# Randomly Generated Passwords # https://pypi.org/project/pwdgen/ šŸ˜‚šŸ˜¼šŸ›€yšŸš®šŸ”šŸ‹šŸ’šŸš·šŸŒ¦šŸŽ°^šŸ¼šŸ‘‡šŸ¤°šŸ†šŸŒ‹šŸžšŸ‘™šŸžšŸ„“šŸ‰šŸ‘šŸ˜“šŸŽ¾šŸŒŒšŸŒŒšŸ˜šŸššŸš²sšŸ’³šŸ™šŸšŸ‘ŠcšŸ‘‹šŸ˜±+šŸŽÆšŸ‘œšŸ“šŸ‘—šŸ“ƒšŸ˜—šŸ¤²}.TzZDm:A#>"KH9>{bc5ZJ6[:%R^\xPrld' # https://passw0rd.me/ascii/50 # pool size: 94 # possible combinations: 5e+98 # equivalent alphanumeric password length: 55.0 # this password would be compromised by # - a botnet* in: 3e+82 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds iMatpJxtuwadcZHKIgegybmymKcDiWIBknexUjfkBpfLSA36UB # https://passw0rd.me/alphanumeric/50 # pool size: 62 # possible combinations: 4e+89 # equivalent alphanumeric password length: 50.0 # this password would be compromised by # - a botnet* in: 3e+73 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds šŸ•šŸŽŠšŸš¦šŸ’‹šŸŒ šŸšæšŸ®šŸ“›šŸ‘°šŸ‘‚šŸ¤®šŸšˆšŸš›šŸ”šŸ›‚šŸ„šŸ’·šŸ„ˆšŸ˜»šŸƒšŸ”šŸŒ©šŸ‘»šŸ¤®šŸ‘‘šŸ˜‡šŸµšŸ‘»šŸ®šŸ«šŸ“…šŸ„®šŸ˜¬šŸƒšŸšŸ‘¤šŸšŒšŸ€šŸ’šŸ˜ŠšŸ„£šŸ˜›šŸ’‡šŸ’—šŸš”šŸ˜±šŸ’¶šŸ‘¦šŸšŸ’ƒ # https://passw0rd.me/emoji/50 # pool size: 710 # possible combinations: 4e+142 # equivalent alphanumeric password length: 79.5 # this password would be compromised by # - a botnet* in: 2e+126 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds * Assuming 1 trillion MD5 hashes/second. http://dreamersion.com/research-papers/usage-of-botnets-for-high-speed-md5-hash-cracking/