OPPO Reno5

From Wiki-IoT
Revision as of 14:53, 24 September 2025 by LiuJiaxin (talk | contribs) (Created page with "{{Classification |name=OPPO Reno5 |brand=OPPO |website=https://www.oppo.com/ |release_date=2020-01-01 |generation=First generation |model=OPPO Reno5 |type=Smartphone |status=E...")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)


Classification

OPPO Reno5
Classification
Grade A-
Calculator version [[:Category:Calculator v|]]
Classification date
Information
Name OPPO Reno5
Brand OPPO
Generation First generation
Model(s) OPPO Reno5
Release date 2020-01-01
Type/Category Smartphone
Website [1]
Status End of sale
More
Dimensions 159.1×73.4×7.9mm
Mass 172g
Operating system Android 11 (ColorOS 11.1)
Companion App OPPO App Market
CPU Qualcomm Snapdragon 765G
GPU Adreno 620
Memory 8GB
Storage 128GB/256GB
Battery 4300mAh
Power 65W
Charging Wired fast charging
Display 6.44 - inch AMOLED, 2400×1080 resolution, 90Hz refresh rate
Camera Rear: 64MP + 8MP + 2MP + 2MP; Front: 32MP
Sound Single speaker
Connectivity 5G, Wi - Fi 6, Bluetooth 5.1, NFC
Device
Criterion Value Proof(s) Comment
Known hardware tampering None [2] No public reports of hardware tampering for OPPO Reno5.
Known vulnerabilities None [3] No major publicly known vulnerabilities reported for OPPO Reno5.
Prior attacks None [4] No public reports of prior targeted attacks on OPPO Reno5.
Updatability Very common [5] OPPO regularly provides software/firmware updates for OPPO Reno5.
Category score 1
System
Criterion Value Proof(s) Comment
Authentication with other systems Partial [6] Can authenticate with some OPPO - compatible systems partially.
Communications Encrypted with up-to-date encryption [7] Uses modern encryption protocols for data transmission.
Storage Encrypted with up-to-date encryption [8] Employs up - to - date encryption for relevant stored data.
Category score 2
User Authentication
Criterion Value Proof(s) Comment
Account management Basic [9] Allows basic account creation, login, and simple settings.
Authentication Secure [10] Uses secure methods for user authentication.
Brute-force protection Exist [11] Has mechanisms to detect and block brute - force attempts.
Event logging Access event logged [12] Logs user access events for security auditing.
Passwords Require change after setup with complexity requirements [13] Requires password change after initial setup and enforces complexity rules.
Category score 2
Grade A-