Re: Elementary ...
> how did it get there?
As per the article, they use an Evil Maid attack. The point is, the maid, or cleaner or whoever, only has to act once - to plant the malware. After that information can be extracted.
Look, security researchers need to research potential attack vectors before deciding whether or not they could be used by genuine bad actors. Note that the research comes before the decision, which is the correct way round.