# Randomly Generated Passwords # https://pypi.org/project/pwdgen/ πŸ“³πŸŒΊπŸ‘€πŸŒ‹πŸŽ£πŸ€£πŸ‰πŸŒΈπŸ’’πŸŒ©πŸ“ͺπŸŽΌπŸ’»πŸ₯πŸ—πŸŽ΅\πŸ™„πŸ»πŸΎπŸ˜†πŸ“§πŸ‘πŸ’ΊπŸ‘˜πŸ‘‘πŸ€£CπŸ‘’πŸ“©πŸ‘“πŸ€˜πŸ“‡πŸ”πŸ‘§πŸš„πŸ›„πŸ“πŸšΏπŸ˜•πŸ’šπŸŒ½πŸ {IπŸŒ½πŸ’πŸ₯›πŸ₯›πŸŽ # https://passw0rd.me/all/50 # pool size: 804 # possible combinations: 2e+145 # equivalent alphanumeric password length: 81.0 # this password would be compromised by # - a botnet* in: 1e+129 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds impeding-flagpole-repugnant-engine-deploy-exciting # https://passw0rd.me/eff-passphrase/6 # pool size: 7776 # possible combinations: 2e+23 # equivalent alphanumeric password length: 13.0 # this password would be compromised by # - a botnet* in: 1e+7 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds !jf#J"(jUO'}.W\T1y)":f"v_W__BhI0nKEbn:[0jn"Un4&wQt # https://passw0rd.me/ascii/50 # pool size: 94 # possible combinations: 5e+98 # equivalent alphanumeric password length: 55.0 # this password would be compromised by # - a botnet* in: 3e+82 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds C5YFAEQDLuBONUszBfNG8Ap8Oxbm7drlwOsHyKgnA9OIwljJW4 # https://passw0rd.me/alphanumeric/50 # pool size: 62 # possible combinations: 4e+89 # equivalent alphanumeric password length: 50.0 # this password would be compromised by # - a botnet* in: 3e+73 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds πŸššπŸšΏπŸ’„πŸ“œπŸ’žπŸ’œπŸ˜”πŸŽ«πŸŽŒπŸ’­πŸ₯‡πŸ πŸŒπŸ€§πŸ‘³πŸŒ’πŸšˆπŸ˜œπŸ’‘πŸŒ‰πŸ•πŸ€πŸ“¦πŸš¨πŸŽ£πŸ₯πŸ‘©πŸ˜πŸ’πŸ₯£πŸ’΅πŸŠπŸŽ‡πŸ’ŸπŸŒ‘πŸ“ŽπŸ€šπŸŽ€πŸ’›πŸ˜ΌπŸ‘ΉπŸˆπŸš―πŸŽ†πŸŽΎπŸ“›πŸ—πŸ¬πŸˆπŸ“˜ # https://passw0rd.me/emoji/50 # pool size: 710 # possible combinations: 4e+142 # equivalent alphanumeric password length: 79.5 # this password would be compromised by # - a botnet* in: 2e+126 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds * Assuming 1 trillion MD5 hashes/second. http://dreamersion.com/research-papers/usage-of-botnets-for-high-speed-md5-hash-cracking/