Graham added: "What we could conclusively say from your evidence within the files is that they're developing snippets of code to be used in other projects and they're reusing approaches in code that they locate on-line. ... In other places they mention obscuring assaults to help you't see where It really is coming from, but there's no concrete want