How to Share Passwords Securely: Stop Using Email and Slack
Every day, millions of passwords are shared via email, Slack, Teams, and text messages. Every single one of those is a security incident waiting to happen. Here is how to do it properly.
The Problem with Plaintext Password Sharing
It happens in every organization. A colleague needs access to a shared account, a client needs credentials for a staging server, or IT needs to distribute new login details to the team. The default response? Copy the password into an email, a Slack DM, or a text message and hit send.
This is one of the most dangerous habits in workplace security, and it is shockingly common. Here is why it is so risky:
- Email is stored forever. That password you emailed three years ago? It is still sitting in your sent folder, the recipient's inbox, their archive, and likely on multiple mail server backups. If any of those accounts are compromised, the password is exposed.
- Slack messages persist in search. Slack retains message history (especially on paid plans with unlimited retention). Anyone with access to the workspace can search for messages containing credentials. A single compromised Slack account can expose every password ever shared in DMs.
- No expiration. A password shared in plaintext stays accessible indefinitely. Even after you rotate the credential, the old one is still visible in the message history — and it may reveal your password patterns.
- No access control. Once you send a message, you lose control over who sees it. Messages get forwarded, screenshots get taken, and conversations get exported.
- Compliance violations. For organizations subject to SOC 2, HIPAA, PCI-DSS, or GDPR, sharing credentials in plaintext can constitute a compliance violation that results in audit findings or fines.
If you can search your Slack or email history and find a plaintext password, so can an attacker who compromises that account.
Secure Alternative 1: Encrypted Pastebins with Burn-After-Reading
The fastest and simplest secure method for one-time password sharing. An encrypted pastebin like SecureBin works like this:
- You paste the password into SecureBin
- Your browser encrypts it with AES-256-GCM before sending anything to the server
- You get a unique link with the decryption key in the URL fragment
- You send that link to the recipient via your normal communication channel
- They open the link, the password is decrypted in their browser, and the paste is permanently deleted (if burn-after-reading is enabled)
The key advantages:
- Zero knowledge: The server never sees the plaintext password. Even if the server is breached, only encrypted gibberish is exposed.
- Self-destructing: With burn-after-reading enabled, the paste is deleted after a single view. There is nothing left to find later.
- No account needed: Both sender and recipient can use it immediately without signing up for anything.
- Password protection: Add an additional password for an extra layer of security. Share the paste URL through one channel and the password through another.
- Expiration: Set pastes to expire after 1 hour, 1 day, or 1 week as an additional safeguard.
Share a Password Securely Right Now
Zero-knowledge AES-256-GCM encryption. Burn after reading. No sign-up. Takes 10 seconds.
Create Encrypted PasteSecure Alternative 2: Password Manager Sharing
For teams that regularly share credentials, a password manager with built-in sharing is the most scalable solution. Both 1Password and Bitwarden offer team/enterprise plans with secure sharing features:
- Shared vaults: Create shared credential vaults that team members can access based on their role
- Granular permissions: Control who can view, edit, or share specific credentials
- Audit logging: Track who accessed which credential and when
- Zero-knowledge architecture: The provider cannot access your shared passwords
The downside is that both parties need accounts on the same password manager. For ad-hoc sharing with external parties (clients, contractors, vendors), an encrypted pastebin is usually more practical.
Secure Alternative 3: Split the Secret Across Channels
If you absolutely must use a standard communication channel, split the credential across two different channels. For example:
- Send the username via Slack, and the password via a phone call
- Send the first half via email, and the second half via text message
- Send the service URL via Slack, and the credentials via an encrypted paste link
This is not ideal, but it significantly reduces risk compared to sending everything in one plaintext message. An attacker would need to compromise both communication channels.
What About Encrypted Messaging Apps?
Apps like Signal offer end-to-end encrypted messaging, which is a major improvement over email and Slack. However, there are caveats:
- Messages persist on devices. Even with disappearing messages enabled, the recipient can screenshot or copy the password before it vanishes.
- No forced deletion. Unlike burn-after-reading, you are relying on the app's disappearing message feature rather than server-side deletion.
- Both parties need the app. Not practical for sharing with external parties who may not use Signal.
Signal is better than email or Slack, but an encrypted pastebin with burn-after-reading is purpose-built for this exact use case.
Best Practices for Secure Credential Sharing
Regardless of which method you choose, follow these principles:
- Never share passwords in plaintext over email, Slack, Teams, Discord, SMS, or any platform that retains message history.
- Use burn-after-reading or self-destructing messages whenever possible. The credential should not persist after the recipient has used it.
- Rotate credentials after sharing. If you share a password, plan to change it once the recipient has set up their own access. Shared passwords should be temporary.
- Use unique credentials per person. Instead of sharing one password among a team, create individual accounts with unique passwords. This provides accountability and makes revocation simple.
- Set expiration times. If using an encrypted paste, set the shortest reasonable expiration. A paste that expires in 1 hour is safer than one that lives for 30 days.
- Add password protection for sensitive credentials. For highly sensitive credentials (production database passwords, root access), add a password to the encrypted paste and communicate it through a separate channel.
Stop Sending Passwords in Plaintext Today
The next time you need to share a password, a database connection string, an API key, or any sensitive credential — take the 10 extra seconds to do it securely. Open SecureBin, paste the credential, enable burn-after-reading, and send the link instead of the plaintext.
It takes the same amount of effort as typing the password into a Slack message, but the security difference is enormous. Your future self (and your security team) will thank you.
Need to generate a strong password to share? Use our free password generator first, then share it securely through SecureBin.