# Randomly Generated Passwords # https://pypi.org/project/pwdgen/ \jn[πŸ˜†πŸ™πŸŒ€πŸ€­πŸ˜…πŸ˜πŸ˜–πŸ˜²πŸ†πŸŽ²πŸ˜ˆπŸ€¨πŸ€’πŸ’‚πŸ˜žπŸŒ—πŸ°πŸ–πŸ„πŸ€œπŸšπŸš‘πŸ’»πŸ₯🐚🌧@πŸ»πŸ…k{πŸ‘ƒπŸ‘ˆπŸΌπŸŒ¦πŸ€›πŸ€’πŸ˜›πŸ‘ΏπŸG&PπŸ‘ŽπŸ˜ΏπŸ© # https://passw0rd.me/all/50 # pool size: 804 # possible combinations: 2e+145 # equivalent alphanumeric password length: 81.0 # this password would be compromised by # - a botnet* in: 1e+129 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds rebuilt-eject-bacterium-rush-unripe-glue # https://passw0rd.me/eff-passphrase/6 # pool size: 7776 # possible combinations: 2e+23 # equivalent alphanumeric password length: 13.0 # this password would be compromised by # - a botnet* in: 1e+7 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds 2Bp-\)\nV73]$JM\W/joq^d=_o:SYg.MG4[~@n$'dk]eJQWoCk # https://passw0rd.me/ascii/50 # pool size: 94 # possible combinations: 5e+98 # equivalent alphanumeric password length: 55.0 # this password would be compromised by # - a botnet* in: 3e+82 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds lsX8EzaWw51bgycisfHt62Yaw1v49dFcyh1sYOCv5TgEjiWnWQ # https://passw0rd.me/alphanumeric/50 # pool size: 62 # possible combinations: 4e+89 # equivalent alphanumeric password length: 50.0 # this password would be compromised by # - a botnet* in: 3e+73 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds πŸœπŸŒΆπŸ«πŸ‘‰πŸ₯¬πŸ’•πŸ‘’πŸ˜—πŸ€³πŸƒπŸŽ£πŸ–πŸŽ±πŸΉπŸ₯‰πŸŽ…πŸ₯ŽπŸ˜€πŸ“˜πŸššπŸ˜»πŸ¬πŸŒ πŸ’€πŸ˜ΊπŸ€’πŸ‘…πŸŽŽπŸ’„πŸ»πŸš·πŸƒπŸ“«πŸ―πŸ‘πŸŽ³πŸ‘²πŸ΄πŸ“‹πŸ“πŸ˜πŸ“¦πŸ­πŸŒƒπŸ˜’πŸš‘πŸ˜πŸŒ»πŸ«πŸŽ‘ # https://passw0rd.me/emoji/50 # pool size: 710 # possible combinations: 4e+142 # equivalent alphanumeric password length: 79.5 # this password would be compromised by # - a botnet* in: 2e+126 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds * Assuming 1 trillion MD5 hashes/second. http://dreamersion.com/research-papers/usage-of-botnets-for-high-speed-md5-hash-cracking/