This document discusses how various file formats like documents, media, and calendars can trigger outbound network connections without user interaction or exploits. This includes leaking privacy-sensitive data and allowing remote code execution via NTLM authentication. The talk demonstrates this behavior in formats like RTF, WMV, MP3, torrents, and others. It notes security implications for de-anonymization, credential theft, and data exfiltration from organizations. Mitigations are difficult due to the variety of formats and potential for false positives or breaking legitimate functionality.