That's arguably a bit different, though.
Shared security parameters work just fine for some applications; we use them all the time in ECC, for example. Obviously avoiding them is preferable, but isn't always possible. But importantly, using shared parameters is required by some protocols.
On the other hand, using somebody else's URL, email address etc. or symmetric encryption key by mistake and assuming it'll work for you as well is just that: A mistake.