In response to a frequent observation / complaint:
Yes, it has always been possible for individuals to leak your data in various ways. The difference here is in *scale* and *uniformity*.
This is a tool being rolled out to the most widely used desktop operating system, as a trusted operating system component, which will be enabled by default, and will save its data to a single standardised location which attackers can trivially target.
If you don't see the issue, I don't know what to tell you.