# Randomly Generated Passwords # https://pypi.org/project/pwdgen/ πŸ’‰πŸπŸ’‰πŸ™πŸ‘‡IπŸŒ‹πŸŽŒπŸ“ΉπŸ‚πŸ“•πŸ“²πŸš™πŸ˜‘πŸš΅πŸ˜e😽🐡πŸ€₯πŸ‘°πŸ”qπŸšπŸŒŠπŸƒπŸ˜ΉπŸ‘”πŸŽ£πŸ₯’πŸπŸ’“πŸ˜§πŸ’™πŸƒπŸšŸπŸ˜₯πŸ’πŸš«πŸ­πŸ’πŸ™ŒπŸŽ€πŸšœ^K🐭mπŸ™ŽπŸŽ· # https://passw0rd.me/all/50 # pool size: 804 # possible combinations: 2e+145 # equivalent alphanumeric password length: 81.0 # this password would be compromised by # - a botnet* in: 1e+129 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds reassign-vaseline-erasable-grit-strict-worst # https://passw0rd.me/eff-passphrase/6 # pool size: 7776 # possible combinations: 2e+23 # equivalent alphanumeric password length: 13.0 # this password would be compromised by # - a botnet* in: 1e+7 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds 8}&{)4(xV*V~yk*dod@i74sLY}QXy-t[}3#Aty4(IX=(f/9lW5 # https://passw0rd.me/ascii/50 # pool size: 94 # possible combinations: 5e+98 # equivalent alphanumeric password length: 55.0 # this password would be compromised by # - a botnet* in: 3e+82 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds x5IFRmra2DGKCbZj4GBNmBFRDv5Z6W9R834bU3AwZhbAbhw8wC # https://passw0rd.me/alphanumeric/50 # pool size: 62 # possible combinations: 4e+89 # equivalent alphanumeric password length: 50.0 # this password would be compromised by # - a botnet* in: 3e+73 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds πŸ€ΆπŸš›πŸ“³πŸ¨πŸš­πŸΈπŸ’¬πŸ‰πŸ‘‚πŸŽΏπŸžπŸ“šπŸπŸΌπŸŠπŸ₯§πŸ˜»πŸ₯¨πŸš’πŸ˜•πŸ₯πŸ‘½πŸš‚πŸ™ŽπŸ¦πŸ‘―πŸŽ…πŸŒ΄πŸŒžπŸ˜₯😰πŸ₯‰πŸ‡πŸ“ͺπŸ“žπŸŒ πŸ™πŸ“πŸ˜²πŸš»πŸ™‡πŸ“πŸ°πŸ˜πŸ§πŸŽ»πŸŒ‰πŸ…πŸ˜’πŸŒ # https://passw0rd.me/emoji/50 # pool size: 710 # possible combinations: 4e+142 # equivalent alphanumeric password length: 79.5 # this password would be compromised by # - a botnet* in: 2e+126 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds * Assuming 1 trillion MD5 hashes/second. http://dreamersion.com/research-papers/usage-of-botnets-for-high-speed-md5-hash-cracking/