Proton Pass (2025) Review: Finally, long tall

Photo of author

By [email protected]


You can rename your acceptance, but you can also set one of dozens of icons, as well as choose from a handful of colored preconception. It is a small addition, but a little color coding has a long way to find what you need at a glance.

Beyond Logins, you can also create and store borrowed names, similar to NordPass. It is a standard feature, even if it is not subscribed. Free users are crowned with 10 borrowed names, while users can pay the largest possible number.

It is not just a fake email associated with a real weapon. You can prepare such borrowed names, but Proton allows you to redirect emails to multiple addresses, create attractive addresses, and even respond directly from the web application. I can record the activity more, though. Proton automatically creates contacts for everyone who interacts with the pseudonym, and you can block random mail addresses without opening your email customer.

There is no desktop application

Proton Pass, which finally stands tall

Proton Pass via Jacob Roche

Proton Pass was originally available as a browser accessory, but now it contains Windows and MacOS and Linux applications, as long as you are in a Fedora or Debian distribution. I have mainly used a pass in the browser, not only because it is suitable but also because the extension is available in almost everything-the browser-based browsers, and there are separate extensions for Firefox, Safari and Brave.

The browser app contains everything you need, and it works when it comes to capturing the password and an automatic file. Proton sometimes asked me to memorize a password for the second time after refusing to take a notice at the beginning. But outside this small hiccup, I did not have any problem with the automatic filling of the forms, login or credit cards.

Inside the application, you have some features that are not available through the extension. The main feature is the Pass Corridor, which is the Proton Security Watchdog feature. It will show you weak passwords and calculations where you can enable 2FA, decisively, the accounts that were victims to violate the data. If you want to go further, you can Run Proton Sentinelalso.

The traffic controller is great, but the breach notifications have a problem. By default, Proton only monitors the email associated with your proton account. If you import passwords from another application, as you did, you have different email messages, this is not part of the default monitoring. And the proton does not tell you that. You should click on the breach details and add addresses manually.

Proton Pass, which finally stands tall

Proton Pass via Jacob Roche



https://media.wired.com/photos/68d7849fbb70db14f7003f81/191:100/w_1280,c_limit/proton-pass-monitor.png

Source link

Leave a Comment