How to protect from covert modeling: Difference between revisions