You can tunnel all traffic through SSH. Though with cellphones bluetooth hacking is the usual problem (so turn off bluetooth when not using it). If using public wifi, someone can tap your traffic if they're smart enough. So always use certificates (not always reliable) and use https instead of http when logging in.