# Randomly Generated Passwords # https://pypi.org/project/pwdgen/ ๐Ÿš”๐Ÿค–๐Ÿ™Ž๐Ÿก๐Ÿ’น๐Ÿ›๐ŸŽ‘๐Ÿ’›๐ŸŒŽ๐Ÿ˜:๐Ÿ๐Ÿ‘‰๐Ÿต๐Ÿšฑ๐Ÿฅก๐Ÿšบ๐Ÿ’ง๐ŸŒ€๐Ÿค—๐ŸŒŠ๐Ÿธ๐Ÿฆ๐Ÿ˜ฝ๐ŸŒ…`๐ŸŽ’๐Ÿ‘พ๐Ÿคข๐Ÿ˜ก๐Ÿฅ–๐Ÿ’ฎ๐ŸŒ†๐Ÿข๐ŸŽ€๐Ÿ™Š๐Ÿคณ๐Ÿœ๐Ÿฐ๐Ÿ’ค๐Ÿšง๐ŸŒธ๐Ÿคฉ๐Ÿ“„R๐Ÿ“–,๐Ÿ‘„๐Ÿฅค๐Ÿšณ # https://passw0rd.me/all/50 # pool size: 804 # possible combinations: 2e+145 # equivalent alphanumeric password length: 81.0 # this password would be compromised by # - a botnet* in: 1e+129 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds unweave-smugness-backstab-reroute-statistic-cardigan # https://passw0rd.me/eff-passphrase/6 # pool size: 7776 # possible combinations: 2e+23 # equivalent alphanumeric password length: 13.0 # this password would be compromised by # - a botnet* in: 1e+7 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds A=_+D76CiJ.4i\/FkHrdQY2{FrZRc#)fqF^/NF?l+isgx)k#Dq # https://passw0rd.me/ascii/50 # pool size: 94 # possible combinations: 5e+98 # equivalent alphanumeric password length: 55.0 # this password would be compromised by # - a botnet* in: 3e+82 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds iHm7kjRAro7ONd7Bsv0ZunKxGjxXiVYiHrTgik0jpUoIfaYKSL # https://passw0rd.me/alphanumeric/50 # pool size: 62 # possible combinations: 4e+89 # equivalent alphanumeric password length: 50.0 # this password would be compromised by # - a botnet* in: 3e+73 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds ๐Ÿ˜๐Ÿ“๐ŸŽˆ๐Ÿฅ๐Ÿก๐Ÿ’†๐Ÿ‘๐Ÿ“ผ๐ŸŽ๐Ÿฅก๐Ÿ‘„๐Ÿšป๐Ÿคจ๐Ÿ‹๐Ÿธ๐Ÿ’ผ๐Ÿ“๐Ÿ“ ๐Ÿ๐Ÿ’‘๐Ÿฅฃ๐Ÿฅซ๐Ÿšป๐Ÿ•๐ŸŒ๐Ÿ‘ด๐Ÿฉ๐Ÿ™…๐Ÿผ๐ŸŒ๐Ÿด๐Ÿ‰๐Ÿ›‚๐Ÿš๐Ÿ˜๐Ÿš ๐Ÿฐ๐Ÿš๐Ÿฟ๐Ÿ˜„๐Ÿง๐Ÿš“๐Ÿ’ฎ๐Ÿ’ฌ๐Ÿ˜’๐ŸŽผ๐ŸŒ„๐ŸŒš๐Ÿšค๐ŸŽบ # https://passw0rd.me/emoji/50 # pool size: 710 # possible combinations: 4e+142 # equivalent alphanumeric password length: 79.5 # this password would be compromised by # - a botnet* in: 2e+126 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds * Assuming 1 trillion MD5 hashes/second. http://dreamersion.com/research-papers/usage-of-botnets-for-high-speed-md5-hash-cracking/