In some embodiments, techniques for computer security comprise receiving a message, receiving a user-originated request for an action, wherein the action is associated with the message, determining whether the message is trustworthy, and impairing performance of the action, if it is determined that the message is not trustworthy. In some embodiments, techniques for computer security comprise receiving a message, determining whether the message is trustworthy, rendering the message, if it is determined that the message is trustworthy, and rendering a restricted version of the message, if it is determined that the message is not trustworthy.