Lots of words, very few details. Fonts getting a "bit pixellated"? Are you kidding me?
Packages "piggybacking on other packages"? This is all very imprecise language for someone who is attempting to convince us that something very grave is going on. And as usual, not a single hex dump of a single packet. Not of any of the packets supposedly spewing out of their supposedly disabled Ethernet port, not out of their supposedly disabled wifi card, not of one of these supposedly piggybacked packages.
I'm not saying these capabilities don't exist; I'm sure they do. I'm not even saying the author is lying or stupid.
Even assuming some of these claims are true, not asking for more evidence robs us of the ability to defend ourselves. Running off to build f2f networks is fun and all, but it's not going to do a lick of good if we have no idea what we're up against beyond some vague descriptions, especially when you consider that the capabilities of our adversaries go well beyond the technological. There is such a thing as technological security that's "too good", when you've spent all your time defending against technological attacks only to succomb to, as others on this thread have pointed out, a rubber hose.