Hello, fellow student here.
As per my understanding from the lecture, they were also able to generate signatures, as signing is basically encryption with the private key, so you won't really have access to the keys themselves, but you can do anything you like with them with the server acting as a proxy.