PASSWORD GENERATOR
Generate strong, random passwords and PIN codes instantly. Uses cryptographic randomness. 100% client-side — nothing is ever transmitted or stored.
Strength Assessment
—
Generate a password to see strength
Entropy: — bits
Tick the box above to enable the generator.
Password Strength by Length
Calculated using a 95-character pool (all printable ASCII). Entropy = length × log₂(95).
The Mathematics of Password Security
A brute-force attack works by systematically trying every possible combination of characters until the correct password is found. Modern graphics cards can test billions of combinations per second — which is why password length matters so much more than memorability.
How this generator works
FindBeam uses window.crypto.getRandomValues() — the Web Crypto API built into every modern browser. This is the same cryptographic randomness source used by your operating system and is considered cryptographically secure. The generated password never leaves your browser tab.
Password Entropy Explained
Entropy measures unpredictability in bits. The formula is: entropy = length × log₂(pool size). Using all 95 printable ASCII characters gives approximately 6.57 bits per character. At 80+ bits of entropy, passwords are considered infeasible to brute-force with current hardware. At 100+ bits, they remain secure against future computing advances for the foreseeable future.
The time to crack scales exponentially with entropy — adding just one character to your password doesn't add a little time, it multiplies the attack time by the size of the character pool.
Password Security Best Practices
Use a Password Manager
A password manager stores all your generated passwords securely behind a single master password. You only need to remember one strong passphrase. Bitwarden (free, open-source), 1Password, and Dashlane are the most trusted options.
Never Reuse Passwords
When a service is breached, attackers test stolen passwords on every other major site (credential stuffing). A unique password for every account means a breach on one site cannot cascade to others. Generate a new password for each account.
Enable Two-Factor Auth
A strong password plus two-factor authentication (2FA) is significantly more secure than either alone. Even if your password is stolen in a breach, an attacker still needs physical access to your 2FA device. Use an authenticator app like Google Authenticator or Authy rather than SMS.
Check for Breaches
Use HaveIBeenPwned.com to check if your email address has appeared in any known data breaches. If it has, change those passwords immediately. Many password managers also check this automatically on your behalf.
PIN Codes — Why They Show "Weak"
Why does the meter show "Weak" for PINs?
PINs only use 10 digits (0–9). The entropy formula is: length × log₂(10) ≈ length × 3.32 bits. A 12-digit PIN has only ~40 bits of entropy — genuinely Weak by cryptographic standards. The strength meter is mathematically correct. What makes PINs safe in practice is the lockout policy, not entropy — explained below.
PIN codes use only the 10 digits (0–9), so their raw entropy is always much lower than an equivalent password. A short PIN can be guessed just by watching over your shoulder. The numbers below show the total possible combinations — this is what the lockout policy protects.
10,000
4-Digit PIN
~13 bits — guessable without lockout
1,000,000
6-Digit PIN
~20 bits — safe only with lockout
100,000,000
8-Digit PIN ✓
~27 bits — recommended minimum
10 billion+
10-Digit PIN
~33 bits — strong for a PIN
Most banking systems and device lock screens apply a lockout policy — the device locks or the account suspends after 3–10 failed attempts. This makes even a 4-digit PIN reasonably secure in practice because an attacker cannot try all 10,000 combinations — they get only a handful of attempts. The entropy meter correctly reflects the raw mathematical strength. Choose 8 digits minimum for any PIN where lockout might not apply, such as encrypted archives or offline systems.
Frequently Asked Questions
Is this password generator safe?
window.crypto.getRandomValues() — the Web Crypto API, which provides cryptographic-quality randomness. No password is ever transmitted to FindBeam's servers or any third party. You can verify this by switching to airplane mode — the generator still works.