(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Classification
Samsung Galaxy 25
|
Classification
|
Grade
|
B
|
Calculator version
|
[[:Category:Calculator v|]]
|
Classification date
|
|
Information
|
Name
|
Samsung Galaxy s25
|
Brand by Parent
|
Samsung by Samsung Electronics
|
Generation
|
25th - generation Galaxy smartphone
|
Model(s)
|
SM - XXXX
|
Release date
|
2025-01-23
|
Type/Category
|
Smartphone
|
Website
|
[www.samsung.com]
|
Status
|
In sale
|
More
|
Dimensions
|
To be announced
|
Mass
|
To be announced
|
Operating system
|
Android
|
Companion App
|
Samsung Health, Samsung Pay, Galaxy Store, etc.
|
CPU
|
Qualcomm Snapdragon 8 Gen 4
|
GPU
|
Adreno or Mali
|
Memory
|
12GB
|
Storage
|
256GB
|
Battery
|
Around 5000 mAh
|
Power
|
Rechargeable lithium - ion battery
|
Charging
|
Supports super - fast wired charging and wireless charging
|
Display
|
Dynamic AMOLED 2X display with high refresh rate
|
Camera
|
Multi - lens rear camera system;Front camera with high resolution for selfies and video calls
|
Sound
|
Stereo speakers with Dolby Atmos support
|
Connectivity
|
5G, Wi - Fi 7, Bluetooth 5.3, NFC, GPS, etc.
|
Device
|
Criterion
|
Value
|
Proof(s)
|
Comment
|
Known hardware tampering
|
Rare
|
[1]
|
|
Known vulnerabilities
|
Rare
|
[2]
|
|
Prior attacks
|
Rare
|
[3]
|
|
Updatability
|
Very common
|
[4]
|
|
Category score
|
2
|
System
|
Criterion
|
Value
|
Proof(s)
|
Comment
|
Authentication with other systems
|
Partial
|
[5]
|
|
Communications
|
Encrypted with up-to-date encryption
|
[6]
|
|
Storage
|
Encrypted with up-to-date encryption
|
[7]
|
|
Category score
|
2
|
User Authentication
|
Criterion
|
Value
|
Proof(s)
|
Comment
|
Account management
|
Basic
|
[8]
|
|
Authentication
|
Secure
|
[9]
|
|
Brute-force protection
|
Exist
|
[10]
|
|
Event logging
|
Partial logging
|
[11]
|
|
Passwords
|
Require change after setup with complexity requirements
|
[12]
|
|
Category score
|
2
|
The Samsung Galaxy S25 shows rare hardware tampering and vulnerabilities, with infrequent prior attacks. It has excellent updatability. System - wise, it enables partial authentication with other systems, and communications and storage use up - to - date encryption. For user authentication, it offers basic account management, secure authentication, brute - force protection, partial event logging, and requires password changes with complexity after setup.