Email feels private, but it's more like a postcard. Why you should stop sending secrets via SMTP.
The "Postcard" Analogy
Security experts often compare email to a postcard. You write your message, put a stamp on it, and drop it in a mailbox. Along the way, anyone who handles that postcardâthe postal worker, the sorting machine operator, the delivery personâcan read it.
Email works similarly. It passes through multiple servers before reaching its destination. While many connections are encrypted (TLS), the email itself is often stored in plain text on intermediate servers.
The "Forever" Problem
The biggest issue with email isn't just transit; it's storage.
When you email a password to a client:
- It's in your "Sent" folder.
- It's in their "Inbox".
- It's likely backed up to the cloud by both providers.
- It might be synced to multiple devices (phone, laptop, tablet).
That single password now exists in half a dozen places, forever. If any one of those devices or accounts is compromised years from now, the attacker has the password.
Accidental Exposure
We've all done it: hit "Reply All" when we meant "Reply". If that email contained sensitive data, you've just leaked it to the entire distribution list.
The Solution: Decouple the Secret from the Medium
You can still use email for communication! Just don't put the secret in the email.
Instead, send a CipherSend link. "Here is the password for the new account: [Link]"
If you Reply All, or if your email is hacked later, the link will be dead. The secret is safe because it's no longer there.
Was this article helpful?
Let us know so we can improve our content
Deploy secure secret sharing in minutes
Launch CipherSend across your team with zero setup and built-in best practices. Trusted by security leaders protecting their most sensitive data.
Continue learning
View all articlesData Ethics
Data ethics essentials: Master ethical data handling, privacy ethics, big data ethics & responsible data use to protect privacy and comply with regs. Data Ethics: Simple Guide to Privacy & Responsib...
IoT Security
IoT security guide: Learn vulnerabilities, risks, and how to protect smart home devices. Essential tips for secure IoT and smart device privacy in 2025. 2025 Smart Home Security: Block Hacks & Prote...
Digital Identity
Future of digital identity: Explore self-sovereign identity, decentralized trends, online verification & privacy tech. Key insights for 2025+. Digital Identity Trends: SSI Growth to 2030 & Access T...
Secure Communication
Secure communication online: Discover encrypted messaging apps, secure email, and privacy tools to protect against 2025 cyber threats. Expert guide. 2025 Online Safety: Protect Calls and Chats From ...