Paul had warned Lucy that he was "doing this for free" --he wanted to prove that a much larger organization than him could easily do this, and had no intention of profiting from it. It's possible that he hoped no one ever would see the site. Notoriety would never have happened if the 10 million+ people who were "friends" on HarvardConnection had never heard of TheFacebook.com.
Paul had become a member of the MIT Security Lab in May 2014. The lab was involved in "code reviews," which ultimately ensured the safety of all MIT users on campus. Paul had worked as a web developer at the lab since August 2013. Until his employment at the lab in 2014, he often had worked for agencies and Fortune 500 companies.
This is particularly important for the pwned US network, as it would be one of the final vulnerabilities that hackers would have to work out of the five. Facing the complete, unchallengeable power of the US government itself would be a hell of a way to go out.
The binary strings in the killswitch could not be completely "decrypted," as most of the critical strings were still "encrypted." Furthermore, while the Linux system was still vulnerable to malicious use, it would be relatively easy for someone who was familiar with the system to patch it. d2c66b5586