Mechanisms of the Trojan Horse