# Randomly Generated Passwords # https://pypi.org/project/pwdgen/ šŸš‹šŸ’ŗšŸ’¶šŸ¤µšŸ‚šŸ‘¼šŸ‘‚šŸ“ šŸæšŸŽ šŸŒ›šŸ‘’šŸ§šŸ’°šŸ‘ØšŸŒ…BšŸ¢šŸ„‹šŸ“ šŸ»šŸ‘®pšŸ’»šŸŠšŸŖšŸŒ³šŸ“šŸ¤ šŸš«šŸ›ƒšŸŽ“šŸ™šŸ“’šŸ—LšŸ“˜šŸŒæšŸš©šŸš¤šŸ’˜šŸš¶šŸš¬šŸœšŸ˜šŸŽšŸ€šŸ˜©qC # https://passw0rd.me/all/50 # pool size: 804 # possible combinations: 2e+145 # equivalent alphanumeric password length: 81.0 # this password would be compromised by # - a botnet* in: 1e+129 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds slightly-overthrow-secluding-radiation-sixtyfold-circle # https://passw0rd.me/eff-passphrase/6 # pool size: 7776 # possible combinations: 2e+23 # equivalent alphanumeric password length: 13.0 # this password would be compromised by # - a botnet* in: 1e+7 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds NzE6b8~.dp0JK|6W=a_]\$/m$MvnWrC>J}{Z*zwv&ba\]f2YaE # https://passw0rd.me/ascii/50 # pool size: 94 # possible combinations: 5e+98 # equivalent alphanumeric password length: 55.0 # this password would be compromised by # - a botnet* in: 3e+82 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds mQSpRG7OxTIYADXGIR2jS5Q5hAQjZwZoPa8VYwEIwTuqwZhyLI # https://passw0rd.me/alphanumeric/50 # pool size: 62 # possible combinations: 4e+89 # equivalent alphanumeric password length: 50.0 # this password would be compromised by # - a botnet* in: 3e+73 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds šŸ˜€šŸ¤—šŸ¤™šŸ“šŸ•šŸ„•šŸ’ÆšŸš§šŸ¼šŸ™€šŸ˜³šŸ¤®šŸ©šŸŽ„šŸš„šŸ˜—šŸ‘‘šŸŽ°šŸ³šŸÆšŸ„‡šŸšŖšŸ˜°šŸ¤ šŸ“›šŸ‘¤šŸš²šŸŒ­šŸ˜®šŸ¢šŸŽ“šŸšˆšŸŠšŸ‘®šŸŽ³šŸšžšŸ›ƒšŸ„•šŸ‘®šŸ™šŸ‹šŸŽŠšŸ˜¤šŸ’ššŸ‘–šŸ›„šŸ‘šŸš˜šŸ¤µšŸ† # https://passw0rd.me/emoji/50 # pool size: 710 # possible combinations: 4e+142 # equivalent alphanumeric password length: 79.5 # this password would be compromised by # - a botnet* in: 2e+126 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds * Assuming 1 trillion MD5 hashes/second. http://dreamersion.com/research-papers/usage-of-botnets-for-high-speed-md5-hash-cracking/