Hashing emails in your data extracts

In order to benefit from a full range of what Easysize offers please provide us with SHA256 of your customer’s emails so we can identify them across millions of data points we have.

What does SHA256 mean and how is it not personal information?

The SHA (Secure Hash Algorithm) is one of a number of cryptographic hash functions. A cryptographic hash is like a signature for a text or a data file. SHA-256 algorithm generates an almost-unique, fixed size 256-bit (32-byte) hash. Hash is a one way function – it cannot be decrypted back. That means that we cannot extract an email out of a hash, but we still are able to identify a customer in different online shops by using it. This brings benefits to all of our shops - we can understand a user’s (your customer’s) purchasing preferences across multiple shops and better predict the size and returns behaviours to provide value to your business.

How secure is hashing?

Hashing is a strong encryption that protects your users’ information. While all encryptions could theoretically be decoded with “brute force” (lots of computer resources and time) the hashing we use is state of the art presently as to ensure that breaking this encryption is not practicable. Further, once your data reaches our servers, we apply another layer of encryption to further block any attempts to extract information. As a result, hashing your users’ emails protects this information while it’s being transferred to us and while we store it on our servers.

What do you get by providing Easysize with hashed emails?

Having customer emails allows us to match customers across multiple shops and thus build better prediction of their size and their return behaviors for all shops - including yours. As a result, we can give you answers based on your customers’ interactions with other shops, not just yours.

What is SHA256 and why are you using it?

SHA256 (Secure Hash Algorithm) is one of the most secure encryption algorithms available currently. It helps ensure that no personal information can be accessed in the event that the data is intercepted in transit, before we secure it on our servers.

By protecting all of your customer personal information (emails, phone numbers) with SHA265, you and us ensure that what any attacker would see would be anonymous data that does not jeopardize your customers’ privacy.