# Randomly Generated Passwords # https://pypi.org/project/pwdgen/ πŸ«πŸ™ˆπŸ’œπŸ˜«πŸ€žπŸ“―πŸ₯—πŸ’¬πŸ‹πŸ—πŸ„πŸŒ±πŸšΆπŸ‘žπŸ„πŸ‰πŸ’»pπŸ“πŸ€—πŸ₯¨πŸ‘šπŸšŸπŸ¦πŸ™‰πŸ‘—πŸ₯ˆπŸ˜Ί=πŸ˜΅πŸΎπŸ˜¬πŸΌπŸ‘ˆ`πŸ’œ0πŸ₯ŠπŸΉπŸš³πŸ‹πŸ˜ΆπŸŽ(WπŸ’¬y6πŸ€¨πŸ˜‚ # https://passw0rd.me/all/50 # pool size: 804 # possible combinations: 2e+145 # equivalent alphanumeric password length: 81.0 # this password would be compromised by # - a botnet* in: 1e+129 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds print-suffrage-flaccid-kelp-unworthy-magnifier # https://passw0rd.me/eff-passphrase/6 # pool size: 7776 # possible combinations: 2e+23 # equivalent alphanumeric password length: 13.0 # this password would be compromised by # - a botnet* in: 1e+7 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds 1ZWtQ*i5b-~=r/M}aq9uvSOX@z-eM2%osiflx5AMk}0{KcogRx # https://passw0rd.me/ascii/50 # pool size: 94 # possible combinations: 5e+98 # equivalent alphanumeric password length: 55.0 # this password would be compromised by # - a botnet* in: 3e+82 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds Qeh6Hp6fmciAThozvWMxrJQfLNLWNux68tE3UU2if1EhgpxaVu # https://passw0rd.me/alphanumeric/50 # pool size: 62 # possible combinations: 4e+89 # equivalent alphanumeric password length: 50.0 # this password would be compromised by # - a botnet* in: 3e+73 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds πŸŒͺπŸ™„πŸŒΉπŸ’πŸ˜ΆπŸš¨πŸš›πŸŽ­πŸ™ŒπŸ“ŒπŸ˜…πŸš‡πŸ“­πŸ“‹πŸ“±πŸš©πŸ€«πŸŒŠπŸ‘¬πŸ˜§πŸ‘³πŸ’πŸ’±πŸ“ΌπŸ¦πŸΆπŸŽΎπŸ“†πŸ—πŸ€–πŸ““πŸ‘†πŸ˜’πŸšΉπŸ“˜πŸ§πŸŽ‘πŸœπŸ₯§πŸΊπŸ¦πŸ₯πŸ™πŸŽΈπŸ˜œπŸ“·πŸ‡πŸŒ˜πŸ€”πŸšž # https://passw0rd.me/emoji/50 # pool size: 710 # possible combinations: 4e+142 # equivalent alphanumeric password length: 79.5 # this password would be compromised by # - a botnet* in: 2e+126 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds * Assuming 1 trillion MD5 hashes/second. http://dreamersion.com/research-papers/usage-of-botnets-for-high-speed-md5-hash-cracking/