This is a fun paper about data exfiltration. It's suggested reading, I'd like you to try and grasp how difficult the problem is why looking at one 'creative" attack. The second paper is a technical approach, only for the people seriously interested in this topic.