# Randomly Generated Passwords # https://pypi.org/project/pwdgen/ šŸ²šŸšŸ¤›šŸ šŸš„šŸ˜ŸšŸ¢(šŸ“·šŸ¤žšŸ˜‡šŸ†gšŸššŸ’ššŸ˜’šŸ¤­šŸŽŸšŸœšŸ‘µšŸŒ²šŸ’‹&šŸ“’šŸÆšŸ’¹šŸ˜°šŸŽ¶šŸ®šŸ–šŸšŸ²bšŸŒšŸ˜¦šŸ˜šŸ§šŸ’œšŸŽ„šŸ‘žšŸ’…šŸ˜„šŸ˜šŸ¦šŸ‘«šŸšŸššŸšµšŸ˜‡šŸ’“ # https://passw0rd.me/all/50 # pool size: 804 # possible combinations: 2e+145 # equivalent alphanumeric password length: 81.0 # this password would be compromised by # - a botnet* in: 1e+129 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds fifth-recharger-morbidity-removable-nativity-poser # https://passw0rd.me/eff-passphrase/6 # pool size: 7776 # possible combinations: 2e+23 # equivalent alphanumeric password length: 13.0 # this password would be compromised by # - a botnet* in: 1e+7 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds OvM2cp@nQD9E-"NC2SEwfiTt'WJNJxkE#Txjq.eL]hHe^ZjE!3 # https://passw0rd.me/ascii/50 # pool size: 94 # possible combinations: 5e+98 # equivalent alphanumeric password length: 55.0 # this password would be compromised by # - a botnet* in: 3e+82 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds QTO0tZoqR4Lavj3bIqbL4Sosi4ASWBULLFrklgk3QWqKQJtqjQ # https://passw0rd.me/alphanumeric/50 # pool size: 62 # possible combinations: 4e+89 # equivalent alphanumeric password length: 50.0 # this password would be compromised by # - a botnet* in: 3e+73 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds šŸ˜ššŸ¦šŸ¶šŸŽŗšŸžšŸ˜‚šŸ‹šŸ™‡šŸŽæšŸ‘­šŸ¤•šŸ¤„šŸ—šŸŒŽšŸ˜‚šŸŒ‚šŸ»šŸ©šŸš•šŸ’ŠšŸ€šŸ‘¾šŸ‘‰šŸ“°šŸšŸ“žšŸ“ŽšŸŒ€šŸ‰šŸŽŗšŸŒÆšŸ‘¦šŸØšŸŒ—šŸ“‰šŸ’·šŸ“‹šŸš³šŸŽ‡šŸŒ€šŸŽ¾šŸ„™šŸŽ‹šŸ„§šŸš”šŸ’§šŸ‘¼šŸ˜¢šŸ’‰šŸ‘® # https://passw0rd.me/emoji/50 # pool size: 710 # possible combinations: 4e+142 # equivalent alphanumeric password length: 79.5 # this password would be compromised by # - a botnet* in: 2e+126 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds * Assuming 1 trillion MD5 hashes/second. http://dreamersion.com/research-papers/usage-of-botnets-for-high-speed-md5-hash-cracking/