Some limitations and caveats apply (this is only one data developer's experience, etc).
Why are they suggesting skipping straight to this hot mess instead of using a simple and well tested algorithm?
Nor sure I understand? The article explicitly argues for using this simple and well tested algorithm.
A hacker does for love what others would not do for money.