Using bottoms for generating passwords is actually top-security method :blobcatthinkingglare: