# Randomly Generated Passwords # https://pypi.org/project/pwdgen/ ๐Ÿ‘๐Ÿ‘ก๐Ÿ“Œ๐Ÿฅ‡๐Ÿ˜“i๐Ÿค“๐Ÿš๐Ÿ“ญ๐Ÿซ๐Ÿช๐Ÿคซ๐ŸŽฅ๐ŸŒ ๐Ÿ“Ž๐ŸŒน๐Ÿšฃ๐ŸŒ๐ŸŽ‹๐ŸŽ‹๐Ÿ˜คh๐Ÿ‘ซ๐Ÿ‡G๐Ÿšฎ๐Ÿ“‚๐Ÿ‘›Z๐Ÿ™Œ๐Ÿ˜˜๐Ÿ’ญ๐Ÿ„๐ŸŽง๐ŸŒ—๐Ÿ›„๐Ÿ’ธ๐ŸŒช๐Ÿ’–๐Ÿ˜ช๐Ÿ‘”๐Ÿฟ๐ŸŽน๐Ÿฅš๐Ÿ“๐Ÿคš๐Ÿซ๐Ÿ‘ช๐Ÿ’’๐Ÿคจ # https://passw0rd.me/all/50 # pool size: 804 # possible combinations: 2e+145 # equivalent alphanumeric password length: 81.0 # this password would be compromised by # - a botnet* in: 1e+129 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds mardi-cheesy-xerox-desktop-carpenter-deftly # https://passw0rd.me/eff-passphrase/6 # pool size: 7776 # possible combinations: 2e+23 # equivalent alphanumeric password length: 13.0 # this password would be compromised by # - a botnet* in: 1e+7 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds PQZho,o#p3BHTd!HYnT9CMIemi89lg7!:_5}~EV]IoMgtRz"t$ # https://passw0rd.me/ascii/50 # pool size: 94 # possible combinations: 5e+98 # equivalent alphanumeric password length: 55.0 # this password would be compromised by # - a botnet* in: 3e+82 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds abOYLXele5XHym78ppPWQgwCLjBu1pDSwI3c1WLJLuebwZiTSt # https://passw0rd.me/alphanumeric/50 # pool size: 62 # possible combinations: 4e+89 # equivalent alphanumeric password length: 50.0 # this password would be compromised by # - a botnet* in: 3e+73 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds ๐Ÿฅค๐Ÿฌ๐Ÿคต๐Ÿ๐ŸŽท๐Ÿšช๐Ÿ’‡๐Ÿณ๐Ÿ“Š๐Ÿฏ๐Ÿน๐Ÿ›๐Ÿ‘ญ๐Ÿ’ผ๐Ÿ“ˆ๐ŸŽ๐Ÿ‘ท๐Ÿ›๐Ÿ’ฝ๐Ÿ‘‡๐Ÿ’˜๐ŸŒ๐Ÿฌ๐Ÿ™Œ๐ŸŒ™๐Ÿ’น๐Ÿ™‡๐ŸŽพ๐Ÿ“’๐Ÿ‘ ๐ŸŽณ๐Ÿš”๐Ÿ“š๐Ÿ“ซ๐Ÿช๐ŸŽ‚๐Ÿ˜๐Ÿ˜ถ๐Ÿฐ๐ŸŽฆ๐Ÿฅง๐Ÿš˜๐Ÿ๐ŸŒซ๐Ÿ‘”๐ŸŒ†๐Ÿ˜ต๐Ÿš‰๐Ÿ˜๐Ÿค™ # https://passw0rd.me/emoji/50 # pool size: 710 # possible combinations: 4e+142 # equivalent alphanumeric password length: 79.5 # this password would be compromised by # - a botnet* in: 2e+126 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds * Assuming 1 trillion MD5 hashes/second. http://dreamersion.com/research-papers/usage-of-botnets-for-high-speed-md5-hash-cracking/