Which bit says about stealing a certificate/keys and MITMing traffic with the stolen keys - with real world ramifications?