Proton Pass & Authenticator
- or
851 results found
-
Enable vault-wide monitoring exclusion
Currently, "Exclude from monitoring" only applies to each individual item. However, doing this for each account is onerous. Please enable right clicking into an existing vault and allow users to "Exclude all items from monitoring" on a per-vault basis to simplify the process.
3 votes -
Customizable theme for Proton Pass
I would really like it if there was an option to customize the theme (system theme) The dark theme is sometimes very difficult to read.
46 votes -
Support for Mooltipass encrypted backup files
With Mooltipass hardware password repositories failing due to battery lifecycle, it would be beneficial to be able to import their native backup file direct to Proton Pass.
The alternative is to manually copy and past each filed for each credential as plain text export is not supported with the Mooltipass Mini BLE device.
3 votes -
please add support to move from pwSafe(https://pwsafe.app/) to proton pass.
please add support to move from pwSafe(https://pwsafe.app/) to proton pass.
4 votes -
Change the term "Master Password" to something more open and neutral
Such as "Proton Password," "Main Password," "Primary Password," etc.
Resoning:
The term "master password" has become frowned upon in some contexts due to its historical connotations and the potential for misinterpretation:
Historical Connotations: The term "master" has origins linked to dominance, control, and even slavery in some contexts. While this isn't the intention when used in technical contexts like "master password," many organizations and individuals are choosing to avoid terms that might evoke such associations to promote inclusivity and sensitivity.
Modern Inclusivity Trends: Many industries, particularly tech, are reevaluating language that could unintentionally reinforce outdated hierarchies or exclusions. Alternatives like "primary password" or "main password" convey the same meaning without potentially problematic undertones.
Misinterpretation: For non-technical users, the term "master password" might be unclear or intimidating. Clearer terms like "main password" can help ensure users understand its importance and purpose.
This shift aligns with broader efforts to use language that is clear, inclusive, and free from potentially negative connotations.
This could also tie in better with the use of the additional password phrasing.
Such as "Proton Password," "Main Password," "Primary Password," etc.
Resoning:
The term "master password" has become frowned upon in some contexts due to its historical connotations and the potential for misinterpretation:
Historical Connotations: The term "master" has origins linked to dominance, control, and even slavery in some contexts. While this isn't the intention when used in technical contexts like "master password," many organizations and individuals are choosing to avoid terms that might evoke such associations to promote inclusivity and sensitivity.
Modern Inclusivity Trends: Many industries, particularly tech, are reevaluating language that could unintentionally reinforce outdated hierarchies or exclusions. Alternatives like…
13 votes -
Allow syncing catch-all aliases to a separate vault
Currently, we can automatically sync all SimpleLogin aliases into 1 single vault. This is great but can be improved for users who use the catch-all feature. Because certain domains receive a lot of spam if catch-all is enabled, it would be fantastic to have catch-all aliases that have been created automatically to sync to another vault of our choosing; this would help us quickly determine which catch-all domains to disable or delete and manage aliases more efficiently.
3 votes -
Improved GrapheneOS Vanadium Support
Autofill on GrapheneOS Vanadium browser is not great. I frequently have to flip back and forth between Proton Pass & Vanadium browser to copy and paste my username / password to login. It would be lovely if someone on the dev team gave GrapheneOS & Vanadium a spin as their primary device and worked to improve consistency in autofill / quick login.
I know the population of users on GrapheneOS is small compared to Safari & Chrome, but GrapheneOS & Proton have similar missions around security and privacy and the user experience story could use some love.
GrapheneOS is "The private and secure mobile operating system with Android app compatibility. Developed as a non-profit open source project." Vanadium is "a hardened variant of the Chromium browser and WebView specifically built for GrapheneOS."
Autofill on GrapheneOS Vanadium browser is not great. I frequently have to flip back and forth between Proton Pass & Vanadium browser to copy and paste my username / password to login. It would be lovely if someone on the dev team gave GrapheneOS & Vanadium a spin as their primary device and worked to improve consistency in autofill / quick login.
