No disagreement there. Mathnerd314 asked for proof of stolen code, which of course is difficult to provide when we're talking about a closed source product. So the original authors must resort to indirect proof like comparing visuals and inspecting the binary.
reply