The document discusses breaking SSL using time synchronization attacks. It describes how the Network Time Protocol (NTP) works and how it is commonly used by operating systems to synchronize time by default without security. It then demonstrates how the Delorean tool can be used to perform man-in-the-middle attacks against NTP to manipulate a victim's clock and bypass protections like HTTP Strict Transport Security (HSTS). Various attack techniques like time skimming, replay attacks, and spoofing are shown using Delorean.