# Randomly Generated Passwords # https://pypi.org/project/pwdgen/ ๐Ÿ‡๐ŸŒด'๐Ÿ†๐Ÿ‘ช๐Ÿ™ŽL๐Ÿฝ๐Ÿ‘•๐Ÿ‘ท๐Ÿ“ง๐Ÿ“๐Ÿš“๐Ÿ’Œ๐Ÿ’…๐Ÿคจ๐ŸŒก๐Ÿ’พ๐Ÿ˜ช๐Ÿคณ๐Ÿ“ฉ๐Ÿค“๐Ÿšš๐ŸŒฎ๐Ÿฌ๐Ÿ‘๐Ÿ€๐ŸŒ๐Ÿš๐Ÿ”๐ŸŒช๐Ÿž๐Ÿ›‚๐ŸŒซ๐Ÿ˜ฃ๐Ÿ™๐Ÿซ๐Ÿ“ž๐Ÿ‘ด๐ŸŽน๐Ÿš๐Ÿš‰๐Ÿฉ๐ŸŽŠ๐Ÿบ๐Ÿ’ซ๐Ÿ˜‹๐Ÿš‚๐Ÿ’ป๐Ÿ‘” # https://passw0rd.me/all/50 # pool size: 804 # possible combinations: 2e+145 # equivalent alphanumeric password length: 81.0 # this password would be compromised by # - a botnet* in: 1e+129 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds nursery-passion-muscular-chevron-erratic-swimming # https://passw0rd.me/eff-passphrase/6 # pool size: 7776 # possible combinations: 2e+23 # equivalent alphanumeric password length: 13.0 # this password would be compromised by # - a botnet* in: 1e+7 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds }ST7=?"?KbtD&PkjJ\,2Ikta3*r!kSfRr7ncJ"4!w@oKP9}[7y # https://passw0rd.me/ascii/50 # pool size: 94 # possible combinations: 5e+98 # equivalent alphanumeric password length: 55.0 # this password would be compromised by # - a botnet* in: 3e+82 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds JBf5oLaMU8Oe8OwNVTN8ZQTvtgxOVxeGnVSXu0PwpxtrZwZfDz # https://passw0rd.me/alphanumeric/50 # pool size: 62 # possible combinations: 4e+89 # equivalent alphanumeric password length: 50.0 # this password would be compromised by # - a botnet* in: 3e+73 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds ๐Ÿคข๐Ÿ›๐ŸŒ›๐Ÿš‘๐Ÿ˜ฌ๐Ÿ’ถ๐Ÿ…๐ŸŒš๐Ÿข๐Ÿฅ๐ŸŒฉ๐Ÿคœ๐Ÿ’ฉ๐Ÿฅซ๐Ÿฅฃ๐Ÿ•๐Ÿ๐Ÿ‘๐Ÿ“‰๐Ÿž๐Ÿš„๐Ÿญ๐Ÿคข๐Ÿž๐Ÿ“จ๐Ÿฆ๐Ÿ“…๐Ÿ˜ฟ๐Ÿ“„๐ŸŽ„๐Ÿšฒ๐Ÿ‹๐Ÿ›‚๐Ÿ˜ฌ๐Ÿ‘ฅ๐ŸŒฒ๐ŸฅŸ๐ŸŒš๐Ÿ‘‰๐Ÿ‘ฃ๐Ÿ“…๐Ÿ‘๐ŸŒ๐Ÿ‘ท๐Ÿ–๐Ÿ‘œ๐Ÿ’ด๐Ÿšฆ๐Ÿ˜๐Ÿ† # https://passw0rd.me/emoji/50 # pool size: 710 # possible combinations: 4e+142 # equivalent alphanumeric password length: 79.5 # this password would be compromised by # - a botnet* in: 2e+126 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds * Assuming 1 trillion MD5 hashes/second. http://dreamersion.com/research-papers/usage-of-botnets-for-high-speed-md5-hash-cracking/