Xiaomi Redmi K60 Ultra
From Wiki-IoT
Revision as of 03:42, 15 October 2025 by Jeandecian (talk | contribs)
Classification
| Xiaomi Redmi K60 Ultra | |
|---|---|
| Classification | |
| Grade | B |
| Calculator version | 1 |
| Classification date | 2025-10-14 |
| Information | |
| Name | Xiaomi Redmi K60 Ultra |
| Brand by Parent | xiaomi by Xiaomi |
| Generation | |
| Model(s) | |
| Release date | 2024-08-02 |
| Type/Category | Smart phone |
| Website | [1] |
| Status | In sale |
| More | |
| Dimensions | |
| Mass | |
| Operating system | |
| Companion App | |
| CPU | |
| GPU | |
| Memory | |
| Storage | |
| Battery | |
| Power | |
| Charging | |
| Display | |
| Camera | |
| Sound | |
| Connectivity | |
| Device | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Known hardware tampering | None | [2] | No widespread or documented cases of hardware tampering for Redmi K50. |
| Known vulnerabilities | None | [3] | No major or widely - known vulnerabilities have been publicly reported for Redmi K50 recently. |
| Prior attacks | Very common | [] | There have been multiple reported instances of attacks targeting Redmi K50 devices, making prior attacks very common. |
| Updatability | None | [] | Redmi K50 has no available updates and is n |
| Category score | 2 | ||
| System | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Authentication with other systems | Full | [4] | Redmi K50 can fully authenticate with other Xiaomi systems via HyperConnect framework. |
| Communications | Encrypted with obselete encryption | [] | Uses older encryption protocols for communications, not up - to - date. |
| Storage | Encrypted with obselete encryption | [] | Storage encryption employs outdated algorithms. |
| Category score | 2 | ||
| User Authentication | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Account management | Full | [5] | Offers comprehensive account management features like creation, deletion, and modification. |
| Authentication | Basic | [] | Only basic authentication methods like password are available. |
| Brute-force protection | Exist | [] | Has mechanisms to prevent brute - force attacks, such as account locking after multiple failed attempts. |
| Event logging | Partial logging | [] | Logs only some user authentication events, not all. |
| Passwords | Require change after setup with complexity requirements | [6] | Requires password change after initial setup and enforces complexity rules like length and character types. |
| Category score | 2 | ||
| Grade | B |
|---|