TFA is totally bullshit.
I think that the hackers used a few open L1 proxies on Amazon AWS.
In my list of open proxies, there are around 20 proxies on Amazon AWS, of the form ec2-??-??-??-???.us-west-1.compute.amazonaws.com:80 ec2-??-??-??-??.ap-southeast-1.compute.amazonaws.com:80 ec2-??-??-??-??.compute-1.amazonaws.com:80 ec2-??-??-??-??.eu-west-1.compute.amazonaws.com:80 where ??-??-??-?? is an IP address.
...so in order to find the perpetrators, we simply need to determine which seven of those proxies were used in the attack!
I think you must really have no spine if you except money from the FBI to backdoor crypto software.
"I needed the money to pay for my prosthetic spine!"
Do you suffer painful hallucination? -- Don Juan, cited by Carlos Casteneda