yeah that one is kind of interesting, really needs more detail. I think what they're talking about is that it's possible to configure insecure connections between the different components.
However, if that's the case, that's a distribution specific issue and not really anything intrinsic in k8s.