End-to-end encrypted file-drops can be made inaccessible