???????? ??? ????? ???? ??? ???&?????? ???&???? ?? ?? ??????? ????????? ????? ??????? ????????????????????????????????????????????In keeping with WikiLeaks, it analysed malware attacks inside the wild and gave "suggestions towards the CIA development teams for further investigation and PoC progress for their own malware initiatives." It largely con