I'm reading Architecture of Open Source Applications. From chapter about Audacity:
However, we do not want Audacity to provide a route to bypass a firewall, so we have a rule not to have TCP/IP connections to or from Audacity at all. Avoiding TCP/IP cuts out many security concerns.
Could you pls explain me (as to security newcomer with details) the next things:
What does they mean by the last sentence? Do "security conterns" with TCP/IP related ONLY to firewall bypass route?
How firewalls work with IP/TCP and why you do need bypass route only for TCP/IP?