# Randomly Generated Passwords # https://pypi.org/project/pwdgen/ πŸ’ŽπŸš›0O5πŸ˜•πŸ™πŸ₯˜πŸ™ˆπŸ­πŸ›πŸ°πŸ˜¬πŸ’–:πŸ€›πŸŒπŸ‘¬πŸš¬πŸŒ…πŸ„πŸ“£πŸ‘ŸπŸ€”πŸ“΄πŸ€πŸ’›~πŸ₯–πŸ˜ πŸ€·πŸ‘„πŸ™‚πŸŽ³E🌍🌩πŸ₯¦πŸ‘πŸ‰πŸ–πŸ€•πŸ’¦πŸ€ΆπŸŽ‡πŸŒ°πŸ‰πŸ“yπŸ˜™ # https://passw0rd.me/all/50 # pool size: 804 # possible combinations: 2e+145 # equivalent alphanumeric password length: 81.0 # this password would be compromised by # - a botnet* in: 1e+129 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds oozy-struck-happiness-scallop-angles-poker # https://passw0rd.me/eff-passphrase/6 # pool size: 7776 # possible combinations: 2e+23 # equivalent alphanumeric password length: 13.0 # this password would be compromised by # - a botnet* in: 1e+7 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds ~KuJD#b*6b5Z+<\nojodN^3O;l&)=pd99qW>++c0{1`e3fiLO@ # https://passw0rd.me/ascii/50 # pool size: 94 # possible combinations: 5e+98 # equivalent alphanumeric password length: 55.0 # this password would be compromised by # - a botnet* in: 3e+82 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds QMlx5OLdJliyTESsgd540POsWIcf7f3VT9MbP5of0yp9reGb3O # https://passw0rd.me/alphanumeric/50 # pool size: 62 # possible combinations: 4e+89 # equivalent alphanumeric password length: 50.0 # this password would be compromised by # - a botnet* in: 3e+73 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds πŸŸπŸ˜“πŸ˜œπŸŽ’πŸ’‘πŸ€•πŸ₯˜πŸ“€πŸ§πŸ™ˆπŸ“žπŸš…πŸ’’πŸ€™πŸŽ¨πŸ‘’πŸ°πŸ’΅πŸŒ»πŸ˜¬πŸ‘›πŸ™‹πŸšΎπŸŒ˜πŸ“’πŸ’ŠπŸ˜ŸπŸ˜πŸ˜“πŸ’‘πŸŽπŸ“ πŸŒ²πŸ«πŸ²πŸ“ΆπŸ’•πŸšΆπŸŽ·πŸ’―πŸ’°πŸ’‚πŸŒ‹πŸšΉπŸ§πŸ˜€πŸ“§πŸ’°πŸ‚πŸ’± # https://passw0rd.me/emoji/50 # pool size: 710 # possible combinations: 4e+142 # equivalent alphanumeric password length: 79.5 # this password would be compromised by # - a botnet* in: 2e+126 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds * Assuming 1 trillion MD5 hashes/second. http://dreamersion.com/research-papers/usage-of-botnets-for-high-speed-md5-hash-cracking/