# Randomly Generated Passwords # https://pypi.org/project/pwdgen/ πŸ₯‡πŸ˜πŸ“šπŸ’†πŸ€΄πŸ“ΌπŸŒΊπŸŽ‡πŸšπŸ˜ŠπŸˆπŸΉπŸ“¨πŸš™hπŸ’–T]πŸš•AπŸ“―πŸ“„πŸŒ³πŸ₯žπŸ˜‘πŸ£πŸ‘‘πŸšΏπŸ™€πŸ˜ŒπŸ†πŸ€³πŸ‘πŸ“΄QπŸ“ΈπŸ£πŸ“£πŸπŸ™πŸŒ”πŸ’πŸ₯”πŸšžπŸŒπŸ˜ΏπŸš™πŸ”πŸ’d # https://passw0rd.me/all/50 # pool size: 804 # possible combinations: 2e+145 # equivalent alphanumeric password length: 81.0 # this password would be compromised by # - a botnet* in: 1e+129 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds dorsal-refinance-dreamy-wager-proofs-shrine # https://passw0rd.me/eff-passphrase/6 # pool size: 7776 # possible combinations: 2e+23 # equivalent alphanumeric password length: 13.0 # this password would be compromised by # - a botnet* in: 1e+7 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds P4R'UoxM3RDpI7vnS~3oVZ:cI(mq=-x#q:,uv9Ahj1ys=!-lK. # https://passw0rd.me/ascii/50 # pool size: 94 # possible combinations: 5e+98 # equivalent alphanumeric password length: 55.0 # this password would be compromised by # - a botnet* in: 3e+82 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds QsuE5CvrtRsDhUiiL9LxXBVWJLsNyXw3eKm4Gs3pcGwh7WpwNJ # https://passw0rd.me/alphanumeric/50 # pool size: 62 # possible combinations: 4e+89 # equivalent alphanumeric password length: 50.0 # this password would be compromised by # - a botnet* in: 3e+73 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds πŸπŸŒ¬πŸš’πŸŒšπŸ˜­πŸ“§πŸπŸŽ‡πŸΏπŸ˜ΏπŸ‘›πŸ’ŠπŸ‡πŸ˜­πŸŒ¨πŸš»πŸš‚πŸ˜£πŸš’πŸ‘―πŸ΅πŸš°πŸ‡πŸœπŸ‘•πŸ₯—πŸ“ˆπŸ˜πŸ“€πŸπŸ πŸ…πŸ₯•πŸ–πŸπŸ’™πŸ„πŸ˜ΆπŸŒ³πŸ€―πŸ‘šπŸ˜”πŸš­πŸ™ŒπŸŠπŸŽΏπŸ˜€πŸŽΈπŸ“ΊπŸ‘Ά # https://passw0rd.me/emoji/50 # pool size: 710 # possible combinations: 4e+142 # equivalent alphanumeric password length: 79.5 # this password would be compromised by # - a botnet* in: 2e+126 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds * Assuming 1 trillion MD5 hashes/second. http://dreamersion.com/research-papers/usage-of-botnets-for-high-speed-md5-hash-cracking/