The application leaks information by requesting a specic
advertisement to represent a specic encoded input token
(binary values of the contacts list). If 2n advertisements are
available, then each request can represent n bits of the data
to be transmitted. The application fetches ads using http
requests with a POST parameter representing the specic ad
to be fetched. Ads of certain values represent the beginning
or end of a covert transmission.