curl
-able passphrases generated using entropy from
random.org
.
% curl --silent https://passphrase-me.onrender.com/ aries selma stamp mark % curl --silent https://passphrase-me.onrender.com/?size=5 qualm snap come molten embark
text/plain
responseFrom the web page for this other generator :
The relationship between the number of words in a pass phrase and the equivalent number of bits in an encryption key is as follows. We must assume [...] that the dictionary from which we choose words is known. This dictionary contains 27489 [..] words, so the information content of a word chosen randomly from the dictionary is [..] its order in the dictionary, 0 to 27488, or log2(27489)≈14.75 bits per word.
The word list used here has 7,776 entries. This leads to a slightly lower bits per word of 12.92. At the default length of 4, you're getting ~51 bits.
The inspirational xkcd comic states it would take a computer 550 years to brute force a passphrase with 44 bits of entropy, so we're doing at least that well. If you're concerned, increase the number of words.
Assuming you trust SSL, yes.
Aside from the word list itself, everything else (the random numbers, the generated passphrases) is stored only in memory and sent directly and only to you over an SSL connection.
If in doubt, please vet the source code yourself.
mkpasswd(1)
do this?Yes, but it generates gibberish passwords. This is meant to generate secure, but memorable passphrases.
Contact