# Randomly Generated Passwords # https://pypi.org/project/pwdgen/ ๐Ÿ˜ท^~๐Ÿ‘‡๐Ÿ˜ต๐Ÿฅฎ๐ŸดT๐Ÿ˜ญ๐Ÿฅง๐Ÿฅฃ๐Ÿ‘Š๐Ÿ’ž๐Ÿฅจ๐Ÿค›๐Ÿง๐Ÿ˜”p๐Ÿ˜‘8๐ŸฅŽ๐Ÿž๐Ÿ›๐Ÿ˜ธ,๐Ÿšซ๐Ÿ˜๐ŸŽผ๐Ÿซ๐Ÿ‘ฒh๐Ÿ“ƒ\i๐Ÿ’ฟ๐ŸŒค๐ŸŽท๐Ÿ˜‰a๐Ÿ—๐Ÿฐ๐Ÿ’ซ/๐Ÿคณ๐Ÿ˜‚๐Ÿšฑ๐Ÿ’‡๐Ÿฆ๐Ÿค’๐ŸŽ‚ # https://passw0rd.me/all/50 # pool size: 804 # possible combinations: 2e+145 # equivalent alphanumeric password length: 81.0 # this password would be compromised by # - a botnet* in: 1e+129 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds corrosive-jittery-reemerge-kennel-average-croak # https://passw0rd.me/eff-passphrase/6 # pool size: 7776 # possible combinations: 2e+23 # equivalent alphanumeric password length: 13.0 # this password would be compromised by # - a botnet* in: 1e+7 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds ,X&L#O&lvrQ{8-Q6i"=wE-"i|"Ao%"7Ab{5+B4+]5W6WJ__,b! # https://passw0rd.me/ascii/50 # pool size: 94 # possible combinations: 5e+98 # equivalent alphanumeric password length: 55.0 # this password would be compromised by # - a botnet* in: 3e+82 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds d5QknNnzc8XFnxJ9mXk0ioQ3xQktX3XTyS56KmvkHI1dRYA49l # https://passw0rd.me/alphanumeric/50 # pool size: 62 # possible combinations: 4e+89 # equivalent alphanumeric password length: 50.0 # this password would be compromised by # - a botnet* in: 3e+73 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds ๐Ÿผ๐Ÿš€๐Ÿ ๐Ÿ‘œ๐ŸŒ‰๐Ÿ™‚๐Ÿฅ•๐Ÿ—๐ŸŽฑ๐Ÿ’ฉ๐Ÿ‘ฐ๐Ÿƒ๐Ÿ‘๐ŸŽ๐Ÿคค๐Ÿ’Ÿ๐ŸŒ—๐Ÿƒ๐ŸŽŸ๐ŸŒ’๐Ÿ“๐Ÿคฎ๐Ÿšœ๐Ÿช๐Ÿšข๐Ÿ›ƒ๐Ÿ๐Ÿšฟ๐Ÿช๐Ÿšˆ๐Ÿ™๐Ÿคด๐Ÿฅ‰๐Ÿข๐Ÿ˜ซ๐Ÿ‘ผ๐ŸŽ’๐Ÿ‘Ž๐Ÿคจ๐Ÿค˜๐Ÿ‰๐Ÿ‘‰๐Ÿ˜๐Ÿ’Œ๐Ÿ˜พ๐Ÿ’น๐Ÿ‘ฐ๐Ÿ ๐Ÿ’ณ๐Ÿด # https://passw0rd.me/emoji/50 # pool size: 710 # possible combinations: 4e+142 # equivalent alphanumeric password length: 79.5 # this password would be compromised by # - a botnet* in: 2e+126 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds * Assuming 1 trillion MD5 hashes/second. http://dreamersion.com/research-papers/usage-of-botnets-for-high-speed-md5-hash-cracking/