When a client connects to a malicious server the server is able to leak the contents of an arbitrary file on the client’s machine.