{"id":19725,"date":"2021-07-01T11:01:22","date_gmt":"2021-07-01T17:01:22","guid":{"rendered":"https:\/\/www.fullcontact.com\/?p=19725"},"modified":"2022-04-19T07:08:19","modified_gmt":"2022-04-19T13:08:19","slug":"whats-a-hashed-email","status":"publish","type":"post","link":"https:\/\/www.fullcontact.com\/blog\/resource\/whats-a-hashed-email\/","title":{"rendered":"What\u2019s a Hashed Email?"},"content":{"rendered":"<p><span data-preserver-spaces=\"true\">For years, the industry has claimed hashed emails will be the future of marketing. Now, as we approach a post-third-party cookie world, that claim is finally validated.\u00a0<\/span><span data-preserver-spaces=\"true\">\u00a0<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">With browser support of third-party cookies going away by\u00a0<\/span><a class=\"editor-rtfLink\" href=\"https:\/\/www.theverge.com\/2021\/6\/24\/22547339\/google-chrome-cookiepocalypse-delayed-2023\" target=\"_blank\" rel=\"noopener\"><span data-preserver-spaces=\"true\">the end of 2023<\/span><\/a><span data-preserver-spaces=\"true\">, you need to start using\u00a0<\/span><a class=\"editor-rtfLink\" href=\"https:\/\/www.fullcontact.com\/blog\/2021\/06\/09\/how-to-respond-to-third-party-cookie-idfa-changes\/\" target=\"_blank\" rel=\"noopener\"><span data-preserver-spaces=\"true\">alternative tactics<\/span><\/a><span data-preserver-spaces=\"true\"> now to understand your customers and prospects.\u00a0<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">This is where hashed emails rise to the occasion. To continue successfully reaching their target market while adhering to newfound privacy legislation, we must determine what modern targeting tactics to utilize in this new world.\u00a0<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">For example, hashed emails are a vital component in\u00a0<\/span><a class=\"editor-rtfLink\" href=\"https:\/\/www.fullcontact.com\/blog\/2020\/05\/08\/resolve-building-the-identity-resolution-engine\/\" target=\"_blank\" rel=\"noopener\"><span data-preserver-spaces=\"true\">Identity Resolution<\/span><\/a><span data-preserver-spaces=\"true\">. Identity Resolution is the practice of connecting and consolidating all of an individual&#8217;s identifiers on multiple platforms and devices and mapping them to one person. This allows you to better leverage the data you already have on your customers, enabling the ability to gain unparalleled recognition and insights to use across omnichannel marketing.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Depending on the level of sophistication of the Identity Resolution, marketers can use advanced analytics to create a\u00a0<\/span><a class=\"editor-rtfLink\" href=\"https:\/\/www.fullcontact.com\/blog\/2020\/08\/06\/the-power-of-persistence\/\" target=\"_blank\" rel=\"noopener\"><span data-preserver-spaces=\"true\">persistent<\/span><\/a><span data-preserver-spaces=\"true\">\u00a0ID (like FullContact\u2019s\u00a0<\/span><a class=\"editor-rtfLink\" href=\"https:\/\/www.fullcontact.com\/blog\/2020\/05\/15\/resolve-building-the-identity-resolution-engine-part-2\/\" target=\"_blank\" rel=\"noopener\"><span data-preserver-spaces=\"true\">PersonID<\/span><\/a><span data-preserver-spaces=\"true\">). This persistent ID is then used to create personalized, targeted messages based on the learned behaviors from the unification of an individual\u2019s identifiers.<\/span><\/p>\n<h3>What\u2019s a Hashed Email?<\/h3>\n<p><span data-preserver-spaces=\"true\">According to a research study done by\u00a0<\/span><a class=\"editor-rtfLink\" href=\"https:\/\/www.radicati.com\/wp\/wp-content\/uploads\/2018\/12\/Email-Statistics-Report-2019-2023-Executive-Summary.pdf\" target=\"_blank\" rel=\"noopener\"><span data-preserver-spaces=\"true\">Radicati Group<\/span><\/a><span data-preserver-spaces=\"true\">, the average person has 1.75 email addresses. \u201cHashing\u201d is simply taking those regular email addresses and encoding them using a cryptographic hashing function. This process creates an obfuscated string of characters, or hash, to now represent the email. Each hash has a fixed number of characters, depending on the type of hash function used. A hash is considered to have a 1 to 1 mapping to an email.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">While the hashed email is irreversible by nature (meaning one cannot \u201cdecrypt\u201d it), it can be used in the process of matching when two parties have the same email. Each party can hash it and arrive at the same hashed value. Thus, the hashed email has become a prominent way to securely exchange and transact on emails without sharing them in their clear text form. This is what makes it both permanent and secure.