Graham added: "What we are able to conclusively say with the proof during the documents is that they are making snippets of code for use in other tasks and they're reusing strategies in code they uncover over the internet. ... In other places they look at obscuring assaults to help you't see where by it's coming from, but there's no concrete plan t