# Randomly Generated Passwords # https://pypi.org/project/pwdgen/ ๐Ÿ’ท๐Ÿ’ณ๐Ÿ’ฌ๐Ÿ˜ถ๐Ÿคณ๐Ÿ‘Ÿ๐ŸŸ4๐Ÿ’…๐Ÿ™„๐ŸŒ๐Ÿ˜ฝ๐Ÿ˜บ๐Ÿ˜ข๐Ÿ’น6๐Ÿฆ๐ŸŒ‚๐Ÿ“๐ŸŒŒ๐Ÿšณ๐Ÿ™Œ๐Ÿšผ๐Ÿ’๐Ÿ’ ๐Ÿ“ž๐Ÿš๐Ÿ’ฝ๐Ÿ†๐ŸŽฟ๐Ÿต๐Ÿ‘ต๐Ÿ“ฑ๐Ÿผ๐Ÿ๐Ÿ˜ฑ๐Ÿฅฅ๐Ÿ™ƒ๐Ÿคฃ๐Ÿ‘ƒ๐Ÿ“•๐ŸŽฐ๐Ÿ’“๐Ÿš ๐Ÿ™,๐ŸŒš๐Ÿ‰๐Ÿค“๐Ÿฃ # https://passw0rd.me/all/50 # pool size: 804 # possible combinations: 2e+145 # equivalent alphanumeric password length: 81.0 # this password would be compromised by # - a botnet* in: 1e+129 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds posted-wildcard-ladle-ajar-patience-kitchen # https://passw0rd.me/eff-passphrase/6 # pool size: 7776 # possible combinations: 2e+23 # equivalent alphanumeric password length: 13.0 # this password would be compromised by # - a botnet* in: 1e+7 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds J}TmX)%1hJUUOt;u63t!q2P1(tIdra|j!2=w(/_J[P-j]1Uw(, # https://passw0rd.me/ascii/50 # pool size: 94 # possible combinations: 5e+98 # equivalent alphanumeric password length: 55.0 # this password would be compromised by # - a botnet* in: 3e+82 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds 0SyBxj2mbCy4YPaSDSPkrICq3Re14VBgrBa7ZJq9f6UQyvPU50 # https://passw0rd.me/alphanumeric/50 # pool size: 62 # possible combinations: 4e+89 # equivalent alphanumeric password length: 50.0 # this password would be compromised by # - a botnet* in: 3e+73 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds ๐Ÿ’ฟ๐ŸŒ๐Ÿ’๐Ÿ‘ฎ๐Ÿคก๐ŸŒน๐Ÿฅฌ๐ŸŽ†๐Ÿ˜ฑ๐ŸŒš๐Ÿฌ๐Ÿ’†๐ŸŒฎ๐Ÿ˜๐Ÿ–๐Ÿ‘ฅ๐Ÿ“ซ๐Ÿ‘ฝ๐ŸฅŠ๐Ÿ’˜๐Ÿ’‹๐Ÿ๐Ÿคน๐Ÿฅฆ๐Ÿ’‘๐Ÿผ๐Ÿ˜š๐Ÿ“‚๐ŸŒ˜๐ŸŽธ๐Ÿฌ๐ŸŒป๐Ÿคญ๐ŸŸ๐Ÿง๐Ÿ˜๐Ÿš๐ŸŒฏ๐Ÿ“ฌ๐ŸŒœ๐Ÿจ๐Ÿ’ฒ๐ŸŽก๐Ÿก๐Ÿ™‡๐Ÿ‘ท๐ŸŽซ๐ŸŒน๐Ÿฆ๐ŸŠ # https://passw0rd.me/emoji/50 # pool size: 710 # possible combinations: 4e+142 # equivalent alphanumeric password length: 79.5 # this password would be compromised by # - a botnet* in: 2e+126 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds * Assuming 1 trillion MD5 hashes/second. http://dreamersion.com/research-papers/usage-of-botnets-for-high-speed-md5-hash-cracking/