npub1cch64exjvxqm26wqz92835l53krvw2k9mu3s804m5m0rnhmzfxpsjwf8nu (npub1cch…f8nu) npub126nsph7a2k9cd6kdr4cf0qu24ph5uv7ly25d8syfpnvk8rs5g4uqu5fq05 (npub126n…fq05) Okay, I thought these were LE certs, looks like it's Cloudflare fronting Google Trust Services certificates (ironic) indeed. I assume Certbot is going to be used primarily in the context of acquiring LE certs.
This is still a Cloudflare problem as rightly identified, but still not a TLS problem, and it's very likely the person who set up this fake website never touched Certbot or knows who the EFF is (Cloudflare will handle certificates), so you are still misguided in where you are placing your anger for the latter half of this screed.
As for OCSP, that's news to me, and good riddance. There is no possible scenario where CRLs are more resource intensive and more leaky/privacy invading than OCSP ever was, even with stapling. I have advocated for CRLs in the past quite a bit and this news seems to have once again validated that stance. This is also not a LE specific change, as Apple, Mozilla, and the whole CA/Browser forum jumped on this change.