# Randomly Generated Passwords # https://pypi.org/project/pwdgen/ všŸŽ…šŸŒ³|šŸ¶šŸ©šŸŖxšŸŒˆšŸ„‰šŸ‘«šŸ“¬šŸŒ—bšŸ¤‘šŸššŸ˜ŖšŸ˜®šŸšøšŸ‘¢šŸ˜ŽšŸŽ„šŸ’”šŸ’©šŸ“±%šŸ„ šŸ˜šŸŽ¬šŸ–šŸ‘™šŸ˜µšŸ‘ŒšŸ“šŸŒ·šŸ˜…šŸ»šŸššŸš±šŸŽ·%šŸ“¦ršŸ˜³šŸŽŽšŸ¤Ÿ,šŸŽøS# # https://passw0rd.me/all/50 # pool size: 804 # possible combinations: 2e+145 # equivalent alphanumeric password length: 81.0 # this password would be compromised by # - a botnet* in: 1e+129 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds refusing-delegator-ultimatum-improvise-engorge-tasty # https://passw0rd.me/eff-passphrase/6 # pool size: 7776 # possible combinations: 2e+23 # equivalent alphanumeric password length: 13.0 # this password would be compromised by # - a botnet* in: 1e+7 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds Y'Po{)o20q,\vdMh]H%^]%o3P_)Jt(HBS'3DspFZ%PxaGyZ^,o # https://passw0rd.me/ascii/50 # pool size: 94 # possible combinations: 5e+98 # equivalent alphanumeric password length: 55.0 # this password would be compromised by # - a botnet* in: 3e+82 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds 8TEOcsEGcOR5cozc4Sgyxeg26VjbYPtXftXQQJnp48tMpfpxH1 # https://passw0rd.me/alphanumeric/50 # pool size: 62 # possible combinations: 4e+89 # equivalent alphanumeric password length: 50.0 # this password would be compromised by # - a botnet* in: 3e+73 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds šŸŽ„šŸšøšŸšƒšŸ’æšŸ”šŸš§šŸŒ²šŸ¤³šŸŒ‹šŸ›šŸŽšŸ°šŸ˜˜šŸš¾šŸ’¼šŸ’¼šŸ©šŸ¤”šŸ¤‘šŸ˜®šŸ‘“šŸ’¤šŸ¤”šŸ“ŠšŸ˜¦šŸŽ³šŸŽæšŸ“ØšŸ†šŸŖšŸ’­šŸŒˆšŸ™šŸ˜ŗšŸŒ¹šŸ’­šŸ˜ššŸ““šŸ™…šŸ˜—šŸŽ‘šŸ“µšŸ¤šŸ“™šŸ”šŸ“ŽšŸ‡šŸ‘šŸššŸŒ # https://passw0rd.me/emoji/50 # pool size: 710 # possible combinations: 4e+142 # equivalent alphanumeric password length: 79.5 # this password would be compromised by # - a botnet* in: 2e+126 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds * Assuming 1 trillion MD5 hashes/second. http://dreamersion.com/research-papers/usage-of-botnets-for-high-speed-md5-hash-cracking/