Such cache side-channel attacks can be used to leak secret encryption keys,
thus breaching whatever confidentiality strong encryption provides.
These attacks can also leak private keys used in public-key ciphers and thereby enable attacks based on masquerading and false authentication.