This document discusses timing attacks in computing systems and their potential implications for security, particularly focusing on applications, DNS tunneling, and information leakage. It outlines various attacks and techniques, such as cross-site request timing (xsrt) and distributed versions, detailing how they can exploit timing discrepancies to extract sensitive information. The presentation is aimed at developers, security professionals, and researchers, emphasizing the importance of awareness regarding timing-related vulnerabilities in their applications.