Hmm. Their protocol apparently doesn’t use end-to-end encryption, which doesn’t sound good. Yeah, I think that if I trusted an external party to host my files, I’d want to retain control over the keys.
Is that what you were referring to, or to something else?