Graham added: "What we are able to conclusively say through the proof during the files is that they are making snippets of code to be used in other assignments and they're reusing techniques in code which they come across online. ... Elsewhere they discuss obscuring assaults so that you can't see where by It truly is coming from, but there's no con