Mojawa Terra

From Wiki-IoT


Classification

Mojawa Terra
Classification
Grade C
Calculator version 1
Classification date 2025-10-05
Information
Name HaptiFit Terra Smart Professional Sports Earphones
Brand by Parent Mojawa by Mojawa
Generation 1st
Model(s) Terra
Release date 2024-01-19
Type/Category Earphone
Website [1]
Status In sale
More
Dimensions
Mass
Operating system Proprietary Embedded System
Companion App mojawa
CPU Proprietary Bluetooth Audio SoC (System on a Chip)
GPU Not Applicable
Memory
Storage 4GB Internal Storage
Battery Lithium-ion, approx. 10-hour battery life
Power USB-C Charging
Charging Supports fast charging (10 min charge for 2 hours of use)
Display None
Camera None
Sound Bone Conduction + Air Conduction Dual Drivers
Connectivity Bluetooth (version unspecified, likely 5.x), USB-C
Device
Criterion Value Proof(s) Comment
Known hardware tampering None [] Risk of hardware tampering is very low for a mass-market consumer electronic device.
Known vulnerabilities None [] No publicly disclosed specific vulnerabilities for this model. Its simple functionality presents a small attack surface.
Prior attacks None [] No publicly reported attack instances targeting this specific model.
Updatability Rare [] Firmware updates may be possible via a companion app, but frequency and long-term support are unclear.
Category score 2
System
Criterion Value Proof(s) Comment
Authentication with other systems Partial [] Uses standard Bluetooth pairing (e.g., PIN code) for connection.
Communications Encrypted with up-to-date encryption [] Bluetooth connections are encrypted by default (e.g., using AES-CCM). Security depends on the Bluetooth version implemented.
Storage No encryption [] The 4GB internal storage for music files is most likely not encrypted.
Category score 2
User Authentication
Criterion Value Proof(s) Comment
Account management Absent [] The earphones themselves have no user account system. A companion app may require an account.
Authentication Basic [] Physical power on/off. Bluetooth pairing is the primary "authentication" method.
Brute-force protection Absent [] The Bluetooth pairing process itself has no brute-force protection mechanism, but the need for physical proximity reduces this risk.
Event logging Absent [] The device itself has no event logging capability.
Passwords Default/Common/Easy to guess [] Bluetooth pairing typically uses common PINs like "0000" or "1234", or requires no PIN.
Category score 3
Grade C