# Randomly Generated Passwords # https://pypi.org/project/pwdgen/ πŸ€“πŸ¦πŸ§πŸ‘†πŸ―πŸˆπŸ‘ΊπŸ«πŸ₯œπŸˆπŸ‘ŽPUπŸ’’πŸ€”πŸ’‹πŸŽ«πŸšπŸŒͺ🎣πŸŽ₯πŸ‘¨πŸ°πŸ‘”kπŸŒ†πŸŽπŸ‘πŸ―πŸ˜–πŸšΉπŸ“ͺdπŸ’΄πŸ“œπŸ‘±πŸšΌπŸ‘‚πŸŒ₯πŸ“ΊπŸπŸš)πŸ˜°πŸ‘ŒπŸ«πŸ™ŽπŸ¦πŸ‹πŸŽΈ # https://passw0rd.me/all/50 # pool size: 804 # possible combinations: 2e+145 # equivalent alphanumeric password length: 81.0 # this password would be compromised by # - a botnet* in: 1e+129 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds ipod-slicer-unspoiled-worshiper-bounce-blemish # https://passw0rd.me/eff-passphrase/6 # pool size: 7776 # possible combinations: 2e+23 # equivalent alphanumeric password length: 13.0 # this password would be compromised by # - a botnet* in: 1e+7 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds j"bp9I*x"//GU!q)S'(Ka"`8qcuy#)gaE+/8h/.9?<"wTD[F;6 # https://passw0rd.me/ascii/50 # pool size: 94 # possible combinations: 5e+98 # equivalent alphanumeric password length: 55.0 # this password would be compromised by # - a botnet* in: 3e+82 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds TKy9uSEZweXzrQidGjOymZH2VatC4dbamI833mKFrB74RDVtUm # https://passw0rd.me/alphanumeric/50 # pool size: 62 # possible combinations: 4e+89 # equivalent alphanumeric password length: 50.0 # this password would be compromised by # - a botnet* in: 3e+73 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds πŸ›‚πŸ˜€πŸ«πŸŒ†πŸŽ’πŸ“πŸ₯œπŸ“‚πŸ’ΌπŸŒŠπŸ’ΈπŸƒπŸ’ΎπŸ’žπŸ₯”πŸš˜πŸ§πŸˆπŸš‹πŸ™πŸ‘•πŸžπŸ˜šπŸ˜ŸπŸ€”πŸ›πŸ•πŸ€›πŸ‰πŸ˜’πŸ•πŸ‰πŸŒΎπŸ’³πŸ’šπŸŽ πŸŽ°πŸ’―πŸŒπŸ£πŸ’ŠπŸŽΈπŸ’ΈπŸ’ͺπŸšΊπŸ‘•πŸŽ½πŸ”πŸπŸ΅ # https://passw0rd.me/emoji/50 # pool size: 710 # possible combinations: 4e+142 # equivalent alphanumeric password length: 79.5 # this password would be compromised by # - a botnet* in: 2e+126 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds * Assuming 1 trillion MD5 hashes/second. http://dreamersion.com/research-papers/usage-of-botnets-for-high-speed-md5-hash-cracking/