Abstract
In considering the leakage of information through hidden text mechanisms in commonly used information interchange formats, the author demonstrates how to automate and scale the search for hidden data in Microsoft Word documents. The combination of this scaling with typical behavior patterns of Word users and the default settings of the Word program leads to an uncomfortable state of affairs for Word users concerned about information security. The author discusses some countermeasures employable by users and notes more general consequences of these effects.