Proton Pass Monitor is now available — dark web scanning, password health and inactive 2FA
from the team:
Hi everyone,
We’re happy to announce that the 2nd highest-voted feature request is rolling out this week — Proton Pass Monitor.
Proton Pass Monitor keeps your data safe with dark web monitoring, checking for weak and reused passwords, scanning for accounts with inactive 2FA, and providing easy access to Proton Sentinel.
You can also check out the following support articles:
Pretty sure a Linux client for proton drive isn't on the protonpass roadmap :)
Edit: sorry that seems to come off quite bitter/sarcastic.
It was meant as a lighthearted joke. I assumed its the second most requested feature on protonpass rather than proton in general. But I could be wrong.
How does Proton decide if a password is weak or not? About half (361 of 678) are considered weak, and I used either Bitwarden or Proton Pass itself to generate a random one. A bunch of the ones I've spot checked have upper, lower, numbers, and symbols and they're still getting flagged as weak. I wish there were a more granular scale because I'd be happy to change the passwords that are truly weak but I'm not going to change hundreds of passwords to a different random string.
If something is weak, it is Proton's knowledge of password strength. For example, they call a 16-character password without special characters "weak," which has around 95 bits of entropy, so this doesn't make sense. They also overemphasize the role of special characters in passwords, as just increasing the password length by a single character would add more entropy than enabling special characters. Furthermore, many of Proton's articles regarding password strength contain a lot of misinformation. This one talking about password entropy might be their worst yet. You cannot seriously claim that a single word, "Bankruptcies," has 68.4 bits of entropy, which also isn't the only inaccurate claim that the article makes.
This is awesome! I have access to it now and the "reused passwords" feature is helping me find duplicates. For example, some login credentials are for a website, some are for the same app as the website but they appear in Pass as separate. So cleaning those out is super easy now.
Edit: omg there are so many duplicates! A lot of them are also associated with "different" sites and display as two unique logins, but the two sites differ by http vs https.