The article doesn't mention KU but does say he made the money before Amazon changed their system in July 2015 so you can pretty much assume that's how he made the money. Since the article is about the tech side of things, but probably didn't want to cloud things up by having to explain KU and its workings.
It says that some of the money, the amount of which is unknown, was made for 6 months before KU2, but that the bulk of the money was made SINCE the implementation of KU2.
Some questions come up: First, how is it that a security firm can just go around and invade the privacy of a private server, even if it is not password protected; and second, how is it that Amazon seems to not know how much this guy made BEFORE KU2?
Also, what is it about KU2 that provided such a rich environment? This article does not seem to be saying that the money was made on borrows from KU2, but maybe the author doesn't understand KU2, and just presented the info that way? I still don't think so, due to the amount of money it would have cost him to buy into the borrow system. Remember, he had over 83,000 fake email accounts. That's cost prohibitive for it to be from KU.
I don't condone what this guy did. It wasn't fair to the rest of the authors fighting for visibility, and it was against the TOS, which others strive to uphold. But, dang, talk about industriousness. He even knew how to launder the addresses.
Amazon would not have caught him had it not been for the security company. So, do you think they used a spider to discover his database? Did they crawl in through one of his pen name accounts?
I never bought a Kindle. Right around the time I was going to buy one, I read about some customer who did something wrong, and Amazon apparently reached through cyberspace and erased her entire Kindle. The books you buy are not really yours permanently. I think you can side load stuff, but I live a simple life.
I downloaded that desktop app, and never used it. There it sits. Why? I got to thinking. What if the mighty 'Zon has it fixed so they can roam around in my computer? I know, paranoia, but...what if?
I don't have anything bad in there, but I sure wouldn't like that!