I saw it and I came to the conclusion that this is just another proof of concept that relies heavily on social engineering in order to get root access. As long as users follow proper security protocols, it's no threat. Yeah, you might be shocked at how many people let strangers into their computers ...