Not all decryption needs to be end to end encryption. I’m not sure when this idea developed, but it’s silly.
If your threat model mandates that you use end to end encryption, go for it, and choose something other than Dropbox. But saying the encryption is pointless just because the organization that manages the keys could become “evil” is hyperbole.