Of course I get what can be done with it. That's not hard.
At first I did think this referred to generating certs that never existed before. I suppose it refers to making copies of existing ones. That doesn't really matter either way though.
Even in trying to explain it to me...you just called the cert fake. If it was fake, the victim's browser would not accept it.
A 'copied cert' or a 'stolen cert' perhaps, but if the hashes match, it isn't fake. I don't really think people are grasping that concept.
Like if I had a program that generated duplicates of valid nuclear launch codes...you'd call them fake. That's dangerous.
"...and as the missile boar down upon them they thought to themselves, 'hey maybe fake was the wrong choice of wording here.'..."
This obviously isn't as dire as nuclear warheads, but I still think it is very unwise to call these certs fake. I guess for now I should just be happy they are phasing out md5.