# Randomly Generated Passwords # https://pypi.org/project/pwdgen/ bπŸ™‡<πŸ’°πŸ‘―πŸ·πŸŽπŸ’ΌπŸ˜·πŸ’…πŸ›ƒπŸ“πŸŽˆπŸ‘‚ZπŸ‘πŸ“‚πŸšπŸ·NπŸ₯‰πŸ‘’πŸ™†πŸ‘πŸŒ—πŸ₯¬πŸ’πŸŽ²πŸ›πŸ‘΄πŸ•πŸ€’πŸ€«πŸπŸ“‡πŸ˜½πŸ“‘πŸ€«πŸŒ†πŸ˜¬zπŸ‘½πŸ’ƒπŸŒ“πŸ™ŒπŸ€œ#J(🐒 # https://passw0rd.me/all/50 # pool size: 804 # possible combinations: 2e+145 # equivalent alphanumeric password length: 81.0 # this password would be compromised by # - a botnet* in: 1e+129 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds yarn-quickness-neurotic-lumpish-upright-passive # https://passw0rd.me/eff-passphrase/6 # pool size: 7776 # possible combinations: 2e+23 # equivalent alphanumeric password length: 13.0 # this password would be compromised by # - a botnet* in: 1e+7 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds z`-O!}`x;4EFjN^@GSmS{[HpW$"w{.T_\Zvzl^'Qf5o:]wp?w# # https://passw0rd.me/ascii/50 # pool size: 94 # possible combinations: 5e+98 # equivalent alphanumeric password length: 55.0 # this password would be compromised by # - a botnet* in: 3e+82 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds rXCUl14Y4ldy87RQ2bLXnJJ6Sk5gLaPQupHIXAozSC01kLUQz4 # https://passw0rd.me/alphanumeric/50 # pool size: 62 # possible combinations: 4e+89 # equivalent alphanumeric password length: 50.0 # this password would be compromised by # - a botnet* in: 3e+73 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds πŸŽ¦πŸ“”πŸš°πŸ³πŸ‘―πŸ’ΉπŸŽ©πŸš•πŸ…πŸŽ†πŸ‘’πŸ‚πŸ˜ΏπŸ‘žπŸ€πŸ’•πŸšΌπŸπŸŠπŸ₯’πŸ‘πŸ½πŸ˜ŽπŸ€–πŸŽ€πŸ·πŸ…πŸ“²πŸŒ™πŸŽ…πŸ­πŸ“šπŸ₯ˆπŸŒ‘🌘πŸ₯«πŸŒπŸ₯“πŸš πŸΊπŸπŸ“ŽπŸŒ²πŸ―πŸ“­πŸ€πŸ‘†πŸ‘œπŸ―πŸŽ€ # https://passw0rd.me/emoji/50 # pool size: 710 # possible combinations: 4e+142 # equivalent alphanumeric password length: 79.5 # this password would be compromised by # - a botnet* in: 2e+126 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds * Assuming 1 trillion MD5 hashes/second. http://dreamersion.com/research-papers/usage-of-botnets-for-high-speed-md5-hash-cracking/