You'll have access to the same models as your hypothetical attackers, and a big advantage if only you have access to the source code