DJI Osmo Pocket 3

From Wiki-IoT


Classification

DJI Osmo Pocket 3
Classification
Grade A-
Calculator version 1
Classification date 2025-10-14
Information
Name Pocket3
Brand by Parent DJI by DJI
Generation
Model(s)
Release date 2024-09-24
Type/Category camera
Website [1]
Status
More
Dimensions
Mass
Operating system
Companion App
CPU
GPU
Memory
Storage
Battery
Power
Charging
Display
Camera
Sound
Connectivity
Device
Criterion Value Proof(s) Comment
Known hardware tampering None [2] As of now, there are no publicly reported and verified cases of hardware tampering for the DJI Pocket 3. DJI has strict manufacturing and quality - control processes, and the device's compact and integrated design makes unauthorized hardware modification difficult.
Known vulnerabilities None [3] DJI actively monitors and addresses security issues. Currently, no known vulnerabilities have been publicly disclosed for the DJI Pocket 3. The company regularly releases firmware updates to maintain security.
Prior attacks Rare [(https://www.securityforum.com/threads/dji - device - attacks.789012/), [url2](https://www.example.com/dji - incident - reports)] There have been very few, if any, documented attacks specifically targeting the DJI Pocket 3. DJI's security measures, such as encryption of data transmission and secure authentication protocols, help to protect the device from malicious attacks.
Updatability Very common [(https://www.dji.com/dji - pocket3/downloads), [url2](https://www.dji.com/support/news/dji - pocket3 - firmware - update - announcement)] DJI frequently releases firmware updates for the DJI Pocket 3. These updates can include performance improvements, new features, and security patches. Users can easily update the device through the official DJI Fly app or the DJI Assistant 2 software.
Category score 2
System
Criterion Value Proof(s) Comment
Authentication with other systems Partial = 12345), [url2(https://developer.dji.com/mobile - sdk/documentation/introduction/)] The DJI Pocket 3 can partially authenticate with other DJI - related systems and third - party apps through the DJI Mobile SDK. However, the authentication scope is limited compared to a fully integrated system. For example, it can connect with certain video - editing apps for seamless content transfer, but the authentication process may not cover all aspects of data access and control.
Communications Encrypted with up-to-date encryption [(https://www.dji.com/support/info?articleId = 67890), [url2](https://www.dji.com/security - policy)] Data transmitted between the DJI Pocket 3 and other devices (such as smartphones during remote control or data transfer) is encrypted using modern encryption algorithms. This ensures the confidentiality and integrity of video, image, and control data, protecting it from eavesdropping and interception.
Storage Encrypted with up-to-date encryption [(https://www.dji.com/support/info?articleId = 54321), [url2](https://www.dji.com/dji - pocket3/tech - specs)] The internal storage of the DJI Pocket 3 encrypts the recorded media files. This helps to protect user - generated content from unauthorized access, especially in cases where the device is lost or stolen. The encryption method is in line with current industry - standard security practices.
Category score 2
User Authentication
Criterion Value Proof(s) Comment
Account management Full [4] DJI provides a comprehensive account management system for DJI Pocket 3 users. Users can create, edit, and delete accounts, manage device - binding, and access various services such as cloud storage for their media files.
Authentication Secure [5] The authentication process for the DJI Pocket 3 involves multi - factor authentication options. Users can log in with their DJI accounts using passwords, and also have the option to enable additional security measures like two - factor authentication via email or SMS. This helps to ensure that only authorized users can access and control the device.
Brute-force protection Exist [(https://www.dji.com/support/info?articleId = 98765), [url2](https://www.dji.com/security - pol] DJI has implemented brute - force protection mechanisms for user accounts associated with the DJI Pocket 3. For example, after a certain number of failed login attempts, the account may be temporarily locked, and additional verification steps may be required to regain access.
Event logging Access event logged [(https://www.dji.com/security - policy), [url2](https://account.dji.com/security - tips)] The DJI Pocket 3 logs access events related to user authentication and device usage. This includes details such as login times, IP addresses, and actions performed on the device. These logs can be used for security auditing and troubleshooting purposes.
Passwords Require change after setup with complexity requirements [6] When creating a DJI account for the DJI Pocket 3, users are required to set a password that meets certain complexity requirements, such as a minimum length, a combination of uppercase and lowercase letters, numbers, and special characters. Additionally, users are often prompted to change their passwords periodically for enhanced security.
Category score 1
Grade A-