For example, if you train image classifiers on sensitive data, attackers could steal that data. Instead of just getting predictions, they extract the actual training images themselves.