How to protect from covert modeling