“…As a result, much effort in the field has been dedicated to defining ways of composing channels, and studying their properties [6,Chapter 8]. These compositionality results have been useful in studying the leakage of information in anonymity protocols [8,25,34], timing attacks against cryptosystems [38], two-player games [5], and in scenarios where the sensitive data that is correlated to the input [14]. We adopt this compositional approach in our work, using the parallel and cascading compositions [6,Chapter 8] to obtain, from simpler and more intuitive channels, a comprehensive model of the effect a trader Alice's actions have in the market.…”