# Randomly Generated Passwords # https://pypi.org/project/pwdgen/ ๐Ÿ™‚๐Ÿฅค๐ŸŽณ๐Ÿ’ฝ๐ŸŒ๐ŸŽค๐Ÿ“L๐Ÿ˜ท๐Ÿ˜œ_๐Ÿค‘๐ŸŽฏ๐Ÿฅ›๐Ÿ™ˆ๐ŸŒ‘๐Ÿ’ฌ.,๐ŸŽ๐Ÿคฑ๐Ÿฎ๐Ÿ’—๐ŸŒซ๐Ÿคฐz๐Ÿ“Ž๐Ÿ‘ค๐ŸŽฒcl4๐Ÿ’„๐ŸŽ‡๐Ÿฟ๐Ÿธ๐Ÿš๐Ÿ๐Ÿน๐Ÿ‘ปXb๐Ÿ˜ป๐Ÿ˜—๐Ÿคค๐Ÿ‘–๐Ÿšฟ๐Ÿ™Š๐Ÿ’ป๐Ÿ˜ค # https://passw0rd.me/all/50 # pool size: 804 # possible combinations: 2e+145 # equivalent alphanumeric password length: 81.0 # this password would be compromised by # - a botnet* in: 1e+129 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds vastly-fantasy-stubbed-ransack-excretory-fritter # https://passw0rd.me/eff-passphrase/6 # pool size: 7776 # possible combinations: 2e+23 # equivalent alphanumeric password length: 13.0 # this password would be compromised by # - a botnet* in: 1e+7 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds rT']eHKyYVz2,d$UB}K>&z|fxF6"$xF):tel>^Ipx3;^Vv^l/| # https://passw0rd.me/ascii/50 # pool size: 94 # possible combinations: 5e+98 # equivalent alphanumeric password length: 55.0 # this password would be compromised by # - a botnet* in: 3e+82 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds QrsiS9Z9ITTDwVKzjowikVTExWvQvXFpnfDMMtfchfqLN6cSbJ # https://passw0rd.me/alphanumeric/50 # pool size: 62 # possible combinations: 4e+89 # equivalent alphanumeric password length: 50.0 # this password would be compromised by # - a botnet* in: 3e+73 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds ๐ŸŽ…๐Ÿš๐ŸŒฏ๐Ÿน๐Ÿ”๐Ÿš๐Ÿ‘”๐Ÿฃ๐Ÿ’จ๐Ÿšฝ๐Ÿ‘’๐Ÿช๐ŸŸ๐Ÿ“†๐Ÿ‘ณ๐Ÿฅ๐Ÿ‘ผ๐ŸŽน๐Ÿคน๐ŸŒ ๐Ÿ‘Ž๐Ÿš๐Ÿš„๐Ÿšž๐Ÿ™๐Ÿ™๐Ÿ—๐ŸŽŠ๐ŸŽฌ๐Ÿถ๐Ÿคน๐ŸŽญ๐Ÿค™๐Ÿšน๐Ÿคฃ๐Ÿ’‹๐Ÿถ๐ŸŒฆ๐Ÿœ๐Ÿ˜ž๐Ÿฅ’๐ŸŽฐ๐Ÿ™‰๐Ÿ‘ป๐Ÿ˜ฏ๐Ÿ’ฐ๐Ÿฎ๐Ÿš๐Ÿ†๐Ÿ‘Ž # https://passw0rd.me/emoji/50 # pool size: 710 # possible combinations: 4e+142 # equivalent alphanumeric password length: 79.5 # this password would be compromised by # - a botnet* in: 2e+126 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds * Assuming 1 trillion MD5 hashes/second. http://dreamersion.com/research-papers/usage-of-botnets-for-high-speed-md5-hash-cracking/