I know the population of users on GrapheneOS is small compared to Safari & Chrome, but GrapheneOS & Proton have similar missions around security and privacy and the user experience story could use some love.
GrapheneOS is "The…
7 votes -
Why SD International is a Trusted Vat Dyes Manufacturer in India
India has many dye manufacturers, but SD International stands out due to their commitment to quality and innovation. Their vat dyes are manufactured under strict quality control measures, ensuring that every batch meets international standards. This reliability is essential for businesses that export textiles and need consistent results.
Additionally, SD International invests in research and development to improve their dye formulations continuously. This focus on innovation means their vat dyes not only provide excellent colorfastness but also comply with environmental regulations. For companies looking to partner with a manufacturer that values quality, sustainability, and customer satisfaction, SD International is a top choice.
Visit here:https://sdinternational.com/vat-dyes-manufacturer-in-india/India has many dye manufacturers, but SD International stands out due to their commitment to quality and innovation. Their vat dyes are manufactured under strict quality control measures, ensuring that every batch meets international standards. This reliability is essential for businesses that export textiles and need consistent results.
Additionally, SD International invests in research and development to improve their dye formulations continuously. This focus on innovation means their vat dyes not only provide excellent colorfastness but also comply with environmental regulations. For companies looking to partner with a manufacturer that values quality, sustainability, and customer satisfaction, SD International is a…2 votes -
Disable Primary Proton Mail Suggestion on Registration – Show Only ‘Create New Alias’ Prompt
During website registrations, Proton Pass’s autofill currently suggests the user’s primary Proton Mail address as a possible e‑mail value. A setting is needed that completely removes this primary‑address suggestion for registration forms. When the setting is enabled, the only e‑mail option presented during sign‑up should be the existing “hide my e-mail” prompt.
Removing the primary‑address suggestion prevents the user’s main email from being inadvertently exposed to third‑party services, thereby improving privacy and reducing the risk of spam, phishing, or data‑breach fallout.
2 votes -
Travel Mode
1Password has a feature that allows you to designate groups of logins that can be removed from your vault by activating "travel mode" on their website and which will be restored to your devices by deactivating "travel mode." The purpose of this feature is to allow you to hide information when crossing international borders, since border agents in many countries (including the US) can compel you to unlock your phone and show them the contents of your apps, including password managers. This is obviously a severe violation of one's privacy.
I would like to see a similar feature in Proton Pass.
1Password has a feature that allows you to designate groups of logins that can be removed from your vault by activating "travel mode" on their website and which will be restored to your devices by deactivating "travel mode." The purpose of this feature is to allow you to hide information when crossing international borders, since border agents in many countries (including the US) can compel you to unlock your phone and show them the contents of your apps, including password managers. This is obviously a severe violation of one's privacy.
I would like to see a similar feature in Proton…
38 votes -
Autofill the new "Other" Item type
Please add the ability to autofill the new "Other" item type. For example when I want to enter my wifi password on mobile and open Proton Pass from my keyboard, my wifi password doesn't show up as an option (even when I search for it) because it is not a login item, but an "other" item.
2 votes -
Improvement to pin feature
Instead of pinning one complete element on the homepage, allow to pin a field of an element and provide action in context of what field type is pinned. For exemple if you pin a password or a PIN and tap this item it will display in large. If you pin a 2FA code it will be shown on the homepage and if you tap it will copy the 2FA…
4 votes -
Generate a barcode for custom Reward Program records
When I use a reward program code at a store, they usually scan it from a bar code. It would be useful to have Proton Pass generate the bar code from the custom Reward Program record. For this to be useful, the set of reward program records should be easily accessible from the app on the phone, as opposed to having to go down a set of hierarchical menus.
3 votes -
Clarify use case scenarios of Proton Pass autofill feature
I think that my installation of Proton Pass, which includes the Windows desktop app, the brower extension, the phone app, and the web app, used to offer to autofill website logins more often than it currently is doing so, As such, I would like more information on what affects autofill and how to configure things which make autofill offer suggestions for ID and password for website logins. I realize that websites may be developed such that they prevent autofill from offering suggested login information, but how that happens would be good information to know also. So, please expound on this major useablitity issue. Thanks.
