OK, I'll bite. This article offers _terrible_ advice, especially if the reader is a neophyte who thinks they are a hacker:<p>* barely mentions operational security<p>* nothing about potential costs or risks<p>* no scoping of the CA certificate<p>* bad recommendations for key lengths<p>* only an off-hand mention of CRL publication<p>* no mention of intermediate CAs<p>If it was just some guy saying, "hey, here's how you set up your own toy CA without having to read the crappy OpenSSL manual pages, but don't use it for anything real because it isn't safe from anything other than the most trivial attacks," then I wouldn't even bother to down-vote the thing. Instead, it's some guy saying, "hey, use your toy CA for real stuff" without the attendant cost-benefit analysis that includes scenarios like "my toy CA got hacked and issued certificates that caused one of my customers to get hacked, and now my customer is suing me for negligence."<p>Not only is this person wrong, but their advice will make the Internet less secure. I'm no fan of X.509 PKI (that Mozilla ticket about Honest Achmed really tickles my funny bone and not in any of the ways that make me laugh), but I'm not about to second-guess the kinds of heavy-duty security engineering that goes into running a real, live root CA.<p></rant>