In addition to enabling the encrypted communications, you should generate a new and unique set of keys. The default keys are the same for every installation. They are copied straight from installation media and are not created during the install.
It's only a matter of time before someone figures that out and updates the exploit script.