In the researchers PoC video they casually don't show that the victim user needs to print to the malicious print queue first, it's not in the video. Minor detail.