Sending a password by email:
why it's dangerous
Every day, billions of passwords transit through email. Yet, sending a password by email remains one of the worst practices in cybersecurity. Here's why — and the simple method to never have to do it again.
7 reasons to stop sending your passwords by email
Email was invented in 1971. Neither encryption nor confidentiality were in the specs. Here are 7 concrete reasons why it's the worst channel for sharing a password.
1. The password stays for life
A sent email stays in the sender's mailbox, the recipient's, and on all intermediate servers. The password can be read in 5 or 10 years.
2. Vulnerable to hacking
A compromised email account = all sent and received passwords exposed. Phishing attacks on Gmail, Outlook or pro accounts are common in 2026.
3. Indexed and searchable
Mailboxes are indexed. A simple keyword ("password") is enough to expose dozens of credentials in seconds.
4. Backed up out of your control
iCloud, Google Drive, OneDrive... automatically back up mailboxes. Your passwords end up duplicated on servers whose location and retention you don't control.
5. Intercepted by antispam
Antispam filters scan email content. Your passwords are read by automated systems — and temporarily stored in their logs.
6. Wrong recipient
An unfortunate autocomplete is enough to send a password to the wrong person. And once sent, impossible to recall.
7. Not GDPR-compliant
GDPR requires appropriate technical measures to protect personal data (article 32). Sending a password by plain email may qualify as a measure failure and trigger an obligation to notify in case of incident. See our GDPR guide.
What about "encrypted" emails?
You often hear: "Gmail/Outlook use TLS, it's encrypted!". True... but only during transport. Once the email arrives, it's stored in plain text. And between two servers, if one doesn't support TLS, the message transits without any encryption.
Even more advanced solutions (S/MIME, PGP) require configuration effort and good key hygiene that make them impractical for one-off use. For sharing a password with a colleague or contractor, the simplest and safest remains a one-time encrypted link.
Seecret.it, in 3 seconds
Instead of writing the password in the email, you write a secure link. The recipient clicks, reads the password once, the link auto-destructs.
Before
From: [email protected] To: [email protected] Subject: Admin access Hi, Here are the credentials: Login: admin Password: UltraSecretPassword2026! Cheers
Password stored for life, readable by anyone with mailbox access.
After
From: [email protected] To: [email protected] Subject: Admin access Hi, Here are the credentials: Login: admin Password: https://seecret.it/abc#xyz (link valid 24h, 1 view only)
Link expires after reading. No plaintext password in email.
Frequently asked questions
Never again plaintext passwords in your emails
Free, no signup. Your colleagues will thank you.
Try Seecret.it free