# Randomly Generated Passwords # https://pypi.org/project/pwdgen/ πŸ‘πŸ“ŠπŸ€±πŸ€ŸπŸŽ πŸ’πŸoπŸ’ΈπŸš„πŸ’€πŸ½πŸ’΅πŸ‘΅ZπŸ’’ZπŸ€πŸ’©πŸ“΄πŸ₯•πŸ₯πŸŽ’πŸŽ‡%πŸ€ΉπŸš˜πŸ‘°πŸšπŸŽ²πŸΆπŸ‘·πŸ€—|🌰-uπŸ­πŸ˜¨πŸ‘ŠπŸ’ΈπŸ₯ˆπŸ˜”πŸŽ―DπŸ’ΎπŸ₯’πŸ“€rπŸ“’ # https://passw0rd.me/all/50 # pool size: 804 # possible combinations: 2e+145 # equivalent alphanumeric password length: 81.0 # this password would be compromised by # - a botnet* in: 1e+129 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds distant-tripping-nuzzle-embroider-blog-reflux # https://passw0rd.me/eff-passphrase/6 # pool size: 7776 # possible combinations: 2e+23 # equivalent alphanumeric password length: 13.0 # this password would be compromised by # - a botnet* in: 1e+7 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds !}PSx8N9kc'~g*hUQ!Bh3-:fzhju82cavW/%{$$_n|6D-DO[ri # https://passw0rd.me/ascii/50 # pool size: 94 # possible combinations: 5e+98 # equivalent alphanumeric password length: 55.0 # this password would be compromised by # - a botnet* in: 3e+82 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds A78OhUE4inpodfI8Nr1Qpq4xtAeYTXh8ilEDL4nJ0yY0EkBvXj # https://passw0rd.me/alphanumeric/50 # pool size: 62 # possible combinations: 4e+89 # equivalent alphanumeric password length: 50.0 # this password would be compromised by # - a botnet* in: 3e+73 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds πŸ“·πŸ˜³πŸ±πŸŒ πŸ‘΄πŸŒ—πŸš½πŸŒ΄πŸŽΊπŸŽπŸ’ΏπŸ₯ͺπŸŒ€πŸ€πŸšπŸ¬πŸŒ‰πŸ₯©πŸͺπŸ‘šπŸ‘―πŸ˜½πŸ˜ΊπŸ‘ πŸΉπŸŽπŸš…πŸŽ¦πŸ€°πŸ‚πŸ€‘πŸ˜™πŸ‘šπŸ¨πŸ˜“πŸ’»πŸŽΈπŸ’…πŸ˜°πŸˆπŸ˜ŸπŸŒŠπŸπŸ­πŸ“—πŸ₯“πŸ“ΌπŸŒ¨πŸ’§πŸ€€ # https://passw0rd.me/emoji/50 # pool size: 710 # possible combinations: 4e+142 # equivalent alphanumeric password length: 79.5 # this password would be compromised by # - a botnet* in: 2e+126 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds * Assuming 1 trillion MD5 hashes/second. http://dreamersion.com/research-papers/usage-of-botnets-for-high-speed-md5-hash-cracking/