# Randomly Generated Passwords # https://pypi.org/project/pwdgen/ πŸ€²πŸŒπŸΏπŸŒ—πŸ©πŸ„πŸ˜ŠπŸ‘πŸ“·πŸ€¦πŸ₯’🎻🀞πŸ₯NπŸ˜©πŸŒ‡πŸš­πŸ“†πŸ‘€πŸ™ˆπŸ’ΌπŸžπŸ˜΅πŸŒ€πŸ˜±πŸŽ΅πŸ±πŸ‘ΊπŸ’¨πŸ˜³πŸ€ΆπŸ˜¨πŸš±πŸ’…πŸ˜§πŸ“³πŸŒ…πŸ€£πŸŒ­πŸ¨πŸ€¬πŸ‘ΏBπŸ‘ΌπŸ˜―πŸ˜•πŸ₯§πŸˆπŸ“™ # https://passw0rd.me/all/50 # pool size: 804 # possible combinations: 2e+145 # equivalent alphanumeric password length: 81.0 # this password would be compromised by # - a botnet* in: 1e+129 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds aviation-boasting-semisweet-headway-thermal-unadorned # https://passw0rd.me/eff-passphrase/6 # pool size: 7776 # possible combinations: 2e+23 # equivalent alphanumeric password length: 13.0 # this password would be compromised by # - a botnet* in: 1e+7 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds #&?n/OWB9Y#_4q<3d}&OJn%!JkF8<^L,\-1ffen,sJ[S:TaL>; # https://passw0rd.me/ascii/50 # pool size: 94 # possible combinations: 5e+98 # equivalent alphanumeric password length: 55.0 # this password would be compromised by # - a botnet* in: 3e+82 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds G2JufNwQtdwDqlfrX3Rvmx0qBo5iPOVtDG7L9cUhxIpoIYYTov # https://passw0rd.me/alphanumeric/50 # pool size: 62 # possible combinations: 4e+89 # equivalent alphanumeric password length: 50.0 # this password would be compromised by # - a botnet* in: 3e+73 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds πŸ₯‘πŸ‘—πŸ‹πŸ“›πŸ’•πŸ’πŸ₯—πŸ†πŸ’πŸπŸŒ”πŸš‘πŸŽΌπŸ“¬πŸ˜ΌπŸ“•πŸŒ‹πŸ’­πŸ’ͺπŸ˜πŸŽ­πŸ’§πŸ₯˜πŸŽ£πŸ€ŸπŸŒ•πŸ˜―πŸ₯ˆπŸŒΌπŸžπŸš΅πŸ‘—πŸ€πŸ‘ΌπŸ˜ΎπŸŒ“πŸ€³πŸŒΉπŸ‘―😒πŸ€₯πŸ‘½πŸ€žπŸ₯¦πŸš‘πŸ€ŸπŸŒ”πŸ˜ˆπŸ‘΅πŸ‘š # https://passw0rd.me/emoji/50 # pool size: 710 # possible combinations: 4e+142 # equivalent alphanumeric password length: 79.5 # this password would be compromised by # - a botnet* in: 2e+126 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds * Assuming 1 trillion MD5 hashes/second. http://dreamersion.com/research-papers/usage-of-botnets-for-high-speed-md5-hash-cracking/