As usual, you're showing where you have no idea what you're talking about or just can't read. As I promised, I won't call you ignorant, since you purposely avoid knowledge. It's too kind of a word for you.
The compromised FSF computer was replaced and files posted to the new server after verification (good security practice, keeping hashes of your files). The Debian and Gentoo systems were running file integrity checkers, which pinpoint exactly what was modified by the attacker at the file level (no archaic registry to mess with and search through), making cleanup easy and sure.
Sure was, so of course I was correct all along.