if you use different passwords then it doesn't matter that they're "weak." the "strength" of a password only matters for brute forcing or decrypting. brute forcing doesn't really happen for a lot of reasons. if they're decrypting your password then they have access to your database which is probably a bigger problem than your "weak password." password security is a joke and poorly understood by everybody who makes the rules. the "strong password" requirements make people use the same "strong" passwords everywhere, which is a much bigger vulnerability than letting people use "weak" but memorable passwords.
if you use different passwords then it doesn't matter that they're "weak." the "strength" of a password only matters for brute forcing or decrypting. brute forcing doesn't really happen for a lot of reasons. if they're decrypting your password then they have access to your database which is probably a bigger problem than your "weak password."
password security is a joke and poorly understood by everybody who makes the rules. the "strong password" requirements make people use the same "strong" passwords everywhere, which is a much bigger vulnerability than letting people use "weak" but memorable passwords.
I apologize for the confusion. We report on specifically passwords that are on a breach list. Not weak passwords.