# Randomly Generated Passwords # https://pypi.org/project/pwdgen/ ๐Ÿ’ฟ๐Ÿ“œ๐Ÿฅ‡k๐Ÿ“™๐Ÿถ๐Ÿ˜š๐Ÿคก๐Ÿ’”l๐Ÿ˜ฆ๐Ÿ“ถ๐Ÿก๐Ÿ“ฎ๐Ÿ๐Ÿค๐Ÿ‘ฉ๐Ÿˆ๐ŸŸ๐Ÿ’˜๐Ÿ‘ฉ๐Ÿ˜ต๐Ÿ—๐Ÿคจ๐Ÿšฃ๐Ÿณ๐Ÿคญ๐Ÿš„๐Ÿ˜ต๐Ÿ‚8๐Ÿ‘“๐Ÿ˜•๐Ÿท๐Ÿฅš๐Ÿ’งak๐Ÿ‘š๐Ÿฉ๐Ÿ„[5x๐Ÿช๐ŸŒชQ๐ŸŽ’๐ŸŽ‹๐Ÿ† # https://passw0rd.me/all/50 # pool size: 804 # possible combinations: 2e+145 # equivalent alphanumeric password length: 81.0 # this password would be compromised by # - a botnet* in: 1e+129 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds virus-squeeze-scalding-wafer-pursuant-germproof # https://passw0rd.me/eff-passphrase/6 # pool size: 7776 # possible combinations: 2e+23 # equivalent alphanumeric password length: 13.0 # this password would be compromised by # - a botnet* in: 1e+7 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds VRF~J`bV^K@=aoik7Lu7;L2Rv].LmDX-*p5Ub!/AB[!Cm1pc!w # https://passw0rd.me/ascii/50 # pool size: 94 # possible combinations: 5e+98 # equivalent alphanumeric password length: 55.0 # this password would be compromised by # - a botnet* in: 3e+82 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds JxAzmofdUNpO6V4cMh35P1HmL69HOsk91Zal3gDkCVuZ6sHRxL # https://passw0rd.me/alphanumeric/50 # pool size: 62 # possible combinations: 4e+89 # equivalent alphanumeric password length: 50.0 # this password would be compromised by # - a botnet* in: 3e+73 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds ๐Ÿ“ƒ๐ŸŽŸ๐ŸŒฐ๐ŸŽ’๐Ÿ™‹๐Ÿ˜น๐Ÿ‘ธ๐Ÿ‘›๐Ÿ“ญ๐Ÿ‘Ž๐Ÿฅ—๐Ÿ‘น๐Ÿ“๐ŸŒ˜๐Ÿ˜ซ๐Ÿก๐Ÿน๐Ÿ„๐ŸŒฝ๐Ÿญ๐Ÿ˜ง๐Ÿช๐Ÿท๐Ÿญ๐Ÿฌ๐Ÿ€๐Ÿ˜ก๐Ÿผ๐Ÿฅง๐Ÿ๐Ÿ˜ผ๐Ÿ’‘๐Ÿ“ฎ๐ŸŸ๐Ÿˆ๐ŸŽฃ๐Ÿ’•๐Ÿฉ๐ŸŒซ๐ŸŽบ๐Ÿ˜–๐ŸŒ๐Ÿป๐ŸคŸ๐Ÿ“’๐Ÿ“ง๐ŸŒฅ๐Ÿ’˜๐ŸŽ๐Ÿ“œ # https://passw0rd.me/emoji/50 # pool size: 710 # possible combinations: 4e+142 # equivalent alphanumeric password length: 79.5 # this password would be compromised by # - a botnet* in: 2e+126 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds * Assuming 1 trillion MD5 hashes/second. http://dreamersion.com/research-papers/usage-of-botnets-for-high-speed-md5-hash-cracking/