Stealth problems revisited