I'm sorry, but I've seen this story carried elsewhere on consumer tech sites and a lot of it seems hopelessly naïve.
Like for example the idea attackers could steal your information, even from encrypted files, using this exploit. How, exactly? Unless this has fundamentally changed cryptography as we know it, encryption still renders files unreadable.
I suspect the actual idea here is that an attacker could read the decrypted contents of an encrypted file on disk, that has been opened and is therefore present in memory (through Thunderbolt's DMA) but this, of course, relies on the file being open in the event anyway, at which point, you're only so many steps away from seeing it on the screen.
Is this totally irrelevant?
No, of course not, for security professionals, organisations that require high degrees of information confidence and even just security concious individuals.
Does it justify removing the capability from a primarily consumer facing device, especially when every other competing device on the market has someone managed to implement it, without any significant incident? No, obviously not.