Methods and apparatus are presented herein for allowing a wireless communication device to perform a proxy authentication on behalf of a tethered device and ensure the authentication is encrypted.