Argh... wouldn't that make it brute force attacks more efficient? E.g. the suspect/victim is born on May 31st, his iPhone allows 10 PIN attempts. Your attack algorithm becomes:
1. Input "0531" on another iPhone's setup screen.
2. Try "0531" and the other suggested PINs, based on distance from thumb to the option.
1. Input "0531" on another iPhone's setup screen.
2. Try "0531" and the other suggested PINs, based on distance from thumb to the option.