Comment to 'Post-hacking recovery'