# Randomly Generated Passwords # https://pypi.org/project/pwdgen/ b7πŸŒ΄πŸ““πŸ’ΌπŸŽπŸ₯₯πŸŒ₯🏬πŸ₯¦πŸš«πŸ€ΈπŸ—πŸŽπŸ˜°πŸŽ©πŸ˜•πŸ₯ˆπŸ†πŸŒˆπŸ₯πŸžπŸ“­πŸ’•WπŸ₯™πŸœπŸ’πŸ‘½πŸ“πŸ—πŸ‘±πŸ‘ŒπŸŽˆπŸ¬πŸ₯ŸπŸ“‘πŸ₯‹πŸ½πŸ™…πŸͺπŸš’πŸ„{πŸŽ€πŸ‘…πŸ€΄πŸ·πŸ’ƒπŸ“ # https://passw0rd.me/all/50 # pool size: 804 # possible combinations: 2e+145 # equivalent alphanumeric password length: 81.0 # this password would be compromised by # - a botnet* in: 1e+129 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds unchanged-untaken-depletion-sixth-yodel-stowing # https://passw0rd.me/eff-passphrase/6 # pool size: 7776 # possible combinations: 2e+23 # equivalent alphanumeric password length: 13.0 # this password would be compromised by # - a botnet* in: 1e+7 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds yOxy)D|~H44uVEW\~`@W6#]c;$=,2\{L>yqej/7&o9s*`zRGaa # https://passw0rd.me/ascii/50 # pool size: 94 # possible combinations: 5e+98 # equivalent alphanumeric password length: 55.0 # this password would be compromised by # - a botnet* in: 3e+82 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds Gs2DSXMjKnB8mh9FLMzOriLM9vNFlsFU5sHZqTXUJhp8RiyaWy # https://passw0rd.me/alphanumeric/50 # pool size: 62 # possible combinations: 4e+89 # equivalent alphanumeric password length: 50.0 # this password would be compromised by # - a botnet* in: 3e+73 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds πŸ€πŸšπŸ“—πŸš«πŸŽ±πŸ’πŸ’΅πŸ˜‘πŸš½πŸ‘˜πŸ₯‘πŸŒΏπŸ˜…πŸ΄πŸ’πŸ˜ˆπŸšŸπŸπŸŒΊπŸ™πŸ˜΄πŸ‚πŸšˆπŸ‘œπŸ‘πŸš·πŸŒΏπŸŸπŸ±πŸŽ½πŸ³πŸ“’πŸ–πŸ“–πŸ’‚πŸ‘πŸ›ƒπŸ’―πŸšΏπŸŒ’πŸ’ƒπŸ’šπŸ™‰πŸ‘ŽπŸ’©πŸš³πŸš₯🏐πŸ₯£πŸŽ© # https://passw0rd.me/emoji/50 # pool size: 710 # possible combinations: 4e+142 # equivalent alphanumeric password length: 79.5 # this password would be compromised by # - a botnet* in: 2e+126 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds * Assuming 1 trillion MD5 hashes/second. http://dreamersion.com/research-papers/usage-of-botnets-for-high-speed-md5-hash-cracking/