Counterarguments against an anti phishing procedure

Consider the procedure below. What are your counterarguments, related to both security and user experience?

This is a follow up on my previous question on the same topic.

Step one: An employee submits an e-mail to coworkers (non-internal roles are also covered):

enter image description here

Step two: The e-mail server intercepts all incoming mails and substitute hyperlinks to non whitelisted sites, e.g. with, and send known authors the following message:

enter image description here

Obviously, if the GUI of the e-mail client can be modified, the verification can happen as the mail is authored.

Step three: If the author takes no action, the recipients get the e-mail after three minutes, but are presented with this message when they click the (doctored) link:

enter image description here

Over time, the user-vetted whitelist could be augmented with white- and blacklists provided by the security part of the organization.

The assumption is that this would intercept most link-based phishing attacks with a message of caution, while also keeping employees alert, due to the two factor authentication involved, without significantly degrading the user experience or imposing excessive policing of the employees.

So again, what are your counterarguments, related to both security and user experience?

What happens when an anti magic field gets close to a polymorphed creature?

I am playing a cleric who has a persistent anti-magic field on him, from which he is excluded.

I use the following feats:

  • Persistent Spell
  • Extraordinary Spell Aim

This means that if I approach something magical, the spell is suppressed in a range of 10-ft.-radius emanation, centred on me.

If I get close to a wizard that has Tren shape (page 87, Serpent Kingdoms) via Alter Self he momentarily loses the transformation because the spell is suppressed. In fact, the tren occupies a space of 5 ft. and falls within the range of the 10 ft anti-magic field.

But what happens if the magician has turned into a monster with Gargantuan size (15 feats) thanks to polymorph?

If I bull-rush him, should I consider the size it has without polymorph or vice versa?

If the size is that of Polymorph my charge would not reach the goal because my weapon does not have sufficient reach. Without polymorph, I will continue past the spell

Should Anti Virus and Anti Malware layer be the first layer in web application stack or can it seat behind services?

Can you have Anti Virus and Anti Malware layer sitting deep with the microservice layer and have the malicious file flow through all the services ? Argument being the file is in memory and not getting processed until the service we will put the Anti Virus and Anti Malware layer on.

Shouldn’t this be stopped at the routing layer of the application?

anti aging green

Why are you selling this site?
because im busy with other project

How is it monetized?
How much time does this site take to run?
this run with an autobloging plugin you need just working on traffic

What challenges are there with running this site?
this site has a great passive income in future if you working hard on social media traffic.

Information hoarding anti pattern

In The Phoenix Project the author describes an interesting antipattern: Brent is a super-important dev-ops engineer that personally knows the details of every new and old implementation and setup, but he does not share, document or distribute his knowledge. Ultimately every small task or large project crucially depends on him.

While this Brent is hailed as a hero by the whole organization, the main protagonist of the book recognized that this is an anti-pattern and starts to break down this information “person-silo” by shadowing him and documenting his knowledge.

Is there a name for this antipattern? Is it widely recognized?