Graham extra: "What we could conclusively say through the evidence during the paperwork is that they are building snippets of code for use in other tasks and they're reusing approaches in code that they locate over the internet. ... Somewhere else they look at obscuring assaults so that you can't see the place It can be coming from, but there's no