# Randomly Generated Passwords # https://pypi.org/project/pwdgen/ πŸ™„gπŸŒΏπŸ“ΆπŸ—πŸ©πŸ˜πŸ’πŸ‘³πŸ€πŸ…πŸ‘’πŸŒπŸ‘·πŸš˜πŸ’ͺπŸ₯¨πŸ’²πŸ’˜πŸš£!πŸ‚πŸ΄πŸ˜£πŸ˜ΊπŸ“‘πŸΈπŸš—πŸ₯œπŸŒ·πŸ˜ŽπŸ€₯πŸ’‡πŸ‘ŠπŸ“΅πŸš‘πŸ¬πŸ‘±πŸ‘πŸΌπŸŒ΄"8]7🐚DπŸŽΉπŸ‘…πŸ» # https://passw0rd.me/all/50 # pool size: 804 # possible combinations: 2e+145 # equivalent alphanumeric password length: 81.0 # this password would be compromised by # - a botnet* in: 1e+129 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds retail-calculate-attest-gliding-album-chrome # https://passw0rd.me/eff-passphrase/6 # pool size: 7776 # possible combinations: 2e+23 # equivalent alphanumeric password length: 13.0 # this password would be compromised by # - a botnet* in: 1e+7 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds KA([}flSQM1X3O`,aWiJV1b[lkHo->5d>cG4:c*:s>[`|{wV2k # https://passw0rd.me/ascii/50 # pool size: 94 # possible combinations: 5e+98 # equivalent alphanumeric password length: 55.0 # this password would be compromised by # - a botnet* in: 3e+82 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds EiUEq90Cw1fqHxz6HzneL0T4QzR9yMulobyHyyBWL85LJZJhP2 # https://passw0rd.me/alphanumeric/50 # pool size: 62 # possible combinations: 4e+89 # equivalent alphanumeric password length: 50.0 # this password would be compromised by # - a botnet* in: 3e+73 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds πŸ₯ͺπŸ₯ͺπŸŽ‰πŸ₯πŸ“¨πŸ₯—πŸπŸ‘€πŸ‘¦πŸ€«πŸ›πŸ€€πŸ₯–πŸ†πŸ˜žπŸŽΉπŸ˜‡πŸ™‚πŸ”πŸ₯πŸ˜½πŸ˜ πŸŒ”πŸ€³πŸ¨πŸŽ΅πŸ‘™πŸŽ„πŸŽ¦πŸŒŽπŸ€ πŸ£πŸ˜΅πŸ‘πŸ€˜πŸŒ‹πŸ“πŸ―πŸŽπŸ‘ΎπŸ’ΊπŸš΄πŸ‹πŸ’žπŸ‘ŸπŸŸπŸŽπŸ“πŸ•πŸ¬ # https://passw0rd.me/emoji/50 # pool size: 710 # possible combinations: 4e+142 # equivalent alphanumeric password length: 79.5 # this password would be compromised by # - a botnet* in: 2e+126 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds * Assuming 1 trillion MD5 hashes/second. http://dreamersion.com/research-papers/usage-of-botnets-for-high-speed-md5-hash-cracking/