Graham extra: "What we can easily conclusively say in the evidence while in the files is that they are creating snippets of code for use in other tasks and they're reusing approaches in code they come across on the internet. ... Elsewhere they discuss obscuring attacks so that you can't see the place It can be coming from, but there's no concrete w