From a Reuters article about a similar program by German security researcher Thomas Roth [1]:
"Nothing in this researcher's work is predicated on the use of Amazon EC2. As researchers often do, he used EC2 as a tool to show how the security of some network configurations can be improved," said Amazon spokesman Drew Herdener.
"Nothing in this researcher's work is predicated on the use of Amazon EC2. As researchers often do, he used EC2 as a tool to show how the security of some network configurations can be improved," said Amazon spokesman Drew Herdener.
[1]: http://uk.reuters.com/article/2011/01/07/us-amazon-hacking-i...