Xiaomi 15
From Wiki-IoT
Revision as of 13:51, 17 October 2025 by Jeandecian (talk | contribs) (Jeandecian moved page Xiaomi Mi 15 to Xiaomi 15 without leaving a redirect)
Classification
| Xiaomi 15 | |
|---|---|
| Classification | |
| Grade | A+ |
| Calculator version | 1 |
| Classification date | 2024-10-31 |
| Information | |
| Name | XiaoMi15 |
| Brand by Parent | Xiaomi by Xiaomi Technology Co., Ltd. |
| Generation | 15 |
| Model(s) | Xiaomi 15 |
| Release date | 2023-01-18 |
| Type/Category | Smartphone |
| Website | [Xiaomi Official Website] |
| Status | In sale |
| More | |
| Dimensions | 161.4 x 73.9 x 8.7 mm |
| Mass | 185g |
| Operating system | Android 13, MIUI 14 |
| Companion App | Mi Wear |
| CPU | Adreno 740 |
| GPU | 8GB / 12GB LPDDR5X |
| Memory | 128GB / 256GB UFS 4.0 |
| Storage | 128GB / 256GB UFS 4.0 |
| Battery | 4800mAh, supports 90W wired fast charging and 50W wireless fast charging |
| Power | Supports reverse charging |
| Charging | Supports QC5.0, PD3.0 and other fast charging protocols |
| Display | 6.5" AMOLED screen, resolution of 3200x1440, supports 120Hz refresh rate |
| Camera | Rear quad camera: 50MP main camera (IMX989), 48MP ultrawide, 48MP telephoto, 48MP periscope telephoto Front single camera: 32MP |
| Sound | Stereo dual speakers, Harman Kardon tuning |
| Connectivity | Wi-Fi 6E, Bluetooth 5.2, NFC, IR remote control, USB Type-C port |
| Device | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Known hardware tampering | None | [1] | |
| Known vulnerabilities | None | [2] | |
| Prior attacks | None | [3] | |
| Updatability | Very common | [4] | |
| Category score | 1 | ||
| System | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Authentication with other systems | Full | [5] | |
| Communications | Encrypted with up-to-date encryption | [6] | |
| Storage | Encrypted with up-to-date encryption | [7] | |
| Category score | 1 | ||
| User Authentication | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Account management | Full | [8] | |
| Authentication | Secure | [9] | |
| Brute-force protection | Exist | [10] | |
| Event logging | Access event logged | [11] | |
| Passwords | Require change after setup with complexity requirements | [12] | |
| Category score | 1 | ||
| Grade | A+ |
|---|