Why Leak Information? Traffic-shaping Wireless spoofing Traffic monitoring Firewalls Other uses we'll hear about today.