Xiaomi Redmi K40 Pro
From Wiki-IoT
Revision as of 06:31, 27 October 2024 by Jeandecian (talk | contribs) (Jeandecian moved page 红米 K40 Pro to Xiaomi Redmi K40 Pro)
Classification
| Xiaomi Redmi K40 Pro | |
|---|---|
| Classification | |
| Grade | A |
| Calculator version | 1 |
| Classification date | 2024-10-27 |
| Information | |
| Name | Redmi K40 Pro |
| Brand by Parent | Redmi by Xiaomi |
| Generation | K40 series |
| Model(s) | Redmi K40 Pro |
| Release date | 2021-02-25 |
| Type/Category | Smartphone |
| Website | [1] |
| Status | End of sale |
| More | |
| Dimensions | 163.7×76.4×7.8mm |
| Mass | 196g |
| Operating system | Xiaomi HyperOS |
| Companion App | Mi Home |
| CPU | Qualcomm Snapdragon 888 |
| GPU | Qualcomm Adreno 660 |
| Memory | 6GB/8GB RAM ROM |
| Storage | 128GB/256GB |
| Battery | 4520mAh with 33W fast charging |
| Power | 4520mAh |
| Charging | 33W fast charging |
| Display | 6.67inch 2400x1080 pixels Full screen |
| Camera | Front-loaded 20MP postposition 64MP+8MP+5MP |
| Sound | |
| Connectivity | Wi - Fi 6, Bluetooth 5.1, NFC |
| Device | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Known hardware tampering | Rare | [2] | Xiaomi received information about a security vulnerability in the ARM Mali GPU Driver |
| Known vulnerabilities | Rare | [3] | Xiaomi received a Bluetooth mesh-related vulnerability from MTK in August 2022 |
| Prior attacks | None | [4] | Xiaomi received multiple DSP cache overflow vulnerabilities reported by MTK |
| Updatability | Rare | [5] | Xiaomi Cloud Service products have XSS vulnerabilities |
| Category score | 2 | ||
| System | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Authentication with other systems | Full | [6] | Presumably has good authentication |
| Communications | Encrypted with up-to-date encryption | [7] | Likely uses modern encryption |
| Storage | Encrypted with up-to-date encryption | [8] | Probably encrypts storage for safety |
| Category score | 1 | ||
| User Authentication | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Account management | Full | [9] | There is a wide range of account management |
| Authentication | Secure | [10] | There are a variety of authentication methods to ensure security |
| Brute-force protection | Exist | [11] | There may be brute force protection |
| Event logging | Access event logged | [12] | There are a number of security measures in place to ensure that logs are protected |
| Passwords | Require change after setup with complexity requirements | [13] | Data is password protected |
| Category score | 1 | ||
| Grade | A |
|---|