The idea of using just #CSS to fingerprint email clients and browsers is wild. The approach suggested in this repo
https://github.com/cispa/cascading-spy-sheets
and further #research paper
explain the technique that works even if #javascript is disabled.
They further explain that they reached out both to #Tor and #BraveBrowser where such exploits should be mitigated.
One example where such an exploit can cause even more precision is when it is incorporated into #phishing attacks. Since the exploit was also able to depict the operating system, meaning one could combine existing exploits for a more targeted attack.
@paraplegic_racehorse from my understanding it depends on the email provider or service. So if the provider/service does not permit CSS, then no attack via CSS is possible.