Chrome v86 Will Now Inform Users About Their Compromised Passwords
Chrome v86 Will Now Inform Users About Their Compromised Passwords

Out of many notable improvements and bug fixes that Chrome v86 came up with, one notable feature is the password compromise intimation. This works by Google taking your credentials in an encrypted form, and checking them against earlier breaches to let you know about if it’s compromised or not.

Google Will Let You Know About Password Compromises

Google has already rolled out a feature to let users know whether their saved passwords are compromised or not. While this is available in the desktop Chrome, it’s now rolling to Android and iOS clients with the launch of Chrome v86. This new version brings a range of improvements and some notable features.

One such feature is the password compromise intimation, where Google will now inform the Android and iOS users whether their saved passwords were compromised or not. To make this possible, the Chrome browser will send the saved credentials in an encrypted form to Google, where it will check them against a dataset obtained from several security breaches.

And if any of the credentials found to be matching with the leaked dataset, it will notify the user to change them immediately. Also, it will direct the user to the concerned website’s password change page to change them. This is good since google directs to the offical pages, instead of users manually searching them and falling for fake pages sometimes.

Also, it’s introducing a biometric authentication for Chrome autofill passwords in the iOS client, making it more secure. Users can enable this authentication to other ios apps too via iPhone settings. Android users also get yet another feature from its desktop counterpart – Enhanced Safe Browsing.

Under this, Chrome will share the realtime data with Google to make sure there are no malwares on the site, thus offering safe browsing. These new features come with Chrome’s new v86, that can be downloaded here – Android | iOS.

LEAVE A REPLY

Please enter your comment!
Please enter your name here