{"id":1570,"date":"2012-09-27T11:12:39","date_gmt":"2012-09-27T11:12:39","guid":{"rendered":"http:\/\/www.kruptos2.co.uk\/blog\/?p=1570"},"modified":"2018-12-31T19:01:46","modified_gmt":"2018-12-31T19:01:46","slug":"all-credit-card-pin-numbers-in-the-world-leaked","status":"publish","type":"post","link":"https:\/\/kruptos2.co.uk\/blog\/all-credit-card-pin-numbers-in-the-world-leaked\/","title":{"rendered":"All Credit Card PIN Numbers in the World Leaked"},"content":{"rendered":"\n<p>There are 10,000 possible combinations that the digits 0-9 can be arranged to form a 4-digit pin code. Out of these ten thousand codes, which is the least commonly used? Which of these pin codes is the least predictable? Which of these pin codes is the most predictable? If you were given the task of trying to crack a random credit card by repeatedly trying PIN codes, what order should you try guessing to maximize your chances of selecting the correct number in the shortest time? If you had to make predication about what the least commonly used 4-digit PIN is, what would be your guess?<\/p>\n\n\n\n<p><a href=\"http:\/\/www.datagenetics.com\/blog\/september32012\/\">Read more here.<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>There are 10,000 possible combinations that the digits 0-9 can be arranged to form a 4-digit pin code. Out of these ten thousand codes, which is the least commonly used? Which of these pin codes is the least predictable? Which of these pin codes is the most predictable? If you were given the task of &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"ast-button\" href=\"https:\/\/kruptos2.co.uk\/blog\/all-credit-card-pin-numbers-in-the-world-leaked\/\"> <span class=\"screen-reader-text\">All Credit Card PIN Numbers in the World Leaked<\/span> Read More \u00bb<\/a><\/p>\n","protected":false},"author":1,"featured_media":1561,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"footnotes":""},"categories":[8,26],"tags":[27,31,29,30],"class_list":["post-1570","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-data-protection","category-security-alerts","tag-password","tag-pin","tag-privacy","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>All Credit Card PIN Numbers in the World Leaked - Kruptos Security Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kruptos2.co.uk\/blog\/all-credit-card-pin-numbers-in-the-world-leaked\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"All Credit Card PIN Numbers in the World Leaked - Kruptos Security Blog\" \/>\n<meta property=\"og:description\" content=\"There are 10,000 possible combinations that the digits 0-9 can be arranged to form a 4-digit pin code. Out of these ten thousand codes, which is the least commonly used? Which of these pin codes is the least predictable? Which of these pin codes is the most predictable? If you were given the task of &hellip; All Credit Card PIN Numbers in the World Leaked Read More \u00bb\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kruptos2.co.uk\/blog\/all-credit-card-pin-numbers-in-the-world-leaked\/\" \/>\n<meta property=\"og:site_name\" content=\"Kruptos Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2012-09-27T11:12:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-12-31T19:01:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/pinnumber.png\" \/>\n\t<meta property=\"og:image:width\" content=\"538\" \/>\n\t<meta property=\"og:image:height\" content=\"218\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Thiru\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Thiru\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/all-credit-card-pin-numbers-in-the-world-leaked\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/all-credit-card-pin-numbers-in-the-world-leaked\/\"},\"author\":{\"name\":\"Thiru\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/c4229b0c41d97c89affd312d9ae991cf\"},\"headline\":\"All Credit Card PIN Numbers in the World Leaked\",\"datePublished\":\"2012-09-27T11:12:39+00:00\",\"dateModified\":\"2018-12-31T19:01:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/all-credit-card-pin-numbers-in-the-world-leaked\/\"},\"wordCount\":117,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/all-credit-card-pin-numbers-in-the-world-leaked\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/pinnumber.png\",\"keywords\":[\"password\",\"PIN\",\"Privacy\",\"Security\"],\"articleSection\":[\"Data Protection\",\"Security