Search passwords
Imagine that you have a compromised password and now you want to find all websites where you used that password. You can't. You'll have to manually check each saved account/pass combination. This feature exists in Firefox logins&passwords and it makes it really useful.
-
Getting Annoyed
commented
The whole search stack is sub-optimal. You can't search for the actual password. You can't search for a username. You just get a "blob" search of any match, in any field, EXCEPT in the password field.
So, if I want to search for my password for my gmail account, it gives me literally every single entry for every website I've ever used my email address for. WTF. Really?
Love Proton. Love proton pass. But I don't love that!
And why is it that virtually EVERY SINGLE COMPANY drops the ball at the 80 yard line? "It's hard to do" - Well, no it's not. Products "A" "B" and "C" did it. But you neglected it.
And it's always with easy to implement goals. Like this. A robust search of our passwords. No can do. Really?
I can have product "A" that does options 1 & 2, but not 3.
I can have product "B" that does options 2 & 3, bot not 1.
I can have product "C" that does options 1 & 3, bot not 2.Is it a freaking conspiracy?
-
Qtum Ev commented
This is must, not a "nice to have feature"!
No, I don't know it was compromised because of some online service, I know because someone saw it in a coffee shop or a colleague saw it, or someone else. So I know, but I don't know where I used that password ... -
Ethan Glover commented
Would love to see this, Proton Pass dark web monitoring is nowhere near as robust as Google’s free monitoring. Being able to find passwords mentioned by it in Pass would be a huge deal for me.
-
chevy ferretta commented
Pass Monitor would be WAY more useful if it actually gave more information. Just saying "xyz@xyz.com was found in this breach" does not give enough information. What was the password? Was it one that hasn't been used in 10 years? Oh, no problem. But Pass Monitor doesn't show me, so I don't know.
This is particularly needed in breaches like pastes and things which are not tied directly to one specific site or service.
I know this is possible since some other services provide this information, either the full password or at least the first few characters of the exposed password. I don't see any issue with providing this information to users who prove ownership of their monitored email addresses.
-
Rambaldi
commented
Thanks for this idea. I'm looking for exactly the same!
@Ryan: I felt the same.
But there is already a solution for that.
Look in the "Pass Monitor" -
Rokus
commented
I got a security breach notification, my password was leaked. Need to change the places were I used it. I'd really appreciate to have this feature.
-
Anonymous
commented
Currently the breach system will tell you generally about leaks but doesn't give you specifics, although it does also add a disclaimer that it can be wrong; however, I would like to be able to evaluate that statement further. Other services will just tell you what was leaked, and you can see if it was indeed a password you used. Which helps when knowing if its a breach I've fixed already, or not.
Particular if it could identify the entry in proton pass, that would be an added nice bonus - if a specific entry is part of the breach it would be like "CHANGE THIS ONE" because the system knows that entry is leaked.
-
Ryan
commented
I’ve reused the same weak passwords for years and am finally getting around to replacing them all with good long randomized ones. This feature would be really helpful to see how many I have left to change.
-
Patrik
commented
I second that, it's very important