yeah I get the high security stuff use case. But didn't see that as the norm, ie the average use case.The company had to have ISO certifications which includes a password policy so we could work for clients like banks and certain government entities.
In a nutshell, Windows 10 PIN is just a shortcut to unlock the security system which will let you in. It only works with physical access and reverts to asking the password after a handful of failed attempts, which is utterly inadequate to brute force even the simplest PINs.
Another problem is, that the password unlocks the keys used for disk encryption. Many (most?) systems store these on the same disk (but on a different partition), so an attacker can attempt to brute force the password programmatically and gain access to the encryption keys. Newer systems (M1 and Intels with T2) store these keys in the secure enclave with brute force protection, but this doesn't work for removable devices and no company will write policies differentiated by hardware models.
Also I forget the default doesn't limit Mac login password entries. By default iPHone is that way.
But recently i noticed Apple let me use my Mac login pass to confirm things that normally I would need my AppleID pass for. ...thus sort of working like the Windows PIN to me.
I guess it's all because I set up Apple ID unlock on my Mac:
"In the future, if you forget your Mac user account password, when you try to log in, after three tries, your Mac will prompt you to reset your password using your Apple ID."
So for me the Mac login works like Windows pin and roughly like the iPhone pin.
Last edited: