In mail, the method depends on the IMAP and SMTP protocols that are standardized and very well described. Inside the safe enclave we parse all incoming and outgoing ask for (to and with the Delegatee) and compare them https://nanaemzc740507.blog2news.com/30423346/data-loss-prevention-confidential-computing-tee-confidential-computing-enclave-safe-ai-act-confidential-ai-data-security-data-confidentiality-secrets