Graham additional: "What we could conclusively say in the proof inside the paperwork is that they are generating snippets of code for use in other jobs and they are reusing techniques in code which they uncover on-line. ... In other places they speak about obscuring attacks in order to't see where it's coming from, but there's no concrete intend to