# Randomly Generated Passwords # https://pypi.org/project/pwdgen/ πŸ€”πŸ˜“πŸŽ€πŸ„πŸ³πŸ…πŸ’…πŸ™πŸ’πŸ“ f🌭🐺NπŸ₯€@🌜🀹🍣🐴xπŸš–πŸ΅πŸ₯πŸ˜‹{πŸ‘³πŸ˜―πŸ˜ƒCπŸ‘πŸ’¨πŸŽπŸŒ‹πŸšŸ#πŸ‘ƒπŸ€·πŸš΄πŸŽ8🎾R_zπŸŒ‘πŸ‘ΊπŸšπŸ“―πŸ» # https://passw0rd.me/all/50 # pool size: 804 # possible combinations: 2e+145 # equivalent alphanumeric password length: 81.0 # this password would be compromised by # - a botnet* in: 1e+129 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds thermos-gravitate-rebel-unrevised-playful-thinness # https://passw0rd.me/eff-passphrase/6 # pool size: 7776 # possible combinations: 2e+23 # equivalent alphanumeric password length: 13.0 # this password would be compromised by # - a botnet* in: 1e+7 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds aa7UGH'-0"M-G$=SPTaG#E7Io8Crv.A,W/?sF+YOsI2'*^>pMt # https://passw0rd.me/ascii/50 # pool size: 94 # possible combinations: 5e+98 # equivalent alphanumeric password length: 55.0 # this password would be compromised by # - a botnet* in: 3e+82 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds Bk6p9dSpb9ZqmkEZqIqhmRLcbKIj5ZjxnXl9F2lHAE76gtrHgV # https://passw0rd.me/alphanumeric/50 # pool size: 62 # possible combinations: 4e+89 # equivalent alphanumeric password length: 50.0 # this password would be compromised by # - a botnet* in: 3e+73 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds πŸŽŒπŸ£πŸŒ‘πŸ’ŒπŸ‘°πŸ‘€πŸ’‘πŸ’’πŸ˜‘πŸšœπŸŒ‚πŸ€©πŸ™‰πŸ₯’πŸ“˜πŸ’πŸ’œπŸ’ΏπŸ“·πŸŒ©πŸŒ‰πŸ„πŸ€¬πŸ“‚πŸ˜ πŸ‘˜πŸšπŸ‘”πŸ€žπŸ₯πŸ“ŒπŸŒ”πŸ‘ πŸ₯¦πŸ’©πŸŽͺπŸ‘‡πŸš΅πŸŸπŸ–πŸ“£πŸ₯πŸ“ŸπŸ‘πŸ€πŸ½πŸ“£πŸ˜¬πŸ‰πŸŽ # https://passw0rd.me/emoji/50 # pool size: 710 # possible combinations: 4e+142 # equivalent alphanumeric password length: 79.5 # this password would be compromised by # - a botnet* in: 2e+126 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds * Assuming 1 trillion MD5 hashes/second. http://dreamersion.com/research-papers/usage-of-botnets-for-high-speed-md5-hash-cracking/