I just found it interesting that after reading plenty of "news sources" on the subject, I didn't get one authoritative post on HOW the hackers did it and WHY. The readme helped out but to hear directly from the hackers was quite informative. This post did. Then again, now that you bring it up, I'm not sure there's any way we can know if it's "authoritative" or not.