Whitepaper discussing how injection of data can later be used to carry out an attack at a different point in time.