Yeah, especially the part that's not about encrypted applications.
Where he talks about using php bytecode to do automated vulnerability scanning on php applications.
In stead of doing text-parsing on php source he compiles the source to php bytecode (which is a bit like assembly) to then apply tools usually used for analysis of binaries.