# Randomly Generated Passwords # https://pypi.org/project/pwdgen/ πŸ˜ͺπŸ…πŸ²πŸπŸ’˜πŸŒ°πŸ₯‰πŸŽπŸŽ‘πŸŽ­πŸΉPπŸ’€πŸ€ΉπŸ“§πŸ˜—πŸ₯’πŸ¬πŸ’ŸπŸ₯ͺπŸ“ͺπŸŒπŸ€¨πŸŽŒπŸŒ΄πŸ˜πŸ™…πŸŒ¦πŸ‘πŸš²πŸ˜ˆπŸ€ΉπŸŽ²KπŸ¦πŸ’πŸ·πŸ’πŸšŒπŸŒΏπŸ‘­πŸ₯—πŸ™ˆπŸ€¨QπŸ“«πŸ₯πŸŽŽπŸ“’πŸ₯‡ # https://passw0rd.me/all/50 # pool size: 804 # possible combinations: 2e+145 # equivalent alphanumeric password length: 81.0 # this password would be compromised by # - a botnet* in: 1e+129 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds snippet-tidings-revivable-bazooka-lagged-catching # https://passw0rd.me/eff-passphrase/6 # pool size: 7776 # possible combinations: 2e+23 # equivalent alphanumeric password length: 13.0 # this password would be compromised by # - a botnet* in: 1e+7 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds ]0CEt>m!MZ]kf*8KQA1A87t>->wU"M!{Q5x)a5*};@_Qu@B?<6 # https://passw0rd.me/ascii/50 # pool size: 94 # possible combinations: 5e+98 # equivalent alphanumeric password length: 55.0 # this password would be compromised by # - a botnet* in: 3e+82 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds QHW008xTtahhX4FbPo22WFlfOwp96jzoJVbDHMEZtKVnQAgvxL # https://passw0rd.me/alphanumeric/50 # pool size: 62 # possible combinations: 4e+89 # equivalent alphanumeric password length: 50.0 # this password would be compromised by # - a botnet* in: 3e+73 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds πŸ€πŸ“£πŸ‘ŒπŸšπŸπŸ“­πŸ₯–πŸ’—πŸŒŒπŸ§πŸ“»πŸ’³πŸŒ—πŸ‘œπŸšΆπŸƒπŸŒΎπŸ₯™πŸŒ³πŸ˜πŸš§πŸ½πŸ’‰πŸ™„πŸ–πŸ‘ πŸ˜πŸ˜›πŸŒ³πŸ’‘πŸ“ŠπŸ‘—πŸŽŠπŸ‘’πŸ’­πŸ₯πŸŽ πŸ“«πŸ“‘πŸš’πŸŒ½πŸ™πŸΏπŸŒ‚πŸ’ˆπŸ˜πŸƒπŸ²πŸ˜°πŸ  # https://passw0rd.me/emoji/50 # pool size: 710 # possible combinations: 4e+142 # equivalent alphanumeric password length: 79.5 # this password would be compromised by # - a botnet* in: 2e+126 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds * Assuming 1 trillion MD5 hashes/second. http://dreamersion.com/research-papers/usage-of-botnets-for-high-speed-md5-hash-cracking/