I’m intending to use Cryptomator with Dropbox. As far as I understand it, one decrypted file in a vault always corresponds, throughout its lifetime, to the same encrypted file that gets uploaded to, and updated via, Dropbox. If and when a particular file changes, Dropbox will keep track of a version history of the encrypted version of that file, as it does with all files.
So, assuming the plaintext of that file changes repeatedly (imagine it’s a plain text contact list that I’m updating every couple of days), Dropbox.com now possesses multiple ciphertexts (arbitrarily different from each other) corresponding to multiple plaintexts that can be presumed to have overlapping content. If an attacker were to get hold of the version history of a file, this would presumably make it a lot easier to for them to break many forms of encryption (or so we learn from watching The Imitation Game). Has anybody tried to get an idea of whether and how much this would weaken Cryptomator security in typical cases?