TFA is totally bullshit.
I think that the hackers used a few open L1 proxies on Amazon AWS.
In my list of open proxies, there are around 20 proxies on Amazon AWS, of the form ec2-??-??-??-???.us-west-1.compute.amazonaws.com:80 ec2-??-??-??-??.ap-southeast-1.compute.amazonaws.com:80 ec2-??-??-??-??.compute-1.amazonaws.com:80 ec2-??-??-??-??.eu-west-1.compute.amazonaws.com:80 where ??-??-??-?? is an IP address.
...so in order to find the perpetrators, we simply need to determine which seven of those proxies were used in the attack!
I think you must really have no spine if you except money from the FBI to backdoor crypto software.
"I needed the money to pay for my prosthetic spine!"
A debugged program is one for which you have not yet found the conditions that make it fail. -- Jerry Ogdin