Xiaomi Redmi K20
From Wiki-IoT
Revision as of 17:52, 8 October 2025 by Jeandecian (talk | contribs) (Jeandecian moved page Xiaomi Redmi k20 to Xiaomi Redmi K20 without leaving a redirect)
Classification
| Xiaomi Redmi K20 | |
|---|---|
| Classification | |
| Grade | A- |
| Calculator version | 1 |
| Classification date | 2024-10-31 |
| Information | |
| Name | Redmi K20 |
| Brand by Parent | Xiaomi by Xiaomi Corporation |
| Generation | K20 series |
| Model(s) | Redmi K20 |
| Release date | 2019-05-28 |
| Type/Category | Smartphone |
| Website | [1] |
| Status | End of sale |
| More | |
| Dimensions | 156.7 x 74.3 x 8.8mm |
| Mass | 191g |
| Operating system | MIUI (based on Android 9) initially, upgradable |
| Companion App | Mi Home |
| CPU | Qualcomm Snapdragon 730 |
| GPU | Adreno 618 |
| Memory | 6GB RAM |
| Storage | 64GB/128GB |
| Battery | 4000mAh with 18W fast charging |
| Power | 4000mAh |
| Charging | 18W |
| Display | 6.39 - inch, 2340 x 1080 resolution, AMOLED |
| Camera | Rear: 48 - MP + 8 - MP + 13 - MP |
| Sound | |
| Connectivity | Rear: 48 - MP + 8 - MP + 13 - MP |
| Device | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Known hardware tampering | Rare | [2] | The hardware structure is relatively firm. Unauthorized modification is difficult due to the solid design and manufacturing process. Although not entirely impossible. |
| Known vulnerabilities | Rare | [3] | Xiaomi addresses potential security issues. There are relatively few serious and widespread known vulnerabilities thanks to timely updates. |
| Prior attacks | None | [4] | As of now, no significant prior attack events have been reported for the Redmi K20. This may be due to its security design, but it doesn't mean it's completely risk - free. |
| Updatability | Rare | [5] | The update frequency has decreased over time. However, some support was provided during its life cycle for user experience and security. |
| Category score | 2 | ||
| System | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Authentication with other systems | Full | [6] | Likely has good authentication for connecting with other systems based on Xiaomi's ecosystem and common practices. |
| Communications | Encrypted with obselete encryption | [7] | Probably uses modern encryption for communication to ensure data security. |
| Storage | Encrypted with obselete encryption | [8] | Most likely encrypts storage to protect user data. |
| Category score | 2 | ||
| User Authentication | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Account management | Full | [9] | Allows comprehensive account management operations like creating, deleting, and password changing. |
| Authentication | Secure | [10] | Uses multiple authentication methods like biometrics and passwords for security. |
| Brute-force protection | Exist | [11] | Expected to have measures to prevent brute - force attacks on passwords. |
| Event logging | Access event logged | [12] | Probably logs access events for security and troubleshooting. |
| Passwords | Require change after setup with complexity requirements | [13] | Typically requires complex passwords and prompts for changes to enhance security. |
| Category score | 1 | ||
| Grade | A- |
|---|