You don't NEED this page. But it will certainly help with your 'online' data security.

1. Passwords are often the first line of defense for securing your online presence / data / systems.
2. Passwords must  be strong ,  kept safe & secured , and  changed regularly  (e.g. every 6-12 months).
3.  As humans, we can't easily create difficult passwords everytime. We get tired of thinking hard, and often end up making costly mistakes:
     - using favourate names / places / phrases - e.g. Johny1985, GoaBeach2023, iLoveCats (easily guessed)
     - using same passwords for different sites (so if one is hacked, so can another be!)
     - recycling passwords with no/minor changes e.g. iLoveMyCatJan2024 and next month iLoveMyCatFeb2024 (once hacked, can be hacked more easily next time!)
4. Criminals take advantage of these mistakes to guess your password , 'break in' to your accounts, and even sell your password (&/or other useful details) to other hackers!
5. Criminals use computerised tools to keep guessing your password, and try until they succeed. These tools can guess easy passwords very quickly.

But HOW EXACTLY does this page HELP ME?
1. This page helps you by  creating VERY STRONG random passwords  that would take 'nonillion' years (10, followed by 30 zeroes) to guess with current non-Quantum Computers.
2. Lets you copy the chosen password into your 'clip-board', and then to 'clear' the page.

   #1. Create passwords: To create a list of strong passwords (for you to choose from) : Click
     
   #2. Copy a password: To copy your chosen password into 'clip-board' : tap / click on it.
      If you do this, please  remember to clear the 'clip-board' on your device after your use. 







1. The Passwords created on this page are strong (stronger than many reputed websites!)
   Password strength / complexity is a function of LENGTH, CHARACTER-SET, avoidance of common PATTERNS (e.g. dictionary words; consecutive / neighboring characters).
     - Length: creates passwords of length 25.
     - Character-set: use the characters specified by    Oracle
     - Patterns: as guided by    University of Illinois at Chicago

2. Everything happens & stays ONLY on your browser i.e. it is fully PRIVATE.
     - All 'processing' happens on YOUR browser. No data flows OUTSIDE.
     - Nothing is saved anywhere (not even on your device)
         - the ONLY 'copy' that may happen is into YOUR 'clip-board' (if you click the 'copy' button).
      You can test this by disconnecting your device from the internet, and this page will still work!

3. Transparency: This page offers additional security through transparency.
     You are welcome to check the "source code" yourself (or get it checked by a computer-savvy friend!) :
       - right click and "view page source" (or press F12 or Cntrl+U),
       - locate <HEAD> tag on the top, and then the <SCRIPT SRC> tag,
       - opening the .js i.e. javascript file (mentioned in the SCRIPT SRC tag).
       - conditionally, opening any further .js files from there.

     Please note:
       - Transparency (of the algorithm to create passwords) does not risk your password security.
       - The Password itself must  be strong and kept safe & secured .

       References:
       1.    Kerckhoff's Principle
       2.    Security Through Obscurity

Notes & recommended use:
  1. All passwords created on this page have the same 'strength'. You may check the strength of a password (created on this page) - to get a sense of how strong it is.
  2. For password privacy, it is NOT advisable to check the strength of THE EXACT PASSWORD  you intend to USE (for real life purposes) on ANY external site.
  3. Therefore, when it comes to chosing a password for real life uses, choose a password (created on this page) that you have NOT used to 'strength test' on an external site.

The strength of Passwords can be checked on these external sites:

Disclaimer:
1. These are 3rd party websites, and this website/its author/its hosting company are in NO WAY connected to, affiliated to, or responsible for any accuracy/functioning of these 3rd party websites, or any harm to anyone arisen from their use.
2. Users may use their own discretion / perform their own research to use any tool to get a sense of the strength of passwords generally created on THIS website.