# Randomly Generated Passwords # https://pypi.org/project/pwdgen/ ๐Ÿ‘ ๐Ÿฅ๐Ÿ“ค๐ŸŽ๐ŸŒก๐ŸŒš๐ŸŽปS๐ŸŒท๐Ÿ‘ฟ๐Ÿ‡๐ŸŽˆ๐Ÿ‘ข๐Ÿ‹๐Ÿ‰๐Ÿธ๐Ÿค]๐Ÿป๐Ÿ“ข%๐ŸšŠ๐Ÿ‘ผ๐Ÿšฃ๐Ÿถ๐Ÿ“ญ๐Ÿ‹๐Ÿ˜œ๐Ÿ‚๐Ÿž๐Ÿ˜ฐ๐Ÿฅ๐Ÿฟ๐Ÿ๐Ÿ๐ŸŒŽ๐Ÿ‡๐Ÿ‘ป'๐Ÿšต๐Ÿ˜ˆ๐Ÿ‘›๐Ÿฆ๐Ÿฅ‡๐Ÿ“ฎ๐Ÿ†๐Ÿœ๐Ÿ’บ๐Ÿ‘๐Ÿ™Ž # https://passw0rd.me/all/50 # pool size: 804 # possible combinations: 2e+145 # equivalent alphanumeric password length: 81.0 # this password would be compromised by # - a botnet* in: 1e+129 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds oversold-dullness-earmark-abruptly-subgroup-scandal # https://passw0rd.me/eff-passphrase/6 # pool size: 7776 # possible combinations: 2e+23 # equivalent alphanumeric password length: 13.0 # this password would be compromised by # - a botnet* in: 1e+7 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds &]9@#Qof#jSsp{f-moq;vzn!IktmRx#9W>-MZS?vC6)h9~?ZOg # https://passw0rd.me/ascii/50 # pool size: 94 # possible combinations: 5e+98 # equivalent alphanumeric password length: 55.0 # this password would be compromised by # - a botnet* in: 3e+82 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds 7oQfIhgGgiP698jcWt6A7h7SmfLvdGdVkVrcCDXjdzy8kz7Kuz # https://passw0rd.me/alphanumeric/50 # pool size: 62 # possible combinations: 4e+89 # equivalent alphanumeric password length: 50.0 # this password would be compromised by # - a botnet* in: 3e+73 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds ๐Ÿคฆ๐Ÿ„๐Ÿ’ž๐Ÿ“ฎ๐Ÿšด๐Ÿšป๐Ÿฅ“๐Ÿ’”๐Ÿคถ๐Ÿ“๐Ÿ˜ง๐Ÿ‘€๐Ÿคฆ๐Ÿš–๐Ÿ‘›๐Ÿ•๐ŸŒ‹๐Ÿšฐ๐Ÿ˜ค๐Ÿบ๐Ÿ™๐Ÿ‘„๐Ÿšฃ๐Ÿค›๐Ÿ˜š๐Ÿ™๐Ÿค›๐ŸŒณ๐Ÿ†๐Ÿ˜Ÿ๐Ÿคข๐Ÿ˜ณ๐Ÿ“‡๐Ÿ’”๐Ÿ˜ ๐Ÿค•๐Ÿš†๐Ÿ‘ช๐Ÿฅž๐Ÿคน๐Ÿป๐Ÿพ๐Ÿช๐Ÿš ๐ŸŒฉ๐ŸŽต๐Ÿฅ๐Ÿคถ๐Ÿ›๐Ÿ  # https://passw0rd.me/emoji/50 # pool size: 710 # possible combinations: 4e+142 # equivalent alphanumeric password length: 79.5 # this password would be compromised by # - a botnet* in: 2e+126 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds * Assuming 1 trillion MD5 hashes/second. http://dreamersion.com/research-papers/usage-of-botnets-for-high-speed-md5-hash-cracking/