I think that my installation of Proton Pass, which includes the Windows desktop app, the brower extension, the phone app, and the web app, used to offer to autofill website logins more often than it currently is doing so, As such, I would like more information on what affects autofill and how to configure things which make autofill offer suggestions for ID and password for website logins. I realize that websites may be developed such that they prevent autofill from offering suggested login information, but how that happens would be good information to know also. So, please expound on this…
4 votes -
Easily import cards inspiring from Google Wallet
The new fields types are great but I think an ID card is missing, and I also think we should be able to directly import stuff like cards or subscriptions like Google Wallet, and easily scan wifi code to import for example.
3 votes -
Smart 2FA Secret Import - Paste and Auto-Convert TOTP Keys
Smart 2FA Secret Import - Paste and Auto-Convert TOTP Keys
Problem
Currently, migrating 2FA codes from other password managers to Proton Pass is painful. Users must manually re-scan QR codes for every single account, which can take hours for users with many 2FA-enabled accounts. This migration friction prevents users from switching to Proton Pass.
Requested Feature
Smart 2FA Key Recognition and Import
Allow users to simply paste 2FA secrets in various formats, and Proton Pass automatically recognizes and converts them into working TOTP codes.
Supported Formats
Base32 secrets (e.g., JBSWY3DPEHPK3PXP)
OTPAuth URIs (e.g., otpauth://totp/Example:user@site.com?secret=ABC123&issuer=Example)
Google Authenticator export format
Raw secret keys from other password managers
User Experience
User clicks "Add 2FA" in Proton Pass
Paste any supported 2FA format
Proton Pass auto-detects format and extracts:
Secret key
Service name
Account identifier
Algorithm settings
One-click to save and start generating codes
Why This Matters
Migration barrier removal: Makes switching to Proton Pass effortless
Time savings: Convert hours of manual work into minutes
Competitive advantage: Most password managers don't offer smart format detection
User retention: Reduces abandonment during migration process
Use Cases
New users: Migrating from Bitwarden, 1Password, Authy, Google Authenticator
Backup restoration: Quickly restore 2FA from exported data
Enterprise: IT teams setting up employee accounts in bulk
Security Implementation
All parsing done locally (client-side)
No secrets transmitted to servers
Support for custom TOTP parameters (SHA-1/256, 6/8 digits, custom intervals)
Maintain end-to-end encryption for stored secrets
Similar Features in Competitors
Bitwarden: Limited OTPAuth URI support
1Password: QR code import only
Proton Pass opportunity: Be the first with comprehensive smart import
Impact
This feature would make Proton Pass the most migration-friendly password manager, directly addressing the biggest barrier to user adoption.
Please upvote if you've struggled with 2FA migration or want easier password manager switching!
Smart 2FA Secret Import - Paste and Auto-Convert TOTP Keys
Problem
Currently, migrating 2FA codes from other password managers to Proton Pass is painful. Users must manually re-scan QR codes for every single account, which can take hours for users with many 2FA-enabled accounts. This migration friction prevents users from switching to Proton Pass.
Requested Feature
Smart 2FA Key Recognition and Import
Allow users to simply paste 2FA secrets in various formats, and Proton Pass automatically recognizes and converts them into working TOTP codes.
Supported Formats
Base32 secrets (e.g., JBSWY3DPEHPK3PXP)
OTPAuth URIs (e.g., otpauth://totp/Example:user@site.com?secret=ABC123&issuer=Example)
Google Authenticator export format
…
3 votes -
click
in desktop app, doubleclicking on an account should automatically copy the password to clipboard.
then when a paste is detected, if there is a TOTP, then copy the code to the clipboard2 votes -
click
for desktop app, doubleclicking on an account should automatically copy the password to the clipboard, and then when a paste operation happens, if there is a TOTP, then replace the password in the clipboard with the code
2 votes -
Thorium
Thorium password import
2 votes -
3 votes
- Don't see your idea?