I stopped reading after the first page. It is obvious that this article goes over the top. "Reading your data by observing the flashing red LED on your network switch," nonsensical.
You can extract several bits of entropy per typed character from network traffic timing information. That's plenty to bring an exhaustive password-guessing attack down into the feasible range, if you have some way to know when a particular person is typing a particular password.
As a crude countermeasure, I leave about a second between adjacent characters in a password when I am typing the password over a network.
Reading data leaked via traffic LEDs was documented years ago at speeds up to 56kbps, with the expectation it would work at least up to 10Mbps; see this 2002 paper: