A person authentificates herself in the system when logging, this authentification is used to determine what is readable and/or writable.
Passwords are (still) kept in the clear in the database.
Anonymous emails are never read from the database.