Quote from: RedDead on August 30, 2011, 09:07 pmWhat about using your own WiFi network with an iPad? Is that safer?Hahaha none of it's safe, right? :) Arguably, by some marginal amount, perhaps safer. How/where tor+ploipo are set up is much more important than wifi+cable vs 3G. There are so many other factors and the network itself is not a very important one. Every single network can be assumed to be under LE control.There's no right way to use these devices. There's always a tradeoff and unknowns. In theory, I'd feel safer with all the software configured and working on the jailbroken iPad, but securing a jailbroken iPad is a whole 'nother ball of wax for another message board entirely. If you're on your home network and want to keep your iPad stock, you can run tor/polipo on your PC/Mac and direct your iPad through that. However, your wireless is then the weak link there because polipo and the browser, they talk unencrypted. Your wireless net better be locked down damn good. Don't forget you gave your neighbor the password too. Does he watch your traffic now? Even without the password, WPA2-P is magnitudes weaker than TLS (modern SSL) or each individual layer of the onion's encryption. (in my opinion anyway) but it's seldom just a case of stronger vs weaker. "Attack vectors" can be different. ie. TLS is strong and saddled with a broken trust model in every shipping OS/browser but that's an example of "the man" socially engineering our security out of us.This place isn't a success because people can get away with it, it's enough that most believe they can. We aren't still free because we're security experts. We're small fish with the benefit of dumb luck, for the most part. Are you just a lowly pothead hoping that officer Barbrady doesn't stumble upon your doings, or you're an established drug kingpin trying to evade the supercop who's currently gunnin' for you with a major hard-on and already hot on your trail? Most of us are a lot closer to the former I think. If it's the latter, you need to hire experts not ask the peanut gallery. I'm sure that expert would say you'd better stay the hell off of them fancy new mobile devices. They are toys, after all.There's a million factors here. When people slip up it's usually not because the FBI hacked their 256-bit n00b-crypt, and darn I shoulda went with l33t-crypt 2048 and only browsed from inside a lead box. Information "leakage" is more likely how they'll get ya and it will betray you through your encryption and your nuclear bunker. Browsers volunteer so much information about you and your computer in the name of convenience and nifty features. Nifty and convenient is pretty much the driving force of the mobile gadget market. Polipo does what it can but you'd have to analyze and tweak everything to be sure. Any applications you use simultaneously while browsing via tor increase your risk of leakage as well as improve the effectiveness of traffic analysis techniques and that goes for PCs or phones.It's all give and take. Be careful pay attention learn and do the best you can. You can't live your life in paranoia though, if you can't accept risk this is the wrong place to be. Anyone who thinks they are "safe" because they did this and this and this is probably just deluding themselves out of a paranoid denial of risk rather than a healthy avoidance of. Or, if they are safe, that and that and that was actually a well thought out and very particular plan for them which may or more likely may not apply to anyone else.Be careful who and what you believe. All success can be attributed equally to pure genius or dumb luck