My thinking on the subject was roughly that for an attacker to have the ability to spy on me via that mechanism would strongly imply that they already have privileged access to my computer (to be able to active the device and exfiltrate the data).
At that point, personally, I'm far more worried about the data they'd get from my keyboard (specifically credentials for various systems) than I am about them being able to see me sit at a desk.
Another type of user keeps confidential stuff out of networked computers and the cloud entirely.
Both are worthy defense strategies.
They may have my data if I'm compromised, that doesn't mean I want them to have embarrassing video or audio of me as well.