Kindle Paperwhite 2
From Wiki-IoT
Classification
| Kindle Paperwhite 2 | |
|---|---|
| Classification | |
| Grade | C |
| Calculator version | 1 |
| Classification date | 2025-10-05 |
| Information | |
| Name | Amazon Kindle Paperwhite 2 |
| Brand by Parent | Kindle by Amazon |
| Generation | 6th (Kindle lineage), 2nd (Paperwhite series) |
| Model(s) | Kindle Paperwhite |
| Release date | 2013-09-30 |
| Type/Category | E-Reader |
| Website | [Amazon.com] |
| Status | End of sale |
| More | |
| Dimensions | 169 mm (H) x 117 mm (W) x 9.1 mm (D) |
| Mass | 206 g |
| Operating system | Custom Linux-based OS |
| Companion App | Not Applicable (Managed via Amazon account) |
| CPU | Freescale i.MX50 Rev.1.1, 800 MHz |
| GPU | (Not specified in sources, integrated with CPU) |
| Memory | 256 MB RAM |
| Storage | 4 GB internal (approx 3 GB user-accessible), non-expandable |
| Battery | 1420 mAh |
| Power | Via USB connection to computer or power adapter |
| Charging | Via proprietary USB cable |
| Display | 6-inch E Ink Pearl capacitive touchscreen, 1024 x 758 resolution (212 PPI), 16-level grayscale, with built-in front light |
| Camera | None |
| Sound | None |
| Connectivity | Wi-Fi 802.11b/g/n, Free 3G (optional on specific model) via Amazon Whispernet, Micro-USB |
| Device | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Known hardware tampering | Rare | [www.amazon.com] | Closed consumer device with low physical tampering incentive. No widely documented hardware exploits. |
| Known vulnerabilities | None | [www.amazon.com] | No widespread public vulnerabilities specific to Kindle Paperwhite 1 documented in available sources. |
| Prior attacks | Rare | [www.amazon.com] | No widely documented specific attack events targeting the Kindle Paperwhite 1 model. |
| Updatability | None | [www.amazon.com] | Hardware is not user-upgradable (storage, memory fixed). |
| Category score | 2 | ||
| System | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Authentication with other systems | Partial | [www.amazon.com] | Primarily through Amazon account for book purchases and syncing via Whispernet/Whispersync. |
| Communications | Encrypted with obselete encryption | [www.amazon.com] | Inferences from era: Uses SSL for Whispernet. Security would be considered not secure for personal data by modern standards. |
| Storage | Encrypted with obselete encryption | [www.amazon.com] | DRM for purchased content managed by Amazon. Device storage encryption status not detailed in available sources. |
| Category score | 2 | ||
| User Authentication | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Account management | Basic | [www.amazon.com] | Binding and management via Amazon account. |
| Authentication | Basic | [www.amazon.com] | Relies on device passcode and Amazon account password. No two-factor authentication (2FA). |
| Brute-force protection | Basic | [www.amazon.com] | Basic passcode attempt limits likely present. |
| Event logging | Absent | [www.amazon.com] | No detailed user action logging functionality mentioned in sources. |
| Passwords | Default/Common/Easy to guess | [www.amazon.com] | No mandatory complexity requirements for device passcode inferred from era and class. Users advised to create strong passcodes. |
| Category score | 3 | ||
| Grade | C |
|---|