Your article suggests that exploiting Superfish requires an active MITM in traffic path. THIS IS NOT TRUE. Mass exploitation is possible using a self signed cert with the target domain name as a SAN. Your characterization of the threat is dangerous and leads people to believe the bar for exploitation is much higher than it actually is!