. Tor is slow enough on Verizon FiOS how do you think it performs over 3G or GPRS? Like garbage, that's how. My service handles the tor while what you are doing is connecting to a server of mine via SSL. It is not technically much different from gateways like web2tor except it's not free and bogged down and you are connecting to a random legitimate business's highly secure server and slipping in with gobs of legitimate traffic. Both web2tor and tor installed on your phone will still allow your network operators to see you are on the tor, even if they can't see what you're up to. With my service they will even be totally unaware that you are even using tor.If you do use any gateway such as mine to get on SR, you are trusting the operator because he could evesdrop or even withdraw your BTC. I will not. Can you trust me? I assure you. Do I expect you to? Not really. I made it for myself in an afternoon, if it helps anyone else out, great! I'd be happy to give anyone the source to run it themselves for free if they have the inclination. It's not hard and it runs on any OS supported by tor and apache. it's not a new actual program its all in the configuration of apache and tor/polipo