Abuse of your device for attacks: your device may be used for DDoS attacks, malware distribution, or other malicious activity. To outside observers, the attack will appear to originate from you (or, within the MU network, from Masaryk University).
Risk to MU infrastructure: a device connected to the MU network may serve attackers as an entry point into the internal network and help them bypass security measures, including the firewall. Attackers could then target MU infrastructure directly.
Hidden functions and malware: an application from an untrustworthy publisher may contain malicious code or user-tracking tools. This can lead to the theft of sensitive data.