\u00a0<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Using hashed emails helps protect the person\u2019s identity and PII to keep an established boundary regarding ethics and privacy in the extensive world of consumer data. This identifier can then be used in <a href=\"https:\/\/www.fullcontact.com\/blog\/2020\/05\/08\/resolve-building-the-identity-resolution-engine\/\">Identity Resolution<\/a> capabilities as a single unified identity used for tracking across channels and devices.\u00a0\u00a0<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Imagine the hashed email is an individual\u2019s passport in the digital world. You can use it to <a href=\"https:\/\/www.fullcontact.com\/blog\/2020\/09\/16\/fullcontact-launches-two-new-solutions-omnichannel-targeting-and-real-time-insights\/\">track engagements<\/a> as a user actively logs in to a website, social media, or platform. And at the same time, it\u2019s anonymous and secure, protecting the individual\u2019s privacy.\u00a0<\/span><\/p>\n<h3>Why Hashed Emails Are A Persistent Option<\/h3>\n<p><span data-preserver-spaces=\"true\">With third-party cookies deprecating, email hashing has been much discussed with identifying customers and prospects. As the market continues to adjust, hashed emails are far superior to third-party cookies. You can track hashed emails through numerous devices and channels. With the help of Identity Resolution, they are a highly dependable way of cross-device identification of users.\u00a0<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Now that hashed emails are finally the linchpin in personalized marketing, it\u2019s time to integrate them into your go-to-market strategy. Want to learn how\u00a0<\/span><a class=\"editor-rtfLink\" href=\"https:\/\/platform.fullcontact.com\/docs\/apis\/enrich\/multi-field-request\" target=\"_blank\" rel=\"noopener\"><span data-preserver-spaces=\"true\">hashed emails<\/span><\/a><span data-preserver-spaces=\"true\">\u00a0can help your business goals?\u00a0<\/span><a class=\"editor-rtfLink\" href=\"https:\/\/www.fullcontact.com\/contact\/\" target=\"_blank\" rel=\"noopener\"><span data-preserver-spaces=\"true\">Talk to one of our experts!<\/span><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>For years, the industry has claimed hashed emails will be the future of marketing. Now, as we approach a post-third-party cookie world, that claim is finally validated.\u00a0\u00a0 With browser support of third-party cookies going away by\u00a0the end of 2023, you need to start using\u00a0alternative tactics now to understand your customers and prospects.\u00a0 This is where [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_improvement_type_select":"improve_an_existing","_thumb_yes_seoaic":false,"_frame_yes_seoaic":false,"seoaic_generate_description":"","seoaic_improve_instructions_prompt":"","seoaic_rollback_content_improvement":"","seoaic_idea_thumbnail_generator":"","thumbnail_generated":false,"thumbnail_generate_prompt":"","seoaic_article_description":"","seoaic_article_subtitles":[],"footnotes":""},"categories":[566],"tags":[6020,6021,5933,5761,290,98],"class_list":["post-19725","post","type-post","status-publish","format-standard","hentry","category-resource","tag-third-party-cookies","tag-deprecating-cookies","tag-hashed-emails","tag-persistent-id","tag-identity-2","tag-identity-resolution"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.1 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>What\u2019s a Hashed Email? | FullContact<\/title>\n<meta name=\"description\" content=\"For years, the industry has claimed hashed emails will be the future of marketing. Now, as we approach a post-third-party cookie world, that claim is finally validated.\u00a0\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.fullcontact.com\/blog\/resource\/whats-a-hashed-email\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What&#039;s a Hashed Email?\" \/>\n<meta property=\"og:description\" content=\"For years, the industry has claimed hashed emails will be the future of marketing. Now, as we approach a post-third-party cookie world, that claim is finally validated.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.fullcontact.com\/blog\/resource\/whats-a-hashed-email\/\" \/>\n<meta property=\"og:site_name\" content=\"FullContact\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-01T17:01:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-04-19T13:08:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.fullcontact.com\/wp-content\/uploads\/2021\/07\/Hashed-Email-Blog-li.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"FullContact\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"What&#039;s a Hashed Email?