# Randomly Generated Passwords # https://pypi.org/project/pwdgen/ šŸØšŸ“†kšŸŽ¢šŸ˜œšŸŽ”šŸ¤°šŸ³šŸš®šŸ’…šŸ“¬šŸ›„šŸŽ¤šŸ‘­šŸ“‹šŸ‡šŸššŸŽ£šŸ±šŸ“®šŸ‘ŒšŸŖšŸš’šŸ„žšŸŽˆšŸ‘šŸ“ŗšŸš‚všŸ˜…šŸš«šŸŒ–šŸ˜ŖšŸ“œšŸ“€šŸšŸ‘ššŸŽ†šŸ˜[šŸ„“šŸ“›8šŸšŸ”šŸ©šŸ‘‹šŸŒ›šŸŽ¶šŸ˜• # https://passw0rd.me/all/50 # pool size: 804 # possible combinations: 2e+145 # equivalent alphanumeric password length: 81.0 # this password would be compromised by # - a botnet* in: 1e+129 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds geometric-unhearing-agreeing-exerciser-awaken-ranging # https://passw0rd.me/eff-passphrase/6 # pool size: 7776 # possible combinations: 2e+23 # equivalent alphanumeric password length: 13.0 # this password would be compromised by # - a botnet* in: 1e+7 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds v.l=ftxOtE,J8e*!,`\IcTk(V # https://passw0rd.me/ascii/50 # pool size: 94 # possible combinations: 5e+98 # equivalent alphanumeric password length: 55.0 # this password would be compromised by # - a botnet* in: 3e+82 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds dUgCSBLo4eqRw3LEgkcx58eHbnXf5u4d5Ut62L11rmbrr8cPnq # https://passw0rd.me/alphanumeric/50 # pool size: 62 # possible combinations: 4e+89 # equivalent alphanumeric password length: 50.0 # this password would be compromised by # - a botnet* in: 3e+73 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds šŸ“‘šŸ™‰šŸ»šŸŽ‹šŸšØšŸ˜©šŸ›šŸ„—šŸŽµšŸ“šŸŒžšŸŽ»šŸšŸš¹šŸ•šŸ’¤šŸ¤ŖšŸ¤šŸ¤„šŸ‘ŸšŸ¼šŸ‘“šŸ’®šŸŒšŸ‘»šŸ“šŸŒ šŸ’‡šŸ¤šŸ˜ŠšŸŽ¹šŸ‡šŸŽŽšŸš“šŸ›‚šŸ€šŸ˜ššŸ‘ŸšŸŒšŸš–šŸ‘£šŸŽ¹šŸŽ“šŸ¤ÆšŸŽ±šŸ‘ŽšŸ‘£šŸ˜ÆšŸ˜ŸšŸ¬ # https://passw0rd.me/emoji/50 # pool size: 710 # possible combinations: 4e+142 # equivalent alphanumeric password length: 79.5 # this password would be compromised by # - a botnet* in: 2e+126 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds * Assuming 1 trillion MD5 hashes/second. http://dreamersion.com/research-papers/usage-of-botnets-for-high-speed-md5-hash-cracking/