As we saw in Chap. 6, our framework for quantitative information flow can provide a robust theory for deriving security properties from a system’s representation as a channel, as long as we can determine what that channel is — but determining an appropriate channel to model a system is itself often a non-trivial task.