http://protonmailrmez3lotccipshtkleegetolb73fuirgj7r4o4vfu7ozyd.onion/blog/centalized-vs-p2p-protondrive
For us, however, this is simply not an issue. Our centralized servers hold the encrypted data, but the decryption keys are tied to user passwords that we do not know. The resistance of any system to hacking is based on the security measure it uses.