Identify unsafe combinations of Bcc and encryption