Home Ad Exchange News Email Hashing: What Could Go Wrong?

Email Hashing: What Could Go Wrong?

SHARE:

hasshYou can’t un-ring a bell, but you might be able to un-hash an email, depending on whom you ask. In order for marketers to safely use hashes for targeted advertising, they must stay abreast of the latest hashing formats.

Email hashing involves converting an email address to a hexadecimal string. Each time an email address is run through a hashing algorithm, it produces a jumble of numbers and letters which, in theory, cannot be tied back to that email address or the individual it belongs to.

Facebook and Twitter use it for their respective CRM matching programs, Custom Audiences and Tailored Audiences.

AdExchanger asked a handful of technology chiefs, security researchers and privacy executives to explain the privacy risks associated with email hashing.

To what extent can email hashing be cracked, and what can the industry do to respect consumer PII?

Click below to read their responses.

 Santiago Pontiroli, security researcher, Kaspersky Lab

“A problem that arises from adopting this procedure is that, as more and more services become part of the [logging-in] trend, the consumer’s online history will be revealed slowly but surely. Since consumers rarely change their primary email address and use them for several years, marketing companies can know users’ current and past online behavior. Email resembles a digital passport that many people can’t hide, leaving breadcrumbs of information that targeted advertisers can use to follow consumers’ activity.”

Richard Maathey, business information security officer, Experian

“There are several different types of email hashing, and there are a few that we typically recommend based on the industry standard. MD5 and SHA1 are widely acknowledged to be insufficient today. The type of hashing we recommend as a company is SHA2, and there are other cutting-edge companies using things like bcrypt and scrypt. Those are generally the industry standard for good hashes today. … The processing power of the computers we use has grown exponentially. It’s important to keep in mind what’s currently considered acceptable. You could argue that SHA2 is probably on its way out, but for today, it’s fine.. … As the speed of computer processing increases, some forms of hashing that were previously thought to be unbreakable are breakable. … But the bigger concern in our industry is how we protect those emails in general, from a security standpoint. Security throughout the whole chain of custody is only as good as the weakest link. You have to look at it in totality. There is no silver bullet.”

Jeff Northrop, chief technology officer, International Association of Privacy Professionals

“Hashing masks the email itself and prevents it from being used or infiltrated in a breach. But the hash still uniquely identifies an email, even if you don’t know the email address. … If you hash an email and you have a home address along with it, it’s not hard to personally identify the individual attached to that hashed information. Hashing is a good solution, but it’s by no means a perfect way to permanently mask someone’s identity. … There are different hashing algorithms and methods of reversing those algorithms, but I don’t think that’s the real risk with hashing. If you use the proper hash algorithm, it can be very difficult to extract the original value, and the value of the email address probably isn’t worth the effort. … If you have a unique identifier tied to an individual, you’re not going to necessarily be able to recover what the email address is, but that doesn’t mean you can’t use that identifier with other information that’s collected along with it to re-identify an individual. That’s the real privacy risk.”

Aaron Kechley, SVP of products, DataXu

“There are always risks associated with handling sensitive information, and email hashing is no exception. If you are going to trust someone to do it, the most important thing is that they are following best practices for data encryption and access control. If someone is working with hashed emails in this way, then I believe the risk of something going wrong is low. But marketers should understand that as a category, they tend not to be especially security-minded, and so vendors are not typically asked lots of hard questions about data security. I believe this has led to complacency in the vendor community, which could imply there is higher risk than is technically necessary.”

Anneka Gupta, VP of product, LiveRamp/Acxiom

“Since the same data going through a hashing recipe produces the same result, when two parties use the same hashing recipe, it produces the same representation. These one-way hashing functions are not reversible, which makes hashing technologies a very secure approach to protecting data. … In the online advertising space, it’s essential to keep the privacy promises made to consumers, yet deliver advertising experiences that are relevant and positively impact the consumer journey. This means we protect consumers’ online anonymity, where promised, by creating technical barriers preventing associating PII with online devices. Hashing email addresses is a piece of the process that allows us to provide advertising capabilities in an anonymous world.”

Dave Hendricks, president, LiveIntent

“Hashing is routine procedure that provides the safest way to share so-called ‘de-identified’ email address data between two parties. It happens when you log in to a website, for example. Hashed emails can’t be mailed – merely matched for what is called CRM retargeting. Hashing, when used for CRM remarketing purposes, has no soft spots. It’s only useful to match user data between two parties, typically a brand and a publisher. If you found a random thumb drive on the street and it contained a file consisting of hashes, it would be useless. Marketers should not fear the hash. Instead, they should revere its ability to rescue us from the world of third-party cookie targeting.”

Must Read

Meta’s NewFronts Message To Advertisers: Embrace The Noise

Can a good sales presentation offset the impact of a very bad news week? That’s a question for Meta, which collected two guilty verdicts in court this week for failing to protect children and creating additive products.

AI Helps Manscaped Trim Social Chatter Down To The Bare Essentials

Meet Clamor, a new social listening product that pulls cultural insights from online conversations in real time. Clamor helped Manscaped freshen up its marketing, including for this year’s Super Bowl.

A man talking to a robot

How Red Roof Is Bringing In More Customers With Zeta’s Voice-Activated AI Agent

Hotel chain Red Roof is using Zeta’s new voice-activated AI agent to guide its campaign creation, deployment timing and audience development.

Privacy! Commerce! Connected TV! Read all about it. Subscribe to AdExchanger Newsletters
Jean-Paul Schmetz, Chief of Ads, Brave

Why Ad-Blocking Browser Brave Introduced Its Own Ads

Brave’s chief of ads Jean-Paul Schmetz on competition in the search and browser markets, the fallout from the Google Search antitrust ruling and whether AI search will help smaller upstarts compete with Big Tech.

Vizio Helps Walmart Cut A Bigger Slice Of The CTV Ad Pie

Walmart and Vizio announced at NewFronts that unified account logins are coming to smart TVs using Vizio’s operating system.

Comic: CTV Tracking

Carl’s Jr. And Hardee’s Marketing Goes Regional With Amazon Ads’ Streaming Media

The age-old question for streaming TV advertisers is, how to target the viewers they want while reaching the scale their businesses need. The quick-serve restaurant operator CKE, which owns Carl’s Jr. and Hardee’s, sought an answer in a case study with Attain and Amazon Ads.