“…The security community has also explored numerous other classes of information leakage, including: the time to perform various tasks (e.g., [13]), optical emanations (e.g., [19] for network appliances and [15] for CRTs), acoustic emanations (e.g., for printers [4], CPUs [26], and keyboards [1]), and reflections (e.g., [2]). There is also security research focused on the modern television showing that it is possible to infer what someone is watching over an encrypted wireless video stream from the size of the transmitted packets [25]; that approach exploits information leakage through variable bitrate encoding schemes, which was pioneered in [29].…”