Below are some real-world scenarios that illustrate some impacts of an attacker exploiting the secret.