# Randomly Generated Passwords # https://pypi.org/project/pwdgen/ kšŸŽ°\šŸ¬mšŸ‘‡šŸ“§%šŸ’˜šŸ”šŸ„ŠšŸ»šŸ˜¾šŸ¾šŸ‘ˆšŸÆšŸ˜ŒBšŸŒøšŸ“šŸ«šŸ®šŸ©šŸ™šŸ¹šŸŒ·šŸŒøšŸ¤’šŸ‘™šŸ„¢šŸŒ·šŸŒ®šŸŽÆšŸŽ¹šŸmšŸ‘æšŸ“›šŸ“¦šŸ“¦šŸ˜§šŸ˜½yšŸ·šŸŽŗšŸŠ<šŸ“–zšŸ’Ø # https://passw0rd.me/all/50 # pool size: 804 # possible combinations: 2e+145 # equivalent alphanumeric password length: 81.0 # this password would be compromised by # - a botnet* in: 1e+129 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds hexagram-voltage-gorged-ajar-grove-finisher # https://passw0rd.me/eff-passphrase/6 # pool size: 7776 # possible combinations: 2e+23 # equivalent alphanumeric password length: 13.0 # this password would be compromised by # - a botnet* in: 1e+7 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds j;!FOv*V*K?m(^h&>u-SKOpvAe+d$O.A#(v:2Dq#$E}@sUx5o8 # https://passw0rd.me/ascii/50 # pool size: 94 # possible combinations: 5e+98 # equivalent alphanumeric password length: 55.0 # this password would be compromised by # - a botnet* in: 3e+82 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds PsdP4gtQ6llYXfWtYovpHgc6ChAeUAKXZVNqoMIBwFXfOLxCnP # https://passw0rd.me/alphanumeric/50 # pool size: 62 # possible combinations: 4e+89 # equivalent alphanumeric password length: 50.0 # this password would be compromised by # - a botnet* in: 3e+73 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds šŸ›šŸ‘¤šŸŸšŸ“•šŸ„£šŸ•šŸ“”šŸš’šŸ’–šŸ˜€šŸ’µšŸŽžšŸ™„šŸ¤–šŸ§šŸ’¼šŸ¦šŸ’¶šŸš®šŸ“·šŸ¤³šŸæšŸšƒšŸ½šŸ˜œšŸ‘ØšŸ‘»šŸ•šŸ¤µšŸŒ šŸ¤–šŸ‘‰šŸŽŖšŸ‘ šŸŸšŸ’²šŸšŸ“’šŸ‘„šŸ˜ŖšŸ¤«šŸŽ¤šŸ’“šŸ’‡šŸŒ”šŸ‘‹šŸ“®šŸ“…šŸ˜„šŸ˜Š # https://passw0rd.me/emoji/50 # pool size: 710 # possible combinations: 4e+142 # equivalent alphanumeric password length: 79.5 # this password would be compromised by # - a botnet* in: 2e+126 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds * Assuming 1 trillion MD5 hashes/second. http://dreamersion.com/research-papers/usage-of-botnets-for-high-speed-md5-hash-cracking/