HONOR 7
From Wiki-IoT
Classification
| HONOR 7 | |
|---|---|
| Classification | |
| Grade | C |
| Calculator version | 1 |
| Classification date | 2025-10-15 |
| Information | |
| Name | HONOR 7 |
| Brand by Parent | Honor by Huawei Technologies Co., Ltd. (Honor was a subsidiary of Huawei when Honor 7 launched) |
| Generation | 7th generation (Honor digital series) |
| Model(s) | PLK-AL10, PLK-TL01H, PLK-UL00 (regional variants) |
| Release date | 2015-06-30 |
| Type/Category | Smartphone |
| Website | [1] |
| Status | End of sale |
| More | |
| Dimensions | 143.2 mm × 71.9 mm × 8.5 mm |
| Mass | 157 g |
| Operating system | Android 5.0 (Lollipop) with EMUI 3.1 |
| Companion App | HiSuite (for device management & backup) |
| CPU | HiSilicon Kirin 935 |
| GPU | Mali-T628 |
| Memory | 3GB |
| Storage | 16GB / 64GB |
| Battery | 3100 mAh |
| Power | Wired power input (via Micro-USB) |
| Charging | Quick Charge (up to 9V/2A) |
| Display | 5.2-inch IPS LCD, 1920×1080 resolution |
| Camera | Rear: 20MP; Front: 8MP |
| Sound | Single speaker, 3.5mm headphone jack |
| Connectivity | 4G LTE, Wi-Fi 802.11b/g/n, Bluetooth 4.1, NFC, GPS |
| Device | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Known hardware tampering | Rare | [2] | Consumer smartphone hardware tampering is not widespread. |
| Known vulnerabilities | Rare | [3] | Limited public vulnerabilities, partly due to outdated software. |
| Prior attacks | Rare | [4] | Few documented direct attacks on this specific model. |
| Updatability | None | [5] | No official OS updates past Android 6.0 (EMUI 4.0). |
| Category score | 3 | ||
| System | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Authentication with other systems | Partial | [6] | Basic authentication (Bluetooth, Wi-Fi) works; advanced integrations limited. |
| Communications | Encrypted with obselete encryption | [7] | Uses older TLS versions/3G encryption (outdated by modern standards). |
| Storage | Encrypted with obselete encryption | [8] | Relies on Android 5.0-era disk encryption (less secure by current norms). |
| Category score | 2 | ||
| User Authentication | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Account management | Basic | [9] | Basic account functions (login, simple profile management) are available, without advanced administrative capabilities. |
| Authentication | Basic | [10] | Supports basic methods like password and pattern unlocking, but lacks modern biometric authentication (such as fingerprint or face recognition) and secure hardware keys. |
| Brute-force protection | Basic | [11] | Has basic protection like temporary lockout after multiple failed login attempts, but the implementation is based on the older Android 5.0 system, which is less robust compared to modern standards. |
| Event logging | Partial logging | [12] | Logs some access events (e.g., failed login attempts), but the logging is not comprehensive or detailed. |
| Passwords | Require change after setup | [13] | Requires setting a password when the device is first set up, but there are no strict requirements for password complexity (due to being based on the legacy Android system). |
| Category score | 2 | ||
| Grade | C |
|---|