# Randomly Generated Passwords # https://pypi.org/project/pwdgen/ šŸ«šŸŒ³šŸ”šŸ“–šŸ“¬šŸ˜„šŸšŸš•šŸŽ®šŸŒ»šŸ‰šŸ‘ŸšŸ‘§šŸ’ŠšŸ’”šŸ•šŸŒšŸŽ¬šŸ„ØšŸ“ØšŸ„›šŸ„ šŸŽµšŸ¤“KšŸš£šŸ”šŸ›šŸ¤‘šŸ“ˆšŸŽžšŸ‘«šŸŽˆšŸ¦šŸ“›šŸ„ššŸšŠšŸŒ­šŸŽ¶šŸ«šŸ™‡šŸ’¹šŸ˜›e"šŸ‹šŸŒ½šŸŽ¢šŸ¤—šŸ˜‘ # https://passw0rd.me/all/50 # pool size: 804 # possible combinations: 2e+145 # equivalent alphanumeric password length: 81.0 # this password would be compromised by # - a botnet* in: 1e+129 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds oxygen-gloater-jujitsu-banking-igloo-twirl # https://passw0rd.me/eff-passphrase/6 # pool size: 7776 # possible combinations: 2e+23 # equivalent alphanumeric password length: 13.0 # this password would be compromised by # - a botnet* in: 1e+7 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds M(2Dh31zpH?JI"bJVCl3t0Het!1O^bQm)%QgM1rZEDir=4m.;O # https://passw0rd.me/ascii/50 # pool size: 94 # possible combinations: 5e+98 # equivalent alphanumeric password length: 55.0 # this password would be compromised by # - a botnet* in: 3e+82 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds J6LH9Rv1lZsrjaorGUvwNyx3ES0lKmPZ8iNP8zLfeqLXn00e8L # https://passw0rd.me/alphanumeric/50 # pool size: 62 # possible combinations: 4e+89 # equivalent alphanumeric password length: 50.0 # this password would be compromised by # - a botnet* in: 3e+73 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds šŸ“ šŸ“ŗšŸ˜”šŸ˜‡šŸ™šŸš“šŸ½šŸ“šŸš²šŸ‘†šŸ£šŸ˜¬šŸ˜“šŸ„®šŸ˜šŸ˜•šŸ‘žšŸ§šŸŽ©šŸ„ŸšŸ–šŸ¤·šŸŒšŸ™ŒšŸ‘‹šŸ™šŸ‘§šŸ“¶šŸ‘ƒšŸ‘¶šŸ‘šŸŽ»šŸŽ¼šŸ˜›šŸ¾šŸššŸšŸ˜„šŸšŸ’©šŸŒŖšŸš„šŸŽ€šŸ™šŸ¦šŸ’šŸ‘½šŸŒšŸ‘æšŸŒ’ # https://passw0rd.me/emoji/50 # pool size: 710 # possible combinations: 4e+142 # equivalent alphanumeric password length: 79.5 # this password would be compromised by # - a botnet* in: 2e+126 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds * Assuming 1 trillion MD5 hashes/second. http://dreamersion.com/research-papers/usage-of-botnets-for-high-speed-md5-hash-cracking/