EOS R5 Mark II
From Wiki-IoT
Classification
EOS R5 Mark II | |
---|---|
Classification | |
Grade | B |
Calculator version | 1 |
Classification date | 2025-10-05 |
Information | |
Name | EOS R5 Mark II |
Brand by Parent | Canon by Canon Inc. |
Generation | 2nd generation |
Model(s) | EOS RS Mark II |
Release date | 2024-07-07 |
Type/Category | Digital Camera |
Website | [1] |
Status | In sale |
More | |
Dimensions | Approx. 138.4 × 97.5 × 88.4 mm |
Mass | Approx. 890g (including battery and memory card) |
Operating system | Canon's proprietary imaging system |
Companion App | Canon Camera Connect |
CPU | DIGIC X Image Processor |
GPU | Integrated in DIGIC X Processor |
Memory | 1GB DDR4 |
Storage | Supports CFexpress Type B, SD UHS - II memory cards |
Battery | LP - E6NH lithium - ion battery |
Power | Approximately 18W (in working state) |
Charging | Supports USB Type - C charging |
Display | 3.2 - inch approximately 2.1 million - dot tiltable touch LCD |
Camera | Full - frame CMOS sensor, approximately 60 million effective pixels; DIGIC X image processor; Maximum continuous shooting speed of approximately 20 frames per second; Supports 8K RAW video shooting, etc. |
Sound | Built - in stereo microphone, supports external microphone |
Connectivity | Wi - Fi, Bluetooth, USB Type - C, HDMI, etc. |
Device | |||
---|---|---|---|
Criterion | Value | Proof(s) | Comment |
Known hardware tampering | None | [2] | No known cases of hardware tampering reported for Canon EOS series cameras. |
Known vulnerabilities | Rare | [3] | Canon has a good track record in addressing vulnerabilities promptly, so few are known to persist. |
Prior attacks | None | [4] | No public reports of successful attacks on this specific model. |
Updatability | Very common | [5] | Firmware updates are regularly released for performance and security enhancements. |
Category score | 2 |
System | |||
---|---|---|---|
Criterion | Value | Proof(s) | Comment |
Authentication with other systems | Partial | [6] | Can connect with some Canon - certified accessories and software with partial authentication. |
Communications | Encrypted with up-to-date encryption | [7] | Uses modern encryption protocols for data transfer. |
Storage | Encrypted with up-to-date encryption | [8] | In - camera storage and data handling use current encryption standards. |
Category score | 2 |
User Authentication | |||
---|---|---|---|
Criterion | Value | Proof(s) | Comment |
Account management | Basic | [9] | Basic account setup for camera - related services. |
Authentication | Secure | [10] | Secure methods like password protection for camera access. |
Brute-force protection | Exist | [11] | Mechanisms in place to prevent brute - force attacks on login. |
Event logging | Partial logging | [12] | Logs key events but not all system activities. |
Passwords | Require change after setup with complexity requirements | [13] | Prompts for password change after initial setup with rules for complexity. |
Category score | 2 |
Grade | B |
---|