OPPO Reno5 Pro
From Wiki-IoT
Classification
OPPO Reno5 Pro | |
---|---|
Classification | |
Grade | A- |
Calculator version | [[:Category:Calculator v|]] |
Classification date | |
Information | |
Name | OPPO Reno5 Pro |
Brand | OPPO |
Generation | First generation |
Model(s) | OPPO Reno5 Pro |
Release date | 2020-01-01 |
Type/Category | Smartphone |
Website | [1] |
Status | In sale |
More | |
Dimensions | 159.7×73.2×7.6mm |
Mass | 173g |
Operating system | Android 11 (ColorOS 11.1) |
Companion App | OPPO App Market |
CPU | MediaTek Dimensity 1000+ |
GPU | Mali - G77 MC9 |
Memory | 8GB/12GB |
Storage | 128GB/256GB |
Battery | 4350mAh |
Power | 65W |
Charging | Wired fast charging |
Display | 6.55 - inch OLED, 2400×1080 resolution, 90Hz refresh rate |
Camera | Rear: 64MP + 8MP + 2MP + 2MP; Front: 32MP |
Sound | Stereo speakers |
Connectivity | 5G, Wi - Fi 6, Bluetooth 5.1, NFC |
Device | |||
---|---|---|---|
Criterion | Value | Proof(s) | Comment |
Known hardware tampering | None | [2] | No public reports of hardware tampering for OPPO Reno5 Pro. |
Known vulnerabilities | None | [3] | No major publicly known vulnerabilities reported for OPPO Reno5 Pro. |
Prior attacks | None | (search for OPPO Reno5 Pro attacks) | No public reports of prior targeted attacks on OPPO Reno5 Pro. |
Updatability | Very common | [4] | OPPO regularly provides software/firmware updates for OPPO Reno5 Pro. |
Category score | 1 |
System | |||
---|---|---|---|
Criterion | Value | Proof(s) | Comment |
Authentication with other systems | Partial | [5] | Can authenticate with some OPPO - compatible systems partially. |
Communications | Encrypted with up-to-date encryption | [6] | Uses modern encryption protocols for data transmission. |
Storage | Encrypted with up-to-date encryption | [7] | Employs up - to - date encryption for relevant stored data. |
Category score | 2 |
User Authentication | |||
---|---|---|---|
Criterion | Value | Proof(s) | Comment |
Account management | Basic | [8] | Allows basic account creation, login, and simple settings. |
Authentication | Secure | [9] | Uses secure methods for user authentication. |
Brute-force protection | Exist | [10] | Has mechanisms to detect and block brute - force attempts. |
Event logging | Access event logged | [11] | Logs user access events for security auditing. |
Passwords | Require change after setup with complexity requirements | [12] | Requires password change after initial setup and enforces complexity rules. |
Category score | 2 |
Grade | A- |
---|