(and probably other ones) But yeah, usually you are aiming to: * avoid leaking source code/IP * avoid leaking unique or shared private keys * avoid tampering, running unsigned firmware