Xiaomi Redmi 10C
From Wiki-IoT
Revision as of 05:38, 31 October 2024 by Jeandecian (talk | contribs)
Classification
Xiaomi Redmi 10C | |
---|---|
Classification | |
Grade | A |
Calculator version | 1 |
Classification date | 2024-10-31 |
Information | |
Name | Redmi 10C |
Brand by Parent | Xiaomi by Xiaomi Corporation |
Generation | Redmi 10C series |
Model(s) | Redmi 10C |
Release date | 2022-04-04 |
Type/Category | Smartphone |
Website | [1] |
Status | In sale |
More | |
Dimensions | 169.6 mm x 76.6 mm x 8.3 mm |
Mass | 190 g |
Operating system | Android 11, MIUI 13 |
Companion App | Mi Home |
CPU | Qualcomm SM6225 Snapdragon 680 4G (6 nm) |
GPU | Adreno 610 |
Memory | 64GB 3GB RAM, 64GB 4GB RAM, 128GB 3GB RAM, 128GB 4GB RAM |
Storage | UFS 2.2 |
Battery | 5000mAh, Li-Po, non-removable |
Power | Supports 18W wired charging |
Charging | USB Type-C 2.0 |
Display | 6.71 inches IPS LCD, 720 x 1650 pixels, ~268 ppi density |
Camera | Dual rear (50 MP, f/1.8, 26mm (wide), PDAF + 2 MP, f/2.4, (depth)), Single front (5 MP, f/2.2) |
Sound | with stereo speakers, 3.5mm headphone jack |
Connectivity | Wi-Fi 802.11 a/b/g/n/ac, dual-band, Bluetooth 5.0, A2DP, LE, GPS, GLONASS, BDS, GALILEO, NFC (market/region dependent), USB Type-C 2.0, OTG |
Device | |||
---|---|---|---|
Criterion | Value | Proof(s) | Comment |
Known hardware tampering | Rare | [2] | Given Xiaomi's manufacturing quality, hardware tampering is likely to be uncommon. |
Known vulnerabilities | Rare | [3] | Xiaomi usually addresses security issues promptly, so known vulnerabilities for this model are likely to be few. |
Prior attacks | None | [4] | As of now, there are no known prior attacks on this device. |
Updatability | Very common | [5] | As a mid-range model, it is expected to receive some system updates and security patches. |
Category score | 2 |
System | |||
---|---|---|---|
Criterion | Value | Proof(s) | Comment |
Authentication with other systems | Full | [6] | Likely has basic authentication for connecting with other Xiaomi ecosystem products. |
Communications | Encrypted with up-to-date encryption | [7] | Probably uses standard encryption for communication. |
Storage | Encrypted with up-to-date encryption | [8] | Encrypts stored data to a certain extent. |
Category score | 1 |
User Authentication | |||
---|---|---|---|
Criterion | Value | Proof(s) | Comment |
Account management | Full | [9] | Offers basic account management functions. |
Authentication | Secure | [10] | Uses common authentication methods for security. |
Brute-force protection | Exist | [11] | Has some measures to prevent brute-force attacks. |
Event logging | Access event logged | [12] | May log some key events for security and troubleshooting. |
Passwords | Require change after setup with complexity requirements | [13] | Requires passwords with some complexity and may prompt for changes. |
Category score | 1 |
Grade | A |
---|