The limitation of this method is that you do need your own port exposed to the internet. The advantage of this method is that you don't have to trust a third party.
For the explicit example above, your guest's firewall would have to be pretty brutal to not allow port 80 through.