I don’t think it’s a matter of convincing you or not… it’s really just up to you whether you care. It’s a small risk, but an unnecessary one. It’s like keeping your front door unlocked… probably 99% of the time it will be fine, but that doesn’t really make it “secure”.
Email is insecure by design because it’s an old protocol, from the days before security was really a consideration on the internet. When you say you want to send an email to bob@example.com, what you’re essentially doing is dropping off a digital postcard. From there, your mail provider “picks up” your email and looks up example.com’s digital addresses and tries to deliver it to them, but there is no guarantee that that the connection between your mail server and theirs is encrypted. It can and often will be, when competently managed, but it doesn’t have to be. And then once it gets to the destination server, it may go through several more hops and intermediary servers (for virus checking, backups, delivery across a company’s intranet, etc.), all of which may leave behind a copy of your email from anywhere for a few seconds to whatever a mandated retention period is — possibly years.
It’s the digital equivalent of dropping a postcard in the mail, where it gets picked up by your carrier, taken to your local sorting center, sent to some big hub for processing, forwarded to another regional hub for further sorting, then to your local post office, then to your recipient’s carrier. Before they ever see it, that postcard with all its information is visible to every person and machine scanning it along the way.
There have been numerous improvements to email security over the years, but the trouble is that they’re opt-in measures that not every email server, company, or country choose to use. Ironically you’re “safest” sending from Gmail to Gmail, where it all stays within Google’s servers. Once it goes from big provider to some small bank’s underpaid IT team, there is no real guarantee they’re doing it right.
Email is semi-secure only when every server along the way is adhering to the latest best practices and enforcing encryption and authentication requirements, but for you as the user, there is no way to tell whether this is the case. There is no “padlock icon” equivalent for email, so you don’t can’t really tell if sending a message to bob@example.com is 100% secure, 50% secure, or totally insecure. The mail servers try their best to negotiate higher security levels on your behalf, but there’s no guarantee of it.
One way to look at it is to compare Gmail’s email transparency report from 2014 vs the current one. The email encryption rate from Gmail to other providers went form 65% in 2014 to 97% today — that is a HUGE improvement, but that remaining 3% is still there, and you as the email sender have no way to tell whether your recipient is part of the “secure” 97% or the “insecure” 3%. Also, that’s just from Gmail to other providers; the numbers will be different between other sets of providers, like if you use your local ISP’s email and send to a bank that self-hosts their own email, all bets are off.
By contrast, a HTTPS website mutually authenticates you against a single destination server and ensures encryption every step of the way. Nobody but that server can see it, even if they intercept it.
And then there’s still the question of “what happens once it gets there” (by either email or a web upload). Email systems are rarely properly access-enforced, and things like self-destructing emails are not part of the standard. So even if the mail servers all followed the best practices, once it gets to the recipient, they may have three copies of it across their computers, can forward it to other people, etc.
When you upload to a web form, that means that some developer at least had to spend time making a secure upload form you. While this doesn’t necessarily mean that they have better controls at the receiving end for who can access that secure document (and for how long, and what they can do with it), it at least makes it possible — which isn’t the case with email.
And that’s just the technical layers. It doesn’t even get into all the “user error” email problems, like spoofed or lookalike addresses, different reply-tos, phishing, etc., that just social engineer their way around the technical protections.
Assuming an attacker had access to one of the intermediary email servers, they don’t need to manually look through it. Programs could scan thousands of PDFs or texts in seconds and look for anything of value that looks like a SSN or bank account number, or that resembles the W2 form, etc.
Again, this isn’t a major real-world source of leaks (as far as I know), but it is a design flaw in the email system that the providers have been trying to band-aid ever since.
There is no way to make it truly secure without breaking delivery to some email recipients, which is the major block against truly secure email.
Google was able to make HTTPS across the web normal/required because they controlled over half the internet (browsers), and the other major browsers were willing to play along.
Google is able to make Gmail to Gmail messages very secure because they control all of it.
Google, or any email provider, cannot make all of email secure because there are a million different email servers across the world each running different server and software and governed by different countries’ laws and different organizations’ setups and retention requirements, not to mention their level of competence. Certain combinations will be more secure than others, but there is no way to tell which is which beforehand.
If you want to roll your own encrypted email, it is possible through things like PGP, but both you and your recipient have to agree to this (and understand how to use it) to make it possible. Some services like ProtonMail make that process simpler, but again, it’s mutually opt-in, not secure by design/by default.