# Randomly Generated Passwords # https://pypi.org/project/pwdgen/ ๐Ÿ˜ถ๐Ÿ”๐Ÿคข๐Ÿ’ถ๐Ÿ˜™๐Ÿ“๐Ÿ‘†๐Ÿšถ๐Ÿฅช๐Ÿ•F๐Ÿญ๐Ÿคนx๐Ÿฅ’๐Ÿ’›๐ŸŒ๐Ÿšถ๐Ÿฅ๐ŸŒฌ๐Ÿ’ฎ๐Ÿ˜ฉ๐ŸŒ™๐Ÿถ๐Ÿ‘๐Ÿฅ‰๐Ÿฅ•๐Ÿ˜ค๐Ÿฅ‰:๐Ÿ‘ญ๐Ÿ๐ŸฅŸ๐Ÿถ๐ŸŒ๐Ÿ“ถt;๐ŸŽ๐Ÿ“€๐Ÿฅ๐Ÿ’ฃ๐Ÿซ๐Ÿ’๐Ÿ“๐Ÿ›ƒ๐Ÿ‘–๐Ÿ™๐ŸŽฏ๐Ÿก # https://passw0rd.me/all/50 # pool size: 804 # possible combinations: 2e+145 # equivalent alphanumeric password length: 81.0 # this password would be compromised by # - a botnet* in: 1e+129 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds myth-ooze-pouncing-pony-landfall-vanilla # https://passw0rd.me/eff-passphrase/6 # pool size: 7776 # possible combinations: 2e+23 # equivalent alphanumeric password length: 13.0 # this password would be compromised by # - a botnet* in: 1e+7 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds cN^!95II>iFD5u~>w)Y@GnB4B9kN9c]KUY^)fewMx.SfsEj[Ls # https://passw0rd.me/ascii/50 # pool size: 94 # possible combinations: 5e+98 # equivalent alphanumeric password length: 55.0 # this password would be compromised by # - a botnet* in: 3e+82 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds MfHfClyY2RBYKBD3N2DnptVCfmqF3i3oUcfwhHcSeqwg5stIeC # https://passw0rd.me/alphanumeric/50 # pool size: 62 # possible combinations: 4e+89 # equivalent alphanumeric password length: 50.0 # this password would be compromised by # - a botnet* in: 3e+73 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds ๐Ÿš™๐Ÿ˜ ๐Ÿ‘ธ๐ŸŒง๐Ÿ…๐Ÿ›๐Ÿ‘†๐Ÿš”๐Ÿ’ค๐ŸŽซ๐Ÿ“ซ๐Ÿฅจ๐Ÿ’‡๐Ÿ“๐Ÿต๐Ÿฅ๐Ÿ‘พ๐Ÿคธ๐Ÿคฉ๐ŸŽฒ๐Ÿค•๐Ÿข๐Ÿข๐ŸŽพ๐ŸŸ๐ŸŽด๐Ÿผ๐Ÿ’ฉ๐Ÿ›๐Ÿธ๐Ÿ‘จ๐Ÿ‘๐Ÿ‘—๐Ÿ’œ๐Ÿจ๐Ÿšœ๐ŸŒก๐Ÿ˜ฆ๐ŸŒ†๐Ÿ’๐Ÿ”๐Ÿคœ๐Ÿ‰๐Ÿฅ‡๐Ÿ‘ฟ๐Ÿ’ฟ๐ŸŒ€๐Ÿฟ๐Ÿ™…๐Ÿ“€ # https://passw0rd.me/emoji/50 # pool size: 710 # possible combinations: 4e+142 # equivalent alphanumeric password length: 79.5 # this password would be compromised by # - a botnet* in: 2e+126 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds * Assuming 1 trillion MD5 hashes/second. http://dreamersion.com/research-papers/usage-of-botnets-for-high-speed-md5-hash-cracking/