What Your Hosting Provider Can See: IPs, Traffic Metadata, Email Headers
If you think in threat models, “my host can see my files” is the wrong level of zoom. The sharper question is where visibility is structural (the network has to know something), where it’s incidental (your own logs quietly recreate the session), and where it’s optional (accessible only through privileged tooling, an insider decision, or a legal demand).