Hi guys... bad guys phished my personal data from a government agency and I was extended use of free a monitoring service. One element monitored is email addresses, which I configured. Something called the "41Q password repository" apparently contains passwords associated with at least two of my email addresses. The dates of the breach are different for the two email addresses as well, Dec 2017 and Feb 2019. I do not reuse passwords between sites, so with my 300 logins, I have 300 unique passwords for those logins. I also make use of the "+" trick that Gmail offers and where I can, my user ID is MyName+SERVICENAME AT gmail.com. I only configured my basic non-plus email address in the monitoring service, because I didn't want to enter 250 different MyName+SERVICE1-N AT gmail.com email combinations. My googling about this particular 41Q has not turned up much of anything meaningful. The monitoring service remediation recommendation is to change password for all logins using the flagged email address as user ID.
Question to you: is Watchtower integrated with this 41Q password repository? Could you describe the exactly what is being checked (email only, password and email, or password only) if it is?
Because of my use of the Gmail + trick, there are probably more email combinations affected by this issue. Also, since all my passwords are unique, just because my email address appeared, it does not mean a particular service was impacted.
1Password Version: Not Provided
Extension Version: Not Provided
OS Version: Not Provided
Sync Type: Not Provided