At the beginning of the current year, Google (Google) introduced a new Chrome browser extension (Chrome), which checks if a user’s password has been leaked as part of a data breach and hence dangerous to use. This feature appears to be soon integrated into the browser itself: the password checker is already embedded within the latest browser version, although it is not enabled by default and must be enabled through the settings menu.
After you enable the feature, using a password that appears in the personal data pool that has been leaked to the network will display a password alert and recommendation for changing the password. Google actually crawls a number of repositories – both hers and those operated by outside companies – to see if there is a match between the password chosen by the user and a password that was previously leaked. To prevent any possibility that Google itself may be retaining user passwords without its consent while it is being reviewed, Google has assisted Stanford University cyber experts who have confirmed that user passwords are only being reviewed and not stored in any additional repository.
The password checker also exists in the Chrome version of the Android device, and there’s no denying it will run on iOS devices as well. However, it will probably take several months before this feature comes from the early trial version, to the public version distributed to all users.