How a Trojan Horse Works