\" \/>\n<meta name=\"twitter:description\" content=\"For years, the industry has claimed hashed emails will be the future of marketing. Now, as we approach a post-third-party cookie world, that claim is finally validated.\" \/>\n<meta name=\"twitter:creator\" content=\"@fullcontact\" \/>\n<meta name=\"twitter:site\" content=\"@fullcontact\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"FullContact\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.fullcontact.com\/blog\/resource\/whats-a-hashed-email\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.fullcontact.com\/blog\/resource\/whats-a-hashed-email\/\"},\"author\":{\"name\":\"FullContact\",\"@id\":\"https:\/\/www.fullcontact.com\/#\/schema\/person\/046a6157300f0577cf0a6122fb63080e\"},\"headline\":\"What\u2019s a Hashed Email?\",\"datePublished\":\"2021-07-01T17:01:22+00:00\",\"dateModified\":\"2022-04-19T13:08:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.fullcontact.com\/blog\/resource\/whats-a-hashed-email\/\"},\"wordCount\":557,\"publisher\":{\"@id\":\"https:\/\/www.fullcontact.com\/#organization\"},\"keywords\":[\"third-party cookies\",\"deprecating cookies\",\"hashed emails\",\"persistent ID\",\"identity\",\"identity resolution\"],\"articleSection\":[\"Resource\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.fullcontact.com\/blog\/resource\/whats-a-hashed-email\/\",\"url\":\"https:\/\/www.fullcontact.com\/blog\/resource\/whats-a-hashed-email\/\",\"name\":\"What\u2019s a Hashed Email? | FullContact\",\"isPartOf\":{\"@id\":\"https:\/\/www.fullcontact.com\/#website\"},\"datePublished\":\"2021-07-01T17:01:22+00:00\",\"dateModified\":\"2022-04-19T13:08:19+00:00\",\"description\":\"For years, the industry has claimed hashed emails will be the future of marketing. Now, as we approach a post-third-party cookie world, that claim is finally validated.\u00a0\",\"breadcrumb\":{\"@id\":\"https:\/\/www.fullcontact.com\/blog\/resource\/whats-a-hashed-email\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.fullcontact.com\/blog\/resource\/whats-a-hashed-email\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.fullcontact.com\/blog\/resource\/whats-a-hashed-email\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.fullcontact.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What\u2019s a Hashed Email?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.fullcontact.com\/#website\",\"url\":\"https:\/\/www.fullcontact.com\/\",\"name\":\"FullContact\",\"description\":\"Relationships, reimagined.\",\"publisher\":{\"@id\":\"https:\/\/www.fullcontact.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.fullcontact.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.fullcontact.com\/#organization\",\"name\":\"FullContact\",\"url\":\"https:\/\/www.fullcontact.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.fullcontact.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.fullcontact.com\/wp-content\/uploads\/2019\/11\/fc-logo@2x.png\",\"contentUrl\":\"https:\/\/www.fullcontact.com\/wp-content\/uploads\/2019\/11\/fc-logo@2x.png\",\"width\":200,\"height\":38,\"caption\":\"FullContact\"},\"image\":{\"@id\":\"https:\/\/www.fullcontact.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/fullcontact\",\"https:\/\/www.linkedin.com\/company\/fullcontact-inc-\",\"https:\/\/www.youtube.com\/user\/FullContactAPI\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.fullcontact.com\/#\/schema\/person\/046a6157300f0577cf0a6122fb63080e\",\"name\":\"FullContact\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.fullcontact.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b4c9a289323b21a01c3e940f150eb9b8c542587f1abfd8f0e1cc1ffc5e475514?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b4c9a289323b21a01c3e940f150eb9b8c542587f1abfd8f0e1cc1ffc5e475514?s=96&d=mm&r=g\",\"caption\":\"FullContact\"},\"url\":\"https:\/\/www.fullcontact.com\/blog\/author\/user\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What\u2019s a Hashed Email? | FullContact","description":"For years, the industry has claimed hashed emails will be the future of marketing. Now, as we approach a post-third-party cookie world, that claim is finally validated.