- Edited
If anyone is interested in getting more quantitative about password strength, I recommend checking out information about using the "entropy" of a given passphrase to measure its difficulty to crack:
https://en.wikipedia.org/wiki/Password_strength#Entropy_as_a_measure_of_password_strength
In general, many prefer diceware passwords because they offer a good balance between memorability and entropy. Surprisingly, this often enables stronger passwords than what you could typically achieve with a "random" string of letters, number, and symbols as some typically suggest.
(relevant - https://xkcd.com/936/ )
IMO, the EFF is a trusted resource with good tools for making your own diceware passwords:
https://www.eff.org/dice
You might consider the "mind palace" method to be a best practice for memorizing diceware passwords:
https://en.wikipedia.org/wiki/Method_of_loci
How much entropy do you need?
Depends on threat model. You'd need to first estimate how big of a (super)computer your threat actor has and how much time they would reasonably spend running that (super)computer to brute force it. There are also other considerations that are OS-specific like BFU/AFU, etc.
Wikipedia suggests that people with the most extreme threat models choose entropies of 256+
https://en.wikipedia.org/wiki/Key_size#Brute-force_attack
Maybe others have better rules of thumb for this?
Some of the discussion on this thread seems relevant here:
https://discuss.grapheneos.org/d/4997-police-took-my-pixel-6a-and-iphone-12-pro