# Randomly Generated Passwords # https://pypi.org/project/pwdgen/ šŸ”šŸšØ^šŸšŒšŸš±šŸ˜”šŸ„ŠšŸ™„šŸ™ŠšŸšŸ˜šŸ“”šŸ’™šŸ’·šŸƒšŸ¤“šŸŒšŸ‹-šŸ“šŸ¤­šŸŽ§šŸ‚šŸ‘­šŸŽ‡šŸš§šŸ„ šŸ¤—šŸ„šŸ™ˆšŸŖšŸ¤¶kšŸŽ²BšŸ·šŸ“ƒšŸ >~šŸ‹šŸŒ—šŸŒ«šŸ“®šŸ¾šŸ¾šŸ¤—šŸ•šŸ’€šŸ‡ # https://passw0rd.me/all/50 # pool size: 804 # possible combinations: 2e+145 # equivalent alphanumeric password length: 81.0 # this password would be compromised by # - a botnet* in: 1e+129 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds cruelty-alarm-dipping-impose-creatable-coastland # https://passw0rd.me/eff-passphrase/6 # pool size: 7776 # possible combinations: 2e+23 # equivalent alphanumeric password length: 13.0 # this password would be compromised by # - a botnet* in: 1e+7 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds ,<))y+Q}95lDT(~9L1MdX7%gQ?#`Q"\;fk(m8Pd4_b&z}%1fs] # https://passw0rd.me/ascii/50 # pool size: 94 # possible combinations: 5e+98 # equivalent alphanumeric password length: 55.0 # this password would be compromised by # - a botnet* in: 3e+82 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds oRskP3lRvvzkJk5DveIpnZoGv8ngAro2jsV5hHwto8iHS7NMdd # https://passw0rd.me/alphanumeric/50 # pool size: 62 # possible combinations: 4e+89 # equivalent alphanumeric password length: 50.0 # this password would be compromised by # - a botnet* in: 3e+73 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds šŸ„šŸ“šŸŒ“šŸ˜»šŸ“šŸ›‚šŸ¤«šŸ˜²šŸ¤ŖšŸ™‡šŸŽšŸŒ‘šŸ¹šŸ˜šŸ‘©šŸ““šŸŽ«šŸ‘¹šŸšŸ‘§šŸ“šŸ›šŸŽ¹šŸ‘ŖšŸ’­šŸ˜·šŸš˜šŸ˜šŸ“·šŸ’ŖšŸŸšŸšµšŸ’«šŸ½šŸššŸ˜»šŸŒšŸœšŸŽšŸ™‡šŸ™šŸ“°šŸ¤‘šŸ‘²šŸ’²šŸ˜žšŸŽ­šŸ¤³šŸ¤–šŸ¤– # https://passw0rd.me/emoji/50 # pool size: 710 # possible combinations: 4e+142 # equivalent alphanumeric password length: 79.5 # this password would be compromised by # - a botnet* in: 2e+126 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds * Assuming 1 trillion MD5 hashes/second. http://dreamersion.com/research-papers/usage-of-botnets-for-high-speed-md5-hash-cracking/