Skip to content

Jessy

My feedback

4 results found

  1. 57 votes
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    Jessy supported this idea  · 
  2. 44 votes
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    An error occurred while saving the comment
    Jessy commented  · 
  3. 1,664 votes
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    An error occurred while saving the comment
    Jessy commented  · 

    I would call this similar to what other password manager software call it: "Dark web monitoring" (duh, whatever that means), an integration of haveibeenwpnd with data leaks monitoring.
    I have doubts I'd like anyone to monitor the passwords since it has to be truly zero-knowledge. I wonder if that is technically safe to verify your password being leaked.

    Jessy supported this idea  · 
  4. 1,260 votes
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    Jessy supported this idea  · 

Feedback and Knowledge Base