4.2.7 Additional equipment evaluation and analysis of information leakage channels