﻿{"id":5848,"date":"2025-11-03T19:52:48","date_gmt":"2025-11-03T19:52:48","guid":{"rendered":"https:\/\/uni.hi.is\/helmut\/?p=5848"},"modified":"2025-11-17T07:54:40","modified_gmt":"2025-11-17T07:54:40","slug":"the-most-common-4-digit-pin-numbers","status":"publish","type":"post","link":"https:\/\/uni.hi.is\/helmut\/2025\/11\/03\/the-most-common-4-digit-pin-numbers\/","title":{"rendered":"The most common 4-digit PIN numbers"},"content":{"rendered":"<p>I found a nice <a href=\"https:\/\/informationisbeautiful.net\/visualizations\/most-common-pin-codes\/\">visualisation of the most common 4-digit PIN numbers<\/a>, based on 3.4 million PIN numbers from several data breaches: The 20 most common numbers make up 27% of the commonly used PIN numbers, i.e. from those 3.4 million PIN numbers used by people, more than a quarter were from this set of 20 PINs. <\/p>\n<pre><code class=\"\" data-line=\"\">\n\tPIN\tFreq\n#1\t1234\t10.713%\n#2\t1111\t6.016%\n#3\t0000\t1.881%\n#4\t1212\t1.197%\n#5\t7777\t0.745%\n#6\t1004\t0.616%\n#7\t2000\t0.613%\n#8\t4444\t0.526%\n#9\t2222\t0.516%\n#10\t6969\t0.512%\n#11\t9999\t0.451%\n#12\t3333\t0.419%\n#13\t5555\t0.395%\n#14\t6666\t0.391%\n#15\t1122\t0.366%\n#16\t1313\t0.304%\n#17\t8888\t0.303%\n#18\t4321\t0.293%\n#19\t2001\t0.290%\n#20\t1010\t0.285%\n<\/code><\/pre>\n<p>A <a href=\"http:\/\/www.datagenetics.com\/blog\/september32012\/index.html\">more detailed analysis<\/a> is also provided, e.g. dates are also likely, either years or MMDD \/ DDMM (Month, Day \/ Day, Month). <\/p>\n<p>Rule of thumb: what comes into your mind as easy to remember (e.g. birth dates) is what also comes into the mind of others -- and might therefore be tried by someone guessing your PIN code. So: do not use these!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I found a nice visualisation of the most common 4-digit PIN numbers, based on 3.4 million PIN numbers from several data breaches: The 20 most common numbers make up 27% of the commonly used PIN numbers, i.e. from those 3.4 million PIN numbers used by people, more than a quarter were from this set of [&hellip;]<\/p>\n","protected":false},"author":512,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[177208],"tags":[],"class_list":["post-5848","post","type-post","status-publish","format-standard","hentry","category-cybersecurity"],"_links":{"self":[{"href":"https:\/\/uni.hi.is\/helmut\/wp-json\/wp\/v2\/posts\/5848","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/uni.hi.is\/helmut\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/uni.hi.is\/helmut\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/uni.hi.is\/helmut\/wp-json\/wp\/v2\/users\/512"}],"replies":[{"embeddable":true,"href":"https:\/\/uni.hi.is\/helmut\/wp-json\/wp\/v2\/comments?post=5848"}],"version-history":[{"count":5,"href":"https:\/\/uni.hi.is\/helmut\/wp-json\/wp\/v2\/posts\/5848\/revisions"}],"predecessor-version":[{"id":5911,"href":"https:\/\/uni.hi.is\/helmut\/wp-json\/wp\/v2\/posts\/5848\/revisions\/5911"}],"wp:attachment":[{"href":"https:\/\/uni.hi.is\/helmut\/wp-json\/wp\/v2\/media?parent=5848"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/uni.hi.is\/helmut\/wp-json\/wp\/v2\/categories?post=5848"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/uni.hi.is\/helmut\/wp-json\/wp\/v2\/tags?post=5848"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}