The document discusses covert channels and side channels. It defines covert channels as communication channels that were not intended for information transfer, while side channels leak implementation details. It notes covert channels may require cooperation while side channels do not. The document also discusses how protection models can convert a side channel to a covert channel, or vice versa, by changing the scope of the model.