Don't Walk Around the Block to Go Next Door

Share this article:


Rodney Joffe goes to great lengths to explain how Message Digest Version 5 (MD5) or Secure Hash Algorithm 1 (SHA-1) are useful tools for a merge/purge by proxy of e-mail addresses ("Merge/Purge of E-Mail Addresses," Feb. 7). Gee, aren't e-mail addresses already unique? Wouldn't a third-party service bureau provide sufficient confidentiality to list owners?


I dedupe 10M to 20M e-mail addresses with a simple comparison in MS Excel or MS Access. Certainly, a service bureau can do a large-scale merge/purge without hashing. If their process isn't secure, I'd look for another vendor.


So, list owner A applies an algorithm; forwards a hashed file; compares; matches hashed records to master files; extracts hashed records; converts to e-mail addresses. Seems more complicated than it has to be. When I want to visit my next-door neighbor, I walk across the yard. I don't walk all the way around the block to get there.


Share this article:
close

Next Article in Opinions

Sign up to our newsletters

Follow us on Twitter @dmnews

Latest Jobs:

More in Opinions

The One-to-One Future Is Now

The One-to-One Future Is Now

Editor-in-Chief Ginger Conlon offers her take on what it means to make an impact on the marketing industry.

Leading by (Poor) Example: Answers

Leading by (Poor) Example: Answers

The VP of marketing has been a little lax in his definition of the term "business expense" and it shows. See how our readers would handle this thorny situation.

Attention Marketing Consultants: Protect Yourselves

Attention Marketing Consultants: Protect Yourselves

A lot can go wrong when you're a marketing consultant—but there are plenty of ways to safeguard yourself if you're smart about it.