Skip to content

finn

My feedback

4 results found

  1. 374 votes
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    finn supported this idea  · 
  2. 2,982 votes
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    finn supported this idea  · 
  3. 1,664 votes
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    An error occurred while saving the comment
    finn commented  · 

    This could be done using K-anonimity feature proposed by Have I been Pwned.
    Meaning part of the hashed password is used to find corresponding elements in HIBP.
    Then the hashes are compared localy when the user is logged in.
    This allows to keep the zero-knowledge aspect for Proton and to detect potentialy leaks.

  4. 30 votes
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    An error occurred while saving the comment
    finn commented  · 

    This would be great. Adding it with custom or integrated domains. for example having a hosting url for an image using the drive of the user for example.

Feedback and Knowledge Base