How would they put guards against poisoned data ? How would they identify poisoned data if there are a lot/obfuscated ?