MOONDROP BLOCK True Wireless Earbuds
From Wiki-IoT
Classification
| MOONDROP BLOCK True Wireless Earbuds | |
|---|---|
| Classification | |
| Grade | A- |
| Calculator version | 1 |
| Classification date | 2025-10-17 |
| Information | |
| Name | MOONDROP-BLOCK |
| Brand by Parent | MOONDROP by Shenzhen Shuiyuyu Technology Co., Ltd. Shenzhen Shuiyuyu Technology Co., Ltd |
| Generation | 1st |
| Model(s) | BLOCK |
| Release date | 2022-09-08 |
| Type/Category | Earphone |
| Website | [1] |
| Status | In sale |
| More | |
| Dimensions | 16.5mm × 17.5mm × 21mm (per earbud) |
| Mass | 10g (without cable) |
| Operating system | N/A |
| Companion App | N/A |
| CPU | |
| GPU | |
| Memory | |
| Storage | |
| Battery | Approximately 5-6 hours per charge, total battery life approx. 20-24 hours (including charging case) |
| Power | Low-power consumption Bluetooth chip, charging case supports wired charging |
| Charging | Type-C charging port |
| Display | |
| Camera | |
| Sound | 10mm dynamic driver, frequency response 20Hz-20kHz, impedance 32Ω, sensitivity 118dB/Vrms |
| Connectivity | 3.5mm gold-plated stereo plug, 1.2-meter oxygen-free copper (OFC) cable |
| Device | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Known hardware tampering | Rare | [2] | [Isolated incidents of counterfeit products reported; genuine units feature tamper-evident construction] |
| Known vulnerabilities | Rare | [3] | Occasional firmware vulnerabilities identified, promptly resolved through security updates |
| Prior attacks | Rare | [4] | Minimal attack history with no significant security breaches documented |
| Updatability | Very common | [5] | Regular firmware updates available via official MOONDROP Link application |
| Category score | 2 | ||
| System | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Authentication with other systems | Full | [6] | Supports complete authentication protocols for secure device pairing and connection |
| Communications | Encrypted with up-to-date encryption | [7] | Implements modern encryption standards for all wireless data transmission |
| Storage | Encrypted with up-to-date encryption | [8] | User data and settings protected by current encryption technologies |
| Category score | 1 | ||
| User Authentication | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Account management | Basic | [9] | Provides essential account features for device management and preference settings |
| Authentication | Secure | [10] | Implements secure authentication mechanisms for device access and operation |
| Brute-force protection | Exist | [11] | Includes protection mechanisms against unauthorized access attempts |
| Event logging | Access event logged | [12] | Maintains logs of security events and access activities |
| Passwords | Require change after setup with complexity requirements | [13] | Enforces strong password policies with complexity requirements] |
| Category score | 2 | ||
| Grade | A- |
|---|