Samsung Galaxy A36 5G
From Wiki-IoT
Revision as of 17:13, 16 October 2025 by Jeandecian (talk | contribs)
Classification
| Samsung Galaxy A36 5G | |
|---|---|
| Classification | |
| Grade | A- |
| Calculator version | 1 |
| Classification date | 2025-10-16 |
| Information | |
| Name | Samsung Galaxy A36 5G |
| Brand by Parent | Samsung by Samsung |
| Generation | 36th generation |
| Model(s) | SM - A366B |
| Release date | 2025-03-02 |
| Type/Category | Smart phone |
| Website | [www.samsung.com] |
| Status | In sale |
| More | |
| Dimensions | 160 × 75 × 8.5 mm |
| Mass | 190 g |
| Operating system | Android 14 with One UI 6.0 |
| Companion App | Samsung Members、Galaxy Store |
| CPU | Snapdragon 6 Gen 3 |
| GPU | Adreno 710 |
| Memory | 8GB |
| Storage | 128GB |
| Battery | 5000mAh |
| Power | ~ 19 Wh |
| Charging | 45W |
| Display | 1080 × 2340, Super AMOLED, 120Hz, Gorilla Glass Victus+ |
| Camera | 50MP main + 8MP ultra-wide + 5MP macro rear; 12MP front camera |
| Sound | Stereo speakers; no 3.5mm jack |
| Connectivity | 5G; Wi-Fi (latest standards); NFC; under-display fingerprint; IP67 water & dust resistance |
| Device | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Known hardware tampering | Rare | [1] | Samsung Knox provides hardware-level security, making physical tampering extremely rare and difficult for non-state actors. |
| Known vulnerabilities | Very common | [2] | As a popular device, it is regularly audited by security researchers, leading to a common and healthy cycle of vulnerability discovery and patching. |
| Prior attacks | Very common | [3] | The Android OS is a frequent target for malware and phishing campaigns, making attacks on the platform very common, regardless of the device tier. |
| Updatability | Very common | [4] | Samsung provides one of the best update policies in the Android space, offering years of frequent security and OS updates even for its mid-range devices. |
| Category score | 3 | ||
| System | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Authentication with other systems | Full | [5] | The Android OS provides full support for modern authentication standards (OAuth, Passkeys, etc.) for secure service integration. |
| Communications | Encrypted with up-to-date encryption | [6] | All modern network communications (Wi-Fi 6/WPA3, 5G, HTTPS/TLS 1.3) use strong, up-to-date encryption standards. |
| Storage | Encrypted with up-to-date encryption | [7] | Modern Android devices enforce mandatory file-based encryption by default to protect user data at rest. |
| Category score | 1 | ||
| User Authentication | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Account management | Full | [8] | The system offers comprehensive controls for adding, removing, and managing permissions for multiple user accounts. |
| Authentication | Secure | [9] | It supports strong, hardware-backed authentication methods, including an under-display fingerprint sensor and complex PIN/passwords. |
| Brute-force protection | Exist | [10] | The lockscreen implements an exponential back-off delay after repeated failed unlock attempts to mitigate brute-force attacks. |
| Event logging | Access event logged | [11] | Associated cloud accounts (Google, Samsung) log and alert users of critical security events like new device sign-ins and password changes. |
| Passwords | Require change after setup with complexity requirements | [12] | During the initial device setup, the user is required to create a screen lock that meets the OS's minimum complexity standards. |
| Category score | 1 | ||
| Grade | A- |
|---|