(For example, if an attacker has compromised server A and you connect to it, they can now use your key to connect to server B which you also use)