Closed Bug 1586852 Opened 6 years ago Closed 6 years ago

Indicate re-use of breached passwords in about:logins (Lockwise management interface)

Categories

(User Experience Design Graveyard :: Firefox Desktop: Project Request, enhancement, P1)

enhancement
Points:
8

Tracking

(Not tracked)

RESOLVED FIXED

People

(Reporter: ssage, Assigned: kcaldwell)

Details

Lockwise (via Monitor) will inform Firefox users where they have reused a potentially compromised password: https://bugzilla.mozilla.org/show_bug.cgi?id=1569848

This effort intends to weave together the known breach impact (this one domain was breached and your password was leaked) and the implications that breach has for other online accounts (and you’ve used this same leaked password on these 6 other websites). And deliver a personalized, holistic view of one’s online accounts with their own saved login data.

Request Description
This is a request for UX (the overall experience) and the visual design (the UI parts). The exploration here goes beyond the breach alerts and vulnerable passwords to include 'duplicate passwords' and potentially 'weak passwords' so that our approach has room to scale.

Deadline
To meet the 72 timeline, design work needs to be complete around the week of 10/15. I'll work on getting a more specific date.

Priority Level
2 = Medium

Note well: this is your prioritization, not the priority set by the triage owner for this ticket

Priority Level Description
This aligns to the Lockwise & Monitor Q4 OKRs to "Build 'vulnerable' passwords feature in Firefox" -- to enable engaged users to take proactive steps to improve their digital hygiene.

Supporting Information
(Links to any assets or previous research relevant to this project.)

Assignee: nobody → kcaldwell
Status: NEW → ASSIGNED
Points: --- → 8
Priority: -- → P2
Priority: P2 → P1

Status: UX specs complete. Pending Engineering resource

Status: ASSIGNED → RESOLVED
Closed: 6 years ago
Resolution: --- → FIXED
You need to log in before you can comment on or make changes to this bug.