While most WiFi hardware is of course incapable of this, the observer in our scenario only needs to receive transmissions. 2.3. Side-channels & private information inference Side-channel analysis is famed for its use in breaking encryption but remains “an often-overlooked threat” [20]. Power ...