- It is not documented anywhere on the Swisscom side
- It was not communicated to customers
- It does not account for people doing TLS, which would make the connection crypted
- More importantly: it sets a very dangerous precedent that Swisscom is hijacking connections.
You should as well try to see if Swisscom SMTP server still allows to send bounces. I stopped allowing my customer to use our SMTP for bounces as : - MUA do no generate bounces - MTA (exchange) using us as smart-host should not use us to send their backscatter.
I do hope that Swisscom realises that by doing that they will never be able to claim anymore that they can't do packet inspection,
IANAL ... This is not packet inspection, it is transproxying of mail. There is legal exception for proxying in most countries.
Also, it all is futile the moment botters grow up and start using TLS.
Breaking TLS is a real issue with mail transproxy.
Thomas