# Randomly Generated Passwords # https://pypi.org/project/pwdgen/ πŸ˜πŸŒ²πŸ’£πŸ’πŸ¦πŸ˜€πŸŒ’πŸπŸ’ƒπŸš₯πŸ‘‘IπŸ―πŸ†πŸ…πŸšπŸ˜·πŸ˜πŸ‘πŸš•πŸŒΊπŸ‘•πŸš’πŸŒ„πŸŽΏ{πŸ₯πŸ‹πŸ₯”πŸ‘ΏπŸΊπŸΈπŸšƒπŸ¨πŸ₯˜πŸ₯žπŸƒπŸŽπŸ‘ΌπŸ₯¨πŸ˜’πŸ‘•πŸˆhπŸ’·πŸπŸšΌπŸ‘πŸ˜πŸ’‘ # https://passw0rd.me/all/50 # pool size: 804 # possible combinations: 2e+145 # equivalent alphanumeric password length: 81.0 # this password would be compromised by # - a botnet* in: 1e+129 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds finance-thank-cobbler-viewless-trusting-happily # https://passw0rd.me/eff-passphrase/6 # pool size: 7776 # possible combinations: 2e+23 # equivalent alphanumeric password length: 13.0 # this password would be compromised by # - a botnet* in: 1e+7 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds )tHK=57ry?6SX&x*"ua?#wRK+;)@'=;Sh\\|~K~n!9oke:+'J0 # https://passw0rd.me/ascii/50 # pool size: 94 # possible combinations: 5e+98 # equivalent alphanumeric password length: 55.0 # this password would be compromised by # - a botnet* in: 3e+82 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds bkIoEt2ZN88d3ZfOFvOjieu8G12cobyajSrmEeQUURg7l9Wk6r # https://passw0rd.me/alphanumeric/50 # pool size: 62 # possible combinations: 4e+89 # equivalent alphanumeric password length: 50.0 # this password would be compromised by # - a botnet* in: 3e+73 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds πŸ’ŒπŸ₯πŸ’‘πŸ‘ŠπŸ‘³πŸ—πŸ₯πŸŒ±πŸ₯ŒπŸ“²πŸšΌπŸ€πŸ₯πŸ‘΅πŸ‘°πŸŽƒπŸ˜πŸšœπŸŒΎπŸ€‘πŸ˜ πŸ‘šπŸ’–πŸ±πŸ“πŸ“«πŸ˜ΎπŸ…πŸ€ πŸŒ«πŸ₯ πŸŒ‹πŸ˜ΌπŸ€πŸŒ¬πŸ€πŸš©πŸŽπŸŒ‚πŸŸπŸ“πŸŒžπŸπŸ’¦πŸ“πŸ“™πŸš€πŸ‘πŸŠπŸˆ # https://passw0rd.me/emoji/50 # pool size: 710 # possible combinations: 4e+142 # equivalent alphanumeric password length: 79.5 # this password would be compromised by # - a botnet* in: 2e+126 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds * Assuming 1 trillion MD5 hashes/second. http://dreamersion.com/research-papers/usage-of-botnets-for-high-speed-md5-hash-cracking/