# Randomly Generated Passwords # https://pypi.org/project/pwdgen/ ๐Ÿฅ๐ŸŒ๐Ÿ““๐Ÿฅฌ๐Ÿ“‘๐Ÿƒ[๐Ÿฅง๐Ÿ˜—๐Ÿ“Ÿ>nd๐ŸŒu๐Ÿ“ทY๐Ÿข๐Ÿทq๐ŸŽพ๐Ÿฅ๐ŸŸ๐Ÿ˜™g๐Ÿคธ๐Ÿ“ญ๐Ÿ˜บ๐Ÿฅœ๐Ÿคด๐Ÿ…๐Ÿ’ƒ?๐Ÿ‘‚E๐Ÿ˜จ๐Ÿš‚๐Ÿ–๐Ÿฅญ๐Ÿคฏ๐Ÿšˆ๐ŸŒƒ๐Ÿจ๐ŸŽ’๐Ÿ™Ž8๐Ÿ““๐Ÿ‘ฆ๐Ÿšณ๐ŸšŸ # https://passw0rd.me/all/50 # pool size: 804 # possible combinations: 2e+145 # equivalent alphanumeric password length: 81.0 # this password would be compromised by # - a botnet* in: 1e+129 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds prissy-hurt-engraver-unbounded-barrier-vacate # https://passw0rd.me/eff-passphrase/6 # pool size: 7776 # possible combinations: 2e+23 # equivalent alphanumeric password length: 13.0 # this password would be compromised by # - a botnet* in: 1e+7 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds p$+-_WN)\T1cCicz.)Hj4Iu,65}^)][;cI|+HS'pwm2"j`[w4) # https://passw0rd.me/ascii/50 # pool size: 94 # possible combinations: 5e+98 # equivalent alphanumeric password length: 55.0 # this password would be compromised by # - a botnet* in: 3e+82 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds YlRBcGHxy4zFkCf2v49bwsIjL5gJklHSqhk3JhvsLKFTnj3QPO # https://passw0rd.me/alphanumeric/50 # pool size: 62 # possible combinations: 4e+89 # equivalent alphanumeric password length: 50.0 # this password would be compromised by # - a botnet* in: 3e+73 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds ๐Ÿ‘ญ๐Ÿ๐ŸŽ๐Ÿ’ต๐Ÿšฎ๐Ÿ’ธ๐Ÿ˜“๐Ÿ™€๐Ÿต๐ŸŒฐ๐Ÿ“ข๐Ÿšซ๐Ÿฒ๐Ÿ˜ธ๐Ÿ˜ด๐ŸŠ๐Ÿฅ“๐Ÿ˜™๐Ÿ–๐Ÿ‘ฃ๐Ÿคฃ๐Ÿ˜ฟ๐Ÿธ๐Ÿ‘‹๐Ÿ‘ƒ๐Ÿ˜†๐ŸŒ“๐Ÿค•๐Ÿ‘ ๐Ÿคค๐Ÿ‘ฉ๐Ÿฅข๐Ÿ˜ผ๐Ÿ’”๐Ÿ˜“๐ŸŽช๐Ÿ“ผ๐Ÿ˜Ž๐Ÿ–๐Ÿฅฉ๐ŸŒ‰๐Ÿ˜ ๐Ÿ€๐Ÿ๐Ÿ’๐Ÿ’›๐Ÿ“ฐ๐Ÿ’๐Ÿ‘๐Ÿš’ # https://passw0rd.me/emoji/50 # pool size: 710 # possible combinations: 4e+142 # equivalent alphanumeric password length: 79.5 # this password would be compromised by # - a botnet* in: 2e+126 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds * Assuming 1 trillion MD5 hashes/second. http://dreamersion.com/research-papers/usage-of-botnets-for-high-speed-md5-hash-cracking/