There is no such thing as perfect security, but there’s a big difference between trying to obscure something confidential between two parties (a password) and trying to obscure information that by design must be shared with other parties (an email address).
Outside of diligently using disposable alias addresses, obscuring an email is an exercise in futility. The biggest point of failure in security is the human, and all it takes is a single person to leak it. With all the people that need to communicate with Musk over email, the opportunity for that to happen is far higher than the chance of something like someone successfully cracking a hash.
There is no such thing as perfect security, but there’s a big difference between trying to obscure something confidential between two parties (a password) and trying to obscure information that by design must be shared with other parties (an email address).
Outside of diligently using disposable alias addresses, obscuring an email is an exercise in futility. The biggest point of failure in security is the human, and all it takes is a single person to leak it. With all the people that need to communicate with Musk over email, the opportunity for that to happen is far higher than the chance of something like someone successfully cracking a hash.