How to identify a Trojan Horse