Plaintext Passwords? Seriously?

I remember the first time I learned about password hashing. It was like discovering the secret sauce of cybersecurity. So, when I read that Meta—a tech giant—was storing passwords in plaintext, I had a moment of disbelief. How could this happen in 2023?

A person sitting on a grass field, with a laptop on their lap, looking at the laptop, covering their face with their hands, looking distressed.
Photography by Ketut Subiyanto on Pexels
Published: Thursday, 20 February 2025 14:10 (EST)
By Nina Schmidt

Let's start with the basics. Storing passwords in plaintext is like leaving your house keys under the doormat with a neon sign saying, 'Take me!' It's one of the most fundamental no-nos in cybersecurity. Yet, here we are, talking about Meta, a company with billions of users, and they just got slapped with a hefty fine for doing exactly that.

According to Ars Technica, Meta stored hundreds of millions of passwords in plaintext. And no, this isn’t some small startup making rookie mistakes. This is Meta, the parent company of Facebook and Instagram. The Irelands' Data Protection Commission fined them 91 million euros (about $100 million) for this colossal blunder. But the real question is: How did this happen?

How Did We Get Here?

Okay, so let’s break this down. Passwords should never be stored in plaintext—period. The industry standard is to hash them. Hashing is a one-way cryptographic function that turns your password into a string of gibberish. Even if someone gets their hands on the hashed password, they can’t reverse-engineer it to figure out what the original password was. Simple, right?

But Meta apparently missed the memo. For years, they stored passwords in plaintext, meaning anyone with access to their internal systems could see them. And by 'anyone,' I mean employees, contractors, and potentially hackers if they ever got in. This is the kind of mistake that makes cybersecurity professionals want to pull their hair out.

Now, you might be wondering, 'How does a company like Meta, with all its resources, make such a rookie mistake?' Well, it’s not as uncommon as you might think. Large companies often have legacy systems—old software that hasn’t been updated in years. These systems can be riddled with vulnerabilities, and sometimes, they don’t follow modern security practices like password hashing.

Why This Is a Big Deal

Some people might shrug this off and say, 'Well, it’s just passwords, right?' Wrong. Passwords are the gatekeepers to our digital lives. If someone gets hold of your password, they can access your personal information, bank accounts, social media profiles—you name it.

And here’s the kicker: Many people reuse passwords across multiple sites. So, if your Facebook password was stored in plaintext and someone got their hands on it, they could potentially use it to access your email, your Amazon account, or even your online banking. Scary, right?

But it’s not just about individual users. This kind of breach can have massive implications for businesses too. Imagine if a hacker got access to the plaintext passwords of Meta’s employees. They could potentially gain access to sensitive internal systems, putting the entire company at risk. It’s a cybersecurity nightmare.

What Can We Learn?

So, what’s the takeaway here? First and foremost, if you’re a business owner, make sure your systems are up to date and that you’re following best practices when it comes to password storage. Hashing isn’t optional—it’s a must.

For the rest of us, this is a wake-up call. If a company as big as Meta can make this kind of mistake, what does that say about the smaller companies we trust with our data? It’s time to start taking our own security seriously. Use strong, unique passwords for every site, and for the love of all things digital, enable two-factor authentication wherever possible.

And hey, if you’re still using 'password123' for your Facebook account, now’s probably a good time to change that.

The Bigger Picture

Meta’s plaintext password fiasco is just the tip of the iceberg. It’s a reminder that even the biggest companies can slip up when it comes to security. But it also highlights a broader issue: We’re still not taking cybersecurity seriously enough.

In a world where our lives are increasingly digital, we need to demand better security from the companies we trust with our data. And we need to hold them accountable when they mess up—like Meta just did.

So, next time you hear about a data breach or a company storing passwords in plaintext, don’t just shrug it off. It’s a big deal. And it’s up to all of us to make sure it doesn’t keep happening.

Cybersecurity