Graham added: "What we could conclusively say in the evidence within the documents is that they're developing snippets of code for use in other projects and they are reusing solutions in code which they discover on the web. ... Somewhere else they speak about obscuring attacks so you can't see wherever it's coming from, but there's no concrete deci