Ponder Stibbons comments on Three Subtle Examples of Data Leakage