I was trying to use short-hand terms for categories that are already admittedly not clearly-defined.
I have no idea what this means.
The “personal email protocol” would be standard MIME stuff overlaid with the personal password information and any encryption.
Or this, and what does it do if it finds a “man-in-the-middle attack” that does “match your provider’s online encryption protocols”?
And if this extra scanning is possible why is it not done on all incoming mail?
Then the provider has a problem, because that could mean a user is doing the attacking. We would hope that the email provider is regularly vigilant. Presumably, there would be a heuristic that reduced the scanning load for pre-approved emails.
What? I know of a few generic sandboxing technologies, but non I would consider user friendly enough for general users.
Which is why the sandboxing would be handled by your AV and malware programs based upon the infiltration threat-level. Do you individually set the heuristic for your AV program, outside of PUP lists or other blacklists? No, the signatures come with the database update.
I ask some basic questions, and you act like your mind is blown by my ignorance, when I already told you that I was providing a descriptive list open to modification.
Look, is what I am describing too technical or too broad?
All I’m trying to outline is a way for email accounts to screen for approved versus non-approved emails, based upon a temporary approval to receive emails from people who you give your email account to. This would potentially allow breaches to be traced.