This talk will present an overview of traffic analysis techniques, and
how they can be used to extract data from 'secure' systems. We will
consider both state of the art attacks in the academic literature,
but also practical attacks against fielded systems.