It's more concerning how people who come up with these proofs of concept get the information required to simulate them in the first place.
From the way this article is written it suggests all they did was a bit of Googling, then bought a mid-to-high spec computer from their local PC World. Frightening that that's "all" it takes. The information needed to do something like this shouldn't be in the public domain, simple as.
It isn't security through obscurity because they clearly knew enough about how it worked to simulate an attack. Absolutely crazy.