Apple Iphone XR
From Wiki-IoT
Classification
| Apple Iphone XR | |
|---|---|
| Classification | |
| Grade | A- |
| Calculator version | 1 |
| Classification date | 2022-01-31 |
| Information | |
| Name | Iphone XR |
| Brand by Parent | Apple by Apple |
| Generation | 10th |
| Model(s) | XR |
| Release date | 2018-09-12 |
| Type/Category | Smartphone |
| Website | [1] |
| Status | In sale |
| More | |
| Dimensions | 75,7 x 150,9 mm |
| Mass | 194 g |
| Operating system | IOS 15.3 |
| Companion App | camera |
| CPU | 2x 2.5 GHz Vortex |
| GPU | |
| Memory | 3 Go |
| Storage | 64Go |
| Battery | 83 % |
| Power | 2942 mAh |
| Charging | fast charging |
| Display | 6.06-inch (154 mm) Retina Liquid Display: LED-backlit LCD TV screen IPS LCD, 1792×828 px (326 ppi) |
| Camera | Appareil photo grand‑angle 12 Mpx Ouverture ƒ/1,8 |
| Sound | Formats audio pris en charge : AAC-LC, HE-AAC, HE-AAC v2, AAC protégé, MP3, PCM linéaire, Apple Lossless, FLAC, Dolby Digital (AC‑3), Dolby Digital Plus (E-AC‑3), Dolby Atmos et Audible (formats 2, 3, 4, Audible Enhanced Audio, AAX et AAX+ |
| Connectivity | 4G LTE Advanced4 Wi‑Fi 802.11ac avec MIMO 2x2 Technologie sans fil Bluetooth 5.0 NFC avec mode lecteur Cartes Express avec réserve d’énergie |
| Device | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Known hardware tampering | Rare | [2] | |
| Known vulnerabilities | Rare | [3] | |
| Prior attacks | Very common | [4] | Il y'a le port 62078 avec le iphone-sync exploit qui existe aussi lorsqu'on scanne avec nmap |
| Updatability | Very common | [5] | |
| Category score | 2 | ||
| System | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Authentication with other systems | Full | [6] | |
| Communications | Encrypted with up-to-date encryption | [7] | Datavault |
| Storage | Encrypted with up-to-date encryption | [8] | Filevault |
| Category score | 1 | ||
| User Authentication | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Account management | Full | [9] | |
| Authentication | Secure | [10] | |
| Brute-force protection | Basic | [11] | |
| Event logging | Access event logged | [12] | |
| Passwords | Require change after setup with complexity requirements | [13] | |
| Category score | 2 | ||
| Grade | A- |
|---|