The exploiter previously claimed that his "trading strategy" were legal open market actions that used the protocol as designed.