If LLM companies are willing to pirate data, why would we believe they wouldn't also use breached and stolen data?