Wrote about this as a college senior for my computer security class. Spent a day or two in the TAMU computer lab with that site prominently displayed… that was 22 years ago. I did set up 2 computers to demo how this worked as part of the presentation but never went much further than that. I seem to remember my report including hypothetical ways to use a tool I think was called silkworm or silk wrapper to disguise this as something else for distribution. Time flies.