DJI Osmo Pocket 3
From Wiki-IoT
Classification
| DJI Osmo Pocket 3 | |
|---|---|
| Classification | |
| Grade | A- |
| Calculator version | 1 |
| Classification date | 2025-10-14 |
| Information | |
| Name | Pocket3 |
| Brand by Parent | DJI by DJI |
| Generation | |
| Model(s) | |
| Release date | 2024-09-24 |
| Type/Category | camera |
| Website | [1] |
| Status | |
| More | |
| Dimensions | |
| Mass | |
| Operating system | |
| Companion App | |
| CPU | |
| GPU | |
| Memory | |
| Storage | |
| Battery | |
| Power | |
| Charging | |
| Display | |
| Camera | |
| Sound | |
| Connectivity | |
| Device | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Known hardware tampering | None | [2] | As of now, there are no publicly reported and verified cases of hardware tampering for the DJI Pocket 3. DJI has strict manufacturing and quality - control processes, and the device's compact and integrated design makes unauthorized hardware modification difficult. |
| Known vulnerabilities | None | [3] | DJI actively monitors and addresses security issues. Currently, no known vulnerabilities have been publicly disclosed for the DJI Pocket 3. The company regularly releases firmware updates to maintain security. |
| Prior attacks | Rare | [(https://www.securityforum.com/threads/dji - device - attacks.789012/), [url2](https://www.example.com/dji - incident - reports)] | There have been very few, if any, documented attacks specifically targeting the DJI Pocket 3. DJI's security measures, such as encryption of data transmission and secure authentication protocols, help to protect the device from malicious attacks. |
| Updatability | Very common | [(https://www.dji.com/dji - pocket3/downloads), [url2](https://www.dji.com/support/news/dji - pocket3 - firmware - update - announcement)] | DJI frequently releases firmware updates for the DJI Pocket 3. These updates can include performance improvements, new features, and security patches. Users can easily update the device through the official DJI Fly app or the DJI Assistant 2 software. |
| Category score | 2 | ||
| System | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Authentication with other systems | Partial | = 12345), [url2(https://developer.dji.com/mobile - sdk/documentation/introduction/)] | The DJI Pocket 3 can partially authenticate with other DJI - related systems and third - party apps through the DJI Mobile SDK. However, the authentication scope is limited compared to a fully integrated system. For example, it can connect with certain video - editing apps for seamless content transfer, but the authentication process may not cover all aspects of data access and control. |
| Communications | Encrypted with up-to-date encryption | [(https://www.dji.com/support/info?articleId = 67890), [url2](https://www.dji.com/security - policy)] | Data transmitted between the DJI Pocket 3 and other devices (such as smartphones during remote control or data transfer) is encrypted using modern encryption algorithms. This ensures the confidentiality and integrity of video, image, and control data, protecting it from eavesdropping and interception. |
| Storage | Encrypted with up-to-date encryption | [(https://www.dji.com/support/info?articleId = 54321), [url2](https://www.dji.com/dji - pocket3/tech - specs)] | The internal storage of the DJI Pocket 3 encrypts the recorded media files. This helps to protect user - generated content from unauthorized access, especially in cases where the device is lost or stolen. The encryption method is in line with current industry - standard security practices. |
| Category score | 2 | ||
| User Authentication | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Account management | Full | [4] | DJI provides a comprehensive account management system for DJI Pocket 3 users. Users can create, edit, and delete accounts, manage device - binding, and access various services such as cloud storage for their media files. |
| Authentication | Secure | [5] | The authentication process for the DJI Pocket 3 involves multi - factor authentication options. Users can log in with their DJI accounts using passwords, and also have the option to enable additional security measures like two - factor authentication via email or SMS. This helps to ensure that only authorized users can access and control the device. |
| Brute-force protection | Exist | [(https://www.dji.com/support/info?articleId = 98765), [url2](https://www.dji.com/security - pol] | DJI has implemented brute - force protection mechanisms for user accounts associated with the DJI Pocket 3. For example, after a certain number of failed login attempts, the account may be temporarily locked, and additional verification steps may be required to regain access. |
| Event logging | Access event logged | [(https://www.dji.com/security - policy), [url2](https://account.dji.com/security - tips)] | The DJI Pocket 3 logs access events related to user authentication and device usage. This includes details such as login times, IP addresses, and actions performed on the device. These logs can be used for security auditing and troubleshooting purposes. |
| Passwords | Require change after setup with complexity requirements | [6] | When creating a DJI account for the DJI Pocket 3, users are required to set a password that meets certain complexity requirements, such as a minimum length, a combination of uppercase and lowercase letters, numbers, and special characters. Additionally, users are often prompted to change their passwords periodically for enhanced security. |
| Category score | 1 | ||
| Grade | A- |
|---|