# Randomly Generated Passwords # https://pypi.org/project/pwdgen/ πŸ•πŸ’ΉπŸ™πŸš©πŸ˜šπŸŒΌπŸ‘€πŸŽžπŸ™„πŸ“ƒπŸŸπŸšŠπŸŽπŸ˜½πŸπŸ™ŒπŸ¨πŸ’¨πŸ˜πŸŒ<πŸ˜©πŸ€—πŸ˜₯πŸ‘΅3πŸ“­πŸŠπŸšΈπŸŒ•πŸŒžπŸŒπŸŽ§πŸŒΉ9πŸ˜ŸπŸ€ΉπŸŒ‚πŸ€žπŸ˜πŸ’£πŸ‰πŸ²πŸ“‘πŸŽΌπŸ€πŸš‘πŸ™ƒπŸŽ‹πŸ₯Š # https://passw0rd.me/all/50 # pool size: 804 # possible combinations: 2e+145 # equivalent alphanumeric password length: 81.0 # this password would be compromised by # - a botnet* in: 1e+129 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds demote-charred-sandstone-swapping-daredevil-ice # https://passw0rd.me/eff-passphrase/6 # pool size: 7776 # possible combinations: 2e+23 # equivalent alphanumeric password length: 13.0 # this password would be compromised by # - a botnet* in: 1e+7 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds 1RKb"/SnPj5{&Vb8ToewfVobwl;zcR(&'C+tO^[R)]r]`04fo= # https://passw0rd.me/ascii/50 # pool size: 94 # possible combinations: 5e+98 # equivalent alphanumeric password length: 55.0 # this password would be compromised by # - a botnet* in: 3e+82 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds HyhCGc4IgAWldzub1fwuuhq4NkrijHYBmehrUXS8FO13EVysmE # https://passw0rd.me/alphanumeric/50 # pool size: 62 # possible combinations: 4e+89 # equivalent alphanumeric password length: 50.0 # this password would be compromised by # - a botnet* in: 3e+73 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds πŸ‘―πŸ™‚πŸ€πŸ€πŸ’ŒπŸ₯©πŸŒŒπŸ»πŸŒ§πŸŠπŸ“€πŸ₯€πŸš•πŸ±πŸ’©πŸ¬πŸ˜†πŸ₯‘πŸ’žπŸ›πŸπŸ¦πŸŒΆπŸš›πŸ„πŸš•πŸ€πŸ’™πŸ©πŸ‘­πŸ›ƒπŸ•πŸ’½πŸ₯§πŸ˜­πŸ˜³πŸ“„πŸŒπŸ“™πŸš‘πŸ’’πŸ πŸ“£πŸ˜§πŸ›‚πŸŒŸπŸ’πŸ€·πŸ’πŸ‘“ # https://passw0rd.me/emoji/50 # pool size: 710 # possible combinations: 4e+142 # equivalent alphanumeric password length: 79.5 # this password would be compromised by # - a botnet* in: 2e+126 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds * Assuming 1 trillion MD5 hashes/second. http://dreamersion.com/research-papers/usage-of-botnets-for-high-speed-md5-hash-cracking/