This document provides an outline and overview of a research paper on covert channels using keyboard timing. It begins with an introduction to covert channels and previous work exploring network timing channels. It then outlines the key aspects of the presented scheme, which focuses on exploiting keyboard timing in interactive SSH sessions rather than modifying network protocols or payloads. An example is provided to illustrate how stolen credentials could be encoded and transmitted by modifying keystroke timings. Implementation details regarding the keyboard protocol and possible events are also summarized. Overall, the document previews the major elements and approach of the research paper on a covert channel using keyboard timing variations.