HONOR Magic V5
From Wiki-IoT
Classification
| HONOR Magic V5 | |
|---|---|
| Classification | |
| Grade | A |
| Calculator version | 1 |
| Classification date | 2025-10-17 |
| Information | |
| Name | HONOR Magic V5 |
| Brand by Parent | HONOR by HONOR |
| Generation | V5 |
| Model(s) | Magic |
| Release date | 2025-07-01 |
| Type/Category | mobile phone |
| Website | [1] |
| Status | In sale |
| More | |
| Dimensions | 156.8 x 145.9 x 4.2 mm |
| Mass | 222g |
| Operating system | Android 15 |
| Companion App | MagicOS 9.0.1 |
| CPU | Snapdragon 8 Elite |
| GPU | Adreno™830 |
| Memory | 12GB |
| Storage | 256GB |
| Battery | Lithium polymer battery |
| Power | 5820mAh |
| Charging | The phone supports a maximum of 20V/3.3A super fast charging and is compatible with 11V/3.2A or 5V/2A charging. |
| Display | 2352x2172 |
| Camera | Rear triple camera: 50 megapixel wide-angle camera (f/1.6 aperture)+50 megapixel ultra wide angle camera (f/2.0 aperture)+64 megapixel periscope telephoto camera (f/2.5 aperture), supporting laser focusing and rear color temperature sensor |
| Sound | Number of speakers 2 of them |
| Connectivity | USB Type-C,USB 3.1 GEN1 |
| Device | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Known hardware tampering | Rare | [2] | The equipment adopts anti disassembly design and sealing technology, and there are relatively few cases of hardware tampering in public records. |
| Known vulnerabilities | None | [3] | As of the evaluation, no serious public vulnerabilities have been found; The system regularly receives security patches. |
| Prior attacks | Rare | [4] | There have been only a few reports of low-risk attacks in the past year, which have been mitigated through updates. |
| Updatability | Very common | [5] | The device receives monthly security updates and supports seamless upgrades, with a user coverage rate of over 90%. |
| Category score | 2 | ||
| System | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Authentication with other systems | Full | [] | Support multi factor authentication (such as fingerprint and facial recognition), and can be securely integrated with systems such as Google services. |
| Communications | Encrypted with up-to-date encryption | [6] | All network communications are encrypted using AES-256 and TLS 1.3, in compliance with industry best practices. |
| Storage | Encrypted with up-to-date encryption | [] | The device is equipped with hardware level encryption (such as FBE), static data encryption, and key security management. |
| Category score | 1 | ||
| User Authentication | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Account management | Full | [] | Please note that the system supports self-service registration, email verification, and role-based access control based on permissions |
| Authentication | Secure | [] | Explanation: Authentication uses MFA (such as SMS verification code) and HTTPS encryption to prevent man in the middle attacks |
| Brute-force protection | Exist | [] | Note that the system locks the account after 5 failed login attempts and integrates CAPTCHA verification |
| Event logging | Access event logged | [] | The system records all login attempts (time, IP, results) and stores them on a secure server |
| Passwords | Require change after setup with complexity requirements | [] | Please note that the password requires a minimum length of 8 characters, including uppercase and lowercase letters and numbers. It must be changed upon first login. |
| Category score | 1 | ||
| Grade | A |
|---|