# Randomly Generated Passwords # https://pypi.org/project/pwdgen/ :πŸ“”WπŸ€πŸ’€πŸ’½PπŸ˜‘πŸŒΌπŸ›€πŸ€wπŸ₯šπŸ₯πŸ˜₯πŸŽͺπŸ™‚πŸΈπŸš‘πŸ’¦πŸ“ˆ|πŸŽ€πŸŒΈπŸ˜πŸ‘„πŸ“†πŸ™ŒπŸ“€πŸŒŒπŸ“{πŸšœπŸˆπŸƒπŸ“ŠπŸ€™πŸ˜ πŸ‚πŸš­πŸ™„πŸŒ“πŸΎπŸ“²πŸ˜»πŸΌπŸš«πŸšœπŸš›πŸ² # https://passw0rd.me/all/50 # pool size: 804 # possible combinations: 2e+145 # equivalent alphanumeric password length: 81.0 # this password would be compromised by # - a botnet* in: 1e+129 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds ozone-headwear-willed-vastness-citadel-grumpily # https://passw0rd.me/eff-passphrase/6 # pool size: 7776 # possible combinations: 2e+23 # equivalent alphanumeric password length: 13.0 # this password would be compromised by # - a botnet* in: 1e+7 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds /D:o9SUM;qq&TG?X@F@gy9A~_FVcB:&V\-,/Z7u'.gKIP;S>Z{ # https://passw0rd.me/ascii/50 # pool size: 94 # possible combinations: 5e+98 # equivalent alphanumeric password length: 55.0 # this password would be compromised by # - a botnet* in: 3e+82 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds ME7QDkWwz5vYXKBYC7iNr07y6tlPqVVDjUuu9nwGS1pYOJDgAL # https://passw0rd.me/alphanumeric/50 # pool size: 62 # possible combinations: 4e+89 # equivalent alphanumeric password length: 50.0 # this password would be compromised by # - a botnet* in: 3e+73 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds πŸŒ„πŸΌπŸ˜ΌπŸ’―πŸŽ’πŸŒ‹πŸŽ¬πŸŒ’πŸ’­πŸ“΅πŸ“΅πŸŒ‘πŸ’«πŸ€›πŸš”πŸŒ‘πŸ˜›πŸΏπŸ€¬πŸ€¬πŸ«πŸŸπŸšΊπŸŒΎπŸ˜’πŸ‘žπŸ˜“πŸšπŸ«πŸ₯πŸ€πŸŽ―🌎🀝🀷πŸ₯‹πŸΌπŸ‘–πŸ‘–πŸŽˆπŸ€¨πŸ™‰πŸ˜˜πŸ‘πŸ‘ͺπŸš„πŸ“ΉπŸ¦πŸ₯🐳 # https://passw0rd.me/emoji/50 # pool size: 710 # possible combinations: 4e+142 # equivalent alphanumeric password length: 79.5 # this password would be compromised by # - a botnet* in: 2e+126 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds * Assuming 1 trillion MD5 hashes/second. http://dreamersion.com/research-papers/usage-of-botnets-for-high-speed-md5-hash-cracking/