I'd agree with this. Point to point, and end to end a larger network of trusted users tends to be more stable, from a security standpoint, than an ad hoc network.
TOR endpoint monitoring is one kind of example of how security through obscurity was easily thwarted. However someone would still need the key, or an enormous amount of resources to decrypt any actual data.
The web is only one class of internet layer transport. If your device is personally secured and your app encrypts for push/pull telemetry, data is generally safe enough when using the web as an entry point, operational errors notwithstanding.
Russell
Sent from mobile.