# Randomly Generated Passwords # https://pypi.org/project/pwdgen/ ๐ŸŽง๐Ÿ“ฌ๐Ÿ˜Ÿ๐ŸŒถ๐Ÿ‡a4๐Ÿค“๐Ÿ˜ช๐Ÿ˜…๐Ÿ›๐Ÿ›๐ŸŽ…๐Ÿต๐Ÿฐ1๐Ÿชu๐ŸŽฑ๐Ÿ๐Ÿ–๐Ÿคฌ๐Ÿ‘๐ŸŽก๐Ÿ™๐Ÿฅก๐Ÿ‘ฟ๐Ÿ‹๐Ÿ˜ ๐Ÿฅ"๐Ÿ’๐Ÿคž๐Ÿšฟ๐Ÿ˜ดw๐Ÿธ๐Ÿฉ๐Ÿ’ผ๐Ÿ“ญ๐Ÿ’ช๐Ÿ’ฃ๐ŸŒ๐Ÿฅ‘๐Ÿคจ๐Ÿคน๐Ÿ‘ง๐Ÿค˜๐Ÿจ๐Ÿ“‰ # https://passw0rd.me/all/50 # pool size: 804 # possible combinations: 2e+145 # equivalent alphanumeric password length: 81.0 # this password would be compromised by # - a botnet* in: 1e+129 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds chute-evaluate-photo-creamer-stammer-splendor # https://passw0rd.me/eff-passphrase/6 # pool size: 7776 # possible combinations: 2e+23 # equivalent alphanumeric password length: 13.0 # this password would be compromised by # - a botnet* in: 1e+7 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds ex7#Uhv10R[Zt6L?C&4D(5|Gb7Ye:q[:NFGd]_O-Rc#iN!!WW6 # https://passw0rd.me/ascii/50 # pool size: 94 # possible combinations: 5e+98 # equivalent alphanumeric password length: 55.0 # this password would be compromised by # - a botnet* in: 3e+82 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds twF67Hw1AiL3cjWLomxVLZTQRICfwBF0HC1YGQeotfVgsRz4p4 # https://passw0rd.me/alphanumeric/50 # pool size: 62 # possible combinations: 4e+89 # equivalent alphanumeric password length: 50.0 # this password would be compromised by # - a botnet* in: 3e+73 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds ๐Ÿง๐Ÿ‘ซ๐Ÿšฐ๐Ÿšƒ๐ŸŒด๐Ÿ’ญ๐Ÿ“ช๐Ÿšณ๐Ÿฅ ๐Ÿ’จ๐Ÿ˜ฅ๐ŸŒฆ๐Ÿคฏ๐Ÿ“๐Ÿ›ƒ๐ŸŒ‰๐Ÿ”๐Ÿ“›๐Ÿ‘ช๐Ÿคญ๐Ÿ‘ฉ๐Ÿ˜€๐Ÿคš๐ŸŒ–๐ŸŒŒ๐Ÿข๐ŸŽพ๐Ÿ™๐Ÿ’ถ๐ŸŒฆ๐Ÿšด๐Ÿ‘ฝ๐Ÿข๐Ÿ“Œ๐ŸŽ‡๐Ÿ˜ฉ๐Ÿ“„๐Ÿช๐Ÿฆ๐ŸฅŸ๐ŸŒ‡๐Ÿฅ ๐ŸŽด๐Ÿ‘–๐Ÿ’›๐Ÿšฎ๐Ÿ‰๐Ÿ™๐Ÿ“ฐ๐Ÿฆ # https://passw0rd.me/emoji/50 # pool size: 710 # possible combinations: 4e+142 # equivalent alphanumeric password length: 79.5 # this password would be compromised by # - a botnet* in: 2e+126 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds * Assuming 1 trillion MD5 hashes/second. http://dreamersion.com/research-papers/usage-of-botnets-for-high-speed-md5-hash-cracking/