# Randomly Generated Passwords # https://pypi.org/project/pwdgen/ ๐Ÿ˜ป<๐Ÿค๐Ÿš ๐ŸŽญ๐Ÿš“๐Ÿคง๐Ÿฆ๐Ÿš…๐ŸŽฟ๐Ÿ€๐ŸŽ๐Ÿ๐Ÿ˜๐Ÿ“๐ŸŒฑ๐Ÿ’๐Ÿฅ๐ŸšŒ๐ŸŽณ๐ŸŒŽ๐ŸŸ๐Ÿ†๐Ÿšฃ๐Ÿ๐Ÿ“ก๐Ÿฅˆ๐Ÿค๐Ÿ“Ž๐ŸŽดjF๐Ÿฅ”๐Ÿ’ณ๐Ÿฉ๐Ÿš•[๐Ÿš–๐Ÿš„๐Ÿ˜๐Ÿ“ง๐Ÿฅ๐ŸŽซ๐ŸŒ’๐Ÿšญ๐Ÿ˜‘๐Ÿ“ถc๐Ÿ–๐Ÿ“ฅ # https://passw0rd.me/all/50 # pool size: 804 # possible combinations: 2e+145 # equivalent alphanumeric password length: 81.0 # this password would be compromised by # - a botnet* in: 1e+129 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds tastiness-kite-talcum-spruce-whooping-dolphin # https://passw0rd.me/eff-passphrase/6 # pool size: 7776 # possible combinations: 2e+23 # equivalent alphanumeric password length: 13.0 # this password would be compromised by # - a botnet* in: 1e+7 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds $,]G!Br9!cZBqMG<^1V8=!I@o/N[}onB2Qt`}lN9'Jx&r6MPjw # https://passw0rd.me/ascii/50 # pool size: 94 # possible combinations: 5e+98 # equivalent alphanumeric password length: 55.0 # this password would be compromised by # - a botnet* in: 3e+82 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds lwRV3rNVoTNPKBsOYOQatTy4ksNRG6v5BuY0YeWCgrFeYAZB6V # https://passw0rd.me/alphanumeric/50 # pool size: 62 # possible combinations: 4e+89 # equivalent alphanumeric password length: 50.0 # this password would be compromised by # - a botnet* in: 3e+73 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds ๐ŸŒ•๐Ÿ˜ญ๐Ÿ ๐Ÿ‘‚๐Ÿ“ก๐ŸŒถ๐Ÿจ๐Ÿ™Œ๐Ÿฒ๐ŸŒฅ๐Ÿคœ๐Ÿ’•๐Ÿ˜ฅ๐ŸŒž๐Ÿณ๐Ÿฅฅ๐Ÿ‘‘๐Ÿ–๐Ÿค•๐Ÿ’’๐Ÿ‘บ๐Ÿ“๐ŸŒ๐Ÿ™๐ŸŽค๐Ÿšš๐Ÿ˜Œ๐Ÿ‘Š๐Ÿป๐Ÿ“ณ๐Ÿ€๐ŸŽ๐Ÿ˜๐ŸŽž๐Ÿฅ˜๐Ÿถ๐Ÿ’ซ๐Ÿคฅ๐Ÿ˜†๐Ÿ˜๐ŸŽ๐ŸŒ‰๐ŸŽฎ๐Ÿคน๐Ÿ€๐Ÿš˜๐Ÿ๐ŸŽ‹๐Ÿ๐Ÿค” # https://passw0rd.me/emoji/50 # pool size: 710 # possible combinations: 4e+142 # equivalent alphanumeric password length: 79.5 # this password would be compromised by # - a botnet* in: 2e+126 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds * Assuming 1 trillion MD5 hashes/second. http://dreamersion.com/research-papers/usage-of-botnets-for-high-speed-md5-hash-cracking/