My email was used on a suspicious website that my email may now be in a data breach eventually… I have the password used on this website.
Would it be possible to blacklist this specific password on BitWarden so it doesn’t generate the same password again?
@VicH Welcome to the forum!
Not that I know of.
But for a random password, it would be relatively unlikely to generate the exact same password a second time.
And sooner or later, that password probably will get listed in the list Bitwarden also uses for the data breach check and report.
So, best you can do: check every password you generate:
And use the data breach report from time to time to check all existing passwords in your login items.
That’s quite an understatement! If you use Bitwarden’s generator to generate a 14-character password (using all character classes), the probability of generating any specific 14-character password is only 0.000000000000000000000001% (which is lower than the probability of winning the Mega Millions lottery jackpot three times in a row — with only one ticket purchased each time).
Besides the extreme unlikelihood of generating the same password when using a 14+ character password, you may want to consider using email aliases (or email + addresses) to register for different accounts. Bitwarden does have email alias integration with many providers. If you run into such a situation in the future, you can turn off the alias and more or less forget the whole thing.
It’s obviously better not to register for an account on questionable websites. For that, I find using Scam Advisor to be useful, at least for initially checking the domain age.
Guys, thank you very much for the warnings and tips, I will be more attentive in the future.
And yes I use, even more than 14 character password.
These are the settings I’ve been using since the first time I started using BitWarden.
To maximize the range of your passwords, i.e. password entropy, you may want to consider reducing the “Minimum numbers” parameter to “1”.
Thank you very much. I adjusted the settings ![]()

