# Randomly Generated Passwords # https://pypi.org/project/pwdgen/ šŸ“¢šŸ’“šŸØšŸŽ…šŸ”šŸŽ¶šŸ­šŸ˜‘šŸ’šŸŒ‘šŸŒ—šŸ«šŸ“²šŸŒšŸš§šŸšžšŸ¤«šŸšŸ’ˆšŸ›‚šŸ¢šŸŒ™|šŸŒ½šŸŒ¾šŸ“£šŸ›šŸ›QšŸ“¶"+h🚧🌯JšŸ°šŸ“„DšŸŒ»šŸŽ¼šŸ™WšŸ‘“šŸ˜ŠšŸ’‚šŸšŗšŸ¾šŸ˜šŸš„ # https://passw0rd.me/all/50 # pool size: 804 # possible combinations: 2e+145 # equivalent alphanumeric password length: 81.0 # this password would be compromised by # - a botnet* in: 1e+129 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds mutate-violin-diabolic-slip-dipped-overpower # https://passw0rd.me/eff-passphrase/6 # pool size: 7776 # possible combinations: 2e+23 # equivalent alphanumeric password length: 13.0 # this password would be compromised by # - a botnet* in: 1e+7 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds uIZ/,cg7u9yb[z8G+b#Tzv*`chf|^1Sk~igQh.jcwNT",:l$f+ # https://passw0rd.me/ascii/50 # pool size: 94 # possible combinations: 5e+98 # equivalent alphanumeric password length: 55.0 # this password would be compromised by # - a botnet* in: 3e+82 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds qrW98BP0EBwsRpeKBvh2VUWMEAkJM3nIS45DCF7VsMD9eROrMZ # https://passw0rd.me/alphanumeric/50 # pool size: 62 # possible combinations: 4e+89 # equivalent alphanumeric password length: 50.0 # this password would be compromised by # - a botnet* in: 3e+73 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds šŸ‘•šŸ‘ŽšŸ˜€šŸƒšŸ„ˆšŸ„§šŸ¤šŸ“¶šŸ«šŸ™…šŸš‚šŸ“˜šŸ˜¼šŸ¹šŸŸšŸšæšŸš»šŸš…šŸ’§šŸŽ³šŸŒƒšŸšŸ‘…šŸ“©šŸ‘¾šŸØšŸ‘¦šŸ¤¶šŸššŸ“¶šŸÆšŸšŸŒ‰šŸŒ‹šŸ’‘šŸ‘ŠšŸšžšŸ˜¶šŸŽ‚šŸ˜ÆšŸš»šŸ‘¶šŸ˜®šŸŒ‰šŸŸšŸ’…šŸ’æšŸš¤šŸ’šŸø # https://passw0rd.me/emoji/50 # pool size: 710 # possible combinations: 4e+142 # equivalent alphanumeric password length: 79.5 # this password would be compromised by # - a botnet* in: 2e+126 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds * Assuming 1 trillion MD5 hashes/second. http://dreamersion.com/research-papers/usage-of-botnets-for-high-speed-md5-hash-cracking/