# Randomly Generated Passwords # https://pypi.org/project/pwdgen/ šŸ˜‘šŸš»šŸ‘šŸšŸ“„šŸ’œšŸ’¢šŸ˜¬šŸ„œšŸ£šŸŒøšŸŒˆšŸ˜³šŸŒšŸ¤”šŸžšŸ¹šŸ™šŸ«šŸ˜›šŸ„—"šŸ‘øšŸ“²šŸšššŸ’øšŸˆšŸ˜¾šŸ˜«šŸŽøšŸæšŸ‘›šŸ…šŸ˜‹šŸ’²šŸ“ŒšŸŽ„šŸ’•~RšŸšŸ’ˆšŸ’’šŸ°šŸ’“šŸ’°šŸ”šŸŸšŸ¶9 # https://passw0rd.me/all/50 # pool size: 804 # possible combinations: 2e+145 # equivalent alphanumeric password length: 81.0 # this password would be compromised by # - a botnet* in: 1e+129 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds peddling-ducktail-study-euphemism-hardhat-stalling # https://passw0rd.me/eff-passphrase/6 # pool size: 7776 # possible combinations: 2e+23 # equivalent alphanumeric password length: 13.0 # this password would be compromised by # - a botnet* in: 1e+7 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds $PYb)W{COl8K$s}8Gbu@LE'sf?mZn8)?G7Wv,RnEZhJAwU`$%k # https://passw0rd.me/ascii/50 # pool size: 94 # possible combinations: 5e+98 # equivalent alphanumeric password length: 55.0 # this password would be compromised by # - a botnet* in: 3e+82 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds IYieCEgm0haGTuTeVsWPkOcfTIEnVqnm3OmJQ1bCoysL4DXmJt # https://passw0rd.me/alphanumeric/50 # pool size: 62 # possible combinations: 4e+89 # equivalent alphanumeric password length: 50.0 # this password would be compromised by # - a botnet* in: 3e+73 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds šŸ„ššŸ„‘šŸ’ŗšŸ˜ƒšŸ’¤šŸŽ«šŸÆšŸµšŸ“ÆšŸ•šŸ‘’šŸ„®šŸ©šŸš›šŸ šŸ’ŖšŸ¤±šŸ’±šŸ˜ŽšŸš›šŸ„­šŸ’µšŸ„šŸ˜†šŸŒ“šŸŽ‡šŸ™šŸ’‹šŸš•šŸŒ•šŸžšŸ„‰šŸ’·šŸ’¦šŸš½šŸ“ƒšŸ’„šŸšŗšŸšŸ“ššŸ‘®šŸ“²šŸ’šŸ˜šŸšµšŸš®šŸš‹šŸ˜½šŸ˜®šŸ‘› # https://passw0rd.me/emoji/50 # pool size: 710 # possible combinations: 4e+142 # equivalent alphanumeric password length: 79.5 # this password would be compromised by # - a botnet* in: 2e+126 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds * Assuming 1 trillion MD5 hashes/second. http://dreamersion.com/research-papers/usage-of-botnets-for-high-speed-md5-hash-cracking/