# Randomly Generated Passwords # https://pypi.org/project/pwdgen/ ๐ŸŽ†๐Ÿ˜๐Ÿ’บ๐Ÿฌ๐Ÿ’–:๐Ÿ‘ต๐ŸŒจW๐Ÿšฝ๐Ÿ’ž๐Ÿ˜๐Ÿ’™B๐Ÿ™๐Ÿฆ๐Ÿšบ๐ŸŽ„๐Ÿง๐Ÿ™‰๐ŸŽก๐Ÿช๐ŸŽž๐ŸŽƒ๐Ÿ“Œ๐Ÿ˜š๐Ÿ“‚๐Ÿ““๐Ÿ๐Ÿ˜‹๐Ÿ“ฃ๐Ÿฅ›J๐Ÿ“๐Ÿ˜ˆc๐Ÿต๐ŸšŸ๐Ÿ“ซ๐Ÿ’ผ๐Ÿ๐Ÿ“ฒ๐Ÿ’ข๐Ÿคฏ๐ŸŽผ๐Ÿธ๐Ÿ“ฅ๐ŸŽ‡๐Ÿ˜œ๐ŸŒฟ # https://passw0rd.me/all/50 # pool size: 804 # possible combinations: 2e+145 # equivalent alphanumeric password length: 81.0 # this password would be compromised by # - a botnet* in: 1e+129 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds stainable-jimmy-password-foothill-dragging-flagship # https://passw0rd.me/eff-passphrase/6 # pool size: 7776 # possible combinations: 2e+23 # equivalent alphanumeric password length: 13.0 # this password would be compromised by # - a botnet* in: 1e+7 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds CT*&G}Kk9|.|eWM=tv{+RD5":U-3ULV0D)+g]!7u$bU{V7RjNy # https://passw0rd.me/ascii/50 # pool size: 94 # possible combinations: 5e+98 # equivalent alphanumeric password length: 55.0 # this password would be compromised by # - a botnet* in: 3e+82 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds ta4CS16AOMYotcTCk53DDtBruMoRsFxGkMHd2oIQWkXRIuR99E # https://passw0rd.me/alphanumeric/50 # pool size: 62 # possible combinations: 4e+89 # equivalent alphanumeric password length: 50.0 # this password would be compromised by # - a botnet* in: 3e+73 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds ๐Ÿ—๐Ÿ–๐Ÿ’ท๐Ÿฅ‰๐ŸŽ†๐Ÿฃ๐Ÿ‹๐Ÿ’˜๐Ÿ’๐Ÿ“ฆ๐Ÿ“‹๐Ÿด๐Ÿš€๐ŸŒ–๐Ÿ˜๐Ÿšญ๐Ÿฅ‹๐Ÿ“Š๐Ÿ˜ƒ๐Ÿจ๐Ÿ๐Ÿฎ๐Ÿ‚๐ŸŒฅ๐Ÿ“จ๐Ÿซ๐Ÿคค๐Ÿ“ถ๐ŸŒ๐Ÿถ๐ŸŽ๐Ÿ‡๐Ÿคค๐Ÿƒ๐Ÿ“ฅ๐ŸšŸ๐Ÿคถ๐Ÿ‘ต๐Ÿฅ‡๐ŸŽฐ๐Ÿ˜•๐Ÿ๐Ÿ’ƒ๐Ÿคข๐Ÿ•๐Ÿคฌ๐Ÿคจ๐Ÿ’ง๐Ÿ™‰๐Ÿ˜Š # https://passw0rd.me/emoji/50 # pool size: 710 # possible combinations: 4e+142 # equivalent alphanumeric password length: 79.5 # this password would be compromised by # - a botnet* in: 2e+126 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds * Assuming 1 trillion MD5 hashes/second. http://dreamersion.com/research-papers/usage-of-botnets-for-high-speed-md5-hash-cracking/