# Randomly Generated Passwords # https://pypi.org/project/pwdgen/ šŸŒ–šŸ‘²šŸ˜„kšŸ›€šŸ˜°šŸŠšŸ‘§šŸ“†šŸ•šŸŽ‚šŸŽ…šŸ˜…šŸ‘…šŸ’™šŸŽ®šŸ˜ÆšŸ˜¾šŸ§šŸ˜‹FšŸ¤žšŸ‘…šŸ“­5šŸš†šŸ“²šŸŽ“!šŸ˜ƒšŸ„šŸšˆšŸ“£šŸ„”šŸ“’šŸ’–šŸ›šŸ’‚4šŸ„©šŸš§šŸ˜ŒšŸ˜šŸ’»y+šŸ˜ššŸ˜Ž1🤬 # https://passw0rd.me/all/50 # pool size: 804 # possible combinations: 2e+145 # equivalent alphanumeric password length: 81.0 # this password would be compromised by # - a botnet* in: 1e+129 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds borrower-presuming-deniable-onion-reproduce-outpour # https://passw0rd.me/eff-passphrase/6 # pool size: 7776 # possible combinations: 2e+23 # equivalent alphanumeric password length: 13.0 # this password would be compromised by # - a botnet* in: 1e+7 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds Av6)8p5st:TocqC~;Z$y9sa0/*PO.Taq;0WWL7Fh?wd8ltAV&B # https://passw0rd.me/ascii/50 # pool size: 94 # possible combinations: 5e+98 # equivalent alphanumeric password length: 55.0 # this password would be compromised by # - a botnet* in: 3e+82 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds HpHbESpyZLJcW6QnHWCTWya2fETnRLhjiBFI72ZnO9zo35iHYo # https://passw0rd.me/alphanumeric/50 # pool size: 62 # possible combinations: 4e+89 # equivalent alphanumeric password length: 50.0 # this password would be compromised by # - a botnet* in: 3e+73 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds šŸŒ‹šŸ‘‹šŸŽ§šŸŸšŸ’šŸšœšŸ¤µšŸ­šŸŽ°šŸ„˜šŸšŽšŸŒ½šŸš°šŸ“­šŸ˜ŸšŸššŸŽŸšŸŽ‡šŸ‘øšŸ¤—šŸ˜„šŸ˜ŠšŸ³šŸ¤”šŸŽ‘šŸšŖšŸŒ€šŸ¶šŸ¾šŸŽæšŸ“žšŸ‘§šŸ’’šŸ‘ššŸŽ“šŸ»šŸš—šŸ’œšŸš”šŸš’šŸ˜“šŸ‡šŸŒšŸ›šŸ“†šŸšŸ‘ŠšŸ’šŸ˜šŸ„— # https://passw0rd.me/emoji/50 # pool size: 710 # possible combinations: 4e+142 # equivalent alphanumeric password length: 79.5 # this password would be compromised by # - a botnet* in: 2e+126 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds * Assuming 1 trillion MD5 hashes/second. http://dreamersion.com/research-papers/usage-of-botnets-for-high-speed-md5-hash-cracking/