How Does Llm Data Poisoning Work?