The server logs spilled out onto the screen—raw, unfiltered, alive with data. In the flood of timestamps, status codes, and requests, an email address sat exposed. One slip, one forgotten mask, and sensitive user data became a liability. Precision in masking email addresses in logs is not optional. It