logoalt Hacker News

d-lisp01/04/20260 repliesview on HN

How would they put guards against poisoned data ? How would they identify poisoned data if there are a lot/obfuscated ?