{"id":16496,"date":"2019-10-04T04:30:04","date_gmt":"2019-10-04T12:30:04","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/10\/04\/news-10236\/"},"modified":"2019-10-04T04:30:04","modified_gmt":"2019-10-04T12:30:04","slug":"news-10236","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2019\/10\/04\/news-10236\/","title":{"rendered":"Google launches leaked-password checker, will bake it into Chrome in December"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2018\/07\/chrome_browser_logos_by_gerd_altmann_cc0_via_pixabay_1200x800-100765584-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Gregg Keizer| Date: Fri, 04 Oct 2019 04:06:00 -0700<\/strong><\/p>\n<p>Google has launched a web-based hacked-password checker, part of its efforts to bake an alert system into Chrome.<\/p>\n<p>Called &#8220;Password Checker,&#8221; the service examines the username-password combinations stored in Chrome&#8217;s own password manager and reports back on those authentication pairings that have been exposed in publicly-known data breaches.<\/p>\n<p>The web version can be found at <a href=\"https:\/\/passwords.google.com\/\" rel=\"noopener nofollow\" target=\"_blank\"><i>passwords.google.com<\/i>&lt;<\/a>&gt;, the umbrella site for Chrome users who run the browser after logging in with their Google account, then use that to synchronize data &#8211; including passwords &#8211; between copies of Chrome on different devices.<\/p>\n<p>After requesting a password checkup, Google returns the results to Chrome, organized in lists of accounts relying on already-compromised username-password pairs, accounts for which the user has reused a password (something usually frowned on by security experts) and accounts that rely on weak passwords.<\/p>\n<p>At the moment, there&#8217;s nothing built into Chrome, at least the most polished, Stable build; only the external web-based dashboard has been launched.<\/p>\n<p>But as Google said last month when it released Chrome 77, it plans to bake a hacked-password alert system into the browser. Details then were absent, although the intent was clear: Chrome would have something similar to what Mozilla will premiere in three weeks when the open-source developer ships the next Firefox.<\/p>\n<p>Currently, the Windows version of Chrome 78 Beta &#8211; the build that leads to Stable &#8211; as well as the less-reliable Chrome 79 Canary on both Windows and macOS, sports the new password checking system. For now, it has been hidden behind a setting on a semi-secret options screen.<\/p>\n<p>To switch it on, type <i>chrome:\/\/flags<\/i> in the address bar; press Return or Enter; type <i>passwords<\/i> in the search field; locate the <i>Password Leak Detection<\/i> item; and to the right of that, select <i>Enabled<\/i> from the drop-down list. Finally, relaunch Chrome.<\/p>\n<p>To verify that the alert system is active, choose <i>Settings<\/i> from the main menu (under the vertical ellipsis at the right); select <i>Passwords<\/i> under <i>Autofill<\/i>; and look for the <i>Check password safety<\/i> item. The toggle to the right should be in the on position.<\/p>\n<p>When the user enters a username + password that have been exposed by a breach, Chrome should pop up a warning that the password has been leaked and needs to be changed. In <i>Computerworld<\/i>&#8216;s trials, however, the alert did not always work: One website whose password had been reported in a breach did not display the alert, while several other sites &#8211; some of them using the same username + password pair &#8211; did result in an on-screen warning.<\/p>\n<p>When it does appear, the alert contains a <i>Check passwords<\/i> button. Press that and the browser opens the online password checkup now in operation.<\/p>\n<p>Last month, Google said it planned to include the hacked-password warning in Chrome 78, then &#8211; and now &#8211; slated to ship Oct. 22.<\/p>\n<p>(Coincidentally, that&#8217;s the same day Firefox is to launch <i>its<\/i> alert system. More on that in a bit.)<\/p>\n<p>But on Tuesday, in one of several <a href=\"https:\/\/bugs.chromium.org\/p\/chromium\/issues\/detail?id=986322\" rel=\"noopener nofollow\" target=\"_blank\">Chromium bug reports<\/a> devoted to the password warning development, the feature was described as &#8220;launching in M79 for all the platforms.&#8221; <i>M79<\/i> refers to Chrome 79, the year&#8217;s last upgrade, set to release Dec. 10.<\/p>\n<p>The current Chrome Beta build will warn the user when he or she enters a username + password combination that&#8217;s been identified as among those revealed by a data breach. The feature is slated to ship with Chrome 79, due to launch Dec. 10.<\/p>\n<p>If Mozilla stays with its plan, Firefox will have a hacked-password alert system of its own before that.<\/p>\n<p>Firefox 70, scheduled to release Oct. 22, will <a href=\"https:\/\/www.computerworld.com\/article\/3410877\/mozilla-to-add-password-manager-hack-alert-to-firefox-70.html\">integrate two formerly separate functions<\/a> &#8211; Firefox Monitor, a password alert service, and the Lockwise password manager &#8211; that will complete a swath of tasks, including identifying victimized accounts and guiding users through changes to leaked passwords.<\/p>\n<p>Firefox Monitor, which <a href=\"https:\/\/www.computerworld.com\/article\/3321749\/firefox-adds-in-browser-notification-of-breached-sites.html\">Mozilla introduced in November 2018<\/a>, relies on a partnership with the <a href=\"https:\/\/haveibeenpwned.com\/\" rel=\"noopener nofollow\" target=\"_blank\"><i>Have I Been Pwned?<\/i><\/a> site and service.<\/p>\n<p>The source of Google&#8217;s leak information is unclear, but it would be less likely than, say, Mozilla, to rely on outside help.<\/p>\n<p>Not surprisingly given Google&#8217;s emphasis on enterprise management of late, a group policy &#8211; <i> PasswordLeakDetectionEnabled<\/i> will be available at launch for IT administrators. Details of the policy&#8217;s settings can be <a href=\"https:\/\/cloud.google.com\/docs\/chrome-enterprise\/policies\/?policy=PasswordLeakDetectionEnabled\" rel=\"noopener nofollow\" target=\"_blank\">found here<\/a>.<\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3444237\/google-launches-leaked-password-checker-will-bake-it-into-chrome-in-december.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2018\/07\/chrome_browser_logos_by_gerd_altmann_cc0_via_pixabay_1200x800-100765584-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Gregg Keizer| Date: Fri, 04 Oct 2019 04:06:00 -0700<\/strong><\/p>\n<article>\n<section class=\"page\">\n<p>Google has launched a web-based hacked-password checker, part of its efforts to bake an alert system into Chrome.<\/p>\n<p>Called &#8220;Password Checker,&#8221; the service examines the username-password combinations stored in Chrome&#8217;s own password manager and reports back on those authentication pairings that have been exposed in publicly-known data breaches.<\/p>\n<aside class=\"fakesidebar\"><strong>[ Further reading: <a href=\"https:\/\/www.computerworld.com\/article\/3261009\/web-browsers\/googles-chromium-browser-explained.html\">Google&#8217;s Chromium browser explained<\/a> ]<\/strong><\/aside>\n<p>The web version can be found at <a href=\"https:\/\/passwords.google.com\/\" rel=\"noopener nofollow\" target=\"_blank\"><i>passwords.google.com<\/i>&lt;<\/a>&gt;, the umbrella site for Chrome users who run the browser after logging in with their Google account, then use that to synchronize data &#8211; including passwords &#8211; between copies of Chrome on different devices.<\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3444237\/google-launches-leaked-password-checker-will-bake-it-into-chrome-in-december.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[12014,10699,11122,1670,714],"class_list":["post-16496","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-browsers","tag-chrome","tag-firefox","tag-google","tag-security"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16496","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=16496"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16496\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=16496"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=16496"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=16496"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}