If there is something that you want to be secure, make that happen at the protocol level, either through SSL or VPN or something similar. Once it gets past the local hardware you have no control over the security of the transmission, so even if the laptop<->phone connection is 'secure' (or tethered) the phone<->tower connection won't necessarily be, or the next hop, etc.