# Randomly Generated Passwords # https://pypi.org/project/pwdgen/ VπŸŒœπŸ³πŸ“–πŸŒ‘πŸ“ͺ🎐UπŸ·πŸ€“πŸ“ŠπŸ»πŸ€―πŸ’·πŸ πŸ₯©πŸŒ―πŸ’•πŸ₯‡πŸ“‰πŸ¨πŸŒπŸŒŸπŸŒ΅~πŸš­πŸš¬πŸ‘ΎπŸ“΅πŸ†pπŸŽŽπŸšžπŸš­πŸŠπŸ˜ŒπŸ‘«πŸ’ŠπŸ₯šπŸ˜§πŸ˜“πŸ€”πŸ€•πŸ€ŸπŸ˜²πŸš£πŸ‡πŸ₯πŸŒ›πŸ’› # https://passw0rd.me/all/50 # pool size: 804 # possible combinations: 2e+145 # equivalent alphanumeric password length: 81.0 # this password would be compromised by # - a botnet* in: 1e+129 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds surgery-scallion-showcase-tribune-frays-mammary # https://passw0rd.me/eff-passphrase/6 # pool size: 7776 # possible combinations: 2e+23 # equivalent alphanumeric password length: 13.0 # this password would be compromised by # - a botnet* in: 1e+7 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds bR!Jiky$oXK>*WXnqv7vdt4%1)7tQj|G;;mB#<`(szVe2z&/dd # https://passw0rd.me/ascii/50 # pool size: 94 # possible combinations: 5e+98 # equivalent alphanumeric password length: 55.0 # this password would be compromised by # - a botnet* in: 3e+82 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds jmT7AOF7T8K6a5AqBUguuxV0LrmkabZgByoT1AOB3o86zBIt7P # https://passw0rd.me/alphanumeric/50 # pool size: 62 # possible combinations: 4e+89 # equivalent alphanumeric password length: 50.0 # this password would be compromised by # - a botnet* in: 3e+73 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds 😐πŸ₯œπŸŒ‰πŸŒ―πŸ“’πŸ“¦πŸ“πŸ―πŸŽ…πŸˆπŸŽ¬πŸš”πŸ˜‘πŸ₯”πŸ₯›πŸŽ’πŸ™ŒπŸ˜œπŸ’ŸπŸ“†πŸ˜΅πŸ₯ˆπŸ€°πŸšπŸš†πŸ€€πŸŒΉπŸ¨πŸ˜ƒπŸŽ’πŸΈπŸ˜³πŸŒ‘πŸ₯‘πŸšœπŸ’›πŸ“’πŸ‘ΎπŸ’πŸŒ‚πŸŒ·πŸŒ‰πŸ’πŸŒ“πŸ˜£πŸŽπŸ₯•πŸ’ͺπŸ’‘πŸ₯‘ # https://passw0rd.me/emoji/50 # pool size: 710 # possible combinations: 4e+142 # equivalent alphanumeric password length: 79.5 # this password would be compromised by # - a botnet* in: 2e+126 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds * Assuming 1 trillion MD5 hashes/second. http://dreamersion.com/research-papers/usage-of-botnets-for-high-speed-md5-hash-cracking/