# Randomly Generated Passwords # https://pypi.org/project/pwdgen/ šŸ¤šŸ”šŸ„šŸ’ŸšŸ„„šŸ¤µšŸ“§šŸ’‰šŸŒŽšŸ‘šŸš»šŸšŖšŸ¤šŸ‘›šŸŽ‘šŸŒ®šŸ¤ šŸŒ…?šŸŽƒšŸŒ“šŸ™…šŸ˜†qšŸŽšŸŒ…?šŸŒ•šŸ–šŸ’”šŸ¤žl🌼🐁i^šŸ‘”šŸ˜³šŸ˜€}šŸ‘·šŸŒ±šŸ‘•šŸ˜˜QšŸ¤‘J🄤M- # https://passw0rd.me/all/50 # pool size: 804 # possible combinations: 2e+145 # equivalent alphanumeric password length: 81.0 # this password would be compromised by # - a botnet* in: 1e+129 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds threaten-angelic-wish-sponge-circling-risotto # https://passw0rd.me/eff-passphrase/6 # pool size: 7776 # possible combinations: 2e+23 # equivalent alphanumeric password length: 13.0 # this password would be compromised by # - a botnet* in: 1e+7 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds >V8"&#f^*\c-%0&+K/w9gF)8{|*>|SLj[Is%2$l`Yv!KGhKWat # https://passw0rd.me/ascii/50 # pool size: 94 # possible combinations: 5e+98 # equivalent alphanumeric password length: 55.0 # this password would be compromised by # - a botnet* in: 3e+82 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds npaeeHD9VawKDkt8IN3Swbx5QmBmqyMs5jHR8vJJDDyFgIs49H # https://passw0rd.me/alphanumeric/50 # pool size: 62 # possible combinations: 4e+89 # equivalent alphanumeric password length: 50.0 # this password would be compromised by # - a botnet* in: 3e+73 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds šŸŒ¾šŸŒ‘šŸ™šŸ’šŸØšŸš”šŸ‘„šŸ¼šŸ²šŸ…šŸ„šŸŽ«šŸ“”šŸŽžšŸ„¢šŸ„šŸ“«šŸš°šŸ–šŸ’¹šŸŽ¾šŸŒ¾šŸšŸšŸššŸ“¹šŸŽ©šŸ‘±šŸ¤šŸ˜øšŸ³šŸ“†šŸ“ šŸŗšŸŽ¼šŸ‘«šŸš©šŸŽŒšŸš”šŸ›ƒšŸ¤­šŸŽ„šŸ“«šŸ“•šŸ˜„šŸ˜šŸ“šŸ˜–šŸŽˆšŸŒŖšŸšš # https://passw0rd.me/emoji/50 # pool size: 710 # possible combinations: 4e+142 # equivalent alphanumeric password length: 79.5 # this password would be compromised by # - a botnet* in: 2e+126 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds * Assuming 1 trillion MD5 hashes/second. http://dreamersion.com/research-papers/usage-of-botnets-for-high-speed-md5-hash-cracking/