# Randomly Generated Passwords # https://pypi.org/project/pwdgen/ πŸ€·πŸ•πŸšπŸŽ©wHπŸ‘•πŸ‘ˆ}🏁πŸ₯ πŸ˜©πŸŽ₯🏠F🏣πŸ’ͺ😜🏞~πŸŽ©πŸ’πŸ‰πŸ“¨πŸ‘πŸŒœπŸ₯πŸ‘™πŸ’²πŸ‘£πŸš—πŸ’½M🐿iπŸΏπŸ“—πŸŒ΅πŸ˜½|πŸ“‘πŸŽ§πŸŽ‡πŸ€³πŸ‘˜πŸŒΎπŸ₯ͺπŸ“˜πŸšŠπŸ€΅ # https://passw0rd.me/all/50 # pool size: 804 # possible combinations: 2e+145 # equivalent alphanumeric password length: 81.0 # this password would be compromised by # - a botnet* in: 1e+129 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds parchment-replica-reformed-volatile-headstone-dubbed # https://passw0rd.me/eff-passphrase/6 # pool size: 7776 # possible combinations: 2e+23 # equivalent alphanumeric password length: 13.0 # this password would be compromised by # - a botnet* in: 1e+7 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds D}5FnQF&J\Vwg/x-+S<+>'Tpc1$)5-fi3!@6a_4p$1E\C1?H){ # https://passw0rd.me/ascii/50 # pool size: 94 # possible combinations: 5e+98 # equivalent alphanumeric password length: 55.0 # this password would be compromised by # - a botnet* in: 3e+82 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds xg6qB7Yxf197uwuYB668FB7ALS2gdPctIa6aSwk7dMDxmpNrVU # https://passw0rd.me/alphanumeric/50 # pool size: 62 # possible combinations: 4e+89 # equivalent alphanumeric password length: 50.0 # this password would be compromised by # - a botnet* in: 3e+73 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds πŸ‘πŸ™…πŸšͺ🎦🎩πŸ“₯πŸ˜‚πŸ¨πŸŒ¦πŸšΎπŸ˜¦πŸˆπŸ™‹πŸš‰πŸ’πŸšƒπŸ“‘πŸ“ŒπŸŽ„πŸ†πŸ‘΄πŸ“πŸŒ…πŸ“¦πŸ‘“πŸ’ΏπŸŒ³πŸš‡πŸ₯ˆπŸ“πŸ§πŸ€©πŸ·πŸš™πŸ₯­πŸ΅πŸ’²πŸ’“πŸŽ―πŸ˜·πŸ‘«πŸ’ΌπŸ₯ͺπŸ’πŸ“€πŸ“ΆπŸ˜ΌπŸ‘”πŸšͺ🍩 # https://passw0rd.me/emoji/50 # pool size: 710 # possible combinations: 4e+142 # equivalent alphanumeric password length: 79.5 # this password would be compromised by # - a botnet* in: 2e+126 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds * Assuming 1 trillion MD5 hashes/second. http://dreamersion.com/research-papers/usage-of-botnets-for-high-speed-md5-hash-cracking/