sqgl@sh.itjust.works to Technology@lemmy.worldEnglish · 2 days agoMost Common PIN Codesinformationisbeautiful.netexternal-linkmessage-square49linkfedilinkarrow-up1190arrow-down14file-textcross-posted to: dataisbeautiful@lemmy.ml
arrow-up1186arrow-down1external-linkMost Common PIN Codesinformationisbeautiful.netsqgl@sh.itjust.works to Technology@lemmy.worldEnglish · 2 days agomessage-square49linkfedilinkfile-textcross-posted to: dataisbeautiful@lemmy.ml
minus-squareRivalarrivallinkfedilinkEnglisharrow-up4arrow-down2·2 days agoUmm… There is one glaring flaw here: 3.4 million data points visualized from several data breaches. We are only looking at the pin codes of people whose data has been compromised.
minus-squaresqgl@sh.itjust.worksOPlinkfedilinkEnglisharrow-up17·2 days agoThey were leaked, not guessed.
minus-squarecodfishjoe@lemmy.worldlinkfedilinkEnglisharrow-up7·2 days agoGenerally these breaches happen on the service side rather than the user side. These likely include users even with secure and insecure alike.
Umm… There is one glaring flaw here:
We are only looking at the pin codes of people whose data has been compromised.
They were leaked, not guessed.
Generally these breaches happen on the service side rather than the user side. These likely include users even with secure and insecure alike.