This fallacy shows that the wider network used by two nodes to communicate is not necessarily under their control. Thus, we should consider it insecure.
The course dedicates a portion to security, where it explains the various techniques we can use to securely utilize an insecure network.