But only if you assume that the data being transferred is public, right?
With the described method, any non-privilieged user could access the data from the TCP socket, right?