Cryptographic chain of custody controls prevent attackers from modifying training sets to manipulate model behavior. Researchers at Carnegie Mellon University argue that verifying data provenance stops poisoning attacks before they hit the training pipeline. This approach shifts the focus from post-training detection to proactive prevention. Practitioners must now prioritize verifiable data lineage to ensure model integrity.