Google's New Tool Alerts When You Use Compromised Credentials On Any Site

Ozzy47

Well-known member
I have not seen or used this yet, has anyone here used it?

With so many data breaches happening almost every week, it has become difficult for users to know if their credentials are already in possession of hackers or being circulated freely across the Internet.

Thankfully, Google has a solution.

Today, February 5, on Safer Internet Day, Google launches a new service that has been designed to alert users when they use an exact combination of username and password for any website that has previously been exposed in any third-party data breach.

Read more,
 
I'm not sure if it's been actually released yet in Chrome. This is really an "extension" of an existing Chrome extension, similar to what Firefox has been using for a while.

It's worth noting that there is some controversy about this new extension, though:


Unlike some similar tools, the tool only looks for breaches that contain the specific combination of username/email address and password. Some other services will carry out one search for the username or email and then another search for the password.

Google's approach does have some benefits because it overcomes the problem that, frankly speaking, any username or email address has probably been involved in at least one security breach at some point. That fact isn't necessarily of any significance or pose a security threat for the particular site the user is visiting right now.

According to Paul Wagenseil of Tom's Guide, the downside to the "Password Checkup" tool is that it can be reverse engineered. For example, hackers may might attempt a dictionary attack on Google's databases with username / password combinations, which would then reveal information about a particular user. That would be a major security problem if it was successful. (Source: tomsguide.com)

For its part, Google says it has designed the system "to prevent an attacker from abusing Password Checkup to reveal unsafe usernames and passwords."

It says the key is to make sure the tool can "query Google about the breach status of a username and password without revealing the information queried." To do this, it uses "rounds of hashing, k-anonymity, private information retrieval, and a technique called blinding." (Source: googleblog.com)

So maybe it boils down to how much you trust Google to secure your data...

See also https://blog.ashampoo.com/en/2019-0...dresses-and-passwords-leaked-are-you-affected

You can check to see the status of your email accounts at Hasso-Plattner-Institut Identity Leak Checker.
 
Back
Top Bottom