\u00a0","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.fullcontact.com\/blog\/resource\/whats-a-hashed-email\/","og_locale":"en_US","og_type":"article","og_title":"What's a Hashed Email?","og_description":"For years, the industry has claimed hashed emails will be the future of marketing. Now, as we approach a post-third-party cookie world, that claim is finally validated.","og_url":"https:\/\/www.fullcontact.com\/blog\/resource\/whats-a-hashed-email\/","og_site_name":"FullContact","article_published_time":"2021-07-01T17:01:22+00:00","article_modified_time":"2022-04-19T13:08:19+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.fullcontact.com\/wp-content\/uploads\/2021\/07\/Hashed-Email-Blog-li.png","type":"image\/png"}],"author":"FullContact","twitter_card":"summary_large_image","twitter_title":"What's a Hashed Email?","twitter_description":"For years, the industry has claimed hashed emails will be the future of marketing. Now, as we approach a post-third-party cookie world, that claim is finally validated.","twitter_creator":"@fullcontact","twitter_site":"@fullcontact","twitter_misc":{"Written by":"FullContact","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.fullcontact.com\/blog\/resource\/whats-a-hashed-email\/#article","isPartOf":{"@id":"https:\/\/www.fullcontact.com\/blog\/resource\/whats-a-hashed-email\/"},"author":{"name":"FullContact","@id":"https:\/\/www.fullcontact.com\/#\/schema\/person\/046a6157300f0577cf0a6122fb63080e"},"headline":"What\u2019s a Hashed Email?","datePublished":"2021-07-01T17:01:22+00:00","dateModified":"2022-04-19T13:08:19+00:00","mainEntityOfPage":{"@id":"https:\/\/www.fullcontact.com\/blog\/resource\/whats-a-hashed-email\/"},"wordCount":557,"publisher":{"@id":"https:\/\/www.fullcontact.com\/#organization"},"keywords":["third-party cookies","deprecating cookies","hashed emails","persistent ID","identity","identity resolution"],"articleSection":["Resource"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.fullcontact.com\/blog\/resource\/whats-a-hashed-email\/","url":"https:\/\/www.fullcontact.com\/blog\/resource\/whats-a-hashed-email\/","name":"What\u2019s a Hashed Email? | FullContact","isPartOf":{"@id":"https:\/\/www.fullcontact.com\/#website"},"datePublished":"2021-07-01T17:01:22+00:00","dateModified":"2022-04-19T13:08:19+00:00","description":"For years, the industry has claimed hashed emails will be the future of marketing. Now, as we approach a post-third-party cookie world, that claim is finally validated.\u00a0","breadcrumb":{"@id":"https:\/\/www.fullcontact.com\/blog\/resource\/whats-a-hashed-email\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.fullcontact.com\/blog\/resource\/whats-a-hashed-email\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.fullcontact.com\/blog\/resource\/whats-a-hashed-email\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.fullcontact.com\/"},{"@type":"ListItem","position":2,"name":"What\u2019s a Hashed Email?"}]},{"@type":"WebSite","@id":"https:\/\/www.fullcontact.com\/#website","url":"https:\/\/www.fullcontact.com\/","name":"FullContact","description":"Relationships, reimagined.","publisher":{"@id":"https:\/\/www.fullcontact.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.fullcontact.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.fullcontact.com\/#organization","name":"FullContact","url":"https:\/\/www.fullcontact.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.fullcontact.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.fullcontact.com\/wp-content\/uploads\/2019\/11\/fc-logo@2x.png","contentUrl":"https:\/\/www.fullcontact.com\/wp-content\/uploads\/2019\/11\/fc-logo@2x.png","width":200,"height":38,"caption":"FullContact"},"image":{"@id":"https:\/\/www.fullcontact.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/fullcontact","https:\/\/www.linkedin.com\/company\/fullcontact-inc-","https:\/\/www.youtube.com\/user\/FullContactAPI"]},{"@type":"Person","@id":"https:\/\/www.fullcontact.com\/#\/schema\/person\/046a6157300f0577cf0a6122fb63080e","name":"FullContact","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.fullcontact.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b4c9a289323b21a01c3e940f150eb9b8c542587f1abfd8f0e1cc1ffc5e475514?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b4c9a289323b21a01c3e940f150eb9b8c542587f1abfd8f0e1cc1ffc5e475514?s=96&d=mm&r=g","caption":"FullContact"},"url":"https:\/\/www.fullcontact.com\/blog\/author\/user\/"}]}},"_links":{"self":[{"href":"https:\/\/www.fullcontact.com\/wp-json\/wp\/v2\/posts\/19725","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.fullcontact.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.fullcontact.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.fullcontact.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fullcontact.com\/wp-json\/wp\/v2\/comments?post=19725"}],"version-history":[{"count":0,"href":"https:\/\/www.fullcontact.com\/wp-json\/wp\/v2\/posts\/19725\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.fullcontact.com\/wp-json\/wp\/v2\/media?parent=19725"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.fullcontact.com\/wp-json\/wp\/v2\/categories?post=19725"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.fullcontact.com\/wp-json\/wp\/v2\/tags?post=19725"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}