. . "This technique certainly can be abused, but it is also commonly used for many types of things as a coding technique with legitimate intent." . .