Sign Up

Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.

Have an account? Sign In

Have an account? Sign In Now

Sign In

Login to our social questions & Answers Engine to ask questions answer people’s questions & connect with other people.

Sign Up Here

Forgot Password?

Don't have account, Sign Up Here

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.

Have an account? Sign In Now

You must login to ask a question.

Forgot Password?

Need An Account, Sign Up Here

Please briefly explain why you feel this question should be reported.

Please briefly explain why you feel this answer should be reported.

Please briefly explain why you feel this user should be reported.

Sign InSign Up

The Archive Base

The Archive Base Logo The Archive Base Logo

The Archive Base Navigation

  • Home
  • SEARCH
  • About Us
  • Blog
  • Contact Us
Search
Ask A Question

Mobile menu

Close
Ask a Question
  • Home
  • Add group
  • Groups page
  • Feed
  • User Profile
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges
  • Buy Points
  • Users
  • Help
  • Buy Theme
  • SEARCH
Home/ Questions/Q 191411
In Process

The Archive Base Latest Questions

Editorial Team
  • 0
Editorial Team
Asked: May 11, 20262026-05-11T16:20:21+00:00 2026-05-11T16:20:21+00:00

From security reasons, is it worth encrypting user emails before putting them into the

  • 0

From security reasons, is it worth encrypting user emails before putting them into the database?

I know we hash and salt passwords but that’s another story as we do not really need password originals. With emails it is different.

Knowing that the decryption key will anyway be somewhere close to the database, does it make sense to encrypt emails? I suppose if someone gets into the system, they will find the key as well, if not immediately then eventually.

What are the best-practices? Are there any other options available if I run my own servers and not on a shared/virtual hosting?

EDIT: I intend to use SQL Server. And no, it is no corporate software with security requirements, just some entertainment site I have in mind.

  • 1 1 Answer
  • 0 Views
  • 0 Followers
  • 0
Share
  • Facebook
  • Report

Leave an answer
Cancel reply

You must login to add an answer.

Forgot Password?

Need An Account, Sign Up Here

1 Answer

  • Voted
  • Oldest
  • Recent
  • Random
  1. Editorial Team
    Editorial Team
    2026-05-11T16:20:21+00:00Added an answer on May 11, 2026 at 4:20 pm

    If you’re going to need the email address in the future, then you’ll have to store them in plain text.

    You could encrypt them, of course, however, this is effectively security through obscurity in this case. Basically, if your application’s perimeter is secure, your data within it can be plain text. Encrypting here adds complexity to you working with the data, but doesn’t really stop an attacker from getting your raw data.

    As you say, if he gets through your perimeter defenses, he’s likely to easily get your decryption key to decrypt the email data. Encryption may slow down the determined attacker slightly, but will not add any real security to your data.

    The best scenario is to hash the email address (with salt!) and store that. This allows you to check the email address against an input value (for example) and verify that the email address input is the same as what you have stored, of course, the major downside for this is that you can’t know what the email address is without that additional value, so if you’re wanting to (for example) regularly email your users, you’ll be out of luck.

    I suspect you’re storing the email address because it’s useful data, and you will want to do something with it (like send an email 🙂 in which case, encrypting just adds overhead to working with that data, whilst gaining very little in return.

    In this case, I would focus on securing access the database itself (i.e. your “perimeter” defenses) and ensure they are as strong as can be, whilst leaving the data in the database in plain text.

    • 0
    • Reply
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
      • Report

Sidebar

Ask A Question

Stats

  • Questions 170k
  • Answers 170k
  • Best Answers 0
  • User 1
  • Popular
  • Answers
  • Editorial Team

    How to approach applying for a job at a company ...

    • 7 Answers
  • Editorial Team

    What is a programmer’s life like?

    • 5 Answers
  • Editorial Team

    How to handle personal stress caused by utterly incompetent and ...

    • 5 Answers
  • Editorial Team
    Editorial Team added an answer I'm assuming this is in a C-style language; if not,… May 12, 2026 at 2:11 pm
  • Editorial Team
    Editorial Team added an answer I always prefer positive names to avoid double negatives in… May 12, 2026 at 2:10 pm
  • Editorial Team
    Editorial Team added an answer Turns out there was no implementation for ExpressionType.Equals in the… May 12, 2026 at 2:10 pm

Related Questions

(If anything here needs clarification/ more detail please let me know.) I have an
Here is my situation with rough numbers. I had like to know if my
I'm fairly new to PHP and have built a medium sized website using standard
is it possible to hide/block files/folders in a VS2008 solution from various users (by

Trending Tags

analytics british company computer developers django employee employer english facebook french google interview javascript language life php programmer programs salary

Top Members

Explore

  • Home
  • Add group
  • Groups page
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges
  • Users
  • Help
  • SEARCH

Footer

© 2021 The Archive Base. All Rights Reserved
With Love by The Archive Base

Insert/edit link

Enter the destination URL

Or link to existing content

    No search term specified. Showing recent items. Search or use up and down arrow keys to select an item.