That's wishful thinking, not reality. In reality, many different actors can benefit from info about the used software on a particular users' PC. And now they know who to bribe to get it.
> Has this investor got a beta build from that new startup everyone's talking about? Their bets are always winning, I better frontrun them if that's the case.
> What apps could I exploit to get into this guy's computer?
> Wait why is my employee suddenly running tor browser after I involved her into this new secret deal? Better be careful with her, she might be talking to someone.
> Damn, our competitor's engineers are all running our app. Let's correlate the timestamps with our own backend to discover their accounts and push a special update to them.