Comment by eli

1 day ago

I'm not following the threat model that begins with a malicious third party having control over my files

Unless you've authored every single file in question yourself, their content is, by definition, controlled by a third party, if with some temporal separation. I argue this is the typical case - in any given situation, almost all interesting files for almost any user came from someone else.