# Randomly Generated Passwords # https://pypi.org/project/pwdgen/ 8šŸ’“`šŸ¤°šŸµšŸ˜µšŸ‘¾šŸŽƒšŸ’ŠšŸ„¢šŸ‘‚šŸ“»šŸ“šŸ¼šŸŽæšŸµšŸ˜¹šŸ¦šŸ˜šŸ˜ŽšŸ’ƒšŸ“¦šŸ’ÆšŸ˜“šŸŒ±šŸ˜šŸ„ŒHšŸ›€šŸ„­@šŸ’ÆšŸøšŸŽšŸ‘»XšŸ™‹šŸ‘’šŸ’‚šŸœšŸš¢šŸÆšŸŒ…šŸŽ­PšŸ’·šŸŒ†šŸŽ¬šŸ“žY # https://passw0rd.me/all/50 # pool size: 804 # possible combinations: 2e+145 # equivalent alphanumeric password length: 81.0 # this password would be compromised by # - a botnet* in: 1e+129 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds snugness-palatable-sneeze-yam-remission-designate # https://passw0rd.me/eff-passphrase/6 # pool size: 7776 # possible combinations: 2e+23 # equivalent alphanumeric password length: 13.0 # this password would be compromised by # - a botnet* in: 1e+7 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds (.zli=-[hn_/UmiK^x-*OL$jSV<:#9,fci~2kpdtt@S=(Xm;9N # https://passw0rd.me/ascii/50 # pool size: 94 # possible combinations: 5e+98 # equivalent alphanumeric password length: 55.0 # this password would be compromised by # - a botnet* in: 3e+82 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds f6JpGTf2tpDK5hzs0WeMrY3LbBNAiLb4vZKq8s5rOBJ3hZLtJS # https://passw0rd.me/alphanumeric/50 # pool size: 62 # possible combinations: 4e+89 # equivalent alphanumeric password length: 50.0 # this password would be compromised by # - a botnet* in: 3e+73 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds šŸ‘¼šŸ’†šŸ¦šŸŒ‘šŸ€šŸ‘‘šŸ“²šŸŒ°šŸ›ƒšŸ‘ƒšŸšŸ„šŸ’ šŸœšŸ“‰šŸš«šŸ¤£šŸ¤­šŸ¤¦šŸŽ®šŸŒØšŸššŸ¤§šŸ™šŸ‘½šŸ˜„šŸ’¦šŸ˜­šŸ›‚šŸŒ—šŸ’–šŸ›‚šŸ¤£šŸ“„šŸ¤“šŸŽÆšŸ’ƒšŸˆšŸ…šŸ˜™šŸˆšŸ¤šŸ‘€šŸ«šŸš”šŸ‘”šŸŒ˜šŸ’šŸ’…šŸ˜€ # https://passw0rd.me/emoji/50 # pool size: 710 # possible combinations: 4e+142 # equivalent alphanumeric password length: 79.5 # this password would be compromised by # - a botnet* in: 2e+126 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds * Assuming 1 trillion MD5 hashes/second. http://dreamersion.com/research-papers/usage-of-botnets-for-high-speed-md5-hash-cracking/