?????????????????????????????????????????????????????????????????????????????According to WikiLeaks, it analysed malware assaults while in the wild and gave "suggestions for the CIA enhancement teams for more investigation and PoC growth for their own malware projects." It primarily contained Evidence-of-Thought Thoughts partly according to public