Because if your adversary is monitoring all the telecoms networks and/or is reasonably capable of backdooring your laptop, you can assume that they'll be able to impersonate you to your digital lockers (and/or know where they are, because you are in regular contact with them).