These questions are complicated by the fact that the person trying to breach the security might have physical access to the 810, not just someone trying to intercept your communications in a wi-fi cafe or something.