# Randomly Generated Passwords # https://pypi.org/project/pwdgen/ ๐Ÿ“ฆ๐Ÿ›๐Ÿ‘ฟ๐Ÿ‘Š๐ŸŒธ๐Ÿ’ฑ๐Ÿ’†๐ŸšŽ๐Ÿ‚๐Ÿ‘ˆ๐ŸŽฟ๐Ÿšฌ!๐Ÿ‘ก๐ŸŽ€๐Ÿž๐Ÿ’…~๐Ÿ™†๐Ÿ–๐Ÿบ๐Ÿ‘ˆ๐Ÿ˜๐Ÿ‘๐Ÿค–h๐Ÿ’ฏ๐Ÿฅ–๐Ÿฅซ๐Ÿ๐Ÿš๐Ÿ‘ช๐Ÿ‘“๐Ÿ˜น๐Ÿฅ”๐Ÿ“€๐Ÿ˜ทe๐ŸŒฆ๐Ÿฅ’๐Ÿ“›๐ŸŽฉq๐Ÿฝ๐Ÿš†๐Ÿบ๐Ÿ’ฝ๐Ÿฅ”๐Ÿ’ฏ๐ŸŽŽ # https://passw0rd.me/all/50 # pool size: 804 # possible combinations: 2e+145 # equivalent alphanumeric password length: 81.0 # this password would be compromised by # - a botnet* in: 1e+129 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds effort-handbook-jersey-hummus-quizzical-viper # https://passw0rd.me/eff-passphrase/6 # pool size: 7776 # possible combinations: 2e+23 # equivalent alphanumeric password length: 13.0 # this password would be compromised by # - a botnet* in: 1e+7 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds /)*fjbL6_PpiUt`Iw,H=lcV8v@^%"#GQ8Y[pO,o)C+CkT-}WTQ # https://passw0rd.me/ascii/50 # pool size: 94 # possible combinations: 5e+98 # equivalent alphanumeric password length: 55.0 # this password would be compromised by # - a botnet* in: 3e+82 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds slzVJZ9rAB823683JcFtH10mLlp2pFSvAnrIDU9AKhBYAhzh0M # https://passw0rd.me/alphanumeric/50 # pool size: 62 # possible combinations: 4e+89 # equivalent alphanumeric password length: 50.0 # this password would be compromised by # - a botnet* in: 3e+73 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds ๐Ÿคฐ๐ŸŒฏ๐ŸŒ๐Ÿ™๐Ÿ˜ณ๐Ÿ‘ฐ๐ŸŒณ๐Ÿค—๐Ÿ’–๐Ÿ’›๐Ÿคน๐ŸŸ๐ŸŒƒ๐ŸŒบ๐Ÿ“ณ๐Ÿ“ฌ๐ŸŽบ๐ŸŽฑ๐Ÿ’ฎ๐Ÿœ๐Ÿฃ๐Ÿš–๐Ÿ’…๐ŸšŠ๐Ÿค›๐Ÿฅ๐Ÿ‘š๐Ÿ‹๐ŸŽŒ๐Ÿ’Ž๐Ÿ•๐Ÿ’ฒ๐Ÿก๐ŸŒพ๐Ÿ˜Š๐Ÿฏ๐Ÿš›๐Ÿ’ง๐Ÿฏ๐Ÿค๐Ÿš™๐Ÿšช๐ŸŒฒ๐Ÿค™๐ŸŽซ๐ŸŒŽ๐Ÿƒ๐Ÿ˜จ๐Ÿ๐Ÿ˜› # https://passw0rd.me/emoji/50 # pool size: 710 # possible combinations: 4e+142 # equivalent alphanumeric password length: 79.5 # this password would be compromised by # - a botnet* in: 2e+126 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds * Assuming 1 trillion MD5 hashes/second. http://dreamersion.com/research-papers/usage-of-botnets-for-high-speed-md5-hash-cracking/