Alerts\"],\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kruptos2.co.uk\/blog\/all-credit-card-pin-numbers-in-the-world-leaked\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/all-credit-card-pin-numbers-in-the-world-leaked\/\",\"url\":\"https:\/\/kruptos2.co.uk\/blog\/all-credit-card-pin-numbers-in-the-world-leaked\/\",\"name\":\"All Credit Card PIN Numbers in the World Leaked - Kruptos Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/all-credit-card-pin-numbers-in-the-world-leaked\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/all-credit-card-pin-numbers-in-the-world-leaked\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/pinnumber.png\",\"datePublished\":\"2012-09-27T11:12:39+00:00\",\"dateModified\":\"2018-12-31T19:01:46+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/all-credit-card-pin-numbers-in-the-world-leaked\/#breadcrumb\"},\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kruptos2.co.uk\/blog\/all-credit-card-pin-numbers-in-the-world-leaked\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/all-credit-card-pin-numbers-in-the-world-leaked\/#primaryimage\",\"url\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/pinnumber.png\",\"contentUrl\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/pinnumber.png\",\"width\":538,\"height\":218},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/all-credit-card-pin-numbers-in-the-world-leaked\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/kruptos2.co.uk\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"All Credit Card PIN Numbers in the World Leaked\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#website\",\"url\":\"https:\/\/kruptos2.co.uk\/blog\/\",\"name\":\"Kruptos Security Blog\",\"description\":\"The Kruptos Security Blog\",\"publisher\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kruptos2.co.uk\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#organization\",\"name\":\"Kruptos Security Blog\",\"url\":\"https:\/\/kruptos2.co.uk\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/logo.png\",\"contentUrl\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/logo.png\",\"width\":200,\"height\":58,\"caption\":\"Kruptos Security Blog\"},\"image\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/c4229b0c41d97c89affd312d9ae991cf\",\"name\":\"Thiru\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/a3bd051206da998bf4e2b7eb0620efff?s=96&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/a3bd051206da998bf4e2b7eb0620efff?s=96&r=g\",\"caption\":\"Thiru\"},\"description\":\"As a Security Specialist at Kruptos Security, Thiru has made it his mission to help users understand how cyber security works and why it\u2019s essential for any Internet user in the world. Using his background in Security Engineering, he speaks out relevant subjects and extracts actionable data and identity protection tip and key examples to illustrate them.\",\"url\":\"https:\/\/kruptos2.co.uk\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"All Credit Card PIN Numbers in the World Leaked - Kruptos Security Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kruptos2.co.uk\/blog\/all-credit-card-pin-numbers-in-the-world-leaked\/","og_locale":"en_US","og_type":"article","og_title":"All Credit Card PIN Numbers in the World Leaked - Kruptos Security Blog","og_description":"There are 10,000 possible combinations that the digits 0-9 can be arranged to form a 4-digit pin code. Out of these ten thousand codes, which is the least commonly used? Which of these pin codes is the least predictable? Which of these pin codes is the most predictable? If you were given the task of &hellip; All Credit Card PIN Numbers in the World Leaked Read More \u00bb","og_url":"https:\/\/kruptos2.co.uk\/blog\/all-credit-card-pin-numbers-in-the-world-leaked\/","og_site_name":"Kruptos Security Blog","article_published_time":"2012-09-27T11:12:39+00:00","article_modified_time":"2018-12-31T19:01:46+00:00","og_image":[{"width":538,"height":218,"url":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/pinnumber.png","type":"image\/png"}],"author":"Thiru","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Thiru","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kruptos2.co.uk\/blog\/all-credit-card-pin-numbers-in-the-world-leaked\/#article","isPartOf":{"@id":"https:\/\/kruptos2.co.uk\/blog\/all-credit-card-pin-numbers-in-the-world-leaked\/"},"author":{"name":"Thiru","@id":"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/c4229b0c41d97c89affd312d9ae991cf"},"headline":"All Credit Card PIN Numbers in