The site title comes from a technique in Public Key Infrastructure (PKI) used to protect the most important object: The private key of the root Certificate Authority (CA). I created my first CA sometime around 2005 and started learning my lessons. Since then I have witnessed way too many horrible implementations of PKI, along with other technologies, and thought it worth my time to share my thoughts on IT in general, and IT security in particular.
