Nothing Phone (2a)
From Wiki-IoT
Classification
| Nothing Phone (2a) | |
|---|---|
| Classification | |
| Grade | A |
| Calculator version | 1 |
| Classification date | 2025-10-05 |
| Information | |
| Name | Nothing Phone (2a) |
| Brand by Parent | Nothing by Nothing Technology Limited |
| Generation | Second-generation mid-range model |
| Model(s) | A142 |
| Release date | 2024-03-05 |
| Type/Category | Smartphone |
| Website | [1] |
| Status | In sale |
| More | |
| Dimensions | 161.7 x 76.3 x 8.6 mm |
| Mass | 190g |
| Operating system | Nothing OS 2.5 |
| Companion App | No standalone supporting application (system-level integration) |
| CPU | MediaTek Dimensity 7200 Pro |
| GPU | Arm Mali-G610 MC4 |
| Memory | 8GB/12GB RAM(LPDDR4X) |
| Storage | 128GB/256GB UFS 2.2 |
| Battery | 5000mAh |
| Power | Supports 45W PD fast charging |
| Charging | Wired 45W (charger sold separately), wireless charging not supported |
| Display | 6.7英寸FHD AMOLED(120Hz刷新率) |
| Camera | Rear: 50MP main camera (Samsung GN9) + 50MP ultra-wide camera (Samsung JN1)Front: 32MP (Sony IMX615) |
| Sound | Stereo dual speakers, supporting high-resolution audio |
| Connectivity | Supports 5G, Wi-Fi 6, Bluetooth 5.3, NFC |
| Device | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Known hardware tampering | None | [2] | The brand follows a transparent design concept, with no known cases of hardware-level malicious tampering. iFixit's teardown report also did not find any abnormalities. |
| Known vulnerabilities | Rare | [3] | Promises regular security updates, and as a relatively niche brand, it is less targeted by large-scale attacks. Identified critical vulnerabilities are patched through monthly security updates. |
| Prior attacks | None | [4] | As of now, there have been no publicly reported large-scale successful attacks specifically targeting the Phone (2a). |
| Updatability | Very common | [5] | The official promise to provide 3 major Android version updates and 4 years of security updates makes the update strategy very clear and common for mid-range devices. |
| Category score | 2 | ||
| System | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Authentication with other systems | Full | [6] | As an Android device, it fully supports authentication integration with Google services (such as Google accounts) and other systems through standard APIs (such as OAuth). |
| Communications | Encrypted with up-to-date encryption | [7] | The system defaults to enforcing the use of TLS and other encryption protocols for network communication, in line with modern Android standards. |
| Storage | Encrypted with up-to-date encryption | [8] | Devices are shipped with file-level encryption (FBE) or full-disk encryption (FDE) enabled by default to protect user data. |
| Category score | 1 | ||
| User Authentication | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Account management | Full | [9] | Supports a complete Google account management system, including adding, deleting accounts, and synchronization management. |
| Authentication | Secure | [10] | It provides both under-display optical fingerprint recognition and facial recognition for biometric authentication, offering higher security than using passwords alone. |
| Brute-force protection | Exist | [11] | After multiple consecutive failed attempts of fingerprint or password, the system will enforce a delay or require the use of the master password to unlock, preventing brute-force attacks. |
| Event logging | Access event logged | [12] | System-level events such as login successes/failures are recorded, but ordinary users cannot directly view the complete logs. |
| Passwords | Require change after setup with complexity requirements | [13] | When setting up or changing the screen lock for the first time, the system requires a password/PIN/pattern that meets minimum length and complexity requirements, and prompts for periodic changes. |
| Category score | 1 | ||
| Grade | A |
|---|