the World Leaked","datePublished":"2012-09-27T11:12:39+00:00","dateModified":"2018-12-31T19:01:46+00:00","mainEntityOfPage":{"@id":"https:\/\/kruptos2.co.uk\/blog\/all-credit-card-pin-numbers-in-the-world-leaked\/"},"wordCount":117,"commentCount":0,"publisher":{"@id":"https:\/\/kruptos2.co.uk\/blog\/#organization"},"image":{"@id":"https:\/\/kruptos2.co.uk\/blog\/all-credit-card-pin-numbers-in-the-world-leaked\/#primaryimage"},"thumbnailUrl":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/pinnumber.png","keywords":["password","PIN","Privacy","Security"],"articleSection":["Data Protection","Security Alerts"],"inLanguage":"en","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kruptos2.co.uk\/blog\/all-credit-card-pin-numbers-in-the-world-leaked\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kruptos2.co.uk\/blog\/all-credit-card-pin-numbers-in-the-world-leaked\/","url":"https:\/\/kruptos2.co.uk\/blog\/all-credit-card-pin-numbers-in-the-world-leaked\/","name":"All Credit Card PIN Numbers in the World Leaked - Kruptos Security Blog","isPartOf":{"@id":"https:\/\/kruptos2.co.uk\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kruptos2.co.uk\/blog\/all-credit-card-pin-numbers-in-the-world-leaked\/#primaryimage"},"image":{"@id":"https:\/\/kruptos2.co.uk\/blog\/all-credit-card-pin-numbers-in-the-world-leaked\/#primaryimage"},"thumbnailUrl":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/pinnumber.png","datePublished":"2012-09-27T11:12:39+00:00","dateModified":"2018-12-31T19:01:46+00:00","breadcrumb":{"@id":"https:\/\/kruptos2.co.uk\/blog\/all-credit-card-pin-numbers-in-the-world-leaked\/#breadcrumb"},"inLanguage":"en","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kruptos2.co.uk\/blog\/all-credit-card-pin-numbers-in-the-world-leaked\/"]}]},{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/kruptos2.co.uk\/blog\/all-credit-card-pin-numbers-in-the-world-leaked\/#primaryimage","url":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/pinnumber.png","contentUrl":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/pinnumber.png","width":538,"height":218},{"@type":"BreadcrumbList","@id":"https:\/\/kruptos2.co.uk\/blog\/all-credit-card-pin-numbers-in-the-world-leaked\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/kruptos2.co.uk\/blog\/"},{"@type":"ListItem","position":2,"name":"All Credit Card PIN Numbers in the World Leaked"}]},{"@type":"WebSite","@id":"https:\/\/kruptos2.co.uk\/blog\/#website","url":"https:\/\/kruptos2.co.uk\/blog\/","name":"Kruptos Security Blog","description":"The Kruptos Security Blog","publisher":{"@id":"https:\/\/kruptos2.co.uk\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kruptos2.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en"},{"@type":"Organization","@id":"https:\/\/kruptos2.co.uk\/blog\/#organization","name":"Kruptos Security Blog","url":"https:\/\/kruptos2.co.uk\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/logo.png","contentUrl":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/logo.png","width":200,"height":58,"caption":"Kruptos Security Blog"},"image":{"@id":"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/c4229b0c41d97c89affd312d9ae991cf","name":"Thiru","image":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/a3bd051206da998bf4e2b7eb0620efff?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a3bd051206da998bf4e2b7eb0620efff?s=96&r=g","caption":"Thiru"},"description":"As a Security Specialist at Kruptos Security, Thiru has made it his mission to help users understand how cyber security works and why it\u2019s essential for any Internet user in the world. Using his background in Security Engineering, he speaks out relevant subjects and extracts actionable data and identity protection tip and key examples to illustrate them.","url":"https:\/\/kruptos2.co.uk\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/posts\/1570","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=1570"}],"version-history":[{"count":2,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/posts\/1570\/revisions"}],"predecessor-version":[{"id":1579,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/posts\/1570\/revisions\/1579"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/media\/1561"}],"wp:attachment":[{"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=1570"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=1570"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=1570"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}