What’s your goal? What’s your threat model?
Example: If jane@gmail.com sends an email to john@gmail.com, there’s not much risk that John’s creepy neighbor would MITM. But the payload (email) is not end-to-end-encrypted, i.e. Google can access the plaintext.
For sensitive conversations: Please use Signal instead.
attachment: muffin-recipe.7z
"Here is Grandma's old muffin recipe. Please do not share it with Betty Crocker"