# Randomly Generated Passwords # https://pypi.org/project/pwdgen/ ๐ŸŽผ๐Ÿ—๐Ÿ˜ซ๐Ÿ“นm๐Ÿ‘ก๐Ÿ˜ฏ๐Ÿด๐Ÿ‘ข๐Ÿก๐Ÿ’ณ๐Ÿ˜๐ŸคŸ๐Ÿฅ‡๐ŸŒ‹5๐Ÿ–๐Ÿ‘‘๐Ÿ’‚๐Ÿ“›๐Ÿ’ถ๐Ÿ’ฑ๐ŸŽŒ๐Ÿฝ๐Ÿšญ๐Ÿ๐Ÿ’ฌ๐Ÿ“บ๐Ÿ‘ด0๐Ÿ˜–:๐Ÿ˜ฎ๐ŸŒธV๐Ÿคฅ*๐Ÿœ๐ŸŽค๐Ÿ“ฐ๐Ÿ•b๐Ÿคท๐ŸŒฑ๐Ÿš‘๐Ÿ‘Ž๐Ÿ๐Ÿ“น๐Ÿ™‰๐Ÿ“… # https://passw0rd.me/all/50 # pool size: 804 # possible combinations: 2e+145 # equivalent alphanumeric password length: 81.0 # this password would be compromised by # - a botnet* in: 1e+129 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds remnant-reload-recolor-relight-challenge-unelected # https://passw0rd.me/eff-passphrase/6 # pool size: 7776 # possible combinations: 2e+23 # equivalent alphanumeric password length: 13.0 # this password would be compromised by # - a botnet* in: 1e+7 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds n>pQdSTd^/kLI8BGuO8t=}ge$SmOQvUAm,o`pFL>%gf2>%H26A # https://passw0rd.me/ascii/50 # pool size: 94 # possible combinations: 5e+98 # equivalent alphanumeric password length: 55.0 # this password would be compromised by # - a botnet* in: 3e+82 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds WSNvZ46noVRxM8LrngiItcjXw8gAWLU6Op8Qh7jLdLVfj1wBFS # https://passw0rd.me/alphanumeric/50 # pool size: 62 # possible combinations: 4e+89 # equivalent alphanumeric password length: 50.0 # this password would be compromised by # - a botnet* in: 3e+73 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds ๐Ÿ“ฃ๐Ÿšจ๐Ÿ‘๐Ÿ’€๐Ÿ›€๐Ÿฅจ๐Ÿšƒ๐ŸŒ“๐Ÿ’ค๐ŸฅŠ๐ŸŽ๐Ÿ’ฌ๐ŸŒฐ๐Ÿ“™๐Ÿšบ๐Ÿšฐ๐Ÿšˆ๐Ÿ‘ฆ๐Ÿฅฅ๐Ÿฅž๐Ÿ“‘๐Ÿ‹๐Ÿ˜ท๐Ÿคฑ๐ŸŒฆ๐Ÿ™Š๐Ÿด๐ŸŒ•๐ŸŒฑ๐Ÿ›๐Ÿ“๐ŸŒธ๐Ÿฟ๐Ÿ“ˆ๐ŸŒ–๐ŸŽฎ๐Ÿคจ๐Ÿ“€๐Ÿ’ธ๐Ÿ’ƒ๐Ÿ ๐Ÿค’๐ŸŽป๐Ÿคก๐ŸŽฑ๐ŸŽŽ๐Ÿ’ฎ๐Ÿฅ™๐Ÿฅญ๐Ÿคจ # https://passw0rd.me/emoji/50 # pool size: 710 # possible combinations: 4e+142 # equivalent alphanumeric password length: 79.5 # this password would be compromised by # - a botnet* in: 2e+126 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds * Assuming 1 trillion MD5 hashes/second. http://dreamersion.com/research-papers/usage-of-botnets-for-high-speed-md5-hash-cracking/