In mail, the procedure relies within the IMAP and SMTP protocols which might be standardized and very well described. Inside the protected enclave we parse all incoming and outgoing ask for (to and within the Delegatee) https://marvinnled421727.techionblog.com/30677941/a-review-of-data-loss-prevention-confidential-computing-tee-confidential-computing-enclave-safe-ai-act-confidential-ai-data-security-data-confidentiality