Nothing to see (as usual?)
From the same article: "This means that if you leave your device in someone else's hands, and it has an unlocked bootloader, with just a minute alone they can access anything you have stored on it.".
So how do we unlock the bootloader? That is explained in the same article, and well.. I consider the explanation itself more then enough to label this a "non issue":
"The most common command to unlock the bootloader is simply "unlock". On most devices that provide this command, a menu will be displayed that explains that by unlocking the bootloader your warranty will be voided, and that it is disrecommended by the manufacturer. It also has a side effect: it will delete all of your personal data stored on the device (I mention this in more detail later, and explain why).".
For me it's simple.. Leave your device in the hands of a stranger and its contents are in jeopardy, this is the same as with any other mobile device. But the other thing, as can be read here, in order to make this exploit work attackers don't only need physical access but unlock the bootloader as well, which effectively removes all your data. Yet isn't the common idea of an exploit to get their hands on your data first?
So; don't leave your device with someone you don't trust and all is well. Yet if you happen to do so anyway and they are going to try something nasty chances are high they won't be able to get to your private stuff. Mission accomplished.
Why not try another article when there are some real exploits to report? At the very least something remote (here's assuming Glass uses wifi and such).