Hehe - Eduroam is what it is - just know that it’s constantly evolving over time, and there’s a lot of switches that the campus admin can do - some are more aggressive than others.
Consider the challenge here…
< campus network > — eduroam 802.1x — < client station >
Trust is established here for campus resources and all is good here, as there is end-to-end security from the network to the authenticated device
now consider the following
< campus network> — eduroam 802.1x — < client repeater with not 802.1x > — < other devices either on WPA(2) or open >
See the problem - the chain of trust is now broken, as the repeater can and will allow access to resources that should be protected, and the campus network admin cannot control the WLAN access for the repeater, so it’s treated as a rogue AP.
Rogue AP’s are never a good thing on a campus or enterprise network, and I’ve seen some that will aggressively de-auth the rogue AP if they see it’s attached to the secure network (yes, it’s easy to tell actually based on the framing).
With the MiFi - if you’re attached only to the 3G/4G network from your wireless carrier, you shouldn’t have a problem, other than cost/performance associated with the wireless service provider.
I’ve seen some campuses that deploy Guest WLAN access, some via a Captive Portal, and attaching there shouldn’t be a problem, other than timed access (many are 60 mins, some up to once a day, some don’t care - all depends on the network admin and the access profiles they create)
Hope this helps.