# Randomly Generated Passwords # https://pypi.org/project/pwdgen/ šŸ‘“CšŸ‘•šŸ˜…šŸš¶šŸˆšŸŽ°šŸ£šŸŽƒšŸ CšŸ‘ƒkšŸ“ššŸ”šŸ’•šŸ¤©šŸ‘…šŸŽ…šŸŠšŸ‘€'šŸ““)šŸ»šŸ“—šŸ“–5šŸ’—šŸ¤·šŸ†šŸ˜nšŸ’ŖšŸŽšŸ“¬šŸŒ‚šŸ‚šŸ˜šŸ‘¾šŸ„ššŸ®šŸŽ¹_šŸ˜•šŸ‚šŸ“šŸ«šŸ“›šŸ” # https://passw0rd.me/all/50 # pool size: 804 # possible combinations: 2e+145 # equivalent alphanumeric password length: 81.0 # this password would be compromised by # - a botnet* in: 1e+129 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds swivel-sage-nearest-pork-wipe-putt # https://passw0rd.me/eff-passphrase/6 # pool size: 7776 # possible combinations: 2e+23 # equivalent alphanumeric password length: 13.0 # this password would be compromised by # - a botnet* in: 1e+7 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds (zO)~vKh8NMTf7]E-"x+s7TH&jPS # https://passw0rd.me/ascii/50 # pool size: 94 # possible combinations: 5e+98 # equivalent alphanumeric password length: 55.0 # this password would be compromised by # - a botnet* in: 3e+82 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds RsERse5ONlMqpDj1lmg99ZO60nsOTl3krkgIPOQcqGwsUxf0F4 # https://passw0rd.me/alphanumeric/50 # pool size: 62 # possible combinations: 4e+89 # equivalent alphanumeric password length: 50.0 # this password would be compromised by # - a botnet* in: 3e+73 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds šŸµšŸ‘æšŸ‘šŸ˜‘šŸ¢šŸ“¢šŸ¤žšŸ›šŸÆšŸŒØšŸ”šŸ’“šŸŒˆšŸš¹šŸ’„šŸ’‹šŸš“šŸŽØšŸ˜øšŸš£šŸ“»šŸ˜ššŸ„šŸ•šŸšŸŒšŸ’žšŸØšŸ’šŸ„œšŸ¤šŸ™‚šŸšŸ“‰šŸ„¤šŸš°šŸ“…šŸ¦šŸ‘ŖšŸ‹šŸ“™šŸššŸØšŸŒ¬šŸ’”šŸššŸ‘£šŸ‘šŸ™šŸŽŗ # https://passw0rd.me/emoji/50 # pool size: 710 # possible combinations: 4e+142 # equivalent alphanumeric password length: 79.5 # this password would be compromised by # - a botnet* in: 2e+126 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds * Assuming 1 trillion MD5 hashes/second. http://dreamersion.com/research-papers/usage-of-botnets-for-high-speed-md5-hash-cracking/