Plaintext leaks
Users might disclose plaintext of messages, for example by composing them inside web applications, or by composing messages on a compromised device.
People regularly compose drafts of a message in a webmail application.
E-mail message replies contain quoted contents of the original message. The reply message can be encrypted to a different set of keys (including the key an adversary has control of), or might not even be encrypted at all.
Plaintext of messages can be leaked via the OS clipboard of a compromised device.
An adversary may use social engineering to entice a user to paste into a textarea (“Press CTRL, and press V”) and browser extensions that have clipboardRead permission can read any plaintext messages copy/pasted to or from that compose window. Extensions can also take a screenshot of the current tab in any browser window, thereby leaking the message plaintext.
When encrypting files, the plaintext version of the file is stored on the filesystem.
Mitigation
Mitigations for compromised devices and goofs by users are outside the scope of this threat model. That said, yet another workshop/individual mentoring might raise awareness of some of these threats and their mitigations.