*With ‘better’ I mean that an encrypted solution is adequate in these cases because the mails are on other servers, and the companies/servers depend on the jurisdiction where they are located. But by hosting a mail server at home, even unencrypted, we are 100% in control of our data.
PS: is there a self-hosting mail server solution that stores everything encrypted? I already self-host almost everything I use, but not email.
Honestly? No. It takes a bit of reading into SPF, DMARC, DKIM etc., and you will need to set up an authentication method (using PAM means you need to cache your unix users credentials in mail clients), which is easy via the dovecot passwd driver. The problem is that some blocklists will block any residential connection per default, but mxtoolbox will search through those, and I basically only needed to fill out spamhouses unblock form, which is easy. Even my employer (major bank) seamlessly accepts any emails from my domain.
Bruteforce attacks can be caught with fail2ban and reported to abuseIPDB
That alone is often (usually?) not enough. Since many IP addresses are already blackholed before you even set up a mail server on one, there is also the slow and sometimes painful process of:
…and then starting all over again every so often, whenever a filtering service changes their configs or a new one appears.
It can be done, and you might get lucky, but it often requires tenacity and a lot of patience.