Have you at any time puzzled why an airport security checkpoint was set up in a specific configuration? When you depart this presentation, you will comprehend why the variety problem exists and how to deal with it by developing a cluster of your possess. Probabilistic algorithms will be explored that can analyze this side channel data and determine software protocols within the tunnel.