Easiest way to use Let's Encrypt

but at least for spying on users in the controlled network it is entirely possible, or DNS cache poisoning there’s enough bad stuff that can hapen and the weakest link breaks the chain.