HONOR X60 GT
From Wiki-IoT
Classification
| HONOR X60 GT | |
|---|---|
| Classification | |
| Grade | A |
| Calculator version | 1 |
| Classification date | 2025-10-14 |
| Information | |
| Name | HONOR X60 GT |
| Brand by Parent | HONOR by HONOR |
| Generation | 2 |
| Model(s) | X60 GT |
| Release date | 2025-04-01 |
| Type/Category | mobile phone |
| Website | [1] |
| Status | In sale |
| More | |
| Dimensions | 161mm×74.2mm×7.7mm |
| Mass | 193g |
| Operating system | Android 15 |
| Companion App | Magic OS 9.0 |
| CPU | The first generation Snapdragon 8+mobile platform |
| GPU | Adreno 730 |
| Memory | 12GB |
| Storage | 256GB |
| Battery | Lithium polymer battery |
| Power | 6300mAh |
| Charging | The phone supports up to 20V/4A super fast charging and is compatible with 11V/6A or 10V/4A super fast charging. |
| Display | FHD+ 2664*1200 |
| Camera | Rear camera: 50 megapixel camera (f/1.88 aperture, supports OIS optical image stabilization)+2 megapixel depth of field camera (f/2.4 aperture) |
| Sound | Number of speakers 2 of them |
| Connectivity | Type-C,USB 2.0 |
| Device | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Known hardware tampering | None | [] | The equipment adopts anti disassembly design and sealing technology, and there are relatively few cases of hardware tampering in public records. |
| Known vulnerabilities | Rare | [] | As of the evaluation, no serious public vulnerabilities have been found; The system regularly receives security patches. |
| Prior attacks | Rare | [] | There have been only a few reports of low-risk attacks in the past year, which have been mitigated through updates. |
| Updatability | Very common | [] | The device receives monthly security updates and supports seamless upgrades, with a user coverage rate of over 90%. |
| Category score | 2 | ||
| System | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Authentication with other systems | Full | [] | Support multi factor authentication (such as fingerprint and facial recognition), and can be securely integrated with systems such as Google services. |
| Communications | Encrypted with up-to-date encryption | [] | All network communications are encrypted using AES-256 and TLS 1.3, in compliance with industry best practices. |
| Storage | Encrypted with up-to-date encryption | [] | The device is equipped with hardware level encryption (such as FBE), static data encryption, and key security management. |
| Category score | 1 | ||
| User Authentication | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Account management | Full | [] | Please note that the system supports self-service registration, email verification, and role-based access control based on permissions |
| Authentication | Secure | [] | Explanation: Authentication uses MFA (such as SMS verification code) and HTTPS encryption to prevent man in the middle attacks |
| Brute-force protection | Exist | [] | Note that the system locks the account after 5 failed login attempts and integrates CAPTCHA verification |
| Event logging | Access event logged | [] | The system records all login attempts (time, IP, results) and stores them on a secure server |
| Passwords | Require change after setup with complexity requirements | [] | Please note that the password requires a minimum length of 8 characters, including uppercase and lowercase letters and numbers. It must be changed upon first login. |
| Category score | 1 | ||
| Grade | A |
|---|