# Randomly Generated Passwords # https://pypi.org/project/pwdgen/ 🚯9πŸ˜ΆπŸš—πŸ’†πŸš’:🌽🚁🀝πŸ₯˜πŸ“³πŸ₯‡πŸ˜–πŸ’Έ0EπŸ˜ŠπŸƒπŸŒΉπŸ«πŸ₯•πŸ“$🐣?🎾😸😭🎣😨πŸ₯ŠπŸ’ΎxπŸπŸ’ΌπŸŒ—πŸ‘©πŸ€°!🏨XπŸ₯’yπŸšπŸ“˜πŸπŸ‘ΊπŸŸπŸ™€ # https://passw0rd.me/all/50 # pool size: 804 # possible combinations: 2e+145 # equivalent alphanumeric password length: 81.0 # this password would be compromised by # - a botnet* in: 1e+129 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds sandpaper-yesterday-placidly-charter-half-thousand # https://passw0rd.me/eff-passphrase/6 # pool size: 7776 # possible combinations: 2e+23 # equivalent alphanumeric password length: 13.0 # this password would be compromised by # - a botnet* in: 1e+7 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds t%"UD+b/+'hY]~Rq?PLO5(obivHhgm{Aij/Ni>Rh"L^C)^d$nr # https://passw0rd.me/ascii/50 # pool size: 94 # possible combinations: 5e+98 # equivalent alphanumeric password length: 55.0 # this password would be compromised by # - a botnet* in: 3e+82 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds 0nYUCiMRONJEpx24PD9QsJu1sdnUibAo6gLPW341TrDMTPdq6W # https://passw0rd.me/alphanumeric/50 # pool size: 62 # possible combinations: 4e+89 # equivalent alphanumeric password length: 50.0 # this password would be compromised by # - a botnet* in: 3e+73 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds πŸ₯‹πŸŽ…πŸŽ¨πŸŒΊπŸ’ΉπŸ“‘πŸŽŽπŸ›€πŸ‘’πŸ‘€πŸ¬πŸš„πŸ€—πŸ₯πŸš”πŸ’ŠπŸ‘€πŸ˜˜πŸœπŸΉπŸš΅πŸƒπŸŒ„πŸŒ‘πŸ‘ΈπŸ˜ΊπŸ₯ˆπŸ˜žπŸΈπŸŠπŸ™πŸ’†πŸ“–πŸΏπŸ’°πŸ“‘πŸŽπŸ₯πŸš•πŸ˜­πŸ’ŒπŸš³πŸšπŸ‘ΌπŸŒ—πŸ“˜πŸ‘žπŸ›πŸŒ„πŸ€΄ # https://passw0rd.me/emoji/50 # pool size: 710 # possible combinations: 4e+142 # equivalent alphanumeric password length: 79.5 # this password would be compromised by # - a botnet* in: 2e+126 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds * Assuming 1 trillion MD5 hashes/second. http://dreamersion.com/research-papers/usage-of-botnets-for-high-speed-md5-hash-cracking/