Have you seen Tresorit’s vulnerability?
- Tresorit’s public key authentication relies on server-controlled certificates, which attackers can replace to access shared files. Metadata is also vulnerable to tampering, allowing attackers to alter file creation details and mislead users.
From [BleepingComputer] (Severe flaws in E2EE cloud storage platforms used by millions )?
E2EE doesn’t really suffice if you’re sharing passwords. Then, you’re relying also